Bitcoin Forum
June 15, 2024, 01:47:06 PM *
News: Voting for pizza day contest
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Economy / Service Discussion / Re: Instawallet claim process on: August 10, 2013, 10:18:18 AM
No, Paymium is pocketing your coins. That's how they make money from Instawallet.

Thanks for your input, but I respectfully hope you're misinformed and I'll reserve judgement for now. Still have hope these guys will find the kindness to help me out, I'm encouraged by people in this thread having their coins returned eventually, though I haven't read through this thread extensively.
2  Economy / Service Discussion / Re: Instawallet claim process on: August 10, 2013, 09:40:22 AM
Hi Davout and Boussac

Is there any chance of helping somebody out that missed the opportunity to file a claim? I stupidly mistook the final date for the claims process, and due to circumstances I won't bore you with, I missed my chance. I'm sure you're busy and I appreciate the lengths you are going to to return the funds to all your users, but any assistance you could provide me would be greatly appreciated. I would very much like to get all my coins back.

Thank you kindly.
3  Other / Beginners & Help / Re: hi everyone!!! on: August 09, 2013, 11:50:10 PM
Hi there
4  Other / Beginners & Help / Re: VPN's??? on: August 09, 2013, 11:08:01 PM
It's always seemed to me that having javascript enabled while using Tor is a terrible idea, I always assumed a site could use it to identify you if they wanted to.

I've read discussions elsewhere on the likelihood that Tor via a VPN would have prevented the exploit in this case from working. Some of the technical points of the discussions go over my head, but it seems most agree that the exploit would have returned your VPN's IP address, but would also return the MAC address of your Windows machine.

I think if you're someone that is concerned about more than privacy when browsing and you have a serious desire for anonymity, you would ensure javascript is disabled when using Tor or a VPN to mitigate the risk of exploits like this. And you would also be aware that these services mask your network connection, but can't protect you from malware on your machine that is designed to identify you.

Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!