Wikidot.com blog

The Dark Side Of Apple

Why you should not use Apple
Censorship
Spying
Worker abuse
Tax avoidance
Right to Repair Phones
Miscellaneous
submitted by Lukun7 to AeterneLabs [link] [comments]

Mockingbird X.0

Imagine if there was one desk that all stories could cross so that, at 4am, a media plan could be decided upon and disseminated where all news outlets coordinated to set the goalposts of debate and hyper focused on specific issues to drive a narrative to control how you vote and how you spend money; where Internet shills were given marching orders in tandem to what was shown on television, printed in newspapers and spread throughout articles on the World Wide Web.
https://i.imgur.com/Elnci0M.png
In the past, we had Operation Mockingbird, where the program was supremely confident that it could control stories around the world, even in instructions to cover up any story about a possible “Yeti” sighting, should it turn out they were real.
https://i.imgur.com/121LXqy.png
If, in 1959, the government was confident in its ability to control a story about a Yeti, then what is their level of confidence in controlling stories, today?
https://i.imgur.com/jQFVYew.png
https://i.imgur.com/ZKMYGJj.png
In fact, we have a recent example of a situation similar to the Yeti. When Bill Clinton and Loretta Lynch met on the TARMAC to spike the Hillary email investigation, the FBI was so confident it wasn’t them, that their entire focus was finding the leaker, starting with searching within the local PD. We have documentation that demonstrates the state of mind of the confidence the upper levels of the FBI have when dealing with the media.
https://i.imgur.com/IbjDOkI.png
https://i.imgur.com/NH86ozU.png
The marriage between mainstream media and government is a literal one and this arrangement is perfectly legal.
https://i.imgur.com/OAd4vpf.png
But, this problem extends far beyond politics; the private sector, the scientific community, even advice forums are shilled heavily. People are paid to cause anxiety, recommend people break up and otherwise sow depression and nervousness. This is due to a correlating force that employs “systems psychodynamics”, focusing on “tension centered” strategies to create “organizational paradoxes” by targeting people’s basic assumptions about the world around them to create division and provide distraction.
https://i.imgur.com/6OEWYFN.png
https://i.imgur.com/iG4sdD4.png
https://i.imgur.com/e89Rx6B.png
https://i.imgur.com/uotm9Cg.png
https://i.imgur.com/74wt9tD.png
In this day and age, it is even easier to manage these concepts and push a controlled narrative from a central figure than it has ever been. Allen & Co is a “boutique investment firm” that managed the merger between Disney and Fox and operates as an overseeing force for nearly all media and Internet shill armies, while having it’s fingers in sports, social media, video games, health insurance, etc.
https://i.imgur.com/zlpBh3c.png
https://i.imgur.com/e5ZvFFJ.png
Former director of the CIA and Paul Brennan’s former superior George Tenet, holds the reigns of Allen & Co. The cast of characters involves a lot of the usual suspects.
https://i.imgur.com/3OlrX7G.png
In 1973, Allen & Company bought a stake in Columbia Pictures. When the business was sold in 1982 to Coca-Cola, it netted a significant profit. Since then, Herbert Allen, Jr. has had a place on Coca-Cola's board of directors.
Since its founding in 1982, the Allen & Company Sun Valley Conference has regularly drawn high-profile attendees such as Bill Gates, Warren Buffett, Rupert Murdoch, Barry Diller, Michael Eisner, Oprah Winfrey, Robert Johnson, Andy Grove, Richard Parsons, and Donald Keough.
Allen & Co. was one of ten underwriters for the Google initial public offering in 2004. In 2007, Allen was sole advisor to Activision in its $18 billion merger with Vivendi Games. In 2011, the New York Mets hired Allen & Co. to sell a minority stake of the team. That deal later fell apart. In November 2013, Allen & Co. was one of seven underwriters on the initial public offering of Twitter. Allen & Co. was the adviser of Facebook in its $19 billion acquisition of WhatsApp in February 2014.
In 2015, Allen & Co. was the advisor to Time Warner in its $80 billion 2015 merger with Charter Communications, AOL in its acquisition by Verizon, Centene Corporation in its $6.8 billion acquisition of Health Net, and eBay in its separation from PayPal.
In 2016, Allen & Co was the lead advisor to Time Warner in its $108 billion acquisition by AT&T, LinkedIn for its merger talks with Microsoft, Walmart in its $3.3 billion purchase of Jet.com, and Verizon in its $4.8 billion acquisition of Yahoo!. In 2017, Allen & Co. was the advisor to Chewy.com in PetSmart’s $3.35 billion purchase of the online retailer.
Allen & Co throws the Sun Valley Conference every year where you get a glimpse of who sows up. Harvey Weinstein, though a past visitor, was not invited last year.
https://en.wikipedia.org/wiki/Allen_%26_Company_Sun_Valley_Conference
Previous conference guests have included Bill and Melinda Gates, Warren and Susan Buffett, Tony Blair, Google founders Larry Page and Sergey Brin, Allen alumnus and former Philippine Senator Mar Roxas, Google Chairman Eric Schmidt, Quicken Loans Founder & Chairman Dan Gilbert, Yahoo! co-founder Jerry Yang, financier George Soros, Facebook founder Mark Zuckerberg, Media Mogul Rupert Murdoch, eBay CEO Meg Whitman, BET founder Robert Johnson, Time Warner Chairman Richard Parsons, Nike founder and chairman Phil Knight, Dell founder and CEO Michael Dell, NBA player LeBron James, Professor and Entrepreneur Sebastian Thrun, Governor Chris Christie, entertainer Dan Chandler, Katharine Graham of The Washington Post, Diane Sawyer, InterActiveCorp Chairman Barry Diller, Linkedin co-founder Reid Hoffman, entrepreneur Wences Casares, EXOR and FCA Chairman John Elkann, Sandro Salsano from Salsano Group, and Washington Post CEO Donald E. Graham, Ivanka Trump and Jared Kushner, and Oprah Winfrey.
https://i.imgur.com/VZ0OtFa.png
George Tenet, with the reigns of Allen & Co in his hands, is able to single-handedly steer the entire Mockingbird apparatus from cable television to video games to Internet shills from a singular location determining the spectrum of allowable debate. Not only are they able to target people’s conscious psychology, they can target people’s endocrine systems with food and pornography; where people are unaware, on a conscious level, of how their moods and behavior are being manipulated.
https://i.imgur.com/mA3MzTB.png
"The problem with George Tenet is that he doesn't seem to care to get his facts straight. He is not meticulous. He is willing to make up stories that suit his purposes and to suppress information that does not."
"Sadly but fittingly, 'At the Center of the Storm' is likely to remind us that sometimes what lies at the center of a storm is a deafening silence."
https://i.imgur.com/YHMJnnP.png
Tenet joined President-elect Bill Clinton's national security transition team in November 1992. Clinton appointed Tenet Senior Director for Intelligence Programs at the National Security Council, where he served from 1993 to 1995. Tenet was appointed Deputy Director of Central Intelligence in July 1995. Tenet held the position as the DCI from July 1997 to July 2004. Citing "personal reasons," Tenet submitted his resignation to President Bush on June 3, 2004. Tenet said his resignation "was a personal decision and had only one basis—in fact, the well-being of my wonderful family—nothing more and nothing less. In February 2008, he became a managing director at investment bank Allen & Company.
https://i.imgur.com/JnGHqOS.png
We have the documentation that demonstrates what these people could possibly be doing with all of these tools of manipulation at their fingertips.
The term for it is “covert political action” for which all media put before your eyes is used to serve as a veneer… a reality TV show facade of a darker modus operandum.
https://i.imgur.com/vZC4D29.png
https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol36no3/html/v36i3a05p_0001.htm
It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever costs. There are no rules in such a game. Hitherto acceptable norms of human conduct do not apply. If the US is to survive, longstanding American concepts of "fair play" must be reconsidered. We must develop effective espionage and counterespionage services and must learn to subvert, sabotage and destroy our enemies by more clever, more sophisticated means than those used against us. It may become necessary that the American people be made acquainted with, understand and support this fundamentally repugnant philosophy.
http://www.nbcnews.com/id/3340677/t/cia-operatives-shadowy-war-force/
Intelligence historian Jeffrey T. Richelson says the S.A. has covered a variety of missions. The group, which recently was reorganized, has had about 200 officers, divided among several groups: the Special Operations Group; the Foreign Training Group, which trains foreign police and intelligence officers; the Propaganda and Political Action Group, which handles disinformation; the Computer Operations Group, which handles information warfare; and the Proprietary Management Staff, which manages whatever companies the CIA sets up as covers for the S.A.
Scientology as a CIA Political Action Group – “It is a continuing arrangement…”: https://mikemcclaughry.wordpress.com/2015/08/25/scientology-as-a-cia-political-action-group-it-is-a-continuing-arrangement/
…Those operations we inaugurated in the years 1955-7 are still secret, but, for present purposes, I can say all that’s worth saying about them in a few sentences – after, that is, I offer these few words of wisdom. The ‘perfect’ political action operation is, by definition, uneventful. Nothing ‘happens’ in it. It is a continuing arrangement, neither a process nor a series of actions proceeding at a starting point and ending with a conclusion.
CIA FBI NSA Personnel Active in Scientology: https://i.imgur.com/acu2Eti.png
When you consider the number of forces that can be contained within a single “political action group” in the form on a “boutique investment firm,” where all sides of political arguments are predetermined by a selected group of actors who have been planted, compromised or leveraged in some way in order to control the way they spin their message.
https://i.imgur.com/tU4MD4S.png
The evidence of this coordinated effort is overwhelming and the “consensus” that you see on TV, in sports, in Hollywood, in the news and on the Internet is fabricated.
Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.'
Thus the uninformed reader will most likely develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'
When you find yourself feeling like common sense and common courtesy aren’t as common as they ought to be, it is because there is a massive psychological operation controlled from the top down to ensure that as many people as possible are caught in a “tension based” mental loop that is inflicted on them by people acting with purpose to achieve goals that are not in the interest of the general population, but a method of operating in secret and corrupt manner without consequences.
Notice that Jeffrey Katzenberg, of Disney, who is intertwined with Allen & Co funds the Young Turks. He is the perfect example of the relationship between media and politics.
Katzenberg has also been involved in politics. With his active support of Hillary Clinton and Barack Obama, he was called "one of Hollywood's premier political kingmakers and one of the Democratic Party's top national fundraisers."
With cash from Jeffrey Katzenberg, The Young Turks looks to grow paid subscribers:
https://digiday.com/media/with-cash-from-katzenberg-the-young-turks-look-to-grow-paid-subscribers/
Last week, former DreamWorks Animation CEO Jeffrey Katzenberg’s new mobile entertainment company WndrCo was part of a $20 million funding round in TYT Network, which oversees 30 news and commentary shows covering politics, pop culture, sports and more. This includes the flagship “The Young Turks” program that streams live on YouTube every day. Other investors in the round included venture capital firms Greycroft Partners, E.ventures and 3L Capital, which led the round. This brings total funding for Young Turks to $24 million.
How Hollywood's Political Donors Are Changing Strategies for the Trump Era:
https://www.hollywoodreporter.com/features/hollywood-political-donors-are-changing-strategy-post-trump-1150545
Hollywood activism long has been depicted as a club controlled by a handful of powerful white men: Katzenberg, Spielberg, Lear, David Geffen, Haim Saban and Bob Iger are the names most often mentioned. But a new generation of power brokers is ascendant, including J.J. Abrams and his wife, Katie McGrath, cited for their personal donations and bundling skills; Shonda Rhimes, who held a get-out-the-vote rally at USC's Galen Center on Sept. 28 that drew 10,000 people; CAA's Darnell Strom, who has hosted events for Nevada congresswoman Jacky Rosen and Arizona congresswoman Kyrsten Sinema; and former Spotify executive Troy Carter, who held three fundraisers for Maryland gubernatorial candidate Ben Jealous (Carter also was a fundraiser for President Obama).
Soros Group Buys Viacom's DreamWorks Film Library:
https://www.forbes.com/2006/03/17/soros-viacom-dreamworks-cx_gl_0317autofacescan11.html#541a895f1f22
Viacom, after splitting off from Les Moonves Les Moonves ' CBS , still holds Paramount Pictures, and that movie studio in December agreed to acquire DreamWorks SKG, the creative shop founded by the Hollywood triumvirate of Steven Spielberg, David Geffen and Jeffrey Katzenberg (a former exec at The Walt Disney Co.). DreamWorks Animation had been spun off into a separate company.
Now it's time for Freston to make back some money--and who better to do a little business with than George Soros? The billionaire financier leads a consortium of Soros Strategic Partners LP and Dune Entertainment II LLC, which together are buying the DreamWorks library--a collection of 59 flicks, including Saving Private Ryan, Gladiator, and American Beauty.
The money you spend on media and junk food and in taxes goes to these groups who then decide how best to market at you so that they decide how you vote by creating a fake consensus to trick into thinking that you want something other than what is best for you; but will inevitably result in more money being funneled to the top, creating further separation between the super rich and the average person. The goal will be to assert creeping authoritarianism by generating outrage against policies and issues they hate. Part of manipulating your basic assumptions is also to use schadenfreude (think canned laughter on TV) against characters who support the cause that might actually do you the most good (which reaffirms and strengthens your confirmation biased along predetermined political lines).
https://i.imgur.com/PW1cRtj.png
We have a population being taught to hate socialism and love capitalism when the truth is no country is practicing either. These terms are merely disguises for political oligarchies where the collection of wealth is less about getting themselves rich and more about keeping everyone else poor.
What can you guess about the world around you if it turned out that every consensus that was forced on you was fake?
How much money would it take to make it look like 51% of the Internet believed in completely idiotic ideas? Combine shill operations with automation and AI’s, and the cost becomes a good investment relative to the return when measured in political power.
Even the people who are well intentioned and very vocal do not have to consciously be aware that they are working for a political action group. A covert political group will always prefer an unwitting tool to help push their agenda, so that they can remain in the shadows.
FDA Admonishes Drug Maker Over Kim Kardashian Instagram Endorsement https://www.forbes.com/sites/davidkroll/2015/08/11/fda-spanks-drug-maker-over-kim-kardashian-instagram-endorsement/#25174a29587b
The OSS files offer details about other agents than famous chef, Julia Child; including Supreme Court Justice Arthur Goldberg, major league catcher Moe Berg, historian Arthur Schlesinger Jr., and actor Sterling Hayden. http://www.nbcnews.com/id/26186498/ns/us_news-security/t/julia-child-cooked-double-life-spy/
USA Today: Businesses and organizations may refer to it as a tool for competitive advantage and marketing; but make no mistake http://archive.is/37tK3
Shareblue accounts caught in /politics posting links to Shareblue without disclosing their affiliation http://archive.is/7HAkr
Psy Group developed elaborate information operations for commercial clients and political candidates around the world http://archive.is/BBblQ
Top mod of /Mechanical_Gifs tries to sell subreddit on ebay for 999.00 dollars. http://archive.is/kU1Ly
Shill posts picture of a dog in a hammock with the brand clearly visible without indicating that it's an ad in the title of the post http://archive.is/Mfdk9
Arstechnica: GCHQs menu of tools spreads disinformation across Internet- “Effects capabilities” allow analysts to twist truth subtly or spam relentlessly. http://arstechnica.com/security/2014/07/ghcqs-chinese-menu-of-tools-spread-disinformation-across-internet/
Samsung Electronics Fined for Fake Online Comments http://bits.blogs.nytimes.com/2013/10/24/samsung-electronics-fined-for-fake-online-comments/?_r=0
Discover Magazine: Researchers Uncover Twitter Bot Army That’s 350 http://blogs.discovermagazine.com/d-brief/2017/01/20/twitter-bot-army/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A%20DiscoverTechnology%20%28Discover%20Technology%29#.WIMl-oiLTnA
Times of Israel - The internet: Israel’s new PR battlefield http://blogs.timesofisrael.com/the-rise-of-digital-diplomacy-could-be-changing-israels-media-image/
Time: Social Media Manipulation? When “Indie” Bloggers and Businesses Get Cozy http://business.time.com/2013/04/22/social-media-manipulation-when-indie-bloggers-and-businesses-get-cozy/
Content-Driven Detection of Campaigns in Social Media [PDF] http://faculty.cs.tamu.edu/caverlee/pubs/lee11cikm.pdf
the law preventing them from using this in America was repealed http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/
Redditor who works for a potato mailing company admits to being a shill. He shows off his 27 thousand dollars he made in /pics
http://i.imgur.com/CcTHwdS.png
Screenshot of post since it was removed. http://i.imgur.com/k9g0WF8.png
Just thought I'd contribute to this thread http://imgur.com/OpSos4u
CNN: A PR firm has revealed that it is behind two blogs that previously appeared to be created by independent supporters of Wal-Mart. The blogs Working Families for Wal-mart and subsidiary site Paid Critics are written by 3 employees of PR firm Edelman http://money.cnn.com/2006/10/20/news/companies/walmart_blogs/index.htm
Vice: Your Government Wants to Militarize Social Media to Influence Your Beliefs http://motherboard.vice.com/read/your-government-wants-to-militarize-social-media-to-influence-your-beliefs
BBC News: China's Internet spin doctors http://news.bbc.co.uk/2/hi/7783640.stm
BBC News: US plans to 'fight the net' revealed http://news.bbc.co.uk/2/hi/americas/4655196.stm
Wall Street Journal: Turkey's Government Forms 6 http://online.wsj.com/news/articles/SB10001424127887323527004579079151479634742?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424127887323527004579079151479634742.html
Fake product reviews may be pervasive http://phys.org/news/2013-07-fake-product-pervasive.html#nRlv
USA Today: The co-owner of a major Pentagon propaganda contractor publicly admitted that he was behind a series of websites used in an attempt to discredit two USA TODAY journalists who had reported on the contractor. http://usatoday30.usatoday.com/news/military/story/2012-05-24/Leonie-usa-today-propaganda-pentagon/55190450/1
ADWEEK: Marketing on Reddit Is Scary http://www.adweek.com/news/technology/marketing-reddit-scary-these-success-stories-show-big-potential-168278
BBC- How online chatbots are already tricking you- Intelligent machines that can pass for humans have long been dreamed of http://www.bbc.com/future/story/20140609-how-online-bots-are-tricking-you
BBC news: Amazon targets 1 http://www.bbc.com/news/technology-34565631
BBC: More than four times as many tweets were made by automated accounts in favour of Donald Trump around the first US presidential debate as by those backing Hillary Clinton http://www.bbc.com/news/technology-37684418
Fake five-star reviews being bought and sold online - Fake online reviews are being openly traded on the internet
http://www.bbc.com/news/technology-43907695
http://www.bbc.com/news/world-asia-20982985
http://www.bbc.com/news/world-asia-20982985
Bloomberg: How to Hack an Election [and influence voters with fake social media accounts] http://www.bloomberg.com/features/2016-how-to-hack-an-election/
"Internet Reputation Management http://www.bloomberg.com/news/articles/2008-04-30/do-reputation-management-services-work-businessweek-business-news-stock-market-and-financial-advice
Buzzfeed: Documents Show How Russia’s Troll Army Hit America http://www.buzzfeed.com/maxseddon/documents-show-how-russias-troll-army-hit-america#.ki8Mz97ly
The Rise of Social Bots http://www.cacm.acm.org/magazines/2016/7/204021-the-rise-of-social-bots/fulltext
CBC News- Canadian government monitors online forums http://www.cbc.ca/news/canada/bureaucrats-monitor-online-forums-1.906351
Chicago Tribune: Nutrition for sale: How Kellogg worked with 'independent experts' to tout cereal http://www.chicagotribune.com/business/ct-kellogg-independent-experts-cereal-20161121-story.html
DailyKos: HBGary: Automated social media management http://www.dailykos.com/story/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All
Meme Warfare Center http://www.dtic.mil/dtic/tfulltext/u2/a507172.pdf
Shilling on Reddit is openly admitted to in this Forbes article http://www.forbes.com/sites/julesschroede2016/03/10/the-magic-formula-behind-going-viral-on-reddit/#1d2485b05271
Forbes: From Tinder Bots To 'Cuban Twitter' http://www.forbes.com/sites/kashmirhill/2014/04/17/from-tinder-bots-to-covert-social-networks-welcome-to-cognitive-hacking/#4b78e2d92a7d
Hivemind http://www.hivemind.cc/rank/shills
Huffington Post- Exposing Cyber Shills and Social Media's Underworld http://www.huffingtonpost.com/sam-fiorella/cyber-shills_b_2803801.html
The Independent: Massive British PR firm caught on video: "We've got all sorts of dark arts...The ambition is to drown that negative content and make sure that you have positive content online." They discuss techniques for managing reputations online and creating/maintaining 3rd-party blogs that seem independent. http://www.independent.co.uk/news/uk/politics/caught-on-camera-top-lobbyists-boasting-how-they-influence-the-pm-6272760.html
New York Times: Lifestyle Lift http://www.nytimes.com/2009/07/15/technology/internet/15lift.html?_r=1&emc=eta1
New York Times: Give Yourself 5 Stars? Online http://www.nytimes.com/2013/09/23/technology/give-yourself-4-stars-online-it-might-cost-you.html?src=me&ref=general
NY Times- From a nondescript office building in St. Petersburg http://www.nytimes.com/2015/06/07/magazine/the-agency.html?_r=1
NY Times: Effort to Expose Russia’s ‘Troll Army’ Draws Vicious Retaliation http://www.nytimes.com/2016/05/31/world/europe/russia-finland-nato-trolls.html?_r=1
PBS Frontline Documentary - Generation Like http://www.pbs.org/wgbh/frontline/film/generation-like/
Gamers promote gaming-gambling site on youtube by pretending to hit jackpot without disclosing that they own the site. They tried to retroactively write a disclosure covering their tracks http://www.pcgamer.com/csgo-lotto-investigation-uncovers-colossal-conflict-of-interest/
Raw Story: CENTCOM engages bloggers http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html
Raw Story: Air Force ordered software to manage army of fake virtual people http://www.rawstory.com/rs/2011/02/18/revealed-air-force-ordered-software-to-manage-army-of-fake-virtual-people/
Redective http://www.redective.com/?r=e&a=search&s=subreddit&t=redective&q=shills
Salon: Why Reddit moderators are censoring Glenn Greenwald’s latest news story on shills http://www.salon.com/2014/02/28/why_reddit_moderators_are_censoring_glenn_greenwalds_latest_bombshell_partne
The Atlantic: Kim Kardashian was paid to post a selfie on Instagram and Twitter advertising a pharmaceutical product. Sent to 42 million followers on Instagram and 32 million on Twitter http://www.theatlantic.com/health/archive/2015/09/fda-drug-promotion-social-media/404563/
WAR.COM: THE INTERNET AND PSYCHOLOGICAL OPERATIONS http://www.theblackvault.com/documents/ADA389269.pdf
The Guardian: Internet Astroturfing http://www.theguardian.com/commentisfree/libertycentral/2010/dec/13/astroturf-libertarians-internet-democracy
The Guardian: Israel ups the stakes in the propaganda war http://www.theguardian.com/media/2006/nov/20/mondaymediasection.israel
Operation Earnest Voice http://www.theguardian.com/technology/2011/ma17/us-spy-operation-social-networks
The Guardian: British army creates team of Facebook warriors http://www.theguardian.com/uk-news/2015/jan/31/british-army-facebook-warriors-77th-brigade
The Guardian: US military studied how to influence Twitter [and Reddit] users in Darpa-funded research [2014] http://www.theguardian.com/world/2014/jul/08/darpa-social-networks-research-twitter-influence-studies
The Guardian: Chinese officials flood the Chinese internet with positive social media posts to distract their population http://www.theguardian.com/world/2016/may/20/chinese-officials-create-488m-social-media-posts-a-year-study-finds
Times of Israel: Israeli government paying bilingual students to spread propaganda online primarily to international communities without having to identify themselves as working for the government. "The [student] union will operate computer rooms for the project...it was decided to establish a permanent structure of activity on the Internet through the students at academic institutions in the country." http://www.timesofisrael.com/pmo-stealthily-recruiting-students-for-online-advocacy/
USA Today: Lord & Taylor settles FTC charges over paid Instagram posts http://www.usatoday.com/story/money/2016/03/15/lord--taylor-settles-ftc-charges-over-paid-instagram-posts/81801972/
Researcher's algorithm weeds out people using multiple online accounts to spread propaganda - Based on word choice http://www.utsa.edu/today/2016/10/astroturfing.html
http://www.webinknow.com/2008/12/the-us-air-force-armed-with-social-media.html
Wired: Powered by rapid advances in artificial intelligence http://www.wired.co.uk/magazine/archive/2015/06/wired-world-2015/robot-propaganda
Wired: Clinton Staff and Volunteers Busted for Astroturfing [in 2007] http://www.wired.com/2007/12/clinton-staff-a/
Wired: Pro-Government Twitter Bots Try to Hush Mexican Activists http://www.wired.com/2015/08/pro-government-twitter-bots-try-hush-mexican-activists/
Wired: Microsoft http://www.wired.com/2015/09/ftc-machinima-microsoft-youtube/
Wired: Military Report: Secretly ‘Recruit or Hire Bloggers’ http://www.wired.com/dangerroom/2008/03/report-recruit/
Wired: Air Force Releases ‘Counter-Blog’ Marching Orders http://www.wired.com/dangerroom/2009/01/usaf-blog-respo/
Reddit Secrets https://archive.fo/NAwBx
Reddit Secrets https://archive.fo/SCWN7
Boostupvotes.com https://archive.fo/WdbYQ
"Once we isolate key people https://archive.is/PoUMo
GCHQ has their own internet shilling program https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group
Russia https://en.wikipedia.org/wiki/State-sponsored_Internet_sockpuppetry
US also operates in conjunction with the UK to collect and share intelligence data https://en.wikipedia.org/wiki/UKUSA_Agreement
Glenn Greenwald: How Covert Agents Infiltrate the Internet to Manipulate https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
Glenn Greenwald: Hacking Online Polls and Other Ways British Spies Seek to Control the Internet https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/
Here is a direct link to your image for the benefit of mobile users https://imgur.com/OpSos4u.jpg
Reddit for iPhone https://itunes.apple.com/us/app/reddit-the-official-app/id1064216828?mt=8
Why Satoshi Nakamoto Has Gone https://medium.com/@ducktatosatoshi-nakamoto-has-gone-4cef923d7acd
What I learned selling my Reddit accounts https://medium.com/@Rob79/what-i-learned-selling-my-reddit-accounts-c5e9f6348005#.u5zt0mti3
Artificial intelligence chatbots will overwhelm human speech online; the rise of MADCOMs https://medium.com/artificial-intelligence-policy-laws-and-ethics/artificial-intelligence-chatbots-will-overwhelm-human-speech-online-the-rise-of-madcoms-e007818f31a1
How Reddit Got Huge: Tons of Fake Accounts - According to Reddit cofounder Steve Huffman https://motherboard.vice.com/en_us/article/how-reddit-got-huge-tons-of-fake-accounts--2
Whistleblower and subsequent investigation: Paid trolls on /Bitcoin https://np.reddit.com/Bitcoin/comments/34m7yn/professional_bitcoin_trolls_exist/cqwjdlw
Confession of Hillary Shill from /SandersForPresident https://np.reddit.com/conspiracy/comments/3rncq9/confession_of_hillary_shill_from/
Why do I exist? https://np.reddit.com/DirectImageLinkerBot/wiki/index
Already a direct link? https://np.reddit.com/DirectImageLinkerBot/wiki/res_links
Here's the thread. https://np.reddit.com/HailCorporate/comments/3gl8zi/that_potato_mailing_company_is_at_it_again/
/netsec talks about gaming reddit via sockpuppets and how online discourse is (easily) manipulated. https://np.reddit.com/netsec/comments/38wl43/we_used_sock_puppets_in_rnetsec_last_year_and_are
Redditor comes clean about being paid to chat on Reddit. They work to promote a politician https://np.reddit.com/offmychest/comments/3gk56y/i_get_paid_to_chat_on_reddit/
Shill whistleblower https://np.reddit.com/politics/comments/rtr6b/a_very_interesting_insight_into_how_certain/
Russian bots were active on Reddit last year https://np.reddit.com/RussiaLago/comments/76cq4d/exclusive_we_can_now_definitively_state_that/?st=j8s7535j&sh=36805d5d
The Bush and Gore campaigns of 2000 used methods similar to the Chinese government for conducting “guided discussions” in chatrooms designed to influence citizens https://np.reddit.com/shills/comments/3xhoq8/til_the_advent_of_social_media_offers_new_routes/?st=j0o5xr9c&sh=3662f0dc
source paper. https://np.reddit.com/shills/comments/4d3l3s/government_agents_and_their_allies_might_ente
or Click Here. https://np.reddit.com/shills/comments/4kdq7n/astroturfing_information_megathread_revision_8/?st=iwlbcoon&sh=9e44591e Alleged paid shill leaks details of organization and actions.
https://np.reddit.com/shills/comments/4wl19alleged_paid_shill_leaks_details_of_organization/?st=irktcssh&sh=8713f4be
Shill Confessions and Additional Information https://np.reddit.com/shills/comments/5pzcnx/shill_confessions_and_additional_information/?st=izz0ga8r&sh=43621acd
Corporate and governmental manipulation of Wikipedia articles https://np.reddit.com/shills/comments/5sb7pi/new_york_times_corporate_editing_of_wikipedia/?st=iyteny9b&sh=b488263f
Ex -MMA fighter and ex-police officer exposes corrupt police practices https://np.reddit.com/shills/comments/6jn27s/ex_mma_fighter_and_expolice_officer_exposes/
User pushes InfoWars links on Reddit https://np.reddit.com/shills/comments/6uau99/chemicals_in_reddit_are_turning_memes_gay_take/?st=j6r0g2om&sh=96f3dbf4
Some websites use shill accounts to spam their competitor's articles https://np.reddit.com/TheoryOfReddit/comments/1ja4nf/lets_talk_about_those_playing_reddit_with/?st=iunay35w&sh=d841095d
User posts video using GoPro https://np.reddit.com/videos/comments/2ejpbb/yes_it_is_true_i_boiled_my_gopro_to_get_you_this/ck0btnb/?context=3&st=j0qt0xnf&sh=ef13ba81
Fracking shill whistleblower spills the beans on Fracking Internet PR https://np.reddit.com/worldnews/comments/31wo57/the_chevron_tapes_video_shows_oil_giant_allegedly/cq5uhse?context=3
https://i.imgur.com/Q3gjFg9.jpg
https://i.imgur.com/q2uFIV0.jpg
TOP SECRET SPECIAL HANDLING NOFORN
CENTRAL INTELLIGENCE AGENCY
Directorate of Operations
October 16, 1964
MEMORANDUM FOR THE DIRECTOR OF THE CIA
Subject: After action report of
Operation CUCKOO (TS)
INTRODUCTION

1) Operation CUCKOO was part of the overall operation CLEANSWEEP, aimed at eliminating domestic opposition to activities undertaken by the Central Intelligence Agency's special activities division, in main regard to operation GUILLOTINE.

2) Operation CUCKOO was approved by the Joint Chiefs of Staff, Department of Defense and the office of The President of the United States as a covert domestic action to be under taken within the limits of Washington D.C as outlined by Secret Executive Order 37.

3) Following the publishing of the Warren Commission, former special agent Mary Pinchot Meyer (Operation MOCKINGBIRD, Operation SIREN) also was married to Cord Meyer (Operation MOCKINGBIRD, Operation GUILLOTINE) threatened to disclose the details of several Special Activities Divisions' operations, including but not limited to, Operation SIREN and GUILLOTENE.
​1
TOP SECRET SPECIAL HANDLING NOFORN
4) It was deemed necessary by senior Directorate of Operations members to initiate Operation CUCKOO as an extension of Operation CLEANSWEEP on November 30th. After Mary Pinchot Meyer threatened to report her knowledge of Operation GUILLOTENE and the details of her work in Operation SIREN from her affair with the former President.

5) Special Activities Division was given the green light after briefing president Johnson on the situation. The situation report was forwarded to the Department of Defense and the Joint Chiefs of staff, who both approved of the parameters of the operation, as outlined under article C of secret executive order 37 (see attached copy of article).
​PLANNING STAGES
6) 8 members of the special activities division handpicked by operation lead William King Harvey began planning for the operation on October 3rd, with planned execution before October 16th.

7) The (?) of the operation was set as the neighborhood of Georgetown along the Potomac river, where the operators would observe, take note on routines, and eventually carry the operation.

8) After nothing Meyer's routines, Edward "Eddy" Reid was picked as the operation point man who would intersect Meyer on her walk on October 12th, with lead William King Harvey providing long range support if necessary from across the Chesapeake and Ohio canal (see illustration A for detailed map).

9) Edward Reid was planned to be dressed in the manner of a homeless black man, due to his resemblances to local trash collector (later found out to be Raymond Crump) who inhabits the AO and the path that Reid was planned to intersect Meyer.
2
TOP SECRET SPECIAL HANDLING NOFORN
submitted by The_Web_Of_Slime to Intelligence [link] [comments]

The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms

Cryptology ePrint Archive: Report 2018/939
Date: 2018-10-05
Author(s): Marcella Hastings, Nadia Heninger, Eric Wustrow

Link to Paper


Abstract
We propose a proof of work protocol that computes the discrete logarithm of an element in a cyclic group. Individual provers generating proofs of work perform a distributed version of the Pollard rho algorithm. Such a protocol could capture the computational power expended to construct proof-of-work-based blockchains for a more useful purpose, as well as incentivize advances in hardware, software, or algorithms for an important cryptographic problem. We describe our proposed construction and elaborate on challenges and potential trade-offs that arise in designing a practical proof of work.

References
  1. SpaceMint: A cryptocurrency based on proofs of space. In: FC’18. Springer (2018)
  2. Back, A.: Hashcash-a denial of service counter-measure (2002)
  3. Ball, M., Rosen, A., Sabin, M., Vasudevan, P.N.: Proofs of work from worst-case assumptions. In: CRYPTO 2018. Springer International Publishing (2018)
  4. Barbulescu, R., Gaudry, P., Joux, A., Thom´e, E.: A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic. In: EUROCRYPT’14 (2014)
  5. Barker, E., Chen, L., Roginsky, A., Vassilev, A., Davis, R.: SP 800-56A Revision 3. Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography. National Institute of Standards & Technology (2018)
  6. Biryukov, A., Pustogarov, I.: Proof-of-work as anonymous micropayment: Rewarding a Tor relay. In: FC’15. Springer (2015)
  7. Bitansky, N., Canetti, R., Chiesa, A., Goldwasser, S., Lin, H., Rubinstein, A., Tromer, E.: The hunting of the SNARK. Journal of Cryptology 30(4) (2017)
  8. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (Jul 1970). https://doi.org/10.1145/362686.362692
  9. Boneh, D., Bonneau, J., B¨unz, B., Fisch, B.: Verifiable delay functions. In: Annual International Cryptology Conference. pp. 757–788. Springer (2018)
  10. Bos, J.W., Kaihara, M.E., Kleinjung, T., Lenstra, A.K., Montgomery, P.L.: Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. International Journal of Applied Cryptography 2(3) (2012)
  11. Buterin, V.: Uncle rate and transaction fee analysis, https://blog.ethereum.org/2016/10/31/uncle-rate-transaction-fee-analysis/
  12. Certicom ECC challenge (1997), http://certicom.com/images/pdfs/challenge-2009.pdf, Updated 10 Nov 2009. Accessed via Web Archive
  13. Diffie, W., Hellman, M.: New directions in cryptography. IEEE transactions on Information Theory 22(6), 644–654 (1976)
  14. Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Annual International Cryptology Conference. pp. 139–147. Springer (1992)
  15. Ethereum Project: Ethereum white paper, https://github.com/ethereum/wiki/wiki/White-Paper\#modified-ghost-implementation
  16. Gordon, D.M.: Discrete logarithms in GF(P) using the number field sieve. SIAM J. Discret. Math. 6(1), 124–138 (Feb 1993). https://doi.org/10.1137/0406010
  17. Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols. In: Secure Information Networks, pp. 258–272. Springer (1999)
  18. King, S.: Primecoin: Cryptocurrency with prime number proof-of-work (2013)
  19. Kleinjung, T., Diem, C., Lenstra, A.K., Priplata, C., Stahlke, C.: Computation of a 768-bit prime field discrete logarithm. In: EUROCRYPT’17. Springer (2017)
  20. Lepinski, M., Kent, S.: Additional Diffie-Hellman groups for use with IETF standards. RFC 5114, RFC Editor (2008), http://rfc-editor.org/rfc/rfc5114.txt
  21. Lochter, M.: Blockchain as cryptanalytic tool. Cryptology ePrint Archive, Report 2018/893 (2018), https://eprint.iacr.org/2018/893.pdf
  22. Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: Repurposing Bitcoin work for data preservation. In: 2014 IEEE S&P. pp. 475–490. IEEE (2014)
  23. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. White paper (2008)
  24. National Institute of Standards and Technology: FIPS PUB 186-4: Digital Signature Standard (DSS). National Institute of Standards and Technology (Jul 2013)
  25. Percival, C., Josefsson, S.: The scrypt password-based key derivation function. RFC 7914, RFC Editor (Aug 2016), http://rfc-editor.org/rfc/rfc7914.txt
  26. Pollard, J.M.: Monte carlo methods for index computation (mod p). In: Mathematics of Computation. vol. 32 (1978)
  27. Poon, J., Buterin, V.: Plasma: Scalable autonomous smart contracts (2017)
  28. Shanks, D.: Class number, a theory of factorization, and genera. In: Proc. of Symp. Math. Soc., 1971. vol. 20, pp. 41–440 (1971)
  29. Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in Bitcoin. In: FC’15. pp. 507–527. Springer (2015)
  30. Teske, E.: Speeding up Pollard’s rho method for computing discrete logarithms. In: ANTS-III. pp. 541–554. Springer-Verlag, Berlin, Heidelberg (1998)
  31. Valenta, L., Adrian, D., Sanso, A., Cohney, S., Fried, J., Hastings, M., Halderman, J.A., Heninger, N.: Measuring small subgroup attacks against Diffie-Hellman. In: NDSS (2017)
  32. Valenta, L., Sullivan, N., Sanso, A., Heninger, N.: In search of CurveSwap: Measuring elliptic curve implementations in the wild. In: EuroS&P. IEEE (2018)
  33. Van Oorschot, P.C., Wiener, M.J.: Parallel collision search with cryptanalytic applications. Journal of cryptology 12(1), 1–28 (1999)
  34. de Vries, A.: Bitcoin’s growing energy problem. Joule 2(5), 801–805 (2018)
  35. Wenger, E., Wolfger, P.: Harder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs. Journal of Cryptographic Engineering (2016)
  36. Wiener, M.J., Zuccherato, R.J.: Faster attacks on elliptic curve cryptosystems. In: International workshop on selected areas in cryptography. Springer (1998)
  37. Wustrow, E., VanderSloot, B.: DDoSCoin: Cryptocurrency with a malicious proofof-work. In: WOOT (2016)
submitted by dj-gutz to myrXiv [link] [comments]

Bitcoin-NG: A Scalable Blockchain Protocol

arXiv:1510.02037
Date: 2015-11-11
Author(s): Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, Robbert van Renesse

Link to Paper


Abstract
Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential.This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is Byzantine fault tolerant, is robust to extreme churn, and shares the same trust model obviating qualitative changes to the ecosystem.In addition to Bitcoin-NG, we introduce several novel metrics of interest in quantifying the security and efficiency of Bitcoin-like blockchain protocols. We implement Bitcoin-NG and perform large-scale experiments at 15% the size of the operational Bitcoin system, using unchanged clients of both protocols. These experiments demonstrate that Bitcoin-NG scales optimally, with bandwidth limited only by the capacity of the individual nodes and latency limited only by the propagation time of the network.

References
[1] Andresen, G. O(1) block propagation. https://gist.github.com/gavinandresen/#file-blockpropagation-md, retrieved July. 2015.
[2] Aspnes, J. Randomized protocols for asynchronous consensus. Distributed Computing 16, 2-3 (2003), 165–175.
[3] Back, A., Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A., Poelstra, A., Timn, J., and Wuille, P. Enabling blockchain innovations with pegged sidechains. http://cs.umd.edu/projects/coinscope/coinscope.pdf, 2014.
[4] Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., and Welten, S. Have a snack, pay with Bitcoins. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on (2013), IEEE, pp. 1–5.
[5] Bellare, M., and Rogaway, P. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on Computer and communications security (1993), ACM, pp. 62–73.
[6] Bitcoin community. Bitcoin source. https://github.com/bitcoin/bitcoin, retrieved Mar. 2015.
[7] Bitcoin community. Protocol rules. https://en.bitcoin.it/wiki/Protocol_rules, retrieved Sep. 2013.
[8] Bitcoin community. Protocol specification. https://en.bitcoin.it/wiki/Protocol_specification, retrieved Sep. 2013.
[9] BlockTrail. BlockTrail API. https://www.blocktrail.com/api/docs#api_data, retrieved Sep. 2015.
[10] Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., and Felten, E. W. Research perspectives on Bitcoin and second-generation cryptocurrencies. In Symposium on Security and Privacy (San Jose, CA, USA, 2015), IEEE.
[11] Buterin, V. Slasher: A punitive proof-of-stake algorithm. https://blog.ethereum.org/2014/01/15/slasher-a-punitive-proof-of-stake-algorithm/, January 2015.
[12] CNNMoney Staff. The Ashley Madison hack...in 2 minutes. http://money.cnn.com/2015/08/24/technology/ashley-madison-hack-in-2-minutes/, retrieved Sep. 2015.
[13] CoinDesk. Bitcoin venture capital. http://www.coindesk.com/bitcoin-venture-capital/, retrieved Sep. 2015.
[14] Colored Coins Project. Colored Coins. http://coloredcoins.org/, retrieved Sep. 2015.
[15] Corallo, M. High-speed Bitcoin relay network. http://sourceforge.net/p/bitcoin/mailman/message/31604935/, November 2013.
[16] Decker, C., and Wattenhofer, R. Information propagation in the Bitcoin network. In IEEE P2P (Trento, Italy, 2013).
[17] Decker, C., and Wattenhofer, R. A fast and scalable payment network with Bitcoin Duplex Micropayment Channels. In Stabilization, Safety, and Security of Distributed Systems - 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings (2015), Springer, pp. 3–18.
[18] Dwork, C., Lynch, N. A., and Stockmeyer, L. J. Consensus in the presence of partial synchrony. J. ACM 35, 2 (1988), 288–323.
[19] Eyal, I., Birman, K., and van Renesse, R. Cache serializability: Reducing inconsistency in edge transactions. In 35th IEEE International Conference on Distributed Computing Systems, ICDCS 2015, Columbus, OH, USA, June 29 - July 2, 2015 (2015), pp. 686–695.
[20] Eyal, I., and Sirer, E. G. Bitcoin is broken. http://hackingdistributed.com/2013/11/04/bitcoin-is-broken/, 2013.
[21] Eyal, I., and Sirer, E. G. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security (Barbados, 2014).
[22] Garay, J. A., Kiayias, A., and Leonardos, N. The Bitcoin backbone protocol: Analysis and applications. In Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (2015), pp. 281–310.
[23] Garcia-Molina, H. Elections in a distributed computing system. Computers, IEEE Transactions on 100, 1 (1982), 48–59.
[24] Hearn, M., and Spilman, J. Rapidly-adjusted (micro)payments to a pre-determined party. https://en.bitcoin.it/wiki/Contract, retrieved Sep. 2015.
[25] Heilman, E., Kendler, A., Zohar, A., and Goldberg, S. Eclipse attacks on Bitcoin’s peerto-peer network. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015. (2015), pp. 129–144.
[26] Kosba, A., Miller, A., Shi, E., Wen, Z., and Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. Cryptology ePrint Archive, Report 2015/675, 2015. http://eprint.iacr.org/.
[27] Kroll, J. A., Davey, I. C., and Felten, E. W. The economics of Bitcoin mining or, Bitcoin in the presence of adversaries. In Workshop on the Economics of Information Security (2013).
[28] Lamport, L. Using time instead of timeout for fault-tolerant distributed systems. ACM Transactions on Programming Languages and Systems 6, 2 (Apr. 1984), 254–280.
[29] Le Lann, G. Distributed systems-towards a formal approach. In IFIP Congress (1977), vol. 7, Toronto, pp. 155–160.
[30] Lewenberg, Y., Sompolinsky, Y., and Zohar, A. Inclusive block chain protocols. In Financial Cryptography (Puerto Rico, 2015).
[31] Litecoin Project. Litecoin, open source P2P digital currency. https://litecoin.org, retrieved Nov. 2014.
[32] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., and Savage, S. A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 Internet Measurement Conference, IMC 2013, Barcelona, Spain, October 23-25, 2013 (2013), pp. 127–140.
[33] Miller, A., and Jansen, R. Shadow-Bitcoin: Scalable simulation via direct execution of multithreaded applications. IACR Cryptology ePrint Archive 2015 (2015), 469.
[34] Miller, A., and Jr., L. J. J. Anonymous Byzantine consensus from moderately-hard puzzles: A model for Bitcoin. https://socrates1024.s3.amazonaws.com/consensus.pdf, 2009.
[35] Miller, A., Litton, J., Pachulski, A., Gupta, N., Levin, D., Spring, N., and Bhattacharjee, B. Preprint: Discovering Bitcoins public topology and influential nodes. http://cs.umd.edu/projects/coinscope/coinscope.pdf, 2015.
[36] Moraru, I., Andersen, D. G., and Kaminsky, M. Egalitarian Paxos. In ACM Symposium on Operating Systems Principles (2012).
[37] Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. http://www.bitcoin.org/ bitcoin.pdf, 2008.
[38] Nayak, K., Kumar, S., Miller, A., and Shi, E. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. IACR Cryptology ePrint Archive 2015 (2015), 796.
[39] Pazmino, J. E., and da Silva Rodrigues, C. K. ˜ Simply dividing a Bitcoin network node may reduce transaction verification time. The SIJ Transactions on Computer Networks and Communication Engineering (CNCE) 3, 2 (February 2015), 17–21.
[40] Pease, M. C., Shostak, R. E., and Lamport, L. Reaching agreement in the presence of faults. J. ACM 27, 2 (1980), 228–234.
[41] Peck, M. E. Adam Back says the Bitcoin fork is a coup. http://spectrum.ieee.org/tech-talk/computing/networks/the-bitcoin-for-is-a-coup, Aug 2015.
[42] Poon, J., and Dryja, T. The Bitcoin Lightning Network. http://lightning.network/lightning-network.pdf, February 2015. Draft 0.5.
[43] Sapirshtein, A., Sompolinsky, Y., and Zohar, A. Optimal selfish mining strategies in Bitcoin. CoRR abs/1507.06183 (2015).
[44] Schneider, F. B. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys 22, 4 (Dec. 1990), 299–319.
[45] Sompolinsky, Y., and Zohar, A. Accelerating Bitcoin’s transaction processing. fast money grows on trees, not chains. In Financial Cryptography (Puerto Rico, 2015).
[46] Sompolinsky, Y., and Zohar, A. Secure high-rate transaction processing in Bitcoin. In Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (2015), pp. 507–527.
[47] Stathakopoulou, C. A faster Bitcoin network. Tech. rep., ETH, Z¨urich, January 2015. Semester Thesis, supervised by C. Decker and R. Wattenhofer.
[48] Swanson, E. Bitcoin mining calculator. http://www.alloscomp.com/bitcoin/calculator, retrieved Sep. 2013.
[49] The Ethereum community. Ethereum white paper. https://github.com/ethereum/wiki/wiki/White-Paper, retrieved July. 2015.
[50] Wikipedia. List of cryptocurrencies. https://en.wikipedia.org/wiki/List_of_cryptocurrencies, retrieved Oct. 2013.
submitted by dj-gutz to myrXiv [link] [comments]

Echoes of the Past: Recovering Blockchain Metrics From Merged Mining

Cryptology ePrint Archive: Report 2018/1134
Date: 2018-11-22
Author(s): Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar Weippl

Link to Paper


Abstract
So far, the topic of merged mining has mainly been considered in a security context, covering issues such as mining power centralization or crosschain attack scenarios. In this work we show that key information for determining blockchain metrics such as the fork rate can be recovered through data extracted from merge mined cryptocurrencies. Specifically, we reconstruct a long-ranging view of forks and stale blocks in Bitcoin from its merge mined child chains, and compare our results to previous findings that were derived from live measurements. Thereby, we show that live monitoring alone is not sufficient to capture a large majority of these events, as we are able to identify a non-negligible portion of stale blocks that were previously unaccounted for. Their authenticity is ensured by cryptographic evidence regarding both, their position in the respective blockchain, as well as the Proof-of-Work difficulty.
Furthermore, by applying this new technique to Litecoin and its child cryptocur rencies, we are able to provide the first extensive view and lower bound on the stale block and fork rate in the Litecoin network. Finally, we outline that a recovery of other important metrics and blockchain characteristics through merged mining may also be possible.

References
  1. C. Decker and R. Wattenhofer, “Information propagation in the bitcoin network,” in Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, 2013, pp. 1–10. [Online]. Available: http://diyhpl.us/∼bryan/papers2/bitcoin/Information% 20propagation%20in%20the%20Bitcoin%20network.pdf
  2. A. Gervais, G. O. Karame, K. Wust, V. Glykantzis, H. Ritzdo rf, and S. Capkun, “On the ¨ security and performance of proof of work blockchains,” in Proceedings of the 2016 ACM SIGSAC. ACM, 2016, pp. 3–16.
  3. A. E. Gencer, S. Basu, I. Eyal, R. van Renesse, and E. G. Sirer, “Decentralization in bitcoin and ethereum networks,” in Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer, 2018. [Online]. Available: http://fc18.ifca.ai/preproceedings/75.pdf
  4. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Financial Cryptography and Data Security. Springer, 2014, pp. 436–454. [Online]. Available: http://arxiv.org/pdf/1311.0243
  5. K. Nayak, S. Kumar, A. Miller, and E. Shi, “Stubborn mining: Generalizing selfish mining and combining with an eclipse attack,” in 1st IEEE European Symposium on Security and Privacy, 2016. IEEE, 2016. [Online]. Available: http://eprint.iacr.org/2015/796.pdf
  6. A. Sapirshtein, Y. Sompolinsky, and A. Zohar, “Optimal selfish mining strategies in bitcoin,” http://arxiv.org/pdf/1507.06183.pdf, 2015, accessed: 2016-08-22. [Online]. Available: http://arxiv.org/pdf/1507.06183.pdf
  7. J. Bonneau, “Why buy when you can rent? bribery attacks on bitcoin consensus,” in BITCOIN ’16: Proceedings of the 3rd Workshop on Bitcoin and Blockchain Research, February 2016. [Online]. Available: http://fc16.ifca.ai/bitcoin/papers/Bon16b.pdf
  8. K. Liao and J. Katz, “Incentivizing blockchain forks via whale transactions,” in International Conference on Financial Cryptography and Data Security. Springer, 2017, pp. 264–279. [Online]. Available: http://www.cs.umd.edu/∼jkatz/papers/whale-txs.pdf
  9. P. McCorry, A. Hicks, and S. Meiklejohn, “Smart contracts for bribing miners,” in 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer, 2018. [Online]. Available: http://fc18.ifca.ai/bitcoin/papers/bitcoin18-final14.pdf
  10. A. Zamyatin, N. Stifter, A. Judmayer, P. Schindler, E. Weippl, and W. J. Knottebelt, “(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice,” in 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer, 2018. [Online]. Available: https://eprint.iacr.org/2018/087.pdf
  11. Blockchain.com, “Blockchain.com orphaned blocks,” https://www.blockchain.com/btc/orphaned-blocks, Blockchain.com, accessed: 2018-09-25.
  12. BitcoinChain.com, “Bitcoinchain bitcoin block explorer,” https://bitcoinchain.com/blockexplorer, BitcoinChain.com, accessed: 2018-09-25.
  13. ChainQuery.com, “A web based interface to the bitcoin api json-rpc,” http://chainquery.com/bitcoin-api, ChainQuery.com, accessed: 2018-09-25.
  14. L. Project, “Litecoin,” https://litecoin.org/, accessed: 2016-03-29.
  15. Y. Sompolinsky and A. Zohar, “Accelerating bitcoin’s transaction processing. fast money grows on trees, not chains,” p. 881, 2013. [Online]. Available: http://eprint.iacr.org/2013/881.pdf
  16. A. Miller and L. JJ, “Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin,” https://socrates1024.s3.amazonaws.com/consensus.pdf, 2014, accessed: 2016-03-09. [Online]. Available: https://socrates1024.s3.amazonaws.com/consensus.pdf
  17. J. Garay, A. Kiayias, and N. Leonardos, “The bitcoin backbone protocol: Analysis and applications,” in Advances in Cryptology-EUROCRYPT 2015. Springer, 2015, pp. 281–310. [Online]. Available: http://courses.cs.washington.edu/courses/cse454/15wi/papers/bitcoin765.pdf
  18. R. Pass and E. Shi, “Fruitchains: A fair blockchain,” http://eprint.iacr.org/2016/916.pdf, 2016, accessed: 2016-11-08. [Online]. Available: http://eprint.iacr.org/2016/916.pdf
  19. R. Pass, L. Seeman, and a. shelat, “Analysis of the blockchain protocol in asynchronous networks,” http://eprint.iacr.org/2016/454.pdf, 2016, accessed: 2016-08-01. [Online]. Available: http://eprint.iacr.org/2016/454.pdf
  20. K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, and E. Gun, “On scaling decentralized blockchains,” in ¨ 3rd Workshop on Bitcoin and Blockchain Research, Financial Cryptography 16, 2016. [Online]. Available: http://www.tik.ee.ethz.ch/file/74bc987e6ab4a8478c04950616612f69/main.pdf
  21. A. Kiayias and G. Panagiotakos, “On trees, chains and fast transactions in the blockchain.” http://eprint.iacr.org/2016/545.pdf, 2016, accessed: 2017-02-06. [Online]. Available: http://eprint.iacr.org/2016/545.pdf
  22. Y. Sompolinsky, Y. Lewenberg, and A. Zohar, “Spectre: A fast and scalable cryptocurrency protocol,” Cryptology ePrint Archive, Report 2016/1159, 2016, accessed: 2017-02-20. [Online]. Available: http://eprint.iacr.org/2016/1159.pdf
  23. Y. Sompolinsky and A. Zohar, “Phantom: A scalable blockdag protocol,” Cryptology ePrint Archive, Report 2018/104, 2018, accessed:2018-01-31. [Online]. Available: https://eprint.iacr.org/2018/104.pdf
  24. Bitcoin community, “Bitcoin-core source code,” https://github.com/bitcoin/bitcoin, accessed: 2018-09-25.
  25. A. Miller, J. Litton, A. Pachulski, N. Gupta, D. Levin, N. Spring, and B. Bhattacharjee, “Discovering bitcoin’s public topology and influential nodes,” http://cs.umd.edu/projects/coinscope/coinscope.pdf, May 2015, accsessed: 2016-03-09. [Online]. Available: http://cs.umd.edu/projects/coinscope/coinscope.pdf
  26. chainz.cryptoid.info/, “Chainz blockchain explorers,” chainz.cryptoid.info/, chainz.cryptoid.info/, accessed: 2018-09-25.
  27. Narayanan, Arvind and Bonneau, Joseph and Felten, Edward and Miller, Andrew and Goldfeder, Steven, “Bitcoin and cryptocurrency technologies,” http://bitcoinbook.cs.princeton.edu/, 2016, accessed: 2016-03-29. [Online]. Available: https://d28rh4a8wq0iu5.cloudfront.net/bitcointech/readings/princeton bitcoin book.pdf
  28. A. Judmayer, A. Zamyatin, N. Stifter, A. G. Voyiatzis, and E. Weippl, “Merged mining: Curse or cure?” in CBT’17: Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology, Sep 2017. [Online]. Available: https://eprint.iacr.org/2017/791.pdf
  29. M. Jakobsson and A. Juels, “Proofs of work and bread pudding protocols,” in Secure Information Networks. Springer, 1999, pp. 258–272. [Online]. Available: https://link.springer.com/content/pdf/10.1007/978-0-387-35568-9 18.pdf
  30. A. Judmayer, N. Stifter, K. Krombholz, and E. Weippl, “Blocks and chains: Introduction to bitcoin, cryptocurrencies, and their consensus mechanisms,” Synthesis Lectures on Information Security, Privacy, and Trust, 2017.
  31. A. Kiayias, A. Miller, and D. Zindros, “Non-interactive proofs of proof-of-work,” Cryptology ePrint Archive, Report 2017/963, 2017, accessed:2017-10-03. [Online]. Available: https://eprint.iacr.org/2017/963.pdf
  32. Namecoin community, “Namecoin source code - chainparams.cpp,” https://github.com/namecoin/namecoin-core/blob/fdfb20fc263a72acc2a3c460b56b64245c1bedcb/src/chainparams.cpp#L123, accessed: 2018-09-25.
  33. ——, “Namecoin source code - auxpow.cpp,” https://github.com/namecoin/namecoincore/blob/fdfb20fc263a72acc2a3c460b56b64245c1bedcb/src/auxpow.cpp#L177-L200, accessed: 2018-09-25.
  34. I0Coin community, “I0coin source code,” https://github.com/domob1812/i0coin, accessed: 2018-09-25.
  35. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” https://bitcoin.org/bitcoin.pdf, Dec 2008, accessed: 2015-07-01. [Online]. Available: https://bitcoin.org/bitcoin.pdf
  36. N. T. Courtois and L. Bahack, “On subversive miner strategies and block withholding attack in bitcoin digital currency,” arXiv preprint arXiv:1402.1718, 2014, accessed: 2016-07-04. [Online]. Available: https://arxiv.org/pdf/1402.1718.pdf
  37. J. Gobel, P. Keeler, A. E. Krzesinski, and P. G. Taylor, “Bitcoin blockchain dynamics: the ¨ selfish-mine strategy in the presence of propagation delay,” http://arxiv.org/pdf/1505.05343.pdf, 2015, accessed: 2015-03-01. [Online]. Available: http://arxiv.org/pdf/1505.05343.pdf
  38. N. Developers, “Neo4j,” 2012.
  39. Gavin Andresen, “Bitcoin improvement proposal 34 (bip34): Block v2, height in coinbase,” https://github.com/bitcoin/bips/blob/mastebip-0034.mediawiki, accessed: 2018-09-25. [Online]. Available: https://github.com/bitcoin/bips/blob/mastebip-0034.mediawiki
  40. Matt Corello, “Fast internet bitcoin relay engine,” http://bitcoinfibre.org/, accessed: 2018-09-25. [Online]. Available: http://bitcoinfibre.org/
  41. Suhas Daftuar, “sendheaders message,” https://github.com/bitcoin/bips/wiki/Comments:BIP-0130, accessed: 2018-09-25. [Online]. Available: https://github.com/bitcoin/bips/wiki/Comments:BIP-0130
  42. R. Bowden, H. P. Keeler, A. E. Krzesinski, and P. G. Taylor, “Block arrivals in the bitcoin blockchain,” 2018. [Online]. Available: https://arxiv.org/pdf/1801.07447.pdf
  43. GeistGeld community, “Geistgeld source code,” https://github.com/Lolcust/GeistGeld, accessed: 2018-09-25.
  44. A. P. Ozisik, G. Bissias, and B. Levine, “Estimation of miner hash rates and consensus on blockchains,” arXiv preprint arXiv:1707.00082, 2017, accessed:2017-09-25. [Online]. Available: https://arxiv.org/pdf/1707.00082.pdf
  45. E. Duffield and D. Diaz, “Dash: A payments-focused cryptocurrency,” https://github.com/dashpay/dash/wiki/Whitepaper, Aug 2013, accessed: 2018-09-25. [Online]. Available: https://github.com/dashpay/dash/wiki/Whitepaper
  46. N. Van Saberhagen, “Cryptonote v 2.0,” https://cryptonote.org/whitepaper.pdf, Oct 2013. [Online]. Available: https://cryptonote.org/whitepaper.pdf
  47. G. Hall, “Guide: Merge mining 6 scrypt coins at full hashpower, simultaneously,” https://www.ccn.com/guide-simultaneously-mining-5-scrypt-coins-full-hashpowe, Apr 2014, accessed: 2018-09-25. [Online]. Available: https://www.ccn.com/guide-simultaneouslymining-5-scrypt-coins-full-hashpowe
  48. united-scrypt coin, “[ann][usc] first merged minable scryptcoin unitedscryptcoin,” https://bitcointalk.org/index.php?topic=353688.0, Nov 2013, accessed: 2018-09-25. [Online]. Available: https://bitcointalk.org/index.php?topic=353688.0
  49. J. A. D. Donet, C. Perez-Sola, and J. Herrera-Joancomart ´ ´ı, “The bitcoin p2p network,” in Financial Cryptography and Data Security. Springer, 2014, pp. 87–102. [Online]. Available: http://fc14.ifca.ai/bitcoin/papers/bitcoin14 submission 3.pdf
  50. M. Bartoletti and L. Pompianu, “An analysis of bitcoin op return metadata,” https://arxiv.org/pdf/1702.01024.pdf, 2017, accessed: 2017-03-09. [Online]. Available: https://arxiv.org/pdf/1702.01024.pdf
  51. R. Matzutt, J. Hiller, M. Henze, J. H. Ziegeldorf, D. Mullmann, O. Hohlfeld, and K. Wehrle, ¨ “A quantitative analysis of the impact of arbitrary blockchain content on bitcoin,” in Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer, 2018. [Online]. Available: http://fc18.ifca.ai/preproceedings/6.pdf
  52. M. Grundmann, T. Neudecker, and H. Hartenstein, “Exploiting transaction accumulation and double spends for topology inference in bitcoin,” in 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer, 2018. [Online]. Available: http://fc18.ifca.ai/bitcoin/papers/bitcoin18-final10.pdf
  53. A. Judmayer, N. Stifter, P. Schindler, and E. Weippl, “Pitchforks in cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques (short paper),” in CBT’18: Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology, Sep 2018. [Online]. Available: https://www.sba-research.org/wpcontent/uploads/2018/09/judmayer2018pitchfork 2018-09-05.pdf
submitted by dj-gutz to myrXiv [link] [comments]

Subreddit Stats: RedditDayOf top posts from 2015-12-23 to 2016-12-21 16:33 PDT

Period: 364.54 days
Submissions Comments
Total 1000 6566
Rate (per day) 2.74 17.97
Unique Redditors 311 2698
Combined Score 83364 32293

Top Submitters' Top Submissions

  1. 8084 points, 78 submissions: joelschlosberg
    1. actress Linda Hamilton has a twin sister who made it possible for Terminator 2 to film some scenes in one camera shot without compositing (396 points, 15 comments)
    2. Ben Franklin's daily schedule (353 points, 29 comments)
    3. historical marker (314 points, 4 comments)
    4. Isaac Asimov tells a joke involving profanity (300 points, 9 comments)
    5. The swordfights in The Princess Bride, Stanley Kubrick's Barry Lyndon, Highlander, The Mask of Zorro, Die Another Day, The Lord of the Rings, and Pirates of the Caribbean were all made by the same sword master, "the man who stabbed Errol Flynn". Who also did Darth Vader's lightsaber dueling himself. (281 points, 9 comments)
    6. Girl Scouts were told by their official handbook that "you should not be hostile to" Jews and Muslims as early as the 1918 edition. (278 points, 26 comments)
    7. "I hate versions that make Watson stupid. What makes Holmes impressive is that he outthinks smart people, not that he outthinks stupid people." (254 points, 3 comments)
    8. a joke from Isaac Asimov's Treasury of Humor (254 points, 18 comments)
    9. a tiny but full-featured solar-powered movie theater (236 points, 14 comments)
    10. Jetta, the teen-ager from the futuristic 21st century in a pre-Jetsons comic drawn by Archie Comics artist Dan DeCarlo (197 points, 9 comments)
  2. 6984 points, 104 submissions: 0and18
    1. Man Pays $10K For House, Finds $107,000 Comic Book Hidden In Wall (241 points, 13 comments)
    2. xkcd: The Three Laws of Robotics (234 points, 2 comments)
    3. FDA Lifts Decades-Old 32 Year Old Ban On Blood Donations By Gay Men (233 points, 31 comments)
    4. This is Why You Should Never Release 1.5 Million Balloons At Once (191 points, 30 comments)
    5. Teaching Methods (188 points, 2 comments)
    6. Pirámide de Mayo In Argentina covered with photos of all the "disappeared" during the Dirty War (154 points, 2 comments)
    7. In 1958, Mao Zedong ordered all sparrows to be killed. As a direct result, millions of people starved to death. (150 points, 7 comments)
    8. Without leap years, today would be July 15, 2017 Explained in Graphics (148 points, 3 comments)
    9. Film poster for the Rocketeer (135 points, 5 comments)
    10. William Kamkwamba: At age 14, in poverty and famine, a Malawian boy built a windmill to power his family's home (131 points, 3 comments)
  3. 6687 points, 50 submissions: sverdrupian
    1. An adult oyster is capable of filtering 25-50 gallons of water a day. (1030 points, 72 comments)
    2. Making chain. (290 points, 18 comments)
    3. A series of tunnels in Taiwan (261 points, 6 comments)
    4. Artichoke in full bloom (242 points, 2 comments)
    5. USS CONSTITUTION in drydock for restoration - Launched in Boston in 1797, she's the oldest commissioned warship afloat (220 points, 24 comments)
    6. German WW1-era map calling out the Allies for the hypocrisy of promoting self-determination while simultaneously holding vast colonial empires. (202 points, 26 comments)
    7. "Our future is an airport without delays" - 1975 advertisement (189 points, 14 comments)
    8. Bee macro. (184 points, 4 comments)
    9. Het Gekkenhuis - a Dutch caricature map of Europe, 1914. (180 points, 2 comments)
    10. The oarfish, the world's largest known bony fish, is thought to have spawned tales of seas serpents. (178 points, 25 comments)
  4. 4762 points, 58 submissions: wormspermgrrl
    1. During Florida winters, manatees flock to nuclear and coal power plants for the warm water discharges. (414 points, 29 comments)
    2. Happy Birthday song ruled public domain as judge throws out copyright claim (202 points, 8 comments)
    3. 18 cities in Pennsylvania reported higher levels of lead exposure than Flint (194 points, 8 comments)
    4. xkcd: Log Scale (191 points, 8 comments)
    5. Parade Magazine's Ask Marilyn Controversy: The Time Everyone “Corrected” the World’s Smartest Woman (174 points, 18 comments)
    6. Maryam Mirzakhani won the Fields Medal in 2014; she is the first woman to win math’s most prestigious prize (163 points, 1 comment)
    7. Meet the woman who makes fake fingers for Japan's reformed gangsters (161 points, 3 comments)
    8. Google's self-driving car gets pulled over for driving too slowly (157 points, 40 comments)
    9. The Wieliczka Salt Mine, Poland (154 points, 12 comments)
    10. The Decemberists - "The Mariner's Revenge Song" (149 points, 14 comments)
  5. 2906 points, 31 submissions: jaykirsch
    1. 1989 Plymouth Voyager III concept. This is a two piece detachable vehicle (link in comments) (220 points, 21 comments)
    2. "Mission Accomplished" fly-in and speech May 1, 2003. Enormous political PR blunder. (206 points, 5 comments)
    3. Prepared for gas attack in France, WW1 (202 points, 6 comments)
    4. Les Paul with Paul McCartney and a Gibson left-handed "Special." 1988 (201 points, 9 comments)
    5. "Pictured Rocks" on Lake Superior near Munising, MI (180 points, 7 comments)
    6. Art Deco in the home - stylish 1937 GE radio (146 points, 9 comments)
    7. Woody Guthrie on the attack, 1941 (141 points, 2 comments)
    8. The Great 1918 Influenza Pandemic claimed more lives than WW1, including 675,000 (est.) Americans. (Article link in comments) (135 points, 6 comments)
    9. Come on in, kids, I have some pie and a magic mushroom. (129 points, 10 comments)
    10. Yooper "Pastie" in Michigan's UP (122 points, 25 comments)
  6. 2882 points, 23 submissions: appropriate-username
    1. "We come in peace" (470 points, 10 comments)
    2. This GIF illustrates why your phone camera takes weird photos of revolving propellers. (325 points, 12 comments)
    3. An electrical current causing water to form a bridge. (xpost/gifs) (276 points, 10 comments)
    4. This series of photos got the photographer banned from Magic TCG tournaments and is among the top 5 top posts of all time on Reddit (266 points, 33 comments)
    5. "My girlfriend keeps sending me her squids" (245 points, 9 comments)
    6. Pocky is a popular Japanese snack consisting of a cracker-like stick partially covered in chocolate--I can't believe nobody posted it so I can upvote it. Here's a picture of Pocky; the wiki article on it is in the comments. (177 points, 46 comments)
    7. An animated short about a lazy guy in space--35th most popular reddit post of all time (158 points, 10 comments)
    8. xkcd: Centrifugal Force (124 points, 3 comments)
    9. 1,000 x 1,000 x 1,000 Rubik's Cube Solve (by a computer) (114 points, 10 comments)
    10. xkcd: Earth Temperature Timeline (86 points, 4 comments)
  7. 2385 points, 30 submissions: sbroue
    1. Flying hammock [gif] (275 points, 13 comments)
    2. Property for Rent: No Asians (224 points, 17 comments)
    3. Gobi warns his shrimp housekeeper of approaching predator (140 points, 11 comments)
    4. First taste of chocolate for Ivory Coast Cocoa farmers (126 points, 10 comments)
    5. "Hurricane" Higgins finishes the match [gif] (119 points, 17 comments)
    6. Big Booty Bitches (Original Video) (116 points, 16 comments)
    7. The Blessing and launching of HMS Albion (1898) created a wave that drowned 39 people, you see them bottom left in some of the earliest disaster footage (110 points, 6 comments)
    8. Pizza with mini meat-pies baked in the crust Australian frankenfood (106 points, 6 comments)
    9. Bought for £1, the mysterious tower that inspired JRR Tolkien (101 points, 1 comment)
    10. Castro meets Nixon: April 1959 [pic] (100 points, 4 comments)
  8. 1687 points, 32 submissions: ceegee1975
    1. Nicolas Cage returns stolen dinosaur skull he bought at auction for $276,000 (192 points, 11 comments)
    2. Why Hypercolor T-Shirts Were Just a One-Hit Wonder (99 points, 15 comments)
    3. Clean My Space. A youtube channel devoted to cleaning just about anything (98 points, 3 comments)
    4. Scientists have breached the blood-brain barrier for the first time to treat a brain tumour (83 points, 2 comments)
    5. They Might Be Giants-Ana Ng (78 points, 8 comments)
    6. How It's Made: Balloons (74 points, 4 comments)
    7. Mr. Bean The Movie - 'Gun' Scene (72 points, 6 comments)
    8. The Best Homemade Girl Scout Cookie Recipes (71 points, 5 comments)
    9. Monty Python - How Not to Be Seen (68 points, 2 comments)
    10. George Carlin - Euphemisms (65 points, 8 comments)
  9. 1623 points, 13 submissions: mrekted
    1. Legendary con man, scam artist, and forger Frank Abagnale Jr. pictured in the pilots seat of a Pan Am airliner. He flew over 1,000,000 miles while wearing a Pan Am uniform. He was never their employee, nor was he a pilot. (484 points, 24 comments)
    2. What It's Like When Reddit Wrongly Accuses Your Loved One Of Murder - The Boston Marathon Bomber Reddit Witch Hunt (240 points, 23 comments)
    3. Tim's Vermeer - Penn Jillette chronicles a mans ridiculously compulsive and obsessive five year obsession with reverse engineering and mastering the artistic techniques of Dutch master painter Vermeer (148 points, 6 comments)
    4. Cadillac Ranch, Amarillo TX. A bizarre, macabre tribute to the American love affair with the automobile. Visitors are encouraged to add their own ideas and messages to the memorial with spray paint. (133 points, 7 comments)
    5. 2010 - Reddit comes to the aid of a terminally ill little girl who was being cruelly harassed by her neighbors (126 points, 7 comments)
    6. In 2013, a UK man scoured the local dump after realizing he threw away a hard disk that contained 7500 bitcoins. At current market value those coins are worth a little over 5.5 million USD. (125 points, 4 comments)
    7. A float in the first Macy's Day Parade in 1924 (95 points, 1 comment)
    8. On Halloween 1938, Orson Welles enters legend with a radio play that convinced listeners that the planet was under attack by aliens from outer space (68 points, 1 comment)
    9. That's one fuckin' nice kitty right there. (51 points, 0 comments)
    10. Stampedes, pepper spray, fist fights, shootouts, and death. This is Black Friday in the United States. (49 points, 4 comments)
  10. 1535 points, 23 submissions: themanwhosleptin
    1. The reason why The Simpsons are yellow is because the creator Matt Groening wanted them to be recognizable when you flip through channels on the TV (194 points, 7 comments)
    2. Shoes (189 points, 3 comments)
    3. On April Fool's Day 2014, NPR posted a fake article on its Facebook page titled "Why Doesn't America Read Anymore?" When clicking on the post, the article asks its readers to not comment on it. Not surprisingly, many people commented anyway. (167 points, 7 comments)
    4. Gran Torino (2008) - a film about an elderly racist Korean War vet, his Hmong neighbors, and their struggles with street gangs (115 points, 11 comments)
    5. Napoleon's Exile In Saint Helena (91 points, 2 comments)
    6. Munchkin - a card game that parodies tabletop RPGs) (90 points, 7 comments)
    7. Meet Brother Najeeb Michael, the monk who saved thousands of manuscripts from IS jihadists (66 points, 1 comment)
    8. The Jimmy Timmy Power Hour - a television crossover film trilogy set between the universes in The Adventures of Jimmy Neutron: Boy Genius and The Fairly OddParents (66 points, 2 comments)
    9. Tibetan Monks and Nuns Turn Their Minds Toward Science (51 points, 1 comment)
    10. The Rule of Thirds - a fundamental technique in photography (47 points, 0 comments)
  11. 1218 points, 14 submissions: justtoclick
    1. "Do it yourself doodler" album (359 points, 8 comments)
    2. If Harry Potter was an anime series (171 points, 37 comments)
    3. The Muppets explain Phenomenology (122 points, 4 comments)
    4. Hawaii Still Has a Leprosy Colony With Six Patients (94 points, 17 comments)
    5. David Bowie song 'Changes' inspired Brandon Flowers to form The Killers (59 points, 4 comments)
    6. Dave Barry’s 2015 Year in Review (57 points, 1 comment)
    7. U.S. Muslims to overtake Jews by 2026 (53 points, 9 comments)
    8. The Beatles Play Ed Sullivan: The Historic TV Appearance Heralding the British Invasion (52 points, 0 comments)
    9. The Evolution of Batman's Bat Symbol [Infographic] (51 points, 10 comments)
    10. Cycling With the Psycos -- Counterculture feminism in East L.A (48 points, 0 comments)
  12. 1191 points, 14 submissions: Lillyclown
    1. A Pocket Guide to Vaginal Euphemisms (197 points, 33 comments)
    2. The story behind the McDonalds hot coffee lawsuit (165 points, 28 comments)
    3. The Polish Beer Drinking Party (PPPP), orginally a satirical political party to promote beer, not vodka, and fight alcoholism, won 16 seats in the 1991 parliamentary election. Later splitting to Big Beer and Little Beer. (126 points, 6 comments)
    4. History of Color (115 points, 3 comments)
    5. The Chemistry of Ice Cream (89 points, 6 comments)
    6. 150 year old sunken steam boat's contents. Including still edible food! (87 points, 3 comments)
    7. The Strangest, Most Spectacular Bridge Collapse (65 points, 7 comments)
    8. All Blacks haka (61 points, 1 comment)
    9. The Poisoning of a City (61 points, 0 comments)
    10. British Police use Tea as a perfect analogy for sexual consent. (57 points, 9 comments)
  13. 1147 points, 14 submissions: Radu316
    1. There's a statue of Lenin at the Pole of Inaccessibility in Antarctica. It was on top of a Soviet research station in the 60s. Abandoned in '67, it was forgotten until 2007 when it was rediscovered by a team of explorers. By then, the statue was the only part still visible. (167 points, 2 comments)
    2. Strelka was one of the first animals in space to return safely. She became a sensation in the Soviet Union and had puppies with cosmo-dog Pushok. Nikita Khrushchev gave a puppy, Pushinka, to JFK as a gift. She also had puppies and Strelka's bloodline is still alive in the United States. (147 points, 7 comments)
    3. The Turk was an 18th century chess-playing automaton. It went on a tour of Europe and America, defeating noted chess players like Ben Franklin and Napoleon. After being destroyed in a fire, it was revealed to be a hoax - a person (usually a chessmaster) hid inside and operated it. (136 points, 10 comments)
    4. "Houston, we have a problem" is a slight misquote popularized by the Apollo 13 movie. The real line was actually "Houston, we've had a problem" and was first said by astronaut John Swigert, not mission captain Jim Lovell. (115 points, 14 comments)
    5. Marginalia are all the various scribbles and comments made in margins of books or documents. In medieval times, religious texts written by nuns and monks featured marginalia with all sorts of vulgar images and dirty jokes. (96 points, 5 comments)
    6. Brain crater on Mars. The bizarre texture of the crater floor makes it resemble a brain. NASA worked out that, at 0.6 miles wide, the brain is about the right size to fit inside the mound known as the Face of Mars. (90 points, 0 comments)
    7. Statue of Alexander the Great taming Bucephalus. Bucephalus is often regarded as the most famous (real) horse in history. According to Plutarch, the horse died at the Battle of the Hydaspes in 326 BC. Afterwards Alexander founded the city of Bucephalia in his honor somewhere in modern day Pakistan. (81 points, 4 comments)
    8. Pretty much everything there is to know about tartan (aka plaid in America). The pattern of the kilt can be used to display your family background, royal lineage, service in specific branches of the military, even your name. You can even register new ones at the Scottish Register of Tartans. (79 points, 4 comments)
    9. "There's a sucker born every minute" is a quote attributed to P.T. Barnum, but it was actually said by David Hannum, one of his competitors. Hannum said it referring to people who paid to see Barnum's Cardiff Giant instead of his original, not realizing that both were fake. (60 points, 0 comments)
    10. Heart of Neolithic Orkney is a 5,000-year old world heritage site in Scotland. It includes four monuments: two ceremonial stone circles, a tomb and a former village called Skara Brae. Skara Brae is sometimes called "Scottish Pompeii" because it is so well-preserved. (47 points, 2 comments)
  14. 1128 points, 13 submissions: StochasticLife
    1. Banned until the 1980's, rock music in the USSR was smuggled around the country on records made from X Ray film. They were called 'Ribs' or 'Bone Records'. (216 points, 14 comments)
    2. Lithuania has only ever had a single king, Mindaugus. He was crowned king in 1251 and assassinated in 1263. (157 points, 5 comments)
    3. Russian had a monopoly on Vodka for over 400 years (1540's - 1992) and at one point Vodka sales made up 40% of the state's revenue (130 points, 8 comments)
    4. A nickelodeon was a hastily assembled movie theater, often setup in converted store fronts, that charged a nickle for admission. They were most popular between 1905 and 1915.) (114 points, 0 comments)
    5. Christopher Hitchen's video - Mother Theresa Hell's Angel, a critical look at her political relationships and the nature of her charitable practices. (109 points, 11 comments)
    6. Zatoichi, about a blind swordsmen, is one of Japan longest running film and TV series with over 27 films and 100 TV Episodes. (91 points, 6 comments)
    7. The oldest (surviving), and largest, Baha'i house of worship is in Wilmette Illiniois.) (64 points, 8 comments)
    8. Some humans (all women) are tetrachromats and are capable of seeing millions of colors the rest of us can't see (60 points, 10 comments)
    9. Geddy Lee of Rush was born in Canada to parents who were Polish Immigrants and holocaust survivors of Auschwitz, Dachu, and Bergen-Belsen. (50 points, 2 comments)
    10. North Korea prints the best counterfeit $100 (USD) bills in the world; they have been dubbed the 'Supernote' (45 points, 0 comments)
  15. 910 points, 8 submissions: frigate
    1. Salmon farmers choose the desired orangness-pinkness of their product from a colour chart (SalmoFan) provided by a company which supplies the food dyes to colour farmed salmon that would otherwise be gray, khaki, pale yellow, or pale pink (191 points, 10 comments)
    2. Kurt Vonnegut humorously graphs the shapes of stories (162 points, 5 comments)
    3. The Highway Hi-Fi: the short-lived record player designed for use in automobiles in the 1950's (155 points, 10 comments)
    4. H&M is making a $99 wedding dress. Here’s what that says about economics. (138 points, 43 comments)
    5. How a Math Genius Hacked OkCupid to Find True Love (100 points, 18 comments)
    6. A few of the most impressive and iconic pipe organs from around the world (81 points, 3 comments)
    7. Truth and Reconciliation Commission: By the numbers – The odds of a child dying in a residential school were about the same as a Canadian soldier dying in World War 2 (48 points, 2 comments)
    8. Gordon Lightfoot superfans cherish every show – "Lightfoot lifers" are fans of Gordon Lightfoot who see as many performances as possible (35 points, 1 comment)
  16. 854 points, 5 submissions: CryptoCollectibles
    1. Cows Playing With Hay .gif (351 points, 24 comments)
    2. Super Antics #8 by Kerry Callen (303 points, 18 comments)
    3. This Ad for /Bitcoin made Two Years Ago, As relevant today as ever describing CryptoCurrency (114 points, 3 comments)
    4. How to Draw Teenage Mutant Ninja Turtles from 1986 (43 points, 1 comment)
    5. DIY: 25 Wearable Geek Projects You Can Knit or Crochet (43 points, 0 comments)
  17. 698 points, 7 submissions: goofballl
    1. Hongdae's (in Seoul) Love Museum features a single exhibit on the history of pornography in Korea. The rest of the museum is taken up with interactive sex-related photo ops. (203 points, 6 comments)
    2. Last known VCR maker stopped production in July, 40 years after VHS format launch (140 points, 9 comments)
    3. Although the exact cause for vitiligo remains unknown, it is thought to be caused by the immune system attacking and destroying the melanocytes of the skin. It famously affected Michael Jackson, causing sections of his skin to lighten over time. (106 points, 13 comments)
    4. Utchari, one of the most difficult moves in sumo, requires a wrestler to lift their opponent entirely off the ground and throw him behind and to the side. (89 points, 7 comments)
    5. Yamadera (lit. mountain temple) is a temple complex found in Yamagata Prefecture after a thousand step climb. It's where the poet Matsuo Basho penned his famous haiku: In the stillness/the cry of the cicada/penetrates the rock. (88 points, 10 comments)
    6. Cauliflower ear occurs when a blood clot forms between ear cartilage and connective tissue. This causes the cartilage to die, creating a deformity common to grappling sports like wrestling. (39 points, 3 comments)
    7. Guillain–Barré syndrome is an autoimmune disorder in which the body's immune system mistakenly attacks the peripheral nerves and damages their myelin insulation. During the disease, only a third of afflicted people are able to walk, and the exact cause of the disease can remain unknown. (33 points, 0 comments)
  18. 698 points, 7 submissions: E_Pluriscoop_Unum
    1. Roger Ebert: "Ponyo [is] one of the very rare movies where I want to sit in the front row, to drown in it. This is more than “artistry.” It is art." (211 points, 11 comments)
    2. Chocolate Rain - Tay Zonday (138 points, 7 comments)
    3. Billy West, the voice of Nickelodeon, talking about some of his voices. (122 points, 7 comments)
    4. Pingu - A beloved children's show from Switzerland (68 points, 5 comments)
    5. Nümberwang - Mitchell & Webb (58 points, 0 comments)
    6. A point about drawing swords (57 points, 3 comments)
    7. Werner Herzog's Disoriented Penguin (44 points, 3 comments)

Top Commenters

  1. wil (3635 points, 155 comments)
  2. 0and18 (584 points, 284 comments)
  3. wormspermgrrl (350 points, 214 comments)
  4. joelschlosberg (334 points, 58 comments)
  5. twitch1982 (222 points, 19 comments)
  6. balrogath (218 points, 36 comments)
  7. justtoclick (216 points, 38 comments)
  8. sverdrupian (199 points, 31 comments)
  9. appropriate-username (154 points, 49 comments)
  10. jaykirsch (151 points, 51 comments)
  11. davidystephenson (145 points, 7 comments)
  12. mrekted (138 points, 5 comments)
  13. no-fun-at-parties (136 points, 17 comments)
  14. Neebat (128 points, 17 comments)
  15. ceegee1975 (112 points, 45 comments)
  16. Disaster_Area (111 points, 4 comments)
  17. markevens (108 points, 8 comments)
  18. raendrop (107 points, 11 comments)
  19. Hazlzz (103 points, 6 comments)
  20. sunnieskye1 (99 points, 14 comments)
  21. Otterfan (96 points, 9 comments)
  22. sbroue (95 points, 18 comments)
  23. xkcd_transcriber (95 points, 11 comments)
  24. DnMarshall (95 points, 5 comments)
  25. rlbond86 (94 points, 15 comments)

Top Submissions

  1. An adult oyster is capable of filtering 25-50 gallons of water a day. by sverdrupian (1030 points, 72 comments)
  2. I was a child star in the 80s. AMA by wil (574 points, 535 comments)
  3. Legendary con man, scam artist, and forger Frank Abagnale Jr. pictured in the pilots seat of a Pan Am airliner. He flew over 1,000,000 miles while wearing a Pan Am uniform. He was never their employee, nor was he a pilot. by mrekted (484 points, 24 comments)
  4. "We come in peace" by appropriate-username (470 points, 10 comments)
  5. The anime Ghost Stories was a mediocre show without much to write home about. However, when it came time to translate it to English, the dub team was given enough leeway that they pretty much parodied the original material. The results are hilarious. by selfproclaimed (439 points, 38 comments)
  6. During Florida winters, manatees flock to nuclear and coal power plants for the warm water discharges. by wormspermgrrl (414 points, 29 comments)
  7. A brief Batman comic by Czarry (396 points, 8 comments)
  8. actress Linda Hamilton has a twin sister who made it possible for Terminator 2 to film some scenes in one camera shot without compositing by joelschlosberg (396 points, 15 comments)
  9. "Do it yourself doodler" album by justtoclick (359 points, 8 comments)
  10. Ben Franklin's daily schedule by joelschlosberg (353 points, 29 comments)

Top Comments

  1. 175 points: wil's comment in I was a child star in the 80s. AMA
  2. 137 points: wil's comment in I was a child star in the 80s. AMA
  3. 135 points: wil's comment in I was a child star in the 80s. AMA
  4. 101 points: wil's comment in I was a child star in the 80s. AMA
  5. 101 points: wil's comment in I was a child star in the 80s. AMA
  6. 92 points: wil's comment in I was a child star in the 80s. AMA
  7. 92 points: wil's comment in I was a child star in the 80s. AMA
  8. 87 points: deleted's comment in Cause of Death for Yuri Gagarin, 1st Man in Space, Finally Revealed
  9. 86 points: markevens's comment in Woman ruins marriage on game show and still loses
  10. 84 points: wil's comment in I was a child star in the 80s. AMA
Generated with BBoe's Subreddit Stats (Donate)
submitted by subreddit_stats to subreddit_stats [link] [comments]

What the NSA really thinks of Tor

This NSA Top Secret document includes an official declaration by the NSA about whether Tor protects Tor users and keeps Tor users anonymous. A URL at the bottom of this post leads to a true copy in the Guardian of the NSA document, which is from the Snowden archives.
Excerpt of text in NSA document, pages 1 and 2:
TOP SECRET//COMINT//REL FVEY
Stinks
CT SIGDEV
JUN 2012
Declassify On: 20370101
TOP SECRET//COMINT//REL FVEY
TOP SECRET//COMINT//REL FVEY
Tor Stinks...(u)
We will never be able to de-anonymize all Tor users all the time. With manual analysis we can de-anonymize a very small fraction of Tor users, however, no success de-anonymizing a user in response to a TOPI request/on demand.
TOP SECRET//COMINT//REL FVEY
On 4 Nov 2013, a Guardian article included a report on the increasing use of Tor after NSA whistle blower Edward Snowden revealed NSA Top Secret documents in June 2013: "What is Tor? A beginner's guide to the privacy tool"
According to the Tor Project's own figures, between 19 August and 27 August alone, which was about 2 months after Snowden's revelations, the number of people using Tor more than doubled to 2.25 million before peaking at nearly 6 million in mid-September. It has since slipped back to just over 4 million.
Since June 2013, how many people have learned for the first time about Tor and Tails, especially since the acclaimed documentary film Citizenfour received an Academy Award on 22 February 2015. At the end of the film, which stars Edward Snowden and others, the film credits acknowledge that Tor and Tails played a role in making the film possible.
How many people use Tor today. 4 million? 10 million? 50 million? 100 million? More? Less? Who knows? Whatever the number, the NSA does not like the fact that people outside of the intelligence community use Tor in the United States and other countries around the world.
On March 12, 2013, the United States Congress Senate Select Committee on Intelligence convened a public hearing. Cable television covered the live hearing. Senator Ron Wyden was present at the hearing as a member of the committee, which had summoned United States Director of National Intelligence James Clapper to answer questions and give official testimony before Congress about whether the United States government was spying on millions of people in the United States. Senator Wyden asked Director Clapper the following question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Clapper lied and said “No...”
This lie by one of the top ranking officials in the United States intelligence community begs the following questions:
Would the NSA disseminate misleading or false information on the Internet to discourage the public from using Tor? Would the NSA disseminate misleading or false information that states the public should not use Tor because it is dangerous to use Tor, and Tor is not effective? Would someone working for the NSA post misleading or false information about Tor and Tails on the Reddit web site or other sites to discourage the public from using Tor?
On Oct 2, 2013, the United States Federal Bureau of Investigation made the high-profile arrest of Ross William Ulbricht, who was the founder and operator of the Silk Road web site. That same month, the Federal Bureau of Investigation shut down the web site. About 2 years 8 months before Ulbricht's arrest, Ulbricht launched the Silk Road site in February 2011. The Silk Road site was a criminal enterprise where many types of illegal drugs, many other illegal items, and many illegal services were available for purchase.
Ulbricht was a Tor user, and his Silk Road web site was a Tor Hidden Service, which means that the web site was available only on the Tor Network. The Silk Road site was not in any Internet search engine index. Ulbricht used Tor to engage in most or all of his illegal transactions, and his Silk Road site used Tor for all transactions.
In the summer of 2013, the Silk Road web site had 957,000 registered user accounts. During the period that the Silk Road was online, the total value of the purchases on the site amounted to USD $1.2 billion. Ulbricht's commissions on those transactions amounted to USD $80 million. All transactions were in Bitcoin.
The pursuit, tracking, and identification of Ulbricht involved the United States Federal Bureau of Investigation, the United States Drug Enforcement Administration, the United States Internal Revenue Service, and the United States Homeland Security Investigations agency. Those government departments and agencies might have expended up to tens or hundreds of millions of dollars and tens of thousands of man hours or more to track and eventually identify Ulbricht and his location. The successful tracking, identification, and location of Ulbricht by the United States government was not due to any technical or system vulnerabilities in Tor.
After expending immense resources and capital over an extended period, the United States government eventually was able to identify Ulbricht's real name and location because Ulbricht foolishly posted his email address: rossulbricht[at]gmail.com and the name Silk Road in a bitcointalk.org public forum where the whole world, including the FBI, could read Ulbricht's Gmail address next to the Silk Road name.
The FBI went to Google, and Google gave information from Ulbricht's Gmail account and information from his Google+ account to the Federal Bureau of Investigation. That account information included Ulbricht's home address. No weakness in Tor brought down Ross William Ulbricht. He brought himself down by revealing his real identity on a popular web site forum.
During Ulbricht's trial in a Manhattan, New York federal court, prosecutors alleged that Ulbricht paid $730,000 to other people to have them murder six people. No one actually murdered any of Ulbricht's intended victims. Ultimately, the government did not prosecute Ulbricht for any of the alleged murders. Some of the information that the government investigation uncovered showed that Ulbricht paid one person USD $150,000 to kill a person who was attempting to blackmail Ulbricht. The blackmailer told Ulbricht that he would reveal online the names and addresses of thousands of Silk Road's biggest customers and vendors unless Ulbricht paid him USD $500,000. The government found no evidence that Ulbricht's hired killer actually killed anyone. On the surface, it appears that the blackmailer and the hired-killer might be the same person, and the person scammed Ulbricht out of USD $150,000.
On May 29, 2015, a federal court in Manhattan, New York, handed Ulbricht five sentences, including two sentences for life imprisonment without the possibility of parole. The court also ordered that Ulbricht forfeit USD $183,000,000. Ulbricht is now serving his sentences. As of June 2015, Ulbricht is under incarceration at Metropolitan Detention Center, Brooklyn, New York.
The point of this post is not to celebrate Ulbricht or his criminal activities. The point is to illustrate that although the United States government expended huge amounts of resources and capital to track and eventually identify Ulbricht and his location, his capture had nothing to do with any weakness in Tor.
If a Tor or Tails user, such as a political dissident living under an oppressive regime, a government whistle blower, or any law abiding person, knows how to use Tor and Tails correctly and avoids making mistakes that reveal his or her name and location, that person and his or her location are likely to remain anonymous and unknown to any cyber spies, web information brokers, or cyber trackers.
Maybe all Internet users who value their right to privacy, right to anonymity, and right to be free from cyber tracking should use Tor and/or Tails. Maybe we should not be obedient, should not give up our right to privacy, should not give up our right to be anonymous, and should not submit to life under a surveillance police state. People under the Soviet Union, Nazi Germany, and North Korea submitted. Look what happened to them.
– LINKS --
4 Oct 2013, The Guardian "'Tor Stinks' presentation - read the full document": www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
5 Nov 2013 The Guardian "What is Tor? A beginner's guide to the privacy tool" www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser
Wikipedia, James R. Clapper: https://en.wikipedia.org/wiki/James_R._Clapper
Wikipedia, Silk Road: https://en.wikipedia.org/wiki/Silk_Road_%28marketplace%29#Arrest_and_trial_of_Ross_William_Ulbricht
Wikipedia, Ross William Ulbricht: https://en.wikipedia.org/wiki/Ross_William_Ulbricht
Beginning on Page 24, this Sealed Complaint has a detailed description of each of Ulbricht's personal mistakes and blunders that enabled the United States government to track, identify, and locate Ulbricht due to the fact that he revealed his real identity on a popular web site forum and made other unnecessary and avoidable mistakes and blunders. This court document is on the Columbia University web site.
Sealed Complaint United States Magistrate Judge Southern District of New York United States v. Ross William Ulbricht: www.cs.columbia.edu/~smb/UlbrichtCriminalComplaint.pdf
submitted by smoothgravity to privacy [link] [comments]

Tales From the Crypto @axlcrypto

I wanted to start a topic about history of bitcoin and tales from the crypto! Most bizarre unusual things happen in Bitcoins Magic World! Please post your story, a link, a photo, something happened to you or someone else in this bizarre new world! From bitcoin creation by http://en.wikipedia.org/wiki/Satoshi_Nakamoto till now!
Some classics :
7,500 Bitcoins are Thrown Out with a Hard Drive! http://www.theguardian.com/technology/2013/nov/27/hard-drive-bitcoin-landfill-site
The pizza cost 750.000$! http://motherboard.vice.com/blog/this-pizza-is-worth-750000
1000btc stolen 500 btc bounty http://nxter.org/500-btc-bounty-for-lost-nxt-btc/
Silk Road http://en.wikipedia.org/wiki/Silk_Road_(marketplace)
Silk Road hitman http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/02/silk-roads-mastermind-allegedly-paid-80000-for-a-hitman-the-hitman-was-a-cop/
The man who bought 5.000btc for 27$ http://www.theguardian.com/technology/2013/oct/29/bitcoin-forgotten-currency-norway-oslo-home
This guy says he is giving 100 btc tell him why !?! https://bitcointalk.org/index.php?topic=723463.0
Provo couple to document 'Life on Bitcoin' ! http://www.deseretnews.com/article/765631895/Provo-couple-to-document-Life-on-Bitcoin.html
80btc around the world! https://bitcoinstarter.com/projects/947
First Bitcoin Baby! https://bitcoinstarter.com/projects/946
Bitcoins in space ! http://www.virgin.com/richard-branson/bitcoins-in-space
First cop accepting bitcoins ! http://www.hazard-herald.com/news/home_top-news/2822997/Vicco-approves-measure-to-pay-police-chief-in-Bitcoin
First University accepting Bitcoins , Bitcoin Master added http://www.unic.ac.cy/digitalcurrency
Guns for bitcoins! http://news.yahoo.com/u-arrests-man-selling-guns-online-bitcoins-214929763.html
Bitcoin Assasination Market http://www.forbes.com/sites/andygreenberg/2013/11/18/meet-the-assassination-market-creator-whos-crowdfunding-murder-with-bitcoins/
Homeless surviving on Bitcoins! http://www.wired.com/2013/09/bitcoin-homeless/all/
15 year old kid make 100.000$ from bitcoins http://www.businessinsider.com/15-year-old-kid-launches-education-startup-with-bitcoin-fortune-2014-6
Wikileaks bitcoin http://www.forbes.com/sites/jonmatonis/2012/08/20/wikileaks-bypasses-financial-blockade-with-bitcoin/
Bitcoin Hacks! http://www.theguardian.com/technology/2014/ma18/history-of-bitcoin-hacks-alternative-currency
Bitcoin MMA! http://www.kitco.com/news/2014-07-18/Bitcoin-Brands-Inc-to-Sponsor-MMA-Legend-Phil-Baroni.html
Bitcoin ransomware malware! http://en.wikipedia.org/wiki/CryptoLocker
Bitcoinica thief! http://bitcoinmagazine.com/1330/the-strange-antics-of-the-bitcoinica-thief/
Bitcoin for homeless! http://www.wired.com/2014/06/bitcoin-run-jason-king/
Heart beat unlocks bitcoin wallet! http://www.wired.com/2014/02/nymi/
Bitcoin game show! http://finance.yahoo.com/news/streamin-garage-launches-first-bitcoin-123000238.html?soc_src=mediacontentstory
Mining Harvard! http://www.wired.com/2014/02/harvard-dogecoin/
Bitcoin for Cannabis! http://www.coindesk.com/washington-dispensary-now-takes-bitcoin-cannabis/
Bitcoin 3d printed gun! http://www.forbes.com/sites/andygreenberg/2013/05/05/meet-the-liberator-test-firing-the-worlds-first-fully-3d-printed-gun/
Bitcoin Laundry http://www.wired.com/2013/08/bitocoin_anonymity/
Bitcoin thefts scams hacks! https://bitcointalk.org/index.php?topic=576337.0
Bitcoin road trip! https://bitcointalk.org/index.php?topic=556038.0 - https://en.bitcoin.it/wiki/Bitcoin_Road_Trip
Bitcoin House auction! https://bitcointalk.org/index.php?topic=199199.60
Bitcoin 8000 convenience in Argentina! http://www.coindesk.com/bitpagos-brings-bitcoin-8000-convenience-stores-ripio/
Bitcoin Canadian hacker! https://bitcointalk.org/index.php?topic=736857
Hackers Steal $1.65 Million in NXT from BTER Exchange! http://www.coindesk.com/bter-nxt-bitcoin-exchange-hack/
Bitcoin in space! https://bitcointalk.org/index.php?topic=496829.20
Bitcoin family road trip https://www.yahoo.com/tech/this-family-is-road-tripping-using-only-bitcoin-89813939049.html
Share your story!
submitted by axlcrypto to Bitcoin [link] [comments]

From Bitcoin To Hedera Hashgraph (Documentary) Hidden Secrets Of Money Episode 8 Is it too late to buy Bitcoin?  My Perspective Buy Bitcoin easly in 1 min with paypal How Low Will Bitcoin Go? Bitcoin is History In The Making - Mike Maloney

(2013). “When perhaps the real problem is money itself!”: the practical materiality of Bitcoin. Social Semiotics: Vol. 23, Charting, Tracking, and Mapping, pp Contribute to bitcoin/bips development by creating an account on GitHub. Commits on Nov 10, 2014 BIP65 assigned for CHECKLOCKTIMEVERIFY. petertodd committed Nov 10, 2014. Verified This commit was signed with a verified signature. 29 August 2013 On Nov, 29 we launched a week-long Black Friday promotion.This time it was different. For the very first time you could purchase account upgrades with Bitcoin and we would give a 50% discount to those paying with Bitcoin. Optimistically speaking, we have learned there definitely is a huge potential in Bitcoin payments, but it still needs to be unleashed. Nov 2013 $350 — $1,242 from October $150–$200 in November, rising to $1,242 on 29 November 2013. Dec 2013 $600 — $1,000 Price crashed to $600, rebounded to $1,000, crashed again to the $500 range. Stabilized to the ~ $650–$800 range. Jan 2014 $750 — $1,000 *** WARNING *** We are investigating a problem. DO NOT TRUST ANY TRANSACTIONS THAT HAPPENED AFTER 15.08.2010 17:05 UTC (block 74638) until the issue is resolved.

[index] [5026] [15537] [21830] [26328] [8780] [14538] [23119] [24328] [26987] [11372]

From Bitcoin To Hedera Hashgraph (Documentary) Hidden Secrets Of Money Episode 8

What do you think about Bitcoin at these levels? Are you optimistic for the short term? Are you tired of the forks? Feel free to leave a comment below! Thank you all so much for watching the video ... Bitcoin is monetary history in the making. But as Mike Maloney points out in this latest video, many of the investors in cryptocurrencies are new to the arena. Unfortunately, most have no idea how ... Published on Nov 29, 2017. James Altucher, Formula Capital managing director, and Spencer Bogart, Blockchain Capital managing director, break down what drives the bitcoin demand, its use and ... 00:40 Mastering Bitcoin and The Internet of Money Book 05:00 History of Bitcoin - Satoshi Nakamoto 07:04 What is Bitcoin? 10:32 Bitcoin Software, Network, and Currency 11:26 Forms of money 15:01 ... Published on Nov 5, 2013 Vitalik Buterin explains what quantum computers are, what they can and cannot do, and the implications they may have to the future of Bitcoin. The lecture took place on ...

Flag Counter