I wouldn't accept PayPal payments from people who don't have any or low trust here. It's a classic scam that's happened many times: buyer gets the bitcoins, and then files a chargeback with PayPal. Doesn't matter if it's paid through Goods and Services or Friends and Family. Lots of people seem to think that F&F payments aren't reversible, but I've heard of F&F transfers being reversed after the sender claims that their account was hacked. Well you can open a conflict and close it again. Once closed It's not possible to open a conflict again tho.
EDIT: The buyer have to do so
That is a lie. It can be opened again with a phone call to Paypal. It's been done before MANY times. Was going to mention this as well. It might be a little harder to open a dispute a second time but it's very doable.
|
|
|
You can try using paint.net and reducing the quality through that. To do so, open up the photo in paint.net, click Save and then a box will pop up allowing you to lower the quality until it's below the Bitcointalk threshold, which I believe is 1MB. I have a feeling that number is off, so if someone could correct me that would be awesome.
|
|
|
The database is still available on pastebin website. I have reported them too. But still no reply from pastebin. Guys, you also report to pastebin to get it removed.
If you reported it they should remove it pretty quickly. Pastebin is pretty good about removing stuff like that from their site. How long ago did you report it? I have reported to both satoshibox and pastebin at the same time on 18th july. But no response from pastebin yet. That's a little odd because IIRC this leak was previously posted to Pastebin and then removed shortly after. Anyway, I'll report it as well, hopefully it'll be taken down soon.
|
|
|
The database is still available on pastebin website. I have reported them too. But still no reply from pastebin. Guys, you also report to pastebin to get it removed.
If you reported it they should remove it pretty quickly. Pastebin is pretty good about removing stuff like that from their site. How long ago did you report it?
|
|
|
I heva a localbitcoins.com?
You have 2 credit cards and a paypal account. Why not go buy on legit exchangers with your credit card? I'm pretty sure there are people who accepts cc payments. Or he could just buy the S5 directly from Bitmain seeing as they accept credit card payments as well. Not sure why OP isn't doing that instead of asking for a loan.
|
|
|
-cut I never excluded him.
huh. guess I was wrong then. ==================================== then who put QS back? Looks like Tomatocage added Quickseller back onto his trust list.
|
|
|
It seems that most escrow providers charge 0% fees so I suspect they make very little on the transactions they escrow. I think it's safe to say they're making less than $5 USD per hour for their work.
It's harder to say for the more popular escrow providers (OgNasty, Tomatocage, etc) but I suspect they'd make a few bitcoin per month running their services.
Most providers don't do it for the money though, they do it to help out the community and keep others safe from potential scams.
|
|
|
Click Report to Moderator.
Actually i'm asking about to report a MEMBER not his POSTS. Because, he has created/posted too many threads. You could always PM a mod or admin and request that the user be banned, but there's no feature built into the forum to report a member.
|
|
|
Many have changed their data, I think it is now useless information.
The database leak is definitely far from useless. If someone bought it, they'd have a list of ~ 80k email addresses associated with bitcoin, plus I'm sure they would be able to steal hundreds of accounts on Bitcointalk as well as other sites. I'm sure lots of people won't bother changing their passwords on sites, or they'll just forget to do so i don't agree, anyone with even a little clue, knows that cloudminer.io was a ponzi scam even before, so using the same password as bitcointalk account(unless you're not a fully newbie which don't know even how bitcoin work), would be very improbable I know of at least one case where a high ranked member had their account stolen because of the database leak. In fact, it was the OP of this thread (grtthegreat). He had his account stolen, and then a loan request was made on the account by the account thief. I'm sure in the next few weeks there will be similar cases of this, because it seems so many people just re-use passwords on all sites they use.
|
|
|
I think it shouldn't be. Signatures play an important role on this forum despite of it's negative effects to others. A lot of users depend on signature campaign for an extra income.
True. And as I said, they can report the spammy or unrelated posts to the campaign managers to penalize them. Its not that hard to send a private message and report anyway. The problem with reporting spammy posters to campaign managers is that quite a few managers could care less. I've reported a couple people in the past with fairly obvious spam to their campaign managers and nothing has been done to stop their spamming. Instead they're getting paid for all this spam, which shouldn't be happening.
|
|
|
I use a Trezor with Electrum and I have the Trezor plugged in before Electrum starts. I've never run into any issues with it before, and Electrum definitely works better than the MyTrezor site. If you're having issues with the latest Electrum release try using the 2.0 version as suggested because it seems to fix problems that users have with later releases.
|
|
|
Many have changed their data, I think it is now useless information.
The database leak is definitely far from useless. If someone bought it, they'd have a list of ~ 80k email addresses associated with bitcoin, plus I'm sure they would be able to steal hundreds of accounts on Bitcointalk as well as other sites. I'm sure lots of people won't bother changing their passwords on sites, or they'll just forget to do so
|
|
|
Thanks. I've gone ahead and installed it. Having checked the signature my understanding is I have done what is necessary. I was just a little cautious because last time I overrode a UAC Error I ended up installing a load of spyware (that was a Filezilla download from SourceForge).
That was probably because it was downloaded through SourceForge, I've heard that their downloads are infamous for containing spyware. Like I said before, if file checksums and signatures work out, you shouldn't run into any problems.
|
|
|
The OP is looking for sites that sell PC hardware, not bitcoin mining gear.
|
|
|
One site that hasn't been mentioned yet is WTCR.ca. They're based out of Canada and sell a bunch of PC parts, plus a few miners as well.
|
|
|
If you've verified the integrity of the installer and it isn't working I'd disable UAC. Just type "UAC" into the windows search, open up the UAC settings and change the UAC setting to "never notify". You shouldn't run into any more problems when installing.
|
|
|
I think he would be a good choice for a moderator as well. Not because of his scam busting, but he seems to patrol most English areas of the website and keeps himself calm, even when things are getting heated. He obviously knows how moderating works around here, like he said, he has 1.6k reports with a 95% acceptance rate.
|
|
|
I haven't seen that error before and I don't think you should be seeing it either. Are you downloading Electrum from their official website? ( https://electrum.org )
|
|
|
It's amazing that people reuse usernames, passwords, and emails on shady sites like that.
Couldn't agree more. For years the discussion of safer passwords has been running, and tools developed to create safer password and keep them safer, but nothing happens even on sites where money is involved. I'm not even sure the password were stored in clear text, as Jack would give you 99 percent of the above. Exactly this. I've been using KeePass for years now and I've never had a problem. If a website is hacked and my login details are posted online, that's no big deal. Just generate a new password for the site and keep going. I'm not sure why more people don't use password managers like that, just remember your master password and then no need to worry about any of your other logins.
|
|
|
--- Little surprised that they stored all passwords in plain text though, that's some terrible security.
Is that the whole database...? It could be just the password's the hackers were able to crack. I can't see a single complex password in the list. The list is just a few examples of accounts to verfy that it's real. The complete list holds over 5,000 accounts I had heard that the whole entire leak was actually more like 80,000 accounts. I remember reading here that someone was offering up 5000 account logins so users could vouch for the validity of the leak. Not sure why that was happening though, as it was verified to be valid with the original 1000 leaked account details.
|
|
|
|