Bitcoin Forum
May 07, 2024, 10:06:36 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Other / Off-topic / Cryptography and deception on: October 11, 2018, 07:53:06 PM
Crypto currency - ideal for scammers. To her a huge interest, everyone is talking about it, while only units really understand how it all works. People perceive bitcoins (and other crypto-currency) as a way of quick and easy money earning. And for scammers, this is a great field for work.

Banal deception

This is when they sell cryptographic goods, which the seller does not have. Or they sell something that is not cryptoexchange. Similar cases occur quite often - people transfer their money, but instead receive nothing. There have even been cases when they sold some metal coins in the form of "bitcoin".
To not become a victim of criminals is quite simple: buy cryptographic only on well-known exchanges and exchange offices. Do not buy bitcoin through forums, negotiating with someone directly, etc. Only through official intermediaries. By the way, this can be said about the sale. Do not forget that if you have translated the cryptographic currency, then it will not turn back. Even if you prove that you have been cheated.
The same is done with equipment for the property: you pay it, but do not get it. Fraudsters use the fact that Asiki (ASIC) is not sold in stores (they can be found there very rarely). Therefore, if it is possible, you need to buy directly from the manufacturer or from intermediaries, which have links to the manufacturer's website.

In this case, cheaters play the greed and reluctance to pay commissions to intermediaries. Do not forget that trying to save you can lose everything.


Fake wallets

Fraudsters create analogues of official purses for cryptic goods, from which they can withdraw money at any moment. This is especially true for mobile wallets, and there were dozens of similar applications in their time in the App Store and Google Play. At one time, quite a large number of people lost their preservation, which failed to return. It is very easy to secure yourself: use only those purses that you download from the official website of cryptography. Do not load wallets elsewhere, fraudsters can easily counterfeit them.
If talking about direct theft is cripped out of your wallet by hacking, then it's unrealistic if you follow all the safety rules. Yes, there are instances of hacking purses (with the same bitcoins), but usually the matter is that their owners neglect the simplest security rules. For example, save passwords in a document. In each cryptic currency your methods and algorithms of protection, if you follow all the recommendations, then you can not be afraid of evil hackers;)


Fake exchanges and exchange offices

It should be fair - these fraud schemes are relevant not only in the field of cryptography, but also with any electronic payment systems. You need to be very attentive when choosing a stock exchange or an exchange office, pay attention to the design of the site, contacts, etc. Look for reviews on the internet, do not trust big amounts of new sites.
The most appropriate choice is to choose one stock exchange or an exchanger for yourself and continue to use only them. Do not forget that fraudsters lure users to low commissions and profitable rates, if prices are too different from market, then this is a reason to beware!


Virtual (cloud) «Mining»

Mining bitcoin on home PC has long been of no use, today they are engaged in mining in pools, buying farms or surrendering power in the cloud. The last one involves a lot of deception, so you need to be very careful. The basic schemes look like this:
- In the most primitive variant, no landlining is not in vain, since users simply collect money, pay them some dividends. After receiving the first money, people start investing more, in order to increase profits and lose all the money. Roughly speaking, they all simply "throw".
-The company really has the equipment, really carried out the property, but at some point the company disappears with the whole crippling currency. Not everyone withdraws money at once, these are crooks and enjoy.
The fact is that it is impossible to identify fraudsters until they disappear with money. There are a number of signs of scammers that you should know:
-Domain in an obscure zone, and data about the person to which he is registered - are hidden;
-There is no visual confirmation of the availability of equipment and other exhaustive information about where it is physically located;
- Missing business or company data, but they can not be verified;
-You promise huge profits, which is quite stupid, given that the profit from cloud-based mining depends on the rate of crying, so they can not guarantee you income.


Since in the case of cloud mining, it is impossible to completely protect yourself from deception, I do not recommend using such services at all. Well, trusting such companies very much money will be extremely stupid.

"Fake" cryptographic experts + Pampers

The scheme of deception is as follows: everything begins with the acquisition of an imaginary expert of any digital coin at a low rate (most often with a minimum trading volume). He then posts reviews about her in his Twitter account. At first it seems that there is nothing unnatural in it. But the essence lies in responding to his post: subscribers follow the example of an "expert" and begin to invest in this crypto foreign currency. This is how the "pumping" of a coin occurs, after which the crook deduces his money with substantial profits.
Analyzing similar schemes, experts came to the conclusion: the attackers have a certain plan of action. For example, the following: An imaginary professional signals to familiar investors about when he will start a campaign to promote cybercriminals in the social network. They buy it, after which the crook publishes a message in Twitter, naive investors are buying up tokens in large volumes. After a few hours, crooks sell their assets and fix their profits.


In order not to get caught by an attacker's bucket, you need to conduct your own market research and ICO projects. Do not go for the occasion of the next "expert".

Buying Closed Keys

Now in the vastness of the Internet there are a lot of fake sites, channels, and pages in social networks that promise to pay cryptology in exchange for private personal keys. There is nothing new here: no project (except for the fraudulent one) will not ask such users for information. It is necessary to remember that closed digital keys are closed and closed, which are not intended for third-party eyes and can not be transmitted in any way.


These are the main schemes of fraud in the field of cryptography (which are known to me), but there are others. Different pyramids, charming purses (send 1 bitcoin, get back two), donations to good intentions, phishing sites, deposits with huge interest. All this is very much, but to protect yourself is very simple: you do not need to be greedy and pursue easy money. Fraudsters play only on greed, if you do not hurry with decisions, then it will be extremely difficult to deceive you Smiley
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!