Merit source application:I am
Coolcryptovator member since March 28, 2018. My total time logged in:
66 days, 13 hours and 59 minutes on this forum. My trust score is
11: -0 / +6. Currently I am a "Sr. Member" and all of my merit by earned. I will try to explain why I would like to be a merit source.
Edit;
I am fully out of smerit nowIf you want to be a merit source:
1. Be a somewhat established member.
I believe somehow I am a established member of this forum. Since I have joined forum, I have been fighting against scam, spam and corruption. Mostly free time I try to report spam post and investigate scam ICO's. I have been trying to contribute my best knowledge and experience to improve this forum. I have
reported 5529 posts with 99% accuracy (5433 good, 68 bad, 28 unhandled)and I have
exposed multi dozen scam ICO's. And I have been trying to motivate people's to avoid spam, scam and corruption. I never hold my smerit and I have been distributing my smerit since beginning, and I proudly can say I haven't handover my smerit on wrong hand. Currently I am out of smerits. I want to keep my role to build a decent forum, and I want to help best contributors. That's why I am expecting to be merit source.
2. Collect TEN posts written in the last couple of months by other people that have not received nearly enough merit for how good they are, and post quotes for them all in a new Meta thread. The point of this is to demonstrate your ability to give out merit usefully.
I have collected TEN post, I believe that have not received nearly enough merits. Post quote are below.
#1TIPS FOR AVOIDING PYRAMID QUOTES
Hi everyone,
In my opinion, over-quoted threads are amongst the most annoying types of shitshows in the forum. Honestly, I used to compose such over-quoted threads, but over time I saw better threads from higher-ranked members, then I learnt from them and improve my threads' styles.
In the topic, I would like to present these following stuffs:
- To share with you some necessary tutorials on how to improve your threads' appearance by avoiding over-quoting when composing them.
- To save more space and help it more comfortable for readers, all images will be shown with links. Therefore, readers should click to those links to see them.
For now, your question will be
"oh, what are the problems of over-quoted threads?"As you can see in the following thread, creator over-quoted past threads, which result in vague of idea flows. Furthermore, doing this also causes their threads a bit messy, annoying. Looking at those threads, it is hard to know which specific thread they wanted to discuss (dozens of threads quoted).
https://i.imgur.com/6uL9h6A.pngAdditionally, such over-quoted threads also require large space to display. It means my fingers hurted too much to scroll my computer mouse. And no one is responsible for my medical bills
.
To improve threads' quality, at least its appearances, there are three basic simple steps composers should do:1) Deleting all un-necessary stuffs (including threads, contents, over-sized images attached, etc.). Only keep which threads (full contents of those threads) you want to discuss with.
2) Using snip to announce that in your thread, you only quote part of original contents of others' threads.
3) Seperating original threads to different smaller sentences/ paraphrases which you want to discuss specific part of its contents with your specific ideas.
So, if you spend time to read, and interested in the topic, your next question might be: Oh, sounds great, but how to do this?
Here you go:
Please look at the following images, then you will know how to do this.
I present three ways of avoiding over-quoted threads for you, which correspond to the three points I mentioned above.
1) The first way:For the specific thread above, please click on the quote, then deleting all contents in the blue highlighted range (which I show you in the two following images).
From there:
https://i.imgur.com/fMhzPmR.pngTo there:
https://i.imgur.com/pi7Iwkg.pngCase study here: https://bitcointalk.org/index.php?topic=3046992.msg32182737#msg321827372) The second way: if you would like to hide all contents which are extremely long (but still allocate which thread you want to discuss). Please do like this:
https://i.imgur.com/foveK5R.pngReplace all contents by using ~, snip.
Case study here: https://bitcointalk.org/index.php?topic=2818350.msg35410681#msg354106813) The third way:For instance:
https://i.imgur.com/gD8uQxm.pngAdditionally, if you only discuss with one thread, you should ignore link to the original thread since the second part of quote, you can do like this (simply using):
to ignore link to the original thread
Case study here: https://bitcointalk.org/index.php?topic=3377342.msg36883745#msg36883745To sum up:Composing your threads with the approach will make them have better appearance. It does not relate to the quality, but somehow makes your threads look a little bit better.
It is not only useful in the Meta board (and other serious ones), but also has good impacts in spamming boards (like altcoin discussions, etc.) ^^
I strongly believe that lots of higher-ranked members don't know how to do this because they luckily ranked up to those current high levels due to old rank requirements, before the lauch of merit system.
Sorry if my topic hurts your fingers, but I think that it's better to display those images to make the topic easier to understand.
This is valuable lesson I learnt from my experiences, so I would like to share it with someone who need it, and has still don't known how to do it.
For someone who known, just ignore my topic.
Please take it easy, because I don't want to bother you with my topic.
Notes:The topic has been under-constructions
#2Table of contents 1.
General Information 2.
The most popular hardware wallets 3.
Other hardware wallets worth attention 4.
Comparison of wallets General InformationWhat are hardware wallets?Hardware wallets are devices designed to store private keys and sign transactions independently from the computer. Their main advantage is being able to use them even on an infected computer. These days, most hardware wallets have built-in screen on which user can check whether or not the destination address was modified by a malware. However, it is not possible to store every cryptocurrency on a such device. It all depends on the support of the manufacturer.
What if I lose my wallet or destroy it?At the first boot, every hardware wallet generates either 12 or 24 word seed which you can later extend with a custom passphrase. This seed can be used to recover coins using third party software, for example, Electrum. It is recommended to test the seed before sending any coins to the generated address. Exposure of the seed should be considered as a major security issue and coins should be urgently moved to another address not associated with the same seed. Firmware updates sometimes wipe the device, keep that in mind before updating your device.
Are hardware wallets completely safe?No, there is no perfect solution. A few vulnerabilities have been found in the most popular hardware wallets but they required a physical access to the device. Here are examples of attacks that were possible to perform on
TREZOR One and
Ledger Nano S. If you don't trust hardware wallets because of that, you should consider using a cold storage. It's less convenient but it provides higher security.
Choosing a proper walletEvery hardware wallet is different. It is difficult to recommend only one model but there are only a few companies which sell trustworthy devices. Keep in mind that you are not paying only for the device but also for a long-term support. It would be a shame if your wallet didn't get an update after, for example, SegWit was activated.
The most popular hardware walletsLedger Nano SThis device is maintained by a French company. Ledger decided to use Secure Element which checks on every boot if the software on the device was modified. Some people are not keen on this solution since it's not completely open-source. You can either use Electrum or Ledger's Chrome app to access your wallet. It will be soon replaced by a new desktop and mobile client which will have more features. Currently, their Chrome app seems to lack some useful features such as using your custom backend and signing transactions without broadcasting them. To send specific coins you have to install a proper app on your device using Ledger Manager. Because of Secure Element, the available space on this model is quite small. However, you can uninstall apps anytime and your coins won't disappear. Later, you will have to reinstall the app which takes some time.
Ledger Nano S supports a huge variety of altcoins which is why many people choose it. You can find a full list
here.
Ledger BlueBig touchscreen, built-in battery, Bluetooth connectivity (not used by any app) and a larger memory are things which differ this model from Nano S. Due to high manufacturing costs, Ledger decided to stop selling this device. At the time of writing this guide, the last batch of ten thousand devices is available. Its support has been much worse than the other model, but Ledger is trying to make up for it.
TREZOR OneTREZOR is one of the most trustworthy hardware wallet manufacturers, located in Czech Republic. TREZOR software is fully open-source so anyone can contribute and help with implementing more coins. TREZOR is constantly upgrading their web wallet interface - you can find many features which are not supported natively by other hardware wallets. The device doesn't have any pre-loaded firmware. Due to security measurements, it's downloaded from TREZOR's servers on the first boot. Some users might find it difficult to input PIN and the seed recovery is done on the computer.
TREZOR TTREZOR T runs on a completely different software written from the scratch. Developers claim that it will make adding more coins easier. This model has a touchscreen which allows user to input PIN and passphrase on the device screen. SD card slot is definitely an unique feature. In the future, it will be possible to store files which will be automatically encrypted with your private key. This model will soon support Monero and Ripple.
KeepKeyKeepKey has been recently bought by ShapeShift. This device has less features than models described above. However, the developers are trying to make up for it. KeepKey
does not support native SegWit addresses (it's not possible to receive and spend from them). You can use either Chrome extension or Electrum to manage your coins. Because of the large screen, it might be difficult to hide or transport this wallet.
OpenDimeOpenDime is a small USB stick which you can hand out to any person you want. The device generates private keys and does not expose them (even not to the owner) unless the seal is void. There is no need to broadcast a transaction to the network, it's useful especially if the transaction fees are too expensive. You can simply give it to the other person.
Other hardware wallets worth attentionColdcardThis device doesn't have any specialized software. It works with some well-known software wallets. The device has a micro SD card slot which can be used for data storage and transporting (un)signed transactions. Currently, it's only available as a pre-order. It's worth to mention that you can use multiple PINs (accessing different wallets or even bricking the device).
BitBoxA small wallet created in Switzerland. Wallet data is stored on a micro SD card. Instead of built-in screen, this device has a touch button which is used for accepting and rejecting transactions. It is possible to use a smartphone to verify if the recipient's address is correct. It does not support as many altcoins as Ledger and TREZOR.
BitloxCredit card sized wallet with e-ink screen which doesn't require much power. Bluetooth can be used to communicate with a mobile device and a micro-usb cable with a computer.
Comparison of walletsWhich one is better? TREZOR or Ledger?It all depends on your needs. Ledger mostly focus on supporting more and more altcoins while TREZOR developers are adding more advanced features to their wallet. I would recommend TREZOR for anyone who is not interested in altcoins. Their build quality and support is almost equal (TREZOR team responds very fast not only through their ticket system, but also GitHub and Telegram).
What is the difference between TREZOR One and TREZOR T?TREZOR T is going to support more coins in the future because of new hardware and software. Touchscreen in TREZOR T allows for a secure input of PIN, passphrase and the seed in case you want to recover your coins.
Which device is more future proof?If you decide to buy either TREZOR or Ledger you won't have to worry about future Bitcoin forks. Don't expect to be able to claim every single one without exposing your keys to a third party software. More advanced features such as touchscreen and additional connectivity are useful, but they might easily break, it will make your device useless.
#3Hi,
In this guide I'd like to show you how to do offline-transactions using MyEtherWallet.
By using this method your private-key won't won't leave the offline machine so this is the safest way of sending transactions without a hardware-wallet.
First of all something about your private-key/keystore-file/recovery-seed: Do NOT store this files on your computer which is connected to the internet! If you're getting infected my malware you may lose all of your coins/tokens linked to this private-key. The safest way would be just using your keystore-file on your offline computer to sign transactions and storing your private-key/recovery seed safely on paper. Your private-key and recovery-seed are unencrypted provide instant access to your wallet while the keystore-file is encrypted and requires an additional password.
Requirements:- a computer which is connected to the internet
- a computer which isn't connected to the internet
- Your ETH public-key
- Your ETH private-key (Keystorefile should be preferred)
Installing MyEtherWallet locally [Do this on the offline computer]Download the local version of MyEtherWallet from the official MyEtherWallet Github (etherwallet-vX.X.X.X.zip):
https://github.com/kvhnuke/etherwallet/releasesMove "etherwallet-vX.X.X.X.zip" to your offline computer (USB Stick, Smartphone, ...) and extract the content from the ZIP.
Open MyEtherWallet by double clicking 'index.html' - you may have to right-click it, then go to 'Open with' and select a browser; I'd recommend using Google Chrome - you may want to download it on your online machine and transfer it to the offline machine.
Making an offline transactionSTEP 1: [ONLINE] Go to the MyEtherWallet-Website and select the 'Send Offline'-tab (
https://www.myetherwallet.com/#offline-transaction). If needed adjust your GWEI according to
https://ethgasstation.info/ by clicking on 'Gas Price: X GWEI' in the upper right corner and adjusting the slider to your needs. Then enter the public-address of the sender account into the 'From Address' textbox and click 'Generate'.
Write down the contents of 'Gas Price' and 'Nonce'.
STEP 2: [OFFLINE] Open your local copy of MyEtherWallet, select the 'Send Offline'-tab and scroll down to 'Step 2: Generate Transaction (Offline Computer)'.
Enter the following information:
- To Address: Receiver-address
- Value / Amount to Send: Amount you want to send (it's also possible to send Tokens by clicking on 'ETH' on the right side of the textbox and selecting the respective Token in the dropdown-menu)
- Gas Limit:
https://kb.myetherwallet.com/gas/what-is-gas-ethereum.html- Gas Price: Value from STEP 1
- Nonce: Value from STEP 1
- Data: optional - leave empty if not needed
Now scroll down until you see 'How would you like to access your wallet?' and log in using your preferred authentication-method (I'd recommend using your Keystore-File!) and click 'Unlock'.
Click 'Generate Transaction'
STEP 3: [OFFLINE] You'll now see two textboxes - 'Raw Transaction' and 'Signed Transaction'. Copy the content from 'Signed Transaction' and transfer it to your online computer.
STEP 4: [ONLINE] Go back to the MyEtherWallet-Website and select the 'Send Offline'-tab (
https://www.myetherwallet.com/#offline-transaction). Scroll down to 'Step 3: Send / Publish Transaction (Online Computer)', enter your signed transaction, click 'Send Transaction' and confirm it.
Congratulations, you're done
Sidenote: To check your balance just use
https://ethplorer.io/ or
https://etherscan.io/ or log in to MyEtherWallet just using your public-key (View only of couse).
If you have any questions please feel free to ask anytime.
Best regards,
Nestade
#4Hi,
Many people don't know how to generate a seed for their IOTA-wallet properly so they just use an online-seed-generator.
However this online generators aren't safe of course as you only need the seed to log in to your wallet.
I'd just like to show you how to generate your own secure seed.
Linux:Well... It's incredibly easy generating your seed using Linux - it's just one command.
cat /dev/urandom |tr -dc A-Z9|head -c${1:-81}
Windows:1.: Download and install Python:
Direct-Download (2.7.14):64bit:
https://www.python.org/ftp/python/2.7.14/python-2.7.14.amd64.msi32bit:
https://www.python.org/ftp/python/2.7.14/python-2.7.14.msiOverview:
https://www.python.org/downloads/release/python-2714/2a: Open Python Command Line (in start menu it's shown as 'Python (Command Line)') ***
3a: Paste in the following commands and hit enter:
from random import SystemRandom
alpha9 = u'9ABCDEFGHIJKLMNOPQRSTUVWXYZ'
password_length = 81
generator = SystemRandom()
print(u''.join(generator.choice(alpha9) for _ in range(password_length)))
Congratulations - you can copy your generated seed now - be sure to write it down and don't lose it!
----------------------------------------------------
2b: You can also download this phyton-script so you don't have to use the console:
https://drive.google.com/file/d/1KgS8JhsQuX7LPP-SW6mrYscJsy8nqThS/view?usp=sharing(If you don't trust it you can check the source-code by right-click and edit and it should be shown by default when downloading it.)
3b: After installing Phyton as mentioned in step 1 you should be able to run the script by double clicking it.
It will create a text-file called 'IOTASeed.txt' (same location as 'IOTASeed_AUTO.py') which contains the generated seed.
4b: Open 'IOTASeed.txt' and congratulations - be sure to write the contained seed down and don't lose it!
----------------------------------------------------
There are multiple ways of generating your seed - another popular method uses the programm 'keepass' - if you prefer this method you could use this guide (haven't checked it!):
https://drive.google.com/file/d/1b4dpnC6VWTQ3N7JHVU3SwYmwL_dt-QRD/viewMacOSI'm sorry, but I don't own any device running MacOS.
It should be possible using the Windows method mentioned above.
Just download this instead of the .exe and follow the Windows guide.
Direct-Download (2.7.14):32bit [Mac OS X 10.5 and later]:
https://www.python.org/ftp/python/2.7.14/python-2.7.14-macosx10.5.pkg32/64bit [Mac OS X 10.6 and later]:
https://www.python.org/ftp/python/2.7.14/python-2.7.14-macosx10.6.pkgOverview:
https://www.python.org/downloads/release/python-2714/Hope you could generate your own seed using this guide
Any advice and suggestions will be greatly appreciated!
Regards,
Nestade alias xuNsh1ne
#5Alternative title: how to be a dinosaur and resist changeBut seriously, I'm hoping this might be useful to someone who's a bit old-school like myself. I know there's Blockfolio and all that jazz, but I'm a bit weird in that I don't like using phone apps that much (get way too addicted) - so I like to manage my portfolio and handle my crypto business on a dedicated laptop. I also manage a portfolio for my dad and my father in law too, so I needed a solution where I could track totals for a number of different people - and I couldn't find an app that has this feature out of the box. It also opens up the possibilities of making all kinds of cool custom graphs etc. if you have the know-how.
Spiel over: so you want to be able to import live crypto price data into an excel spreadsheet? It's actually pretty simple. (Also bear with the post, the images take a while to load!)
1. Open a new spreadsheet and head the the Data tab on the ribbon, then click "From Web"
2. A dialogue box will then open as follows:
a. Now you're going to need to type in the link for the coinmarket cap API. For bitcoin, it is:
https://api.coinmarketcap.com/v1/ticker/bitcoinb. For alternative coins, you are going to need to find out the long URL name from coinmarketcap - simply look up your chosen coin on CMC and look at the URL - the name you want is the entry following /currencies/, for example for ETH:
https://coinmarketcap.com/currencies/ethereumc. A step for international users - if you'd like the ticker to include a conversion into your local currency, you can append the following code to the end of the API link: ?convert=[ENTER CURRENCY CODE HERE]. For example, I'm English, so my full code would read: "
https://api.coinmarketcap.com/v1/ticker/bitcoin/?convert=GBP"
3. The Query Tracker window will then open:
a. This can be a bit fiddly, but the first thing to do is give your query a title in the Query Settings: Property bar on the right (just for your convenience), e.g. just type in "Bitcoin" or whatever
b. Click on 'Record' and the table will populate:
c. Then go to 'File'>'Close and Load' in the ribbon, and voila, you'll have your shiny new table (complete with useful additional fields like "percent_change_24h", "rank" etc.)
4. Finally you're going to want to tweak the connection settings so the table auto updates and gives you dynamic pricing data.
a) Highlight the table, then click on the "Table Tools: Design" tab - then click the down arrow underneath "Refresh" and then click "Connection Properties" in the cascade menu
b) I then personally set it to "Refresh every 1 minute" and "Refresh data when opening the file"
c) OK, and ... that's it!
You now have a dynamic price ticker in Excel, and can start charting up your portfolio, tracking % gains etc. - your imagination and Excel skills are the only limit really. Enjoy!
#6(Opened initially this on Reputation with the idea most "Merit/alts investigators" would be in there but turn out they may be actually in here as well, if you are an Investigator, i suggest you read this, it may make your work easier)
Hi,
i had made this tool visualization of the Merit Network to find merit sources:
https://bitcointalk.org/index.php?topic=4584759.0But actually found out it may be good to find abusers as well. This visualization show the merit connections happened between users and in one of these version i marked also the red trust level for each user:
In here you can see who was red trusted(red), who is not(azure) and who is trusted (green)
Updated to Sunday 1st of JulyLink to the tool below:
https://albertoit.github.io/Merit-Network-Visualization/?config=config_Trust.jsonNow if you move along the peripheral area of this circle you see in the picture, you will notice a lot of points (users) isolated from the rest,
these could be transactions happened between alts or abuse in general(some in fact were already spotted as you can see):
Example 1:Example 2:If anybody has the time and will to go through these would be quite convenient as you can see immediately:
- Suspicius exchanges of merits between users
- If the user was already red trusted
- If any people he had some exchange was red trusted
- Clicking on the node you get information about rank - merit sent and received in general
If you have any questions ask.
More over: when you have identified some person of interest, you can use this other tool to output a list of the merit transactions with clickable links to the user profiles and message merited in the forum
Go here:
https://albertoit.github.io/Merit-Explorer-SQL/You can specify in the last line the name of the user you want to search for ( in this example theymos)
WHERE UserData.Username like "theymos"
paste this in the box to see the merit sent from the user
SELECT
date,
'<a href=https://bitcointalk.org/index.php?action=profile;u=' || fromid || '>' || fromid || '</a>' as Sender,
'<a href=https://bitcointalk.org/index.php?action=profile;u=' || toid || '>' || toid || '</a>' as Receiver,
merit,
'<a href=https://bitcointalk.org/index.php?topic=' || msg || '#' || substr(msg,instr(msg,'.')+1) || '>Link Merited post</a>' as MeritedPost
FROM meritdata
Inner Join UserData on UserData.userid = meritdata.fromid
WHERE UserData.Username like "theymos"
paste this in the box to see the merit received from theymos
SELECT
date,
'<a href=https://bitcointalk.org/index.php?action=profile;u=' || fromid || '>' || fromid || '</a>' as Sender,
'<a href=https://bitcointalk.org/index.php?action=profile;u=' || toid || '>' || toid || '</a>' as Receiver,
merit,
'<a href=https://bitcointalk.org/index.php?topic=' || msg || '#' || substr(msg,instr(msg,'.')+1) || '>Link Merited post</a>' as MeritedPost
FROM meritdata
Inner Join UserData on UserData.userid = meritdata.toid
WHERE UserData.Username like "theymos"
One real case research examplei went here:
https://albertoit.github.io/Merit-Network-Visualizationand found this user
hrbt:
then go to see the same in here:
https://albertoit.github.io/Merit-Network-Visualization/?config=config_Trust.jsonRun this query in here:
https://albertoit.github.io/Merit-Explorer-SQL/SELECT
date,
'https://bitcointalk.org/index.php?action=profile;u=' || fromid,
'https://bitcointalk.org/index.php?action=profile;u=' || toid,
merit,
'https://bitcointalk.org/index.php?topic=' || msg || '#' || substr(msg,instr(msg,'.')+1)
FROM meritdata
Inner Join UserData on UserData.userid = meritdata.fromid
WHERE UserData.Username like "hrbt"
Result, i display the links of: who sent, who received and a link to the message merited:
Done, the situation in here is pretty clear.
#7 There are 120 merit sources with a total merit generation of up to 23045 sMerit per 30 days
When 1 Merit is given it generate .5 sMerits. I found many times user trying to calculate like from 23045 will create 11522 and then 5761 and so on.
But they are not able to reach the number at end (after all the sum of halving merits).
So I decided to calculate it Mathematically. Since number of smerits will halved every time and 23045 is not perfectly divisible by 2.
We need to represent 23045 as sum of numbers that can be easily divisible by 2 at every stage till we reach Merit 1 .
In other words, first we need to put 23045 as sum of numbers in power of 2
23045 = 16384+4096+2048+512+4+1
23045= 2
14 + 2
12 + 2
11 + 2
9 +2
2 +2
0Now we start with 2
14 i.e 16384 and check how many merits it can generate.
16384 + 8192 + 4096 + 2048 +1024 + 512 + 256 + 128 + 64 +32 + 16 + 8 + 4 + 2 + 1 = 32767
Similarly, for other terms
4096 + 2048 +1024 + 512 + 256 + 128 + 64 +32 + 16 + 8 + 4 + 2 + 1 = 8191
2048 +1024 + 512 + 256 + 128 + 64 +32 + 16 + 8 + 4 + 2 + 1 = 4095
512 + 256 + 128 + 64 +32 + 16 + 8 + 4 + 2 + 1 = 1023
4 + 2 + 1 = 7
1= 1
So sum of these number will be 32767+8191+4095+1023+7+1=46084
Since we have 6 number that make up to the sum of 23045 , so we get 6/2 =3. and further 3/2 =1
You might be wondering why I did not use same formula for 6 (2
2+2
1 ) because 6 is converted to merit ,it is not smerit anymore.
So in total 46084+3+1 =
46088 Merit will be generated Mathematically.
This all calculation is derived by using the fundamentals of Geometric Progression and sequence, their n
th term and sum till the n
th term.
Some links to understand Geometric Progression are
here and
here and
hereTabular Data of the Calculation
Hope you all enjoyed the calculation.
PS: 46088 is mathematically feasible and maximum limit that can be generated if we used all source merit but actual number can be less or more because many users will left with residual smerits but this residual smerit can be used next time when they receive a single merit or odd number of merits.
#8I'm going to make a short list indicators on how you can spot an obvious ponzi scam website. Please tell me if this board is the right place for this content.
You can give suggestions and other variables so I will edit the list below.
What is a Ponzi scheme?A Ponzi scheme is an investment fraud platform that requires payment of returns to existing investors from funds contributed by new investors. They often seduce new investors by promising them to invest money for an opportunity claimed to generate high-value returns with small or even no risk at all. They usually or mostly attracting new amount of money to make promised payments to earlier-stage investors to create the false impression that investors are profiting from an authorized business.
History of Ponzi SchemeThese known scheme is named after
Charles Ponzi (1882–1949). He received a letter in the mail from a company in Spain that contained in it an IRC/International Reply Coupon (a coupon that can be exchanged for a number of priority airmail postage stamps from another country). Ponzi realized that he could turn a profit by buying IRCs in one country, and exchanging them for more expensive stamps in another country.
Ponzi began to seek investors to turn even higher profits. He promised investors outrageous returns of
50 percent in 45 days, or
100 percent in 90 days. Ponzi paid these investors using money from other investors, rather than with actual profit—as in the criminal scheme of Bernie Madoff.
Ponzi's manipulation made him very rich—he bought a mansion in Lexington, Massachusetts, with air conditioning and a heated swimming pool. He reportedly made
$250,000 a day. Ponzi was arrested on August 12, 1920, and charged with 86 counts of mail fraud. Owing an estimated $7 million, he pleaded guilty to mail fraud, and subsequently spent 14 years in prison. Ponzi died penniless in Rio de Janeiro, Brazil, on January 18, 1949.
Red Flags and Indicators- High investment returns. Ponzi schemes typically have a high value of returns, 1% a day, 30% a month or more is ridiculous.
- Lack of transparency. The names, contacts, office address of the operators should be publicly shown to run a legitimate business. Which most ponzi doesn't provide their valid address and even names of the operators.
- Consistent Returns. Regardless of the market conditions which will rise and fall yet the investment continues to generate regular, positive returns.
- Advertised as "risk-free". Ponzi advertised their shaddy service as such as "Invest to us, we are risk-free and are guaranteed to make money for you." in which All investments come with a different degree of risks.
- Increasing minimum investment. Ponzi starts off with a very small amount of capital and later grows rapidly for their new investors. Ponzi needs to make their capital grow which is higher than their minimum withdrawal amount so they can pay their old investors by the funds of the new investors.
- High rates of commision. Users are highly motivated to promote their referral links due to high commision which is very lucrative.
- Difficulty receiving payments. If you do not receive a payment or have difficulty to cash out your investment then its a high chance that the operators doesn't have enough new investors to fund their old investor and a high chance to run your investment and get scammed.
How to avoid PonziObviously, if you noticed that an investment platform has the characteristics of red flags metioned above then stay away from it make report the site to any authorized people/websites. Don't invest without a thorough research coz you will end up nothing and lossing your money instead of profit.
Famous Ponzi Scheme in Crypto-worldBitconnect.co the most known ponzi in cryptocurrencyOnecoin running a centralized private ledgerMy Big Coin team misappropriating more than $6 million from customers in a cryptocurrency-fueled Ponzi scheme.Plexcoin claiming would yield a 1,354 percent profit in less than 29 daysVideos Related to PonziThe Wizard of Lies (Movie Trailer) -
https://www.youtube.com/watch?v=D1mhAB-790ABernie Madoff The $50 Billion Ponzi Scheme -
https://www.youtube.com/watch?v=q_RVG2qBB_UIn Search Of History - Charles Ponzi & His Scheme (History Channel Documentary) -
https://www.youtube.com/watch?v=6pxxS07PZn0Where to report Ponzi Schemehttps://www.sec.gov/tcrhttps://badbitcoin.org/https://bitcointalk.org/index.php?board=83.0 (Create a thread on Scam Accusation)
References:
https://en.wikipedia.org/wiki/Ponzi_scheme
https://en.wikipedia.org/wiki/Charles_Ponziarles_Ponzi
https://www.biography.com/people/charles-ponzi-20650909
https://www.sec.gov/fast-answers/answersponzihtm.html
https://www.fbi.gov/scams-and-safety/common-fraud-schemes/ponzi-schemes
Disclaimer: Linked websites does not equal to endorsement.
Let us give zero chance to scammers, be knowledgeable to avoid losing money.
#9 Feeling demotivated after recent rank demotion? Everybody says make good post but how to make good post?
With so many user do I really stand a chance? Will I ever receive a Merit?
If you are struggling to find all the answer and thinking too much then let me help you.
1. Read,Read and Read more. Read some books like
Mastering Bitcoin. Read articles from reputed site like
coindesk and
cointelegraph. Avoid reading from ICO promoting sites.
Forum has good source of information ,start with reading stickies in the forum
Reading will give you first hand knowledge in subject , vocabulary expansion that ultimately help you in writing good post.
What to avoid in reading : Speculative topic, Price discussions and thread after first 3 pages
Conditions Apply*.
2. Show some posting etiquette: Do not post in Mega threads, no body reads there, they are just farming grounds of activity
Before replying to OP, Read all the replies in thread.
Do not reply if you have nothing to add in previous replies.
Do not post off topic replies.
While replying, do not quote the full post , Just quote the relevant part of the post that you want to reply.
Check your reply for spelling errors and read it once before posting and read again after posting to check whether sentences are meaningful and making sense and everything you quoted is coming properly.
Address each other with their Forum names only, Be humble but use of "Sir" and "Please" is not required. Make sure you have searched it yourself before asking in the forum.
3. Practice as Practice makes man Prefect.There are boards like
"Fit to talk" where you can practice. You can start your topic and reply on existing topic. Legendary member like Jet Cash and jackg
will help you by improving your already written post. So you can learn ,how to post better.
4. Diverse yourself in this forum.For better use of forum, you should visit multiple boards in this forum. Do not get yourself stick in one board and be ignorant of others board. This will help you in learning different thing simultaneously.
5. Choose your signature campaign wisely.Do not join a campaign just for rewards. Join the campaign that suits your posting habits. Do not join campaign that ask for 25 post in a week when you are comfortable with 15 only. Instead join which ask for 10 only, that will give you a time to research.
Some campaign allow post in local board to be included so they can be a good option too.
6. Be YourselfDo not try to chase Merits but try to gather knowledge. See what others are requiring and try to come up with a solution.
Take some initiative/or participate in initiative that may bring good to forum. You might get insulted but there is no need to react on the insult.
Always work on developing your skills.
7. Put some little more effort.A little extra effort will pay you in long run and I will explain this mathematically.
.01 is only 1% of 1. If you see at a glance you will not say that .99 and 1.01 is a huge difference.
But a huge difference occurs when they are multiplied repeatedly.
(.99)
100 = .3660
(1.01)
100 = 2.704
(1)
100 =1
1 % laziness repeated in 100 post reduce your chances of getting merit from 1 to .366 but in other hand 1% of extra effort repeated 100 times will increase your chances from 1 to 2.704.
This is important, because Merit giver/ source do look in the history of poster. You might not get Merit for your all posts but if some Merit source/giver decide to give you Merit than he/she might double up seeing your history. In other hand if your continuously making bad post then Merit source/giver can change its mind by seeing other bad posts.
Few topics for your further reading:
TMAN's Guide for getting meritsFit To talk projectImprove your English skillsGuides to earn MeritAttitude mattersEdited: 1 and 2.
#10Found something interesting !
While cryptocurrency has seen tremendous growth over the past year, sending cryptocoins still requires users to send the coins to long and hard to remember addresses.
Due to this, when sending cryptocoins, many users will simply copy the address into memory from one application and paste it into another application that they are using to send the coins.
Attackers recognize that users are copying and pasting the addresses and have created malware to take advantage of this.
This type of malware, called CryptoCurrency Clipboard Hijackers, works by monitoring the Windows clipboard for cryptocurrency addresses,
and if one is detected, will swap it out with an address that they control.
Unless a user double-checks the address after they paste it, the sent coins will go to an address under the attackers control instead the intended recipient.
While we have covered cryptocurrency
clipboard hijackers in the past and they are not new, most of the previous samples monitored for 400-600 thousand cryptocurrency addresses.
This week BleepingComputer noticed a
sample of this type of malware that monitors for a over 2.3 million cryptocurrency addresses!
2.3 million cryptocurrency addresses being monitor by malwareHow the infection loadsThis infection was spotted as part of the
All-Radio 4.27 Portable malware package that was distributed this week.
When installed, a DLL named d3dx11_31.dll will be downloaded to the Windows Temp folder and an autorun called "DirectX 11" will be created to run the DLL when a user logs into the computer.
This DLL will be executed using rundll32.exe with the "rundll32 C:\Users\[user-name]\AppData\Local\Temp\d3dx11_31.dll,includes_func_runnded" command.
Rundll32.exe launching the infection
Protecting yourself from clipboard hijackersAs malware like this runs in the background with no indication that it is even running, is it not easy to spot that you are infected.
Therefore it is important to always have a updated antivirus solution installed to protect you from these types of threats.
It is also very important that all cryptocurrency users to double-check any addresses that they are sending cryptocoins to before they actually send them.
This way you can spot whether an address has been replaced with a different one than is intended.
I hope admin will consider my application.