Its really strange for me: It takes ages to load and when i try to login it throws me back to the login page after loading endlessly.
|
|
|
Sold again?
|
|
|
The usual downtime:
|
|
|
I ship worldwide. In fact i had a customer from India today, which made me post here.
|
|
|
Can I receive payments to this card? For example from a foxex or trading company?
You can receive payments from everywhere.
|
|
|
Q: Do you need to register the card online before using it? Or you just load it up and go?
No, you dont have to, they are active by default.
|
|
|
Minimum order amount is 2 cards for and for 10 including shipping. If you want to buy more, please PM me for a quote. Please note that this are not the cheap PLN cards that expire within a few months. You also dont have to pay conversion fees of 2.8% per EUR deposit+withdraw, since this are not PLN cards. This are no virtual credit cards (VCC), which users are scammed with big times. There is nothing shady about the cards, they are issued by an EU bank and are completely legal. The cards will be sent insured, trackable and you will have to sign for them(optional: no sign for, no tracking, no refund). Shipping duration: 2-3 days to Central Europe, 3-5 days rest of Europe and 5-15 days to the rest of the world.Immediately usable and transferable without formalities No ID, credit check and no bank account necessary Available and usable worldwide Absolute anonymity without name tied to card The bank account will accept transfers in any name Issued and sealed by a major EU bank Ne fees for account and card maintenance Easy and free topup to your own bank account Accepted worldwide in over 29 million outlets Accepted worldwide in over 1 million ATMs Accepted worldwide on the internet Accepted worldwide for authentication Check your balance online and per text Expiration date: 11 / 2015 Maximum balance on the card per calendar year: 2500€ (7500€ in 3 calendar years) Single POS or online transaction limit: 1000€ Free online and POS shopping ATM fee worldwide: 2.5€ ATM daily limit: 150€ Currency exchange fee: 2.8% - this only applies to transactions not in EUR I have been selling for over 6 months here, but see for yourself: https://bitcointalk.org/index.php?action=trust;u=81795Main thread: https://bitcointalk.org/index.php?topic=216629
|
|
|
Minimum order amount is 2 cards for 55€, 250€ for 10 and 2300€ for 100 including shipping. If you want to buy more, please PM me for a quote. 99+ cards come with your own design, but take 1-2 weeks to process:
Please note that this are not the cheap PLN cards that expire within a few months. You also dont have to pay conversion fees of 2.8% per EUR deposit+withdraw, since this are not PLN credit cards. This are no virtual credit cards (VCC), which users are scammed with big times. There is nothing shady about the cards, they are issued by an EU bank, are transferable and are completely legal. The cards are shipped, insured and trackable and you will have to sign for them(optional: no sign for, no tracking, no refund). Shipping duration: 2-3 days to Central Europe, 3-5 days rest of Europe and 5-15 days to the rest of the world from Germany. 24/7 support by email or IRC.Immediately usable and transferable without formalities No ID, credit check and no bank account necessary Available and usable worldwide Absolute anonymity without name tied to card The bank account will accept transfers in any name Issued and sealed by a major EU bank Ne fees for account and card maintenance Easy and free topup to the attached bank account Accepted worldwide in over 29 million outlets Accepted worldwide in over 1 million ATMs Accepted worldwide on the internet Check your balance online and per text Expiration date: 05 / 2016 Maximum balance on the card per calendar year: 2500€ (7500€ in 3 calendar years) Single POS or online transaction limit: 1000€ Free online and POS shopping ATM daily limit: 150€ ATM fee worldwide: 2.5€ Currency exchange fee: 2.8% - this only applies to transactions not in EUR I have been selling for over a year here, but see for yourself: https://bitcointalk.org/index.php?action=trust;u=81795You also also check my spotless Bitmit feedback: FAQWhat bank issues the cards? Its an EU bank. Are this real, legal, anonymous credit cards? This are real, legal, anonymous VISA debit cards. Are these cards legal? Yes, they are issued by an EU bank, transferable and completely legal. How much do the cards cost? You can see the price on top of this page. What information is needed to send the card? Any address where you can receive the cards. What does "you will have to sign for them" mean? It means you will have to sign for them, when the mailman arrives to confirm you received the card. What happens if i use a funny name like James Bond or Brad Pitt? If you dont ask for non registered mail, i will assume you are Brad Pitt and ship it. Do you accept PayPal, Skrill, Western Union, Credit Card or my cow as payment? No, i accept Bitcoins only. Can you explain what Bitcoins are? No, i am a very lazy person: http://lmgtfy.com/?q=BitcoinsDo i have to register the card? No, they are ready to use and work with any name. How can i load the card with Bitcoins? Exchange Bitcoins at an exchange and send the cash by SEPA or international transfer to the attached bank account. Can i use this for PP? No, the cards dont work with PP! How do i stay anonymous with the cards? Withdraw anonymously from an exchange. Will you ship to Timbuktu or Inner Mongolia? Yes, i will ship worldwide, except to the Middle East and the US. Will the card work in Timbuktu or Inner Mongolia? The card will work anywhere where VISA is accepted. Will i get a refund when my card gets "lost"? I have the tracking number and see if you received it or not. Can you send me a sample? I promise i will order 100 after that. Yes, i will make you a very special price for the first 2 cards: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2.0.22 (MingW32) mQENBFG4mREBCAC4pJ6VZfq4Nadr2AL6AglNkbSu2VYmLdjBszNivPduPQZY9L9E MUwZCOgJUfDq01JpE+4mrwZvMnKXqHDRVzpy372d5U1Ncg0PfeeP3QGwrUX1kDkZ CxcuwdE1U5e+QE3H5qL+SForBE7Oz1erq6xu0EttWAealBx7nsR7WidV4faPcAAM 1xGSVIXXP7Rj1yvdI8ny61d/u+6q468bduEni6XnUq+qPsQ0LyN5r4S0YKk1gkck ZDmCvOmex2e1+a4tZrHGx2ixqdd/jwle721BdnLPszLyJznxZiohqB26Sp/S3tOE BEQNhxWGaBTWuwC5MARKG9+6h+c60HkU5A99ABEBAAG0IWJlcm5hcmQ3NSA8YmVy bmFyZDc1QHRvcm1haWwub3JnPokBOAQTAQIAIgUCUbiZEQIbAwYLCQgHAwIGFQgC CQoLBBYCAwECHgECF4AACgkQydOd0ho1zBQb6QgAkMzkOqyYYvKZbnUeruHbfDST TiO6z8/wocpIQntLPNQGKGB4ttGV2SpVVSnRbfq1LZaSrXh9jUUva9rjTrVCFniz DT5rGEexDmqPtVFXmUVfTNeUHu4ekBnIF7lK1pb6dI+QK2JoHgZYYsfFoz5Uba55 QkjZBxtz//CVzTw078OOKnuO9XuZpssC5AsUz1kI0VIrNo0KId5kB32TXCE1rsn9 pODVpKuZ2kM5VuDENCIdPxZyqfFqloN+1VvSBMz9FnH+YLbTgyxG5xnNqGuYjYc8 VwAharBQpNelB6CiYe44Lz2DA6yemDbtLv22FbG2+dMq9l7sv5EsTIjZ3b9i9LkB DQRRuJkRAQgA2+1wcKuPuH3XGnayC2Or/zPueSqxY2lgxNdZOfzHr+muxqe2VkI4 JP8ty2+rARrxH0jq/jXSljjA884lVoIeoau4Ebp+m3u4fxMEhay8exDMJFmBNTci EJdGJbNChC84uh9qt3baPBFMqBO0Dko0XmGUk4qeQn3zYImfxGsA1E42Lf9fVjQ0 UsmiscFz1Flla+9cd11w9OJ4lbD9mtZY0wQbpkt/0uKy+Zd66ulniVy0nKnlqDwh WOgeSVXcCE3kXY+x1RI/NZdjOQW4eD24U5d0cAu6thmOdwN1CahW6ShBDf7NFBwP 3eCCHaX0c/qrK7zVTMxIrqndXsWiu65lIQARAQABiQEfBBgBAgAJBQJRuJkRAhsM AAoJEMnTndIaNcwUPhEH/i6NuEyI2b3u6wqhqjop9bTcUHVZGJUacpt2NdgQW0fs 6pIYcl4PbYoNuUOLpAZXV0LSYMJhchOMpJlxFFI6djVKE4tkJ7Ozw06BmRdzQe6q 5VMKSe3FcFHWjHzke0mKcNdgyRM69xJSd15IooDxkKlVy6sHX+kVTmt11ZX81CMz WW3YN9FBnSKYo4Xx8rJ840Io98EbGG9HoNEDNyN7ZQ0kS1zhskesnyoHzcPwE5eA GrHSvgeA/izCV3ESeAHsFxlhvoojVvtqSMpSCPgV0DeMFFlzzQ53wcLmDlMZKjeh YTluTRoegoNQ0vY80M9DSlOcdLiGguafIMutEysE3Es= =no2y -----END PGP PUBLIC KEY BLOCK-----
|
|
|
Updated the listing, only in English though.
|
|
|
Updated the listing, only in English though.
|
|
|
http://www.chronicles.no/2013/08/bitmessage-crackdown.htmlMr "Robert White" was behind the "attack" (message from secupost.net and Bitmessage): -- -- -- This message is also available at http://secupost.netAlright, the messages sent out a few days ago are starting to expire now. It's time for everyone to learn what the purpose of secupost.net is. As many of you guessed, this is indeed a Bitmessage address to IP address mapper. Yes, the only thing that webserver would send was a 500 message. It did alright too, gathering nearly 500 bitmessage users information after sending 15000 messages. Double what I expected. I've included both a log of each address detected and the first thing to hit it including IP, reverse DNS and useragent as well as raw logs for every valid request. If you need to confirm this signature so you can verify messages from me when bitmessage is down, please see the bitmessage general chan for a copy from my bitmessage address. So, future lessons: - - - Yes, all bitmessage addresses are public and can be read from your messages.dat file using a small script. - - - Don't click links. Even if it looks like a security-related site and uses some technical terms. I am not a nice person, I will publish any information I can gather about you and I don't care if you get lit on fire by terrorists because of it. - - - Bitmessage does _not_ scale. It took me around 3.5 hours to send ~15k messages but it took the bitmessage network over 18 hours to fully propogate them. Some of you were smart enough to use tor or VPN providers, but many of these are direct home or server IPs. The information below is more than enough for any government to come after you or any script kiddie to DDoS you. Be more careful next time. Some of you tried to use scripts to claim addresses which weren't yours and skew the data, of course, you didn't even change your user-agent. Even without accouting for that your attacks were ineffective because the IDs were generated in a non-linear fashion using a cropped HMAC-SHA256. To find your id: def gen_mac(addr): mac = hmac.new("fuck you", addr, hashlib.sha256).digest() return unpack('>I', mac[0:4])[0] This simple deterministic method means that you would have had to try... (2^32/15000)/2 = 143165 times on average just to get a single collision. Thanks for playing, but no luck this time. This service has been operated completely anonymously thanks to Tor and Bitcoin. I hope you enjoy the result. Robert White (BM-2D8yr4fzoMzwndqPwLMVyzUcdfK9LWZXjY)
|
|
|
http://www.chronicles.no/2013/08/bitmessage-crackdown.htmlMr "Robert White" was behind the "attack" (message from secupost.net and Bitmessage): -- -- -- This message is also available at http://secupost.netAlright, the messages sent out a few days ago are starting to expire now. It's time for everyone to learn what the purpose of secupost.net is. As many of you guessed, this is indeed a Bitmessage address to IP address mapper. Yes, the only thing that webserver would send was a 500 message. It did alright too, gathering nearly 500 bitmessage users information after sending 15000 messages. Double what I expected. I've included both a log of each address detected and the first thing to hit it including IP, reverse DNS and useragent as well as raw logs for every valid request. If you need to confirm this signature so you can verify messages from me when bitmessage is down, please see the bitmessage general chan for a copy from my bitmessage address. So, future lessons: - - - Yes, all bitmessage addresses are public and can be read from your messages.dat file using a small script. - - - Don't click links. Even if it looks like a security-related site and uses some technical terms. I am not a nice person, I will publish any information I can gather about you and I don't care if you get lit on fire by terrorists because of it. - - - Bitmessage does _not_ scale. It took me around 3.5 hours to send ~15k messages but it took the bitmessage network over 18 hours to fully propogate them. Some of you were smart enough to use tor or VPN providers, but many of these are direct home or server IPs. The information below is more than enough for any government to come after you or any script kiddie to DDoS you. Be more careful next time. Some of you tried to use scripts to claim addresses which weren't yours and skew the data, of course, you didn't even change your user-agent. Even without accouting for that your attacks were ineffective because the IDs were generated in a non-linear fashion using a cropped HMAC-SHA256. To find your id: def gen_mac(addr): mac = hmac.new("fuck you", addr, hashlib.sha256).digest() return unpack('>I', mac[0:4])[0] This simple deterministic method means that you would have had to try... (2^32/15000)/2 = 143165 times on average just to get a single collision. Thanks for playing, but no luck this time. This service has been operated completely anonymously thanks to Tor and Bitcoin. I hope you enjoy the result. Robert White (BM-2D8yr4fzoMzwndqPwLMVyzUcdfK9LWZXjY)
|
|
|
- alle gebühren auf dem weg und auch erst wenn das geld eintrifft, wenn überhaupt
|
|
|
Lavabit, Silent Circle, Tormail and now Bitmessage: It seems like all users received the following message today: Bitmessage has several potential security issues including a broken proof of work function and potential private key leaks. Full details: http://secupost.net/*RefNumber/bitmessage-security Somebody is collecting IPs, i wonder who?
|
|
|
Lavabit, Silent Circle, Tormail and now Bitmessage: It seems like all users received the following message today: Bitmessage has several potential security issues including a broken proof of work function and potential private key leaks. Full details: http://secupost.net/*RefNumber/bitmessage-security Somebody is collecting IPs, i wonder who?
|
|
|
Nachricht von Riseup: Es wäre ein Fehler, die letzten Offenbarungen zu den massiven Überwachungsprogrammen in den USA und der EU ausschließlich hinsichtlich der Privatsphäre von Individuen zu betrachten. Auf dem Spiel steht keineswegs nur die Privatsphäre, sondern es geht dabei um die Macht der Staaten über ihre Bürger. Überwachung ist im Ursprung eine höchst effektive Form sozialer Kontrolle. Das Wissen darum, zu jeder Zeit beobachtet zu werden, ändert das Verhalten und erstickt abweichende Meinungen. Die Unfähigkeit zu flüstern bedeutet, dass es keine Form der Rede gibt, die wirklich frei von Zwang ist, real oder unterschwellig. Weit tiefer bedroht durchdringende Überwachung das entscheidende Kriterium für sowohl Demokratie, als auch soziale Bewegungen: den geistigen Freiraum, Widerspruch und unpopuläre Ansichten zu entwickeln. Viele KommentatorInnen und Edward Snowden selbst haben festgestellt, dass diese Überwachungsprogramme eine existentielle Bedrohung für die Demokratie an sich darstellen. Das untertreibt das Problem jedoch. Die installierten allumfassenden Überwachungsprogramme sind gegenwärtig nicht nur eine potentielle Bedrohung, sondern sie werden gewiss, sofern nicht überprüft werden, "demokratische" Systeme fundamental beschädigen. Demokratie, sogar der gegenwärtig praktizierte Schatten von Demokratie, ruht auf dem Grundstein der freien Assoziation, der freien Rede, inklusive Widerspruch. Die Konsequenz aus der zwingenden Herrschaft durch Überwachung ist die Erschütterung dieser Grundlage und untergräbt all das, worauf Demokratie aufbaut. Innerhalb sozialer Bewegungen gibt es die Versuchung, zu meinen, dass sich nicht wirklich etwas geändert habe. Schließlich haben Regierungen schon immer Aktivistengruppen im Visier und trachten diesen zu zerrütten, besonders die erfolgreichen unter ihnen. Diese neue Überwachung ist jedoch anders. Was die alliierten US- und EU-Regierungen geschaffen haben, ist eine Infrastruktur der perfekten sozialen Kontrolle. Durch die Automatisierung der Überwachungsmechanismen sind sie in der Lage, mühelos die Leben aller zu begutachten, zu jeder Zeit. Damit haben sie ein beispielloses System geschaffen mit der Möglichkeit, zu kontrollieren, wie wir denken und uns verhalten. Zugegeben, diese Infrastruktur wird gegenwärtig nicht in dieser Weise genutzt. Allerdings ist es ein technischer Werkzeugkasten, der sehr leicht zu totalitären Auswüchsen führen kann. Wer glaubt, wir können Regierungen vertrauen, dass sie ihre unheilvolle Macht im Zaum halten, wenn sie haarscharfe Einblicke in unsere täglichen Arbeitsprozesse erlangen, verwettet die Zukunft gegen die Fähigkeit geheimer Regierungen, sich bei der Ausübung ihrer ständig wachsenden Macht selbst zu beherrschen. Wenn uns Geschichte eines lehrt, dann dass die Machthabenden immer ihre ganze Macht benutzen, sofern sie nicht daran gehindert werden. Also, wie genau wollen wir sie stoppen? Wir unterstützen Menschen, die sich in Rechtssysteme einarbeiten und politischen Druck ausüben, aber wir haben den Eindruck, die größte Hoffnung zur Überwindung von Überwachungstechnik ist Verschlüsselung. Warum? Weil jene, die diese schöne neue Welt erschaffen haben, vermutlich nicht abgesetzt werden können, bis es zu spät ist, die fortschreitende Überwachung aufzuhalten. Unglücklicherweise ist die meiste Verschlüsselungstechnik kontraproduktiv. Viele Menschen propagieren proprietäre Technik, die sich auf zentrale Autoritäten verlässt, oder für gewöhnliche Anwender furchtbar kompliziert ist. Die einzige Technik mit Aussicht, der zunehmenden Überwachung zu trotzen, muss frei, quelloffen, dezentral vernetzt und fürchterlich einfach zu benutzen sein. Langfristig könnten dezentrale Peer-to-Peer-Werkzeuge diese Kriterien erfüllen, aber auf absehbare Zeit erfüllen diese Werkzeuge noch nicht alle Funktionen und Ansprüche an die Benutzbarkeit, die die meisten Menschen gewöhnt sind. In den kommenden Monaten werden die Vögel von Riseup eine Reihe von radikal neuen Diensten starten, beginnend mit verschlüsseltem Internet, über E-Mail-Verschlüsselung bis hin zu verschlüsselter Sofortkommunikation. Diese Dienste werden zu 100% freie und offene Software und offene Protokolle verwenden. Sie werden einfach zu benutzen sein und sie werden eure Kommunikation vor allen fremden Zugriffen schützen, sogar von Riseup selbst. Dies ist ein massives Unterfangen, das wir zusammen mit verschiedenen anderen Organisationen im Laufe des letzten Jahres unternommen haben, und es wird nur mit eurer Hilfe funktionieren. Wir brauchen ProgrammiererInnen, besonders jene unter euch mit Erfahrung im Umgang mit Python, C, Ruby und Android-Entwicklung haben, sowie SystemadministratorInnen, die selbst sichere Dienstleistungen anbieten möchten. Wir brauchen auch Geld. Spenden unserer verblüffenden Riseup-NutzerInnen ermöglichen den Betrieb unserer gegenwärtigen Infrastruktur. Um allerdings in der Lage zu sein, die nächste Generation wirklich sicherer und einfach zu bedienender Kommunikationstechnologie zu meistern, brauchen wir einiges mehr, als unsere Mitglieder geben können. Falls Du tiefe Taschen und ein Interesse am Aufbau dieser neuen Generation von Kommunikation hast, wünschen wir uns, von Dir zu hören. Falls Deine Freunde oder Familie sich um die Zukunft der Demokratie kümmern und etwas beisteuern können, dann wollen wir auch von ihnen hören. Bei Riseup hatten wir in den letzten Jahren den Eindruck, dass die Handlungsmöglichkeiten gegen die zunehmend allumfassende Überwachung immer weiter eingeschränkt werden. Jetzt ist die Gelegenheit, um eine neue Wirklichkeit zu schaffen, in der ein Großteil der Menschen täglich Verschlüsselung benutzt. Falls Du Fähigkeiten oder Geld hast, dann ist jetzt die Zeit, einen Schritt zu tun, um diese Realität wahr werden zu lassen. Bitte schreibt an waxwing@riseup.net. Bitcoins gern gesehen: https://help.riseup.net/en/donate
|
|
|
Call from Riseup: It is a mistake to frame the recent US and European massive surveillance revelations in terms of the privacy of individuals. What is at stake is not privacy at all, but the power of the state over its citizenry. What surveillance really is, at its root, is a highly effective form of social control. The knowledge of always being watched changes our behavior and stifles dissent. The inability to associate secretly means there is no longer any possibility for free association. The inability to whisper means there is no longer any speech that is truly free of coercion, real or implied. Most profoundly, pervasive surveillance threatens to eliminate the most vital element of both democracy and social movements: the mental space for people to form dissenting and unpopular views. Many commentators, and Edward Snowden himself, have noted that these surveillance programs represent an existential threat to democracy. This understates the problem. The universal surveillance programs in place now are not simply a potential threat, they are certain to destroy democracy if left unchecked. Democracy, even the shadow of democracy we currently practice, rests on the bedrock foundation of free association, free speech, and dissent. The consequence of the coercive power of surveillance is to subvert this foundation and undermine everything democracy rests on. Within social movements, there is a temptation to say that nothing is really different. After all, governments have always targeted activist groups with surveillance and disruption, especially the successful ones. But this new surveillance is different. What the US government and European allies have built is an infrastructure for perfect social control. By automating the process of surveillance, they have created the ability to effortlessly peer into the lives of everyone, all the time, and thus create a system with unprecedented potential for controlling how we behave and think. True, this infrastructure is not currently used in this way, but it is a technical tool-kit that can easily be used for totalitarian ends. Those who imagine a government can be trusted to police itself when given the ominous power of precise insight into the inner workings of everyday life are betting the future on the ability of a secretive government to show proper self-restraint in the use of their ever-expanding power. If history has shown us anything, it is that the powerful will always use their full power unless they are forced to stop. So, how exactly are we planning on stopping them? We support people working through the legal system or applying political pressure, but we feel our best hope of stopping the technology of surveillance is the technology of encryption. Why? Because the forces that have created this brave new world are unlikely to be uprooted before it is too late to halt the advance of surveillance. Unfortunately, most existing encryption technology is counterproductive. Many people are pushing technology that is proprietary, relies on a central authority, or is hopelessly difficult for the common user. The only technology that has a chance to resist the rise of surveillance will be open source, federated, and incredibly easy to use. In the long run, decentralized peer-to-peer tools might meet this criteria, but for the foreseeable future these tools will not have the features or usability that people have grown accustomed to. In the coming months, the Riseup birds plan to begin rolling out a series of radically new services, starting with encrypted internet, encrypted email, and encrypted chat. These services will be based on 100% open source and open protocols, will be easy to use, and will protect your data from everyone, even Riseup. This is a massive undertaking, made in concert over the last year with several other organizations, and will only work with your support. We need programmers, particularly those experienced in Python, C, Ruby, and Android development, and sysadmins interested in starting their own secure service providers. We also need money. Donations from our amazing Riseup users keep us running on our current infrastructure. But in order to be able to graduate to a new generation of truly secure and easy to use communication technology, we are going to need a lot more money than our users are able to donate. If you have deep pockets and an interest in building this new generation of communication, then we need to hear from you. If you have friends or family who care about the future of democracy and who have deep pockets, we need to hear from them, too. At Riseup, we have felt for the last few years that the window of opportunity to counter the rise of universal surveillance is slowly shrinking. Now is our chance to establish a new reality where mass numbers of people are using encryption on a daily basis. If you have the skills or the money, now is the time to step up and help make this reality come true. Please contact waxwing@riseup.netBitcoins accepted: https://help.riseup.net/en/donate
|
|
|
Wow, what is nowadays the the standard tool looked like this in the early days.
|
|
|
How about ticker images for bitstamp? Like here: http://btcticker.appspot.comUnfortunately that project is abandoned. Also very interested in 24h average images.
|
|
|
|