Bitcoin Forum
December 07, 2019, 05:06:50 AM *
News: Latest Bitcoin Core release: 0.19.0.1 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 »  All
  Print  
Author Topic: Binance BTC Hack is due to 2FA  (Read 309 times)
jdarren
Member
**
Offline Offline

Activity: 297
Merit: 12


View Profile
May 08, 2019, 10:45:40 PM
 #1

With the recent Binance hack of 7,000 BTC cyber security firm Ciphertrace pointed out that the reason hackers were able to obtain API keys, 2FA codes and other info was due to hacking hot wallets using a two factor approach, social engineering and SIM card porting of phone numbers.

What Dave Jevans recommends moving forward is a 3FA approach. Has anyone used this or what are your thoughts?

https://cryptobriefing.com/binance-promises-to-cover-7000-btc-lost-in-hack/
1575695210
Hero Member
*
Offline Offline

Posts: 1575695210

View Profile Personal Message (Offline)

Ignore
1575695210
Reply with quote  #2

1575695210
Report to moderator
1575695210
Hero Member
*
Offline Offline

Posts: 1575695210

View Profile Personal Message (Offline)

Ignore
1575695210
Reply with quote  #2

1575695210
Report to moderator
1575695210
Hero Member
*
Offline Offline

Posts: 1575695210

View Profile Personal Message (Offline)

Ignore
1575695210
Reply with quote  #2

1575695210
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
rdbase
Sr. Member
****
Offline Offline

Activity: 1260
Merit: 309


bustadice.com


View Profile
May 09, 2019, 12:35:16 AM
 #2

Havent heard of 3fa authentication before but I guess it was coming if 2fa can be hacked into as your article suggested what happened to binance losing their funds.

bustadice         ▄▄████████████▄▄
     ▄▄████████▀▀▀▀████████▄▄
   ▄███████████    ███████████▄
  █████    ████▄▄▄▄████    █████
 ██████    ████████▀▀██    ██████
██████████████████   █████████████
█████████████████▌  ▐█████████████
███    ██████████   ███████    ███
███    ████████▀   ▐███████    ███
██████████████      ██████████████
██████████████      ██████████████
 ██████████████▄▄▄▄██████████████
  ▀████████████████████████████▀
                     ▄▄███████▄▄
                  ▄███████████████▄
   ███████████  ▄████▀▀       ▀▀████▄
               ████▀      ██     ▀████
 ███████████  ████        ██       ████
             ████         ██        ████
███████████  ████     ▄▄▄▄██        ████
             ████     ▀▀▀▀▀▀        ████
 ███████████  ████                 ████
               ████▄             ▄████
   ███████████  ▀████▄▄       ▄▄████▀
                  ▀███████████████▀
                     ▀▀███████▀▀
           ▄██▄
           ████
            ██
            ▀▀
 ▄██████████████████████▄
██████▀▀██████████▀▀██████
█████    ████████    █████
█████▄  ▄████████▄  ▄█████
██████████████████████████
██████████████████████████
    ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
    ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
       ████████████
[bustadice.
Play
bustadice]
TimeBits
Member
**
Offline Offline

Activity: 224
Merit: 62


View Profile
May 09, 2019, 12:42:24 AM
Last edit: May 09, 2019, 03:58:19 AM by TimeBits
 #3

With the recent Binance hack of 7,000 BTC cyber security firm Ciphertrace pointed out that the reason hackers were able to obtain API keys, 2FA codes and other info was due to hacking hot wallets using a two factor approach, social engineering and SIM card porting of phone numbers.

What Dave Jevans recommends moving forward is a 3FA approach. Has anyone used this or what are your thoughts?

https://cryptobriefing.com/binance-promises-to-cover-7000-btc-lost-in-hack/

Here is a few things they can do POP proof of person https://www.youtube.com/watch?v=l4x0vOAu0lQ
They could also when they see a bunch of accounts withdrawing or trading alts into bitcoin at the same time, freeze those accounts. Set up a "line up" where they can only service one person at a time. Every time these big exchanges get hacked there is so many accounts doing something at the same time. Why not have a Queue?

Imagine being in a mcdonalds and everyone walks up and orders something from the cashier at the same time, that is what is going on here.
Why not make them form a line and take each customer one at a time? or 3-4...

Kind of like a data throttle or engine throttle

Granted this will only stop massive attacks and slow them down, but small scale attacks will be done if they don`t use 3fa.
850,000 coins went missing more than satoshi owns has because of not having a line, at mt.gox.

It is pretty simple you set up a system where "if certain amount of users withdraw or alts are being traded and exchanged for btc which exceeds above normal a rate of traffic by 1.5x or 2x transactions" exec queue timer.

I don`t know I am no expert at coding but I am sure it would not take much. To do the later suggestion.
jakelyson
Legendary
*
Offline Offline

Activity: 1330
Merit: 1052

CryptoTalk.Org - Get Paid for every Post!


View Profile
May 09, 2019, 12:54:45 AM
 #4

3FA could work for a while and I am sure hackers will find a way to obtain your fingerprint or retinal scans and use a digital copy of it to bypass security. Any security employed always have the weakest link, the user or human nature that can be exploited.

 
                                . ██████████.
                              .████████████████.
                           .██████████████████████.
                        -█████████████████████████████
                     .██████████████████████████████████.
                  -█████████████████████████████████████████
               -███████████████████████████████████████████████
           .-█████████████████████████████████████████████████████.
        .████████████████████████████████████████████████████████████
       .██████████████████████████████████████████████████████████████.
       .██████████████████████████████████████████████████████████████.
       ..████████████████████████████████████████████████████████████..
       .   .██████████████████████████████████████████████████████.
       .      .████████████████████████████████████████████████.

       .       .██████████████████████████████████████████████
       .    ██████████████████████████████████████████████████████
       .█████████████████████████████████████████████████████████████.
        .███████████████████████████████████████████████████████████
           .█████████████████████████████████████████████████████
              .████████████████████████████████████████████████
                   ████████████████████████████████████████
                      ██████████████████████████████████
                          ██████████████████████████
                             ████████████████████
                               ████████████████
                                   █████████
.CryptoTalk.org.|.MAKE POSTS AND EARN BTC!.🏆
rdbase
Sr. Member
****
Offline Offline

Activity: 1260
Merit: 309


bustadice.com


View Profile
May 09, 2019, 12:57:35 AM
 #5

3FA could work for a while and I am sure hackers will find a way to obtain your fingerprint or retinal scans and use a digital copy of it to bypass security. Any security employed always have the weakest link, the user or human nature that can be exploited.
Yes this is what I was thinking too. Anything dealing with security will eventually get hacked because they are not updated often enough giving time to those who are doing the hacking chances to try and crack any sort of defense they would put in place.

bustadice         ▄▄████████████▄▄
     ▄▄████████▀▀▀▀████████▄▄
   ▄███████████    ███████████▄
  █████    ████▄▄▄▄████    █████
 ██████    ████████▀▀██    ██████
██████████████████   █████████████
█████████████████▌  ▐█████████████
███    ██████████   ███████    ███
███    ████████▀   ▐███████    ███
██████████████      ██████████████
██████████████      ██████████████
 ██████████████▄▄▄▄██████████████
  ▀████████████████████████████▀
                     ▄▄███████▄▄
                  ▄███████████████▄
   ███████████  ▄████▀▀       ▀▀████▄
               ████▀      ██     ▀████
 ███████████  ████        ██       ████
             ████         ██        ████
███████████  ████     ▄▄▄▄██        ████
             ████     ▀▀▀▀▀▀        ████
 ███████████  ████                 ████
               ████▄             ▄████
   ███████████  ▀████▄▄       ▄▄████▀
                  ▀███████████████▀
                     ▀▀███████▀▀
           ▄██▄
           ████
            ██
            ▀▀
 ▄██████████████████████▄
██████▀▀██████████▀▀██████
█████    ████████    █████
█████▄  ▄████████▄  ▄█████
██████████████████████████
██████████████████████████
    ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
    ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
       ████████████
[bustadice.
Play
bustadice]
TimeBits
Member
**
Offline Offline

Activity: 224
Merit: 62


View Profile
May 09, 2019, 12:59:56 AM
Last edit: May 09, 2019, 04:15:28 AM by TimeBits
 #6

3FA could work for a while and I am sure hackers will find a way to obtain your fingerprint or retinal scans and use a digital copy of it to bypass security. Any security employed always have the weakest link, the user or human nature that can be exploited.

True, DNA(spit,blood,sweat,piss,shit) is the ultimate solution, if it was tied into the hospital records we would even be able to tell if the DNA used by that person on the chain is dead. It would be pretty easy to catch people in a p2p network sending one users funds they stolen to another to link it to them, if you don`t get killed and get robbed you just say hey police robo cop network, my funds were stolen, freeze them. If you make people renew it once a year, we can make sure no dead people are voting or collecting UBI. People will stop stealing from eachother, and they will be 100% sure to get caught when they do.

But 2FA < 3FA < 4FA < 5FA < ∞

Is better than 1 or 2 FA

fingerprints is the easiest way to go (some people don`t have fingers)
eyes is another easy way to go (some people don`t have eyes)
DNA is universal.

They don`t have to be pictures, they can be videos, making the person in the video do certain things or random things to verify more proof of person.

We really need to be careful here, not all earthlings are on the same page, if this tech is used in the wrong hands, it could wipe out a entire gene pool, drones could scan your face from the sky and 1 tap you.
We need to keep it away from religious radicals and terrorist.

Imagine I had a blockchain of everyone and their face in my country, we could set up drone helicopter or plane to scan your face and if it does not match our data base, it kills you.

Granted here in Canada, China and US, they already have street cams that are linking you to your facebook and email. So Yah...  I don`t know what to do  Undecided

This is public tech, https://www.youtube.com/watch?v=aE1kA0Jy0Xg Imagine what they got.
some more stuff https://www.youtube.com/watch?v=Cgxsv1riJhI
https://www.youtube.com/watch?v=4BdyGFfaRlk
Crypto Girl
Sr. Member
****
Offline Offline

Activity: 980
Merit: 290


View Profile
May 09, 2019, 01:04:53 AM
 #7

Havent heard of 3fa authentication before but I guess it was coming if 2fa can be hacked into as your article suggested what happened to binance losing their funds.
We already have it, if you're not aware and it seems good if they push it through as additional authenticator as it will strict the access on our accounts.

We have three factors in using authentication
[1] something you know ( e.g. password )
[2] something you have (e.g. smart card )
[3] something you are ( e.g. biometric or fingerprint )

We all see in some scifi movies that scanning a retina to be able to enter into a restricted area is a cool stuff. So I guess that will really enhance the security unless someone kill us and get our eyeball. lol!

I use this provider to trade Cryptos : Bitcoin Revolution
beatzcoin123
Jr. Member
*
Offline Offline

Activity: 184
Merit: 2


View Profile WWW
May 09, 2019, 01:20:17 AM
 #8

I am just hearing of a 3fa securitysystem for the first time, but it is a welcome development if a 2fa system has failed, it's a very serious threath to cryptocurrency space if a renowned cryptocurrency exchange like binance can be hacked.
TimeBits
Member
**
Offline Offline

Activity: 224
Merit: 62


View Profile
May 09, 2019, 01:20:50 AM
Last edit: May 09, 2019, 01:40:04 AM by TimeBits
 #9

3FA could work for a while and I am sure hackers will find a way to obtain your fingerprint or retinal scans and use a digital copy of it to bypass security. Any security employed always have the weakest link, the user or human nature that can be exploited.

True, DNA(spit,blood,sweat,piss,shit) is the ultimate solution, if it was tied into the hospital records we would even be able to tell if the DNA used by that person on the chain is dead. It would be pretty easy to catch people in a p2p network sending one users funds they stolen to another to link it to them, if you don`t get killed and get robbed you just say hey police robo cop network, my funds were stolen, freeze them. If you make people renew it once a year, we can make sure no dead people are voting or collecting UBI. People will stop stealing from eachother, and they will be 100% sure to get caught when they do.

But 2FA < 3FA < 4FA < 5FA < ∞

Is better than 1 or 2 FA

fingerprints is the easiest way to go (some people don`t have fingers)
eyes is another easy way to go (some people don`t have eyes)
DNA is universal.

They don`t have to be pictures, they can be videos, making the person in the video do certain things or random things to verify more proof of person.

We really need to be careful here, not all earthlings are on the same page, if this tech is used in the wrong hands, it could wipe out a entire gene pool, drones could scan your face from the sky and 1 tap you.
We need to keep it away from religious radicals and terrorist.

Imagine I had a blockchain of everyone and their face in my country, we could set up drone helicopter or plane to scan your face and if it does not match our data base, it kills you.

Granted here in Canada, China and US, they already have street cams that are linking you to your facebook and email. So Yah...  I don`t know what to do  Undecided

This is public tech, https://www.youtube.com/watch?v=aE1kA0Jy0Xg Imagine what they got.

We really need to make a Super Colony to prevent this from happening, The tech is in the wrong hands, So is the money supply, It needs to be in all of our hands, so all of humanity's interest are invested in. It was reverse psychology on all of these One World Order things (conspiracy things on youtube) Government speeches. We want a one world order, but we want one that does not force us to be a part of it, we are willing. The One World Order to be run by all of us. Divide and Conquer is how they win. Unite and Conquer is how we all win.

https://www.youtube.com/watch?v=wMKpYxhI2KI
10,000 thumbs up 99%, 90 thumbs down 1%
(well close enough)

90 out of 10,000 people are greedy.

THAT ORDER NEEDS TO BE OUR ORDER.


"And so long as men die, liberty will never perish." COME AT ME BANKERS, COME AT ME POLITICIANS, COME AT ME YOU MACHINE MEN.

 I am the Matter that cannot be crushed anymore, every time you kill me I come back, brighter than ever, go ahead try and put out my flame, I dare you.
TimeBits
Member
**
Offline Offline

Activity: 224
Merit: 62


View Profile
May 09, 2019, 01:49:45 AM
Last edit: May 09, 2019, 02:03:37 AM by TimeBits
 #10

We should all be cops, bankers, military, judges, fire force, government.  (IF WE WANT TO BE WILLINGLY)

We should all be voting on issues
We should all be able to make issues to vote on
We should all have at least 1 back up house, with self sustaining food, water and green energy. If not why not 2 or 3.
We should be on mars by now
We should be on the moon by now
We could of been in another galaxy by now!

Patents hold us back, same with copyright. WHY? LIKE WTF? ARE YOU DOING? GREED BLINDS YOU.
open source that shit

If every greedy person stopped being greedy, there would be more for everyone not just everyone, but them included.

Who wants a free moment of my time? Go ahead ask me anything? We don`t live in fear, they do. They are the ones with the bunker backups for them, not US!
https://www.youtube.com/watch?v=WQtRDr0qHvY
THAT OUR LIMITED WORK AND TIME PAID FOR! IT ALSO PAID FOR THEIR JOB TO PROTECT THEM, NOT US!
TimeBits
Member
**
Offline Offline

Activity: 224
Merit: 62


View Profile
May 09, 2019, 02:43:14 AM
 #11

3FA could work for a while and I am sure hackers will find a way to obtain your fingerprint or retinal scans and use a digital copy of it to bypass security. Any security employed always have the weakest link, the user or human nature that can be exploited.

If 3fa is as I suggested

how will they not get caught? I mean lets say worst case scenario, Let`s say the physically kill your or kidnap you, the funds move on your account, it is reported to blockchain and it sorts it out to the robo network that tells the people, the people are the police, when buddy tries to use the funds at any store the merchant who is a police officer as well, they will arrest him, the cameras will catch him long before he has anything to buy anyways I am sure of it. So even worse case scenario because if they kill you, we will all know because your dna has gone stale, or you have no re upload your own video to the network in a few weeks to reverify. We will be able to see that you have not bought food in 2 weeks and your family probably already reported you missing. I mean like we can see on video if it is you or not when you are 3fa`ing, here is the global sound you make while they force your face to the camera with a gun being point at you, "help they are robbing me lol" "CAW CAW" "CAW CAW" Heck just tilt the camera a little towards them and we will see or just give them the funds, and after tell the network lol.  
 
TimeBits
Member
**
Offline Offline

Activity: 224
Merit: 62


View Profile
May 09, 2019, 02:51:31 AM
Last edit: May 09, 2019, 04:11:21 AM by TimeBits
 #12

should we all go out in these from now on with super thick glasses and wear gloves at all times? make sure to hold our breath the entire time and our piss and shit, they could see where you are when you piss, they own the sewer systems. Don`t you even think of shedding 1 single hair or skin flake.

tyz
Legendary
*
Offline Offline

Activity: 2058
Merit: 1145


I quit telegram. Ask for my keybase.io details.


View Profile
May 09, 2019, 03:24:32 AM
 #13

What Dave Jevans recommends moving forward is a 3FA approach. Has anyone used this or what are your thoughts?

You can install as many security mechanisms as possible if the users act carelessly in the end. Social engineering is a broad field, so you can't say exactly how the hackers got to the data, but it often happens via a personal mail asking to change the password and then redirected to a fake site. It is difficult to prevent such mistakes from individual users.
TimeBits
Member
**
Offline Offline

Activity: 224
Merit: 62


View Profile
May 09, 2019, 03:50:01 AM
 #14

What Dave Jevans recommends moving forward is a 3FA approach. Has anyone used this or what are your thoughts?

You can install as many security mechanisms as possible if the users act carelessly in the end. Social engineering is a broad field, so you can't say exactly how the hackers got to the data, but it often happens via a personal mail asking to change the password and then redirected to a fake site. It is difficult to prevent such mistakes from individual users.

worst case possibility`s they kill you? or they kid nap you? right? the "hackers, or hijackers, or murders, or thieves" whatever you want to call them.
Duzter
Sr. Member
****
Offline Offline

Activity: 924
Merit: 256



View Profile
May 09, 2019, 03:58:49 AM
 #15

None is sure what is the truth behind the hack. In each and everything now we've got the 2FA security and this is termed to be the best in comparison to all other security features. Now this too has got hacked is simply unbelievable. Another issue going on is that Binance could have revealed it as a way to transfer the funds to its DEX which is under development and this might be to bypass US regulations.

          ▄▄████▄▄
      ▄▄███▀    ▀███▄▄
   ▄████████▄▄▄▄████████▄
  ▀██████████████████████▀
▐█▄▄ ▀▀████▀    ▀████▀▀ ▄▄██
▐█████▄▄ ▀██▄▄▄▄██▀ ▄▄██▀  █
▐██ ▀████▄▄ ▀██▀ ▄▄████  ▄██
▐██  ███████▄  ▄████████████
▐██  █▌▐█ ▀██  ██████▀  ████
▐██  █▌▐█  ██  █████  ▄█████
 ███▄ ▌▐█  ██  ████████████▀
  ▀▀████▄ ▄██  ██▀  ████▀▀
      ▀▀█████  █  ▄██▀▀
         ▀▀██  ██▀▀
.WINDICE.████
██
██
██
██
██
██
██
██
██
██
██
██
████
      ▄████████▀
     ▄████████
    ▄███████▀
   ▄███████▀
  ▄█████████████
 ▄████████████▀
▄███████████▀
     █████▀
    ████▀
   ████
  ███▀
 ██▀
█▀

██
██
██
██
██
██
██
██
██
██
██
██
     ▄▄█████▄   ▄▄▄▄
    ██████████▄███████▄
  ▄████████████████████▌
 ████████████████████████
▐████████████████████████▌
 ▀██████████████████████▀
     ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
     ▄█     ▄█     ▄█
   ▄██▌   ▄██▌   ▄██▌
   ▀▀▀    ▀▀▀    ▀▀▀
       ▄█     ▄█
     ▄██▌   ▄██▌
     ▀▀▀    ▀▀▀

██
██
██
██
██
██
██
██
██
██
██
██
                   ▄█▄
                 ▄█████▄
                █████████▄
       ▄       ██ ████████▌
     ▄███▄    ▐█▌▐█████████
   ▄███████▄   ██ ▀███████▀
 ▄███████████▄  ▀██▄▄████▀
▐█ ▄███████████    ▀▀▀▀
█ █████████████▌      ▄
█▄▀████████████▌    ▄███▄
▐█▄▀███████████    ▐█▐███▌
 ▀██▄▄▀▀█████▀      ▀█▄█▀
   ▀▀▀███▀▀▀
████
  ██
  ██
  ██
  ██
  ██
  ██
  ██
  ██
  ██
  ██
  ██
  ██
████


▄▄████████▄▄
▄████████████████▄
▄████████████████████▄
███████████████▀▀  █████
████████████▀▀      ██████
▐████████▀▀   ▄▄     ██████▌
▐████▀▀    ▄█▀▀     ███████▌
▐████████ █▀        ███████▌
████████ █ ▄███▄   ███████
████████████████▄▄██████
▀████████████████████▀
▀████████████████▀
▀▀████████▀▀
██████
██████
███
███
███
███
███
███
███
███
███
███
██████
██████
.Play Now.██████
██████
   ███
   ███
   ███
   ███
   ███
   ███
   ███
   ███
   ███
   ███
██████
██████
[/table
tyz
Legendary
*
Offline Offline

Activity: 2058
Merit: 1145


I quit telegram. Ask for my keybase.io details.


View Profile
May 09, 2019, 04:01:38 AM
 #16

What Dave Jevans recommends moving forward is a 3FA approach. Has anyone used this or what are your thoughts?

You can install as many security mechanisms as possible if the users act carelessly in the end. Social engineering is a broad field, so you can't say exactly how the hackers got to the data, but it often happens via a personal mail asking to change the password and then redirected to a fake site. It is difficult to prevent such mistakes from individual users.

worst case possibility`s they kill you? or they kid nap you? right? the "hackers, or hijackers, or murders, or thieves" whatever you want to call them.

As I wrote, social engineering is a broad field with many varities. And all your listed kinds more or less belong to it  Wink
hatshepsut93
Legendary
*
Offline Offline

Activity: 1358
Merit: 1006


Bitcoin realist


View Profile
May 09, 2019, 04:30:49 AM
 #17

fingerprints is the easiest way to go (some people don`t have fingers)
eyes is another easy way to go (some people don`t have eyes)
DNA is universal.

That's a horrible idea, because that information is sorta public - someone can obtain your fingerprints from items that you have touched, and it takes just one breach to render this method broken for the rest of your life, because you can't change your fingreprints. So, if some crappy service will get hacked and biometric information will get stolen, or if someone will deliberately setup a malicious service under the guise of a legit one, all in order to harvet biometrics, this method of security will get completely broken. It only works when you submit your fingreprints in real life instead of sending them over the Internet, and even then I'm sure hackers will be able to tamper with it at some point.

darklus123
Hero Member
*****
Offline Offline

Activity: 1106
Merit: 582

LocalEthereum.com


View Profile
May 09, 2019, 04:44:27 AM
 #18

Eventually sooner or later hackers will be able to obtain new tactics or find out any loopholes of the said 3FA. Therefore the best thing to do is to always move your funds in and out from any trading platforms.

I know this is kinda toxic idea but I think that is one of the best thing we can do for now.
peter0425
Sr. Member
****
Offline Offline

Activity: 1036
Merit: 297


★777Coin.com★ Fun BTC Casino!


View Profile
May 09, 2019, 05:12:44 AM
 #19

Eventually sooner or later hackers will be able to obtain new tactics or find out any loopholes of the said 3FA. Therefore the best thing to do is to always move your funds in and out from any trading platforms.

I know this is kinda toxic idea but I think that is one of the best thing we can do for now.
Hackers will will obtain new ways to really hack our accounts here in crypto. That's why first thing we really do is not to leave huge money in our trading account. 2FA was touted to be the best solutions when is was released years ago, but look at where we are today. Those hackers are really that smart and will always find ways any loopholes in the system even if we have this 3FA.

vennali
Legendary
*
Offline Offline

Activity: 1358
Merit: 1008

www.Sparrowexchange.com |


View Profile
May 09, 2019, 05:31:34 AM
 #20

Is 2FA really that weak for authentication ? Other than social engineering, I don't see how accounts can get hacked, unless they have the passwords and codes on their phones which get hacked. Its more of a result of poor security management.

3Fa would certainly change things.

SPARROW
          ███
          ███
          ███     ███
          ███     ███
          ███     ███     ███
          ███     ███     ███
          ███     ███     ███
          ███     ███
          ███     ███
          ███
          ███

  Leading Options Trading Platform

          ███     ███     ███
          ███     ███     ███
          ███     ███     ███
          ███     ███     ███
          ███     ███     ███
          ███     ███     ███
          ███     ███     ███
          ███     ███     ███
          ███     ███     ███
          ███     ███     ███
          ███     ███     ███

  Take Control
  Trade Confidently

[/quote]
Pages: [1] 2 3 »  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!