Bitcoin Forum
May 03, 2024, 07:30:15 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 [43] 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 »
841  Other / Meta / Re: The new (maybe not so new) spammy trend. on: July 08, 2019, 09:26:51 PM
Seeing this every day or questions that could be found by a simple google search seem very out of place being posted in a few line then most of the time if your reply to them they do not answer or other accounts pipe into the topic and take it off to another level even after the initial question has been concluded.

I have to think that these accounts are being created with one aim to be spam or sock-puppet accounts for future ANN topics on the forum.

While we don't want to push new users away the influx of what I will call "SpamAccs" is really taking away from some of the boards here.

You have done a good thing raising this in a topic but right now I can't think of any way to stop this on the forum I know some like LoyceV ect have been working on some system to help spot these users.

842  Economy / Scam Accusations / Re: Tradesatoshi - BEWARE! Blocking without reasons. on: July 08, 2019, 09:18:50 PM
I can 100% tell you now that TradeSatoshi is not at that address listed on company house.
For any US people who don't understand company house for a fee of £18 yes only £18 you too can list your "fake" company on there and no one will care..

TradeSatoshi is not a UK company they are not based in the UK nor do they have a office in the UK there servers are not located in the UK either and they have failed to submit ANY tax information as required BY law in the UK..

Also the company was dissolved on 24 Jul 2018 via voluntary strike-off Final meaning they did not keep there records up to date and decided it better to strike the company off.

Another thing I find strange about the is the directors name.  
Francesco ALIBRANDI

a quick google search turns up.  



which turns out to be a doctors my thoughts are tradesatoshi is a fake company pushing fake paperwork to company house in order to aid in there "long term fraud"

I wonder if anyone actually know's where TradeSatoshi is based.. office / servers...  Because it's not the UK like they told everyone at the start.

Code:
Date (document was filed at Companies House) 	Description (of the document filed at Companies House) 	View / Download (PDF file, link opens in new window)
24 Jul 2018 Final Gazette dissolved via voluntary strike-off
View PDF Final Gazette dissolved via voluntary strike-off - link opens in a new window - 1 page (1 page)
08 May 2018 First Gazette notice for voluntary strike-off
View PDF First Gazette notice for voluntary strike-off - link opens in a new window - 1 page (1 page)
30 Apr 2018 Application to strike the company off the register
View PDF Application to strike the company off the register - link opens in a new window - 1 page (1 page)
05 Mar 2018 Director's details changed for Mr Francesco Alibrandi on 5 March 2018
View PDF Director's details changed for Mr Francesco Alibrandi on 5 March 2018 - link opens in a new window - 3 pages (3 pages)
05 Mar 2018 Notification of Francesco Alibrandi as a person with significant control on 5 March 2018
View PDF Notification of Francesco Alibrandi as a person with significant control on 5 March 2018 - link opens in a new window - 2 pages (2 pages)
02 Oct 2017 Confirmation statement made on 2 October 2017 with updates
View PDF Confirmation statement made on 2 October 2017 with updates - link opens in a new window - 4 pages (4 pages)
19 Jul 2017 Total exemption small company accounts made up to 30 November 2016
View PDF Total exemption small company accounts made up to 30 November 2016 - link opens in a new window - 3 pages (3 pages)
Download iXBRL
05 Oct 2016 Confirmation statement made on 30 September 2016 with updates
View PDF Confirmation statement made on 30 September 2016 with updates - link opens in a new window - 5 pages (5 pages)
19 Nov 2015 Director's details changed for Mr Francesco Alibrandi on 19 November 2015
View PDF Director's details changed for Mr Francesco Alibrandi on 19 November 2015 - link opens in a new window - 2 pages (2 pages)
18 Nov 2015 Incorporation
Statement of capital on 2015-11-18

    GBP 1,000


View PDF Incorporation
Statement of capital on 2015-11-18

    GBP 1,000



https://beta.companieshouse.gov.uk/officers/ZHXLO4pL8BVkmlyjN2Ug0YAXNAE/appointments

Right now I would be very careful trading on there my guess is if they are locking accounts they will exit scam.

And as always Do Your Own Research!
843  Other / Off-topic / Re: Kleiman v. Wright case 6/28/19 (show cause) hearing likely open... follow 'live' on: July 08, 2019, 07:54:53 PM
Why this thread is in off topic section?? This is probability the most Bitcoin topic related thread for the past year and it ended up in the section where almost nobody (from the regular members) visit. Better move it to the Serious discussion of the Ivory tower if you don't what it to be in the bitcoin discussion.

Seems the mod's moved it I would agree it's one of those moments that could either tarnish bitcoin or push it back to the spot light (all be it for the wrong reasons)
I would say mod's should move this back to a more relevant section.


844  Bitcoin / Bitcoin Discussion / Re: Change Bitcoin to Asic Resistant on: July 08, 2019, 06:47:43 PM
While I agree the electrical use of the bitcoin network is something to be concerned about I doubt anyone is keen on changing from ASIC.
I do think more effort is needed to ensure bitcoin is not a massive pollution source better machine with more efficiency are what is required but this may take another 10 years to reach where we need to be.

Another effort I feel is missed out on in bitcoin is Green energy.



The African nations really could be green-energy-zones of the world but we all know that fossil fuel company's won't let there grip go of the industry why is bitcoin not aiming to make the sun power the network I know there has been much good work done by some members of the forum in this regard but there is wind power and wave power that is yet to be fully tapped or the potential for the use of them in bitcoin is massive.
845  Economy / Micro Earnings / Re: URL SHORTENER THAT PAYS IN BTC [SHORT4S] on: July 08, 2019, 06:41:12 PM
** USE WITH CAUTION **

WARNING SIGNS :


New account posting about URL shorter that pays btc?    (too good to be true so probably is)
Big bold statement about PAYMENT PROOF (Normally what scammers do)

This may end up in your links being pushed to some exploit kit or browser hooking if you decide to use this do so with caution or better yet don't use at all not worth the risk..





846  Bitcoin / Bitcoin Technical Support / Re: Please critique my planned Multi-Sig-Setup. on: July 08, 2019, 06:18:49 PM
It's still a 3rd party.
If you want to use a dead man's switch, then you pretty much have to trust a third party somewhere, since you won't be around to oversee the process yourself. The safest way would probably be to set up a program yourself on a dedicated computer, but you still have to trust the computer doesn't fail, your ISP, it isn't attacked, etc.

The seeds would be on paper with the hardware wallets in an envelope.
If you are going to store the mnemonic phrase in plaintext along with the wallet, then there is hardly any point in having a hardware wallet at all. For a passphrase alone to be secure as a 24 word mnemonic phrase, it needs to be 37 random characters from the 128 character ASCII set, and something this complex should also be backed up on paper.

There was similar talk of a dead-man style switch for bitcoin you can find the post here it may be of some use to you..or not.
The issue with dead-man switch is normally you would need to trust some 3rd party service such as Lawyer or Solicitor ect still leaving trust with someone out of your control.

I really think bitcoin in general should look at ways of creating inheritance wallets of such I think many people are searching for similar things.

On your plans they look good thought as said above take care in the preparation.
 


** EDIT **

Found the topic

https://bitcointalk.org/index.php?topic=5069728.0
847  Bitcoin / Pools / Re: [∞ YH] solo.ckpool.org 1% fee solo mining USA/DE 252 blocks solved! on: July 08, 2019, 06:12:50 PM
I report this and whats was happened and see in last days  for pool owner check and explain system condations , it may be problem from pool , from blockchain nodes, from other chain users , tcp packets and etc.
May some of them valid ... And may be my machines found blocks .


System owner can check and inform you shown events really happened or not .
I dont think you access to these records , Con Kolivas owner and maker of this pool can answer questions also say to you shown records was real or fake .

If they was real i will be happy hear that what was your facts to do judge and charge peoples for lying ?


We're getting trolled,  by a newbie
 Grin Grin Grin Grin Grin Grin Grin Grin Grin Grin Grin Grin Grin


Next Diff skipping the 8trillion??? and going to the 9Trillion mark Huh Huh Huh
OMG!!!! Shocked Shocked Shocked Shocked Shocked Shocked Shocked



No is real.. honest look..



ck when 9999 blocks for me? Smiley
 Cheesy Cheesy Cheesy Cheesy Cheesy Cheesy Cheesy Cheesy Cheesy Cheesy

on another note the diff is just outright disgusting give's me nightmares looking at it Smiley
848  Bitcoin / Development & Technical Discussion / Re: Get list of all addresss, hash160, amount on: July 08, 2019, 04:14:11 PM
Yea sure my fee is 0.1 BTC for 1 week support.
Sorry but no one works for free in this game.


* and I will not attempt brute force..  Fee is for setup of ABE and sync chain and export nothing more.


849  Bitcoin / Pools / Re: [∞ YH] solo.ckpool.org 1% fee solo mining USA/DE 252 blocks solved! on: July 08, 2019, 04:05:00 PM
Your system records available on the pool DB?

Can you submit some logs from "your system" 
CK is one of the most trusted pool op's around here and if your attempting to accuse the pool of block withholding your cry's will be met with deaf ears.
 

850  Bitcoin / Development & Technical Discussion / Re: Need some help with recovering one of my old wallets on: July 08, 2019, 11:37:16 AM
My advice would be to sit down with a paper and pen and start to write out things that you can re-call about the time you put your drive away.
Write down possible passwords you used around that time, make a list of attempted passwords you can strike off the list.  

Try jog your memory of around this time (sometimes old accounts help to job memory)

How is the drive protected?  Is the drive encrypted? or just password protected?

Do you know what the password protection software is used on the drive?

Another possible way to do this is if you know most of the password used you can generate a list of passwords possibility.

I have included below a small python project that will allow you to generate a list of potential passwords from some input it may help in the process.

The Code..

you can edit the code to add special characters or numbers if you can recall any parts of the password this might also help cut down the attempts required. 

Code:
"""
Command-line utility to generate permutation of possible words used in a password
"""
import argparse
import sys

SPECIAL_CHARACTERS_REPLACEMENTS = {
    "a": "@",
    "o": "0",
    "s": "$",
    "e": "3",
}

SPECIAL_CONNECTOR_CHARACTERS = [
    # "@"
]

SPECIAL_ADDITIONS = [
    "1", "12", "123", "1234"
]

SPECIAL_ADDITIONS_CHARACTERS = [
    "*"
]


class Generator:
    def __init__(self, words, output_file, level=5, strict_mode=False):
        self.results = []
        self.words = words
        self.level = level
        self.strict_mode = strict_mode
        self.word_forms = {}
        for word in self.words:
            self.word_forms[word] = self.generate_word_forms(word)
        self.output_file = output_file

    def generate(self):
        self.generate_one_word_dictionary()
        self.generate_two_word_dictionary()
        self.generate_three_word_dictionary()

        for password_dict in self.one_word_dictionary:
            self.results.append(password_dict["pass"])
        for password_dict in self.two_word_dictionary:
            self.results.append(password_dict["pass"])
        for password_dict in self.three_word_dictionary:
            self.results.append(password_dict["pass"])


    def generate_one_word_dictionary(self):
        self.one_word_dictionary = []
        words_only = []
        words_with_special_additions = []
        words_with_special_addition_characters = []
        words_with_special_addition_and_special_characters = []
        for word in self.words:
            for word_form in self.word_forms[word]:
                words_only.append({"pass" : word_form, "forms":[word]})
                for special_addition in SPECIAL_ADDITIONS:
                    words_with_special_additions.append({"pass" : word_form + special_addition, "forms":[word]})
                for special_addition_character in SPECIAL_ADDITIONS_CHARACTERS:
                    words_with_special_addition_characters.append({"pass" : word_form + special_addition_character, "forms":[word]})
                for special_addition in SPECIAL_ADDITIONS:
                    for special_addition_character in SPECIAL_ADDITIONS_CHARACTERS:
                        words_with_special_addition_and_special_characters.append({"pass" : word_form + special_addition + special_addition_character, "forms":[word]})


        self.one_word_dictionary.extend(words_only)
        self.one_word_dictionary.extend(words_with_special_additions)
        self.one_word_dictionary.extend(words_with_special_addition_characters)
        self.one_word_dictionary.extend(words_with_special_addition_and_special_characters)

    def generate_two_word_dictionary(self):
        self.two_word_dictionary = []

        two_words = []
        two_words_with_connectors = []

        for word in self.words:
            for one_word in self.one_word_dictionary:
                if len(one_word["forms"]) < 1:
                    continue
                if word in one_word["forms"]:
                    continue
                if self.strict_mode and self.words.index(word) >= self.words.index(one_word["forms"][0]):
                    continue

                for word_form in self.word_forms[word]:
                    two_words.append({"pass" : word_form + one_word["pass"], "forms":[word, one_word["forms"][0]]})
                    for connector in SPECIAL_CONNECTOR_CHARACTERS:
                        two_words_with_connectors.append({"pass" : word_form + connector + one_word["pass"], "forms":[word, one_word["forms"][0]]})

        self.two_word_dictionary.extend(two_words)
        self.two_word_dictionary.extend(two_words_with_connectors)

    def generate_three_word_dictionary(self):
        self.three_word_dictionary = []

        three_words = []
        three_words_with_connectors = []

        for word in self.words:
            for two_word in self.two_word_dictionary:
                if len(two_word["forms"]) < 2:
                    continue
                if word in two_word["forms"]:
                    continue
                if self.strict_mode and self.words.index(word) >= self.words.index(two_word["forms"][0]):
                    continue

                for word_form in self.word_forms[word]:
                    three_words.append({"pass" : word_form + two_word["pass"], "forms":[word, two_word["forms"][0], two_word["forms"][1]]})
                    for connector in SPECIAL_CONNECTOR_CHARACTERS:
                        three_words_with_connectors.append({"pass" : word_form + connector + two_word["pass"], "forms":[word, two_word["forms"][0], two_word["forms"][1]]})

        self.three_word_dictionary.extend(three_words)
        self.three_word_dictionary.extend(three_words_with_connectors)

    def generate_word_forms(self, composite_word):
        composite_words = composite_word.split(":")
        aggregate_words = []
        for word in composite_words:
            words = [word.upper(), word.lower(), word.title(), word]
            for word_form in [word.upper(), word.lower(), word.title(), word]:
                for i in range(1, self.level + 1):
                    words.append(self.replace_word_with_special_characters(word_form, i))

            aggregate_words.extend(words)

        aggregate_words = self.remove_duplicates(aggregate_words)

        return aggregate_words

    def remove_duplicates(self, words):
        existing = []
        for word in words:
            if word not in existing:
                existing.append(word)

        return existing

    def replace_word_with_special_characters(self, word, level):
        if level == 5:
            level = 100
        output = word
        counter = 0
        for char in SPECIAL_CHARACTERS_REPLACEMENTS:
            output = output.replace(char, SPECIAL_CHARACTERS_REPLACEMENTS[char])
            output = output.replace(char.upper(), SPECIAL_CHARACTERS_REPLACEMENTS[char])
            counter += 1
            if counter >= level:
                break

        return output

    def write_output(self):
        for result in self.results:
            self.output_file.write(result + "\n")
        if self.output_file != sys.stdout:
            self.output_file.close()
        return len(self.results)


if __name__ == '__main__':
    parser = argparse.ArgumentParser(description='generate a password list from permutation of probable words')

    parser.add_argument('-w', required=True, metavar='word', nargs='+', type=str,
                        help='possible words used in the password')
    parser.add_argument('-s', action='store_true', default=False, help='ordered list of words')
    parser.add_argument('-l', metavar='level', default=5, type=int, help='level of character replacement strength (1 - 5)')
    parser.add_argument('-o', metavar='output.txt', default=sys.stdout, type=argparse.FileType('w'),
                        help='The output file where the password list should be written')

    args = parser.parse_args()

    generator = Generator(args.w, args.o, args.l, args.s)
    generator.generate()
    results = generator.write_output()
    if args.o != sys.stdout:
        print("Generated passwords file with %d possible passwords" % (results))
    else:
        print("Generated %d possible passwords" % (results))





How It Works...

Code:
/Desktop$ python pass.py 
usage: pass.py [-h] -w word [word ...] [-s] [-l level] [-o output.txt]

So to use run  python pass.py -w ThisIsMyPassword -s -l 2 -o output-passwords.txt

THISISMYPASSWORD
thisismypassword
Thisismypassword
ThisIsMyPassword
THISISMYP@SSWORD
THI$I$MYP@$$WORD
thisismyp@ssword
thi$i$myp@$$word
Thisismyp@ssword
Thi$i$myp@$$word
ThisIsMyP@ssword
Thi$I$MyP@$$word
THISISMYPASSWORD1
THISISMYPASSWORD12
THISISMYPASSWORD123
THISISMYPASSWORD1234

this will throw a bunch of possible passwords to the output-passwords.txt file for you to try you can bump the option -l for more complexity in the passwords returned.



As above do not answer to any PM's telling you they will fix it they are scammers.
851  Bitcoin / Pools / Re: [∞ YH] solo.ckpool.org 1% fee solo mining USA/DE 252 blocks solved! on: July 08, 2019, 11:21:55 AM
If your machine found a block on CK solo it would have been broadcast to the network right now the difficulty is at

Bitcoin Difficulty:    6,379,265,451,411   meaning your best share on your miners GUI should be a number like this but checking the address you posted it seems your best share is still only:

"bestshare":593881802.880121,

You can always look at the template the pool is sending your miners to check what they are mining you would need to do tcp dump. 
but I can assure you that you did not find a bitcoin block because if you did we would all be back to diff 0 for the next round and you would have coins in your  3F8kvsy8fcBqTsxKLtouVk5JGVVqM99HAy  address.
852  Bitcoin / Development & Technical Discussion / Re: Get list of all addresss, hash160, amount on: July 08, 2019, 10:55:00 AM
Another brainflayer junkie?

Good luck with that and you will need to build your own scraper or list hasher to get the 160's.

I tested with Bitcoin-abe and MySQL download bitcoin install. sync chain.  Install MySQL,  Install Bitcoin-ABE, then scrape.

here is a quick guide on how to set it up.


Code:
				    SETUP

  :Required:

Ubuntu, MySQL Python, MySQL Client, MySQL Server, Python, Python2, Blockchain,

Downloading the bitcoin blockchain two options. 

1. Download & Install bitcoin core wallet and sync with network


################################################################################

Install Python MySQL


$ sudo apt-get install python-mysqldb

    Install MySQL Client & Server

$ sudo apt-get install mysql-client mysql-server

To configure the MySQL instance with InnoDB engine support. 
If you installed with Debian/Ubuntu then InnoDB is enabled by default. 
To check for InnoDB support, issue "SHOW ENGINES" and look in the output
for "InnoDB" with "YES" next to it.  If "skip-innodb" appears in the server
configuration (my.cnf or my.ini) then remove it and restart the server.

################################################################################

SETUP MYSQL

Log into MySQL as root (i.e: mysql -u root) and give commands.
Don't forget to change the PASSWORD

    create database abe;
    CREATE USER 'abe'@'localhost' IDENTIFIED BY 'YOUR_PASSWORD_HERE';
    grant all on abe.* to abe;

The above will

1.  Create a database called abe
2.  Create a user called abe for localhost with the password you enter above
3.  Will grant all permisions to abe for abe user


################################################################################

DOWNLOAD AND INSTALL BITCOIN-ABE

This will allow you to check getrecievedbyaddress calls quickly without being rate limited by online API checkers.

$ git clone https://github.com/bitcoin-abe/bitcoin-abe.git
cd bitcoin-abe
python setup.py install

once installed open file abe.conf
(Included is a copy of the file with section uncommented all you need to do is edit the password and DB info if you changed it)
If You use the original config file from abe you will need to follow steps below and uncomment and modify lines.

################################################################################

abe.conf GUIDE

uncomment lines 33 & 34 and update line 34 with your password / user and db info for MySQL

# MySQL example; see also README-MYSQL.txt:
dbtype MySQLdb
connect-args {"user":"abe","db":"abe","passwd":"YOUR_PASSWORD_HERE"}

Uncomment lines 57 & 58

# Specify port and/or host to serve HTTP instead of FastCGI:
port 2750
host localhost

This will open port 2750 on localhost to allow the wallet checker to connect to the API

Next scroll down to the section where datadir is listed, you must specifiy the path to the blockchain directory this path should contain the bitcoin.conf & blocks & chainstate folders.

Uncomment Lines 136 / 137 / 139 / 140
**Do not uncomment line 138 "loader"**  as we are not caling via RPC rather via the API and http request to gettecievedbyaddress + addy

datadir += [{
        "dirname": "/path/to/blockchain",
#        "loader": "rpc",    # See the comments for default-loader below.
        "chain": "Bitcoin"
      }]

################################################################################

START THE IMPORT

You can now start to load the data to abe from the blockchain run the following command from the bitcoin-abe-master dir

$ python -m Abe.abe --config abe.conf --commit-bytes 100000 --no-serve --datadir /path/to/blockchain

You should see output like:

block_tx 1 1
    block_tx 2 2
block_tx 3 3
    block_tx 4 4
block_tx 5 5
    block_tx 6 6
block_tx 7 7
    block_tx 8 8

( THIS PROCESS WILL TAKE A VERY LONG TIME POSSIBLY 2-6 DAYS DEPENDING ON YOUR SYSTEM SPEC )

You can stop the process at any time and re-start the load will continue from the last block loaded after checking the chain.
The data that is loaded can also be used to search while data in importing but only up to the latest block number processed.

Next step can be done now if you want to scan small search space or wait for full import of data before continuing.


################################################################################

CHECK MYSQL

Go back to MySQL and log in and type

mysql> use abe;

mysql> show tables;

Output will show.

+-----------------+
| Tables_in_abe   |
+-----------------+
| abe_lock        |
| block           |
| block_next      |
| block_seq       |
| block_tx        |
| block_txin      |
| chain           |
| chain_candidate |
| chain_seq       |
| chain_summary   |
| configvar       |
| datadir         |
| datadir_seq     |
| multisig_pubkey |
| orphan_block    |
| pubkey          |
| pubkey_seq      |
| tx              |
| tx_seq          |
| txin            |
| txin_detail     |
| txin_seq        |
| txout           |
| txout_approx    |
| txout_detail    |
| txout_seq       |
| unlinked_tx     |
| unlinked_txin   |
+-----------------+



################################################################################


LAUNCH BITCOIN ABE (LOCALHOST)

If you have this working you can now launch ABE from the bitcoin-abe-master dir to view the api in localhost.

$ python -m Abe.abe --config abe.conf

Open browser and navagate to: localhost:2750 

You should now see the ABE block explorer running.


################################################################################

853  Bitcoin / Mining support / Re: Need Antminer s9 serial connect to eliminate NEW VIRUS!!! on: July 08, 2019, 10:41:34 AM
Well I tested the attack toolkit last night and I must say it's a free-ride for hackers is bitcoin and mining.
After only a few moments tested I had over 300+ ip's of machines 95% of which were not behind any sort of firewall or protection.

I did not attempt to brute them but I would guess with some good word lists and time most of them would fall.

I am also convinced there is an exploit out there for miners that would allow this kind of thing.

Don't say I didn't warn you when the ransomware starts to hit the miners.
854  Bitcoin / Pools / Re: [∞ YH] solo.ckpool.org 1% fee solo mining USA/DE 252 blocks solved! on: July 08, 2019, 10:33:55 AM
It would seem you must have rolled over to your fail-over pools and solved blocks there.
CK Pool and CK solo are both highly trusted pools they do not mine S**t coins or merged mine for that matter.

My thoughts would be you solved a block with one of your fail-over pools.

It's happened to me in the past when I have had machines set to roll over to nicehash or MMR.

I've mined here for years and still no jackpot Smiley
855  Bitcoin / Mining support / Re: Need Antminer s9 serial connect to eliminate NEW VIRUS!!! on: July 07, 2019, 10:23:31 AM
This may actually be a legit issue recently an attack tool for miners has been released it scans shodan with the API for miners with open ports then brutes the miners allowing the attacker access to the machines it may be possible you have weak credentials on your machines and they have been compromised via brute force attempt.

Once attackers gain access they can update your miners it could be possible they have custom firmware that might make it difficult to recover the miner but you should be able to use the above guides to flash the miners with clean firmware.

856  Bitcoin / Bitcoin Discussion / Re: BITCOIN IS IN A BUBBLE !!! The true value of Bitcoin is somewhere near ZERO on: July 06, 2019, 01:50:15 PM
Another x100 bitmex user liquidated?   

Seems the theme right now people lose money then come here and spout absolute crap. 
Good luck holding that paper fiat. did you not know FIAT is the biggest bubble in the world but you use it right?

You are also free to do as you wish and say as you wish but it will fall on deaf ears in this forum and to those who actually understand what it is there are buying.

857  Other / Off-topic / Re: Kleiman v. Wright case 6/28/19 (show cause) hearing likely open... follow 'live' on: July 05, 2019, 10:29:18 AM
https://www.youtube.com/watch?v=2qLI3VIHuKU

Gavin claims Craig signed in his presence block 1,  Yet his claims are not he cannot sign and has no access to the keys today.
Now if this is the case it would have been impossible for this to have happened back then if now today he claims that he has none of the keys and they are slip with shamirs secret sharing.

His claims of "Bonded" delivery's of keys are still to happen must be fake his claims now in court do not sit with the previous history of events he created.

https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing

858  Other / Off-topic / Re: Kleiman v. Wright case 6/28/19 (show cause) hearing likely open... follow 'live' on: June 30, 2019, 05:47:40 PM
@ BitcoinFX.

This is true looking back at the 0.01v ALPHA it's clearly there in main.cpp under the //mapKeys

Code:
    CRITICAL_BLOCK(cs_mapKeys)
    {
        mapKeys[key.GetPubKey()] = key.GetPrivKey();
        mapPubKeys[Hash160(key.GetPubKey())] = key.GetPubKey();
    }
    return CWalletDB().WriteKey(key.GetPubKey(), key.GetPrivKey());

and //mapWallet sections

Code:
vector<unsigned char> GenerateNewKey()
{
    CKey key;
    key.MakeNewKey();
    if (!AddKey(key))
        throw runtime_error("GenerateNewKey() : AddKey failed\n");
    return key.GetPubKey();

This is the very first code base for bitcoin he is claiming it was not supposed to be part of it but it's in the ALPHA release what he is trying to do is bamboozle the court.

for a long time he claims things like  "the blockchain is the ultimate proof"   and " the ledger can't lie" & " We can check the blockchain"
Yet now he is trying to tell us he didn't want a ledger or publickeys or anyway to see the funds?

I hope he likes prison food Smiley
859  Bitcoin / Legal / Re: Avoiding Tax on Capital Gains from Bitcoin on: June 30, 2019, 10:44:44 AM
In the event that you make a profit from the sale of your bitcoin, in many countries you will need to pay capital gains tax on this profit.

You take all the risk, and if it pays off, the government will be there looking for their taste - 30 to 45% of your gains.

If you were to make $1,000,000 from your bitcoin investment, you would be giving away possibly $300,000 to $450,000 depending on the country...

Hypothetically speaking of course (I personally would never try to avoid paying taxes), is there a simple way to avoid paying these types of taxes?

Exchanges are collecting your name and handing your transaction info over to the government for tax purposes. But with a little bit of creativity, is there not a way around this? E.g.

1. Using an exchange that does not require KYC / taking your personal information
2. Moving your bitcoin to another address not associated with your exchange account - If asked you can say that you have sold this with 0 profit to the person who holds that new address, "a man by the name of John Smith I think it was". The bitcoin can then be sold on an exchange which does not require KYC.
3. Transferring the funds from the sold btc to an offshore bank account, e.g. in Puerto Rico, which does not share information with foreign governments for tax purposes.

The question is, are there any reliable exchanges/p2p sites which do not require name/passport to sign up to?
Can these exchanges be linked to an offshore bank account in a jurisdiction which does not share banking info with other countries?



In the UK you only pay capital gains one your convert the BTC to GBP.
Advice.. Don't convert large amounts stick to smaller amounts.

End of the day Capital Gains is STEALING only with Authority.

My advice seek sounds financial advice from accountant if your concerned.

Or Move your assets to somewhere without CG
860  Economy / Economics / Re: CEO - WIREX: "GOODBYE Banknotes... Payments will be DIGITAL" - Cryptonites on: June 30, 2019, 10:34:28 AM
WXT has purpose and gives those who hold it cheaper fees and more cashback on purchases.  
If the funds help the system grow the I don't see what the issue with is.

Not like there going to vanish overnight (Not working with visa they won't)

Do you know what purpose means?
How is holding wirextoken in your account serve any purpose?  That's not a purpose, that's a reward.

Oh, it would grant you cheaper fees and better cashback. Why it only applies for their tokens, you could hold 5000 euros on your account, why not give those users also better cashback and better fees.
ESPECIALLY!!!! since you have to hold those tokens in your account, letting them act as collateral.

Do you realize what insane cash grab this IEO is?
Not only do they sell you a worthless token, but they force you to keep them in your account if you want to enjoy better fees, making sure you won't sell even one or try to redeem them.

And further, let's do some math.

Since crypto back for normal accounts is 0.5% and for holding 5000$ is 1.5% it means you will have to spend 500 000$, half a million with their card to get even!!!!
And you're going to see those benefits only starting September!

And it doesn't stop there.
The total supply is 300 000 000 tokens, so only 600 people would be able to benefit from it.

Lols, lols and rolf and lmao!

In a perfect world..

End of the day they are not forcing you to buy them are they? 
Not like they are saying buy or you won't be able to use our cards.

I'm supporting them as they have supported us by pushing to get conventional ways to spend your crypto they also did  hell of a lot for adoption if they are looking to raise capital (from what I see to get CBS core banking software) then really I don't see the issue 1. you get something for the token back (where as 99% of other tokens have nothing to show)    and your helping to boost one of the best platforms to use for crypto IMO.

And I know a lot of users who make extremely large transactions there some of who spent way over the 500k so yes do your math if your buying the token to try turn a coin that's not what it's for and should not be viewed as that either.

Your looking at it as investment token which it's not.  Oh if I but 5000 today I want to sell at x5 in 2 weeks that is NOT what WXT token is for and it says that clearly.

Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 [43] 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!