The last communique I had with xetsr was 14 July 2016, 13:30:20 » we were comparing notes about some dubious trades in the Currency Exchange section.
|
|
|
I suspect Tomatocage u=37522 is using an Alt to lurk on this forum.A couple of days ago I modified negative trust I'd left them splitting it into two trusts; one neutral, the other negative. The negative trust of Tomatocage concerns their baseless accusation that: Within 24 hours of me doing so, Tomatocage has logged back into BCT as them-self, but has not posted anything. http://archive.is/DLSf9Tomatocage has been offline over the last 365 days since I made a comparison to Quickseller's use of "use escrow" when leaving negative trust when QS was on the DT https://bitcointalk.org/index.php?topic=1183087.msg12466169#msg12466169I hadn't realised when Tomatocage posted their accusation against me that they then went dark for 12 months, but the comparisons between Tomatocage's and Quickseller's flagrant use of Red Paint TM Plus lashing out with unfounded accusations against me (both Tom. and QS have said I have Alt's but refuse to offer proof, just an accusation) Then there was the accusation that Tomatocage had self-escrowed (Quickseller's downfall) which conveniently turned out to be Tom's flatmate had been logged in... I have to wonder if perhaps they are related in some way or other? In either case it was uncanny that Tomatocage came back online <24 hours after I modified my negative trust. 12 hours (almost to the minute) after Tomatocage last logged in http://archive.is/DLSf9#selection-375.0-379.31 Quickseller created the thread List of users that condone violence - avoid doing business with anyone listed https://bitcointalk.org/index.php?topic=1614573.0 - An archive of the posts (thus far) http://archive.is/Le59AUncanny coincidence?
|
|
|
I checked his history 2 year gap I realized this was a hacked account or leaked from the database in the dark net. and this proof of said hacking is?
|
|
|
You can always use paypal by linking your credit card but since it has more favorable policies like buyer protection, you won’t find many bitcoin sellers accepting paypal. Alternatively you can try localbitcoins and find merchant who is willing to accept credit card as a payment method.
I am not sure about it but you can try cex.io. If you have virtual credit card then you can directly sell it in marketplace section or anywhere on the web. What Dudeperfect meant to say was that because PayPal will always roll over and play dead when a scammer reverses a PP payment transaction, quite a few members of the BCT community have been scammed when they've traded BitCoins for PayPal, so PayPal is very toxic and therefore: Beware of PayPal and other reversible transfer services https://bitcointalk.org/index.php?topic=14632.0
|
|
|
Timelord, for a challenge, how about finding a vanity addy with the prefix somewhere in the private key? This is the best I've got: You're welcome to search for those, I won't be participating as once a private key is made public, it is always worthless.
|
|
|
Somewhere in the copy / paste process, DARKSTAR_ has tweeked the message to remove a space between the first and second dashes three times. So although the BitCoin signings are able to be confirmed, DarkStar_ needs to sign with the already posted PGP / GPG key OR post the new PGP / GPG key and sign that with his/her BitCoin Wallets...
I figured out what I did wrong. I tried to verify the message with brainwallet and it showed an error, so I thought there were added spaces between those lines which is why it didn't verify. After removing those didn't work, I thought it might be because of how brainwallet reads the message, since I verified it with Electrum (thought the problem was with copying from Electrum, so I copied from brainwallet). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------BEGIN BITCOIN SIGNED MESSAGE----- This message is to verify that I, DarkStar_ (u=507936) own the address 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS - ------BEGIN SIGNATURE----- 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS HGQVJuqVpBJcMvOw/6BoWH62cb1dYGlof2rENV4U4erhMmfmX7AeSMBJKRs8BaCEpkE/CIehTi3M2CoHgja2EAA= - ------END BITCOIN SIGNED MESSAGE----- -----BEGIN PGP SIGNATURE----- Version: Keybase OpenPGP v2.0.56 Comment: https://keybase.io/crypto
wsBcBAABCgAGBQJX2qAZAAoJEIZVviH1IAyt5rYIAJ51+SWsNQgB3Z3RM5omg1rz uk2ysRzObVBzyyzg0Pow0qECqvHAo42hvRAmGwy+mIkhdcvgwL2JFHiwc+g18CN5 dxtMtfQCMGAkrQDs4QF/LW3SeFqeDfvXPPIZU+1T2F5gPl38OFh2GgJHrJby+o0Z RsOqI8OOAPXrPQf8C6ew+m7EkNRQriVjgm9k8awdO+NQdC94DBD48CJrinJ1niva sc4gLwP/exRDkGl94vX4N5pyEURtI+8dajTiu1mboGVwN2rEvbiIY+m29OCc6Ggy hAyFhj7i29NMNupeVpCs2NSCmPfOjA8dO8wgVSNtBHEteUYIg1L1FDW22o5RS9s= =3Pv5 -----END PGP SIGNATURE-----
I've resigned that PGP message, which verifies. Just for the record, I don't own the PGP key used on the other message. As with before, this message has also not been signed with DarkStar_ 's posted PGP / GPG key. Kleopatra says: Signed on 2016-09-15 23:20 with unknown certificate 0x0D61816DF2D6EFA5E49AD68E8655BE21F5200CAD. The validity of the signature cannot be verified. While PGP says: *** PGP SIGNATURE VERIFICATION *** *** Status: Unknown Signature *** Signer: Unknown Key (0xF5200CAD) *** Signed: 15/09/2016 11:20:25 PM *** Verified: 16/09/2016 4:59:44 AM *** BEGIN PGP VERIFIED MESSAGE ***
------BEGIN BITCOIN SIGNED MESSAGE----- This message is to verify that I, DarkStar_ (u=507936) own the address 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS ------BEGIN SIGNATURE----- 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS HGQVJuqVpBJcMvOw/6BoWH62cb1dYGlof2rENV4U4erhMmfmX7AeSMBJKRs8BaCEpkE/CIehTi3M2CoHgja2EAA= ------END BITCOIN SIGNED MESSAGE-----
*** END PGP VERIFIED MESSAGE *** However...Keybase.io says So we got there in the end...
|
|
|
So what we have is: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ------BEGIN BITCOIN SIGNED MESSAGE----- This message is to verify that I, DarkStar_ (u=507936) own the address 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS ------BEGIN SIGNATURE----- 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS HGQVJuqVpBJcMvOw/6BoWH62cb1dYGlof2rENV4U4erhMmfmX7AeSMBJKRs8BaCEpkE/CIehTi3M2CoHgja2EAA= ------END BITCOIN SIGNED MESSAGE----- -----BEGIN PGP SIGNATURE----- Version: Keybase OpenPGP v2.0.56 Comment: https://keybase.io/crypto
wsBcBAABCgAGBQJX2dVjAAoJEIZVviH1IAytAewH/jVzTlElqDVCiK4fwI/9H8BC B5L8aOkXjCSAcHLHMpnrSFj/DlVg8FDUHp7aKmtiGEnzmkZBTjCopBrjlvN3HgRS bZGLpCHpcVtfG/sqp1IMXj/WLY2cIYC/734l3MkJZ2bLQb/Zq+l88XdUSUNg566P w/Bm4oRFV7mmj3HlR4T8Q6f1TwINli9NYwwI9rXu2z7sfattStkk2qXaJliP0XWS AjYVsORDkrLElEsYLGxt9yRsfoR729DacvF18Tth4oQuZ8vnrP6QRoQPPUi5xLxo DuWvM6nv91HBlLa+kICbgDM9DP92dWnwQfH25RJdZstO6pXk/YUeF1W33Qc1uCI= =MjI3 -----END PGP SIGNATURE----- which gives us Signed with unknown certificate 0x8655BE21F5200CAD. The signature is bad. What we should have is: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - -----BEGIN BITCOIN SIGNED MESSAGE----- This message is to verify that I, DarkStar_ (u=507936) own the address 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS - -----BEGIN SIGNATURE----- 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS HGQVJuqVpBJcMvOw/6BoWH62cb1dYGlof2rENV4U4erhMmfmX7AeSMBJKRs8BaCEpkE/CIehTi3M2CoHgja2EAA= - -----END BITCOIN SIGNED MESSAGE----- -----BEGIN PGP SIGNATURE----- Version: Keybase OpenPGP v2.0.56 Comment: https://keybase.io/crypto
wsBcBAABCgAGBQJX2dVjAAoJEIZVviH1IAytAewH/jVzTlElqDVCiK4fwI/9H8BC B5L8aOkXjCSAcHLHMpnrSFj/DlVg8FDUHp7aKmtiGEnzmkZBTjCopBrjlvN3HgRS bZGLpCHpcVtfG/sqp1IMXj/WLY2cIYC/734l3MkJZ2bLQb/Zq+l88XdUSUNg566P w/Bm4oRFV7mmj3HlR4T8Q6f1TwINli9NYwwI9rXu2z7sfattStkk2qXaJliP0XWS AjYVsORDkrLElEsYLGxt9yRsfoR729DacvF18Tth4oQuZ8vnrP6QRoQPPUi5xLxo DuWvM6nv91HBlLa+kICbgDM9DP92dWnwQfH25RJdZstO6pXk/YUeF1W33Qc1uCI= =MjI3 -----END PGP SIGNATURE----- Which gives us: Signed on 2016-09-15 08:55 with unknown certificate 0x8655BE21F5200CAD. The signature is invalid: No public certificate to verify the signature DarkStar_ has posted the PGP key 58AB AEE9 0659 EEE5 2F32 1FBA 96BF FCB0 D6CC EE10 / 0xD6CCEE10here https://keybase.io/darkness/key.asc and here https://bitcointalk.org/index.php?topic=1159946.msg14636070#msg14636070However, that is not the PGP / GPG he used to sign this message with (ie 0x8655BE21F5200CAD ).
Somewhere in the copy / paste process, DARKSTAR_ has tweeked the message to remove a space between the first and second dashes three times. So although the BitCoin signings are able to be confirmed, DarkStar_ needs to sign with the already posted PGP / GPG key OR post the new PGP / GPG key and sign that with his/her BitCoin Wallets...
|
|
|
-----BEGIN BITCOIN SIGNED MESSAGE----- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ------BEGIN BITCOIN SIGNED MESSAGE----- This message is to verify that I, DarkStar_ (u=507936) own the address 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS ------BEGIN SIGNATURE----- 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS HGQVJuqVpBJcMvOw/6BoWH62cb1dYGlof2rENV4U4erhMmfmX7AeSMBJKRs8BaCEpkE/CIehTi3M2CoHgja2EAA= ------END BITCOIN SIGNED MESSAGE----- -----BEGIN PGP SIGNATURE----- Version: Keybase OpenPGP v2.0.56 Comment: https://keybase.io/crypto
wsBcBAABCgAGBQJX2dVjAAoJEIZVviH1IAytAewH/jVzTlElqDVCiK4fwI/9H8BC B5L8aOkXjCSAcHLHMpnrSFj/DlVg8FDUHp7aKmtiGEnzmkZBTjCopBrjlvN3HgRS bZGLpCHpcVtfG/sqp1IMXj/WLY2cIYC/734l3MkJZ2bLQb/Zq+l88XdUSUNg566P w/Bm4oRFV7mmj3HlR4T8Q6f1TwINli9NYwwI9rXu2z7sfattStkk2qXaJliP0XWS AjYVsORDkrLElEsYLGxt9yRsfoR729DacvF18Tth4oQuZ8vnrP6QRoQPPUi5xLxo DuWvM6nv91HBlLa+kICbgDM9DP92dWnwQfH25RJdZstO6pXk/YUeF1W33Qc1uCI= =MjI3 -----END PGP SIGNATURE----------BEGIN SIGNATURE----- 1STAR8KiRzcqWx5tXmvxRhdLcXtYHjzzY HNo9LcJo8xN7nbijzybK+rTpLwt6m7RhZKu135HlXGP/OSFBP9b50y6Fv15o7+HtkVRQ4dwnks64SJJ4HGtejq8= -----END BITCOIN SIGNED MESSAGE----- Message confirmed as being signed by 1STAR8KiRzcqWx5tXmvxRhdLcXtYHjzzY
-----BEGIN BITCOIN SIGNED MESSAGE----- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ------BEGIN BITCOIN SIGNED MESSAGE----- This message is to verify that I, DarkStar_ (u=507936) own the address 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS ------BEGIN SIGNATURE----- 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS HGQVJuqVpBJcMvOw/6BoWH62cb1dYGlof2rENV4U4erhMmfmX7AeSMBJKRs8BaCEpkE/CIehTi3M2CoHgja2EAA= ------END BITCOIN SIGNED MESSAGE----------BEGIN PGP SIGNATURE----- Version: Keybase OpenPGP v2.0.56 Comment: https://keybase.io/cryptowsBcBAABCgAGBQJX2dVjAAoJEIZVviH1IAytAewH/jVzTlElqDVCiK4fwI/9H8BC B5L8aOkXjCSAcHLHMpnrSFj/DlVg8FDUHp7aKmtiGEnzmkZBTjCopBrjlvN3HgRS bZGLpCHpcVtfG/sqp1IMXj/WLY2cIYC/734l3MkJZ2bLQb/Zq+l88XdUSUNg566P w/Bm4oRFV7mmj3HlR4T8Q6f1TwINli9NYwwI9rXu2z7sfattStkk2qXaJliP0XWS AjYVsORDkrLElEsYLGxt9yRsfoR729DacvF18Tth4oQuZ8vnrP6QRoQPPUi5xLxo DuWvM6nv91HBlLa+kICbgDM9DP92dWnwQfH25RJdZstO6pXk/YUeF1W33Qc1uCI= =MjI3 -----END PGP SIGNATURE----- -----BEGIN SIGNATURE----- 1STAR8KiRzcqWx5tXmvxRhdLcXtYHjzzY HNo9LcJo8xN7nbijzybK+rTpLwt6m7RhZKu135HlXGP/OSFBP9b50y6Fv15o7+HtkVRQ4dwnks64SJJ4HGtejq8= -----END BITCOIN SIGNED MESSAGE----- Message confirmed as being signed by 1DarkStrRagcDjWtsPGxkav4WG3poLXzDS
Some one needs to drop a bomb on keybase.io their encryption is incompatible with either PGP or Kleopatra - I'm trying to recall how I got around this I think keybase added an extra space in front of the lines that are part of the message...
|
|
|
Ive sent the bitcoin. Check you pm. I had trouble all night getting a wifi signal and couldnt verify payment. Im back on now and good to go.
Switch to 2° - they've got great coverage
|
|
|
How do you determine the criteria for "pronounceable" addy though?
"1ANoNYMURccWEEGMoMTozTtjBj7CmtRZdb (2014-01-24: longest pronounceable prefix - owner: Nikinger)"
I would say, vowels. Notice there are no vowels in "CCW" or "TtjBj7cmtrzdb"
Agreed ANoN is just an abbreviation... "We" or "Mom" (which is the North American way to spell "Mum") don't really count. 1PoLymathxkzDAULEum2sSVmPnzcoYfaUP beats that one hands down. See also: https://en.wikipedia.org/wiki/Special:Search?search=ANoNYMUR
|
|
|
...and in case anyone wants to point out the typo in the date above... https://bitcointalk.org/index.php?topic=1614769.0-----BEGIN BITCOIN SIGNED MESSAGE----- My account is Maloppo has been hacked/lost. Please reset the email to maloppoballa@yahoo.com The current date is 11 september 2016 -----BEGIN SIGNATURE----- 1uYGWkiEaJaWmUZ4X2NocwH2HSBzzpT1a IMPA5/1Jg6LscbWhPXlGi5V1h/+ygqoNZyabT3MHc3dXCt9E8GyIjxkc5PpT1MLyvXeuEo6z7gH4PonS2Ge2Rt4= -----END BITCOIN SIGNED MESSAGE-----
|
|
|
-----BEGIN BITCOIN SIGNED MESSAGE----- My account is Maloppo has been hacked/lost. Please reset the email to maloppoballa@yahoo.com The current date is 11 september 2016 -----BEGIN SIGNATURE----- 1uYGWkiEaJaWmUZ4X2NocwH2HSBzzpT1a IMPA5/1Jg6LscbWhPXlGi5V1h/+ygqoNZyabT3MHc3dXCt9E8GyIjxkc5PpT1MLyvXeuEo6z7gH4PonS2Ge2Rt4= -----END BITCOIN SIGNED MESSAGE----- I Confirmed that my old account back thank you.. thank you.. thank you.. very much Admin Theymos and Cyrus -----BEGIN BITCOIN SIGNED MESSAGE----- I am Maloppo from bitcointalk today is 15 september 2015 -----BEGIN BITCOIN SIGNATURE----- 1uYGWkiEaJaWmUZ4X2NocwH2HSBzzpT1a ICrwwrjOs+eAsPmKwibxppPrtzRmbrVHkyi2xL177qKyBrX+5SiFTMeTKcVA0fN/5A688M+G/NH0+1iufu2wC9s= -----END BITCOIN SIGNATURE----- Both message verified as coming from the quoted wallet address by my wallet. If I can suggest, you should lock this thread.
|
|
|
Finding 1234xxxxxxxxx4321 can't be that hard, right? Not sure of any other way to search for that form of other than to set the keep searching switch to er, keep searching to a dump file and then sift through what you've found. Can't recall the command to search the tail (or middle) end for a pattern, but AFAIK you can't search for at both ends simultaneously?
|
|
|
Please help quote -----BEGIN BITCOIN SIGNED MESSAGE----- I am Maloppo from bitcointalk today is 15 september 2015 -----BEGIN BITCOIN SIGNATURE----- 1uYGWkiEaJaWmUZ4X2NocwH2HSBzzpT1a ICrwwrjOs+eAsPmKwibxppPrtzRmbrVHkyi2xL177qKyBrX+5SiFTMeTKcVA0fN/5A688M+G/NH0+1iufu2wC9s= -----END BITCOIN SIGNATURE----- Quoted, archived and I verify with my BTC Wallet. http://archive.is/It83n#selection-7651.0-7671.31
|
|
|
I'm a little stumped what else to search for that is random? I could say things like 1Xena 1House 1StarWars 1StarTrek or did you have something else in mind?
I made this puzzle 2 weeks ago. It doesn't require a search for vanity addresses, but it did include them. Why would you want something random? To make sure nobody has it already? You could just pick a Bitcoin-related word. But even then, it's nothing more than a combination of computing power and luck to see who wins. 1bitcointaLk is too much BTW. If they are random, then no one could be searching for them already. If participants came up with search items, they could already be searching for them ie 1GhennomhhcG813vjQkCrDJ67LFMrQwcCW or 1MjoLLnirmoZtc3fD7WfCMGswvHV7AWUmr from NetHack. I read a while ago someone has a 20,000 word list of search items they are searching for, so the only thing I could think of was to make it totally random - it's more to see who has better "luck" than the others for a given phrase.
|
|
|
While I for one admire your enthusiasm, this is the KNOWN Alt's thread, not the "I think these people might be Alts, but I have no proof." page.
Are they using the same BTC Wallet Addresses? Are they using the same skype / twitter / facebook?
Are they using the same slang or dialect ?
Have a browse back through their posts, do they always log in at the same time of day? Or post in the same order or around the same time of day?
Have they scammed?
Have they vouched (trust) for each-other?
|
|
|
Prefix: 1SUNAR Pub Key: 0413BE46F6D80B0B0ACA870CD49CBF7147F6096FD7721B4EA8CF5688D84DFCD0BD3D372E5B33D7D 74C11C3A48F5171CDB5D6FAF74BC6C9502CBB5DFFF19963615D Thanks in advance Any donations are to be sent directly to LoyceVPattern: 1SUNAR Address: 1SUNARjQD4EA3aamV35CB7Pb8SbrRcuGY PrivkeyPart: 5J9PBJS81sWuCHLMLt4mokSKGKiA9KeaoRjpmYHWF9pmW7WLNDh Regards,
|
|
|
1DWutrU 2 months 1oGoMo16h 500 years For 50% chance. I'm out Unless you make it a more fun thing to do than searching for some random strings that will never look more impressive than any random addy. 1DWutrU Difficulty: 15058417127 [50% in 8.1min] 1eMHMBn Difficulty: 888446610538 [50% in 8.1h] 1zBLvyQY Difficulty: 51529903411245 [50% in 19.5d] 11GSoq7b Difficulty: 51529903411245 [50% in 19.5d] 1T8AJtk2z Difficulty: 2988734397852220 [50% in 3.2y] 1oGoMo16h Difficulty: 2988734397852220 [50% in 3.1y]
I'm a little stumped what else to search for that is random? I could say things like 1Xena 1House 1StarWars 1StarTrek or did you have something else in mind?
|
|
|
|