Creating a Bitcoin Bank in Less Than Thirty Minutes With a ...
Creating a Bitcoin Bank in Less Than Thirty Minutes With a ...
Best Linux distributions for mining Bitcoin and other ...
8 Best Cryptocurrency Mining Tools for Linux
How To Store Bitcoin On USB Stick - What is Bitcoin ...
5 Best USB Bitcoin Miners 2020 – Reviews & Buying Guide
Electrum on Puppy Linux - Bootable USB with Offline Bitcoin Wallet
Here is the video how to do it and the copied short description: https://youtu.be/RBlpWhLVbZo It took me 3 days to find solution that works. If you like it, send any amount of bitcoin to: 1GHaTVyJo8wG4VqdTevyZa7xSyicMGLikj Steps:
Why don't more people use/discuss Linux Live USB drives with bitcoin wallet installed?
I'm new to bitcoin and I have been looking into safe options for wallets. My first solution was the just use a spare phone I had, which didn't seem safe enough. My second solution was to install the bitcoin software on a usb drive and plug it in/run it directly from the drive when I needed to. This also didn't seem safe since you're plugging it into a running machine. The final solution aside from buying something like the ledger nano s was to just install a Live Linux distro with persistence and install the wallet onto there so at least I could boot from it directly and run the wallet on a fresh OS all the time. I guess my question is, why isn't this option discussed more as of late? It seems that most of the posts I'm pulling up are 2-3 years old. Is there something I am missing as a newbie to crypto currencies?
bitkey.io - "A self-contained Live CD/USB key with everything you need to perform highly secure air-gapped Bitcoin transactions. Offline cold storage made (slightly more) practical.". It's a project related to the Turnkey (Linux based virtual machines that can be run on Virtualbox et al.) project.
Issues with running Bitcoin from a Linux live USB.
So I'm definitely a newbie at this so before wasting any more time than I already have I thought I'd ask if anyone could suggest my next step. I first tried with a Mint distro to no avail. I just tried with Uberstudent since I wanted to check out the distro and everything was going fine (besides a super slow synchronization) until I had about 800 blocks left to download and I started getting messages about not having any disk space left. I deleted some software apps to free up some space but only was able to get a few more blocks. So my question is basically this, would it be better to create a new live USB with a really light distro, like Puppy Linux, in hopes I would have enough memory for the whole blockchain or should I just use a lighter client that doesn't require downloading to synchronize, such as Armory I believe. My live USB creator doesn't allow persistence greater than 4gb, so I'm only using a 4gb stick. Alternatively I could use a distro designed for bitcoin like BitSafe or LinuxCoin if anyone has had any good experiences with those. Thanks in advance for any responses.
Actually Making a bootable USB with linux for bitcoin wallets
Okay, theres lots of website that tell you to make a bootable Linux USB for cold storage. Great idea. Except those same websites tell you tro use Puppy linux (because its small) and electrum (because it can work offline without the whole coin chain). Cool.. except electrum wont work on puppy. So its all bullshit. What I want to ask is, has anyone ACTUALLY in REALITY made a bootable USB with linux for use with bitcoin? And if so what linux dist did you use and which bitcoin wallet software did you use? Bitcoin is never going to adopted by the mainstream if the instructions given to people are overly complicated or wrong or both.
Edit: Currently writing a new version of this, dont know when it will be done. Edit: Since first post I have updated a few sections with additional information. I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful. I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips) Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful. I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both. -------- Everyday Simple Info Sec:
Password for the device is an obvious one (8+ characters minimum, best if over +12), if there is sensitive information on any of the drives, either encrypt the entire drive or just the sensitive files, and make encrypted backups on a different memory storage device (There many programs to encrypt files and drives I'm sure a search will figure it out)
-There could be a hidden administrator user on your PC, make sure to change its password
Always use the device on a non admin account
a VPN that doesn't log (use with kill switch on, should be enough for everyday stuff, more safe stuff in the high security section) (VPNs that claim they don't log sometimes do, it's bad, but I would like to point out that not using a VPN will always expose your traffic to your ISP and also remove additional encryption. Even if the VPN tracks, there is no downside because your ISP would track anyways, and VPNs can be more anonymous, and also add extra encryption)
disable location tracking (preferably make all your privacy setting to release minimal info, get rid or cortana, change privacy settings in all of your accounts as well, there's no reason why you should allow Facebook to give you target ads. Use the setting they give you.
TOR, Firefox or similar browser, stay the fuck away from Google Chrome.
your preferred search engine should be duckduckgo (other privacy focused search engines exist as well)
use an adblocker that also prevents the adding of tacking cookies
Use pgp with all your friends or messaging services that implemented end to end encryption (Implemented services can still be bypassed, but are way more convenient so for everyday use they should suffice, some examples should be Telegraph, Signal, WhatsApp etc) (more info on pgp in high security section)
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted) -Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
use software (like ccleaner) that purges cookies and other data after every use, before shutting down your device
use a virus scanner daily (I like spy bot Search and destroy, many other options also exist)
never use the same password/passphrase twice (I will address what passphrase are below) (Better yet use randomized passwords that are stored in a master key chain, make them as long as possible (tho it is okay to go with the minimum of 12 never go below 7, I recommend 15+ depending on how often you have to manually enter the password instead of copying/pasting it) Don't generate too long keys for things you need to access regularly without copy/paste, except your master key ring)
its ideal to never use the same email or username as well, especially username, email is obviously tricky and also very annoying, but it would be best to always change the email.
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password) -use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
for your main password manager(key ring), I highly recommend Keepass 2, make backups of the file save to separate devices and drives (Flash drives, phone, PC, laptop, etc, if you loose that file, you lose all of your passwords) (Other good password managers exist as well, I don't recommend online password managers as you lose the control over passwords)
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good. -Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
Any account that is supposed to remain anonymous and as secure as possible should only be used on secured devices. A unsecured device can link you to the account.
always shutdown your machine when leaving it (To prevent access, and to prevent a possible attack vector)
2 factor factor authentication is not great anymore. Unless you can do it over a anonymous source. A cell phone is usually directly connected to you, so it is not a anonymous device. There might still be secure/anonymous 2 factor authentication methods that won't expose you, for example over a secure email. (If there is 2FA that doesn't need a device that removes anonymity and is secure, use it.) (Please don't misunderstand, 2FA is great, however it can remove the anonymity that you worked hard to establish)
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question) -------_ High level crimimal information security: The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked. Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible. -Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
Do not EVER use a high security device at any lower level of security. There are unique identifiers to your device, exposing them once can expose you for everything you do.
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown) -Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities) -rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password) -Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade) -Never use accounts that have been exposed to lower security on higher security machines -your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak) -Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
set up a new pgp (can't use the same one you use for regular use, again less safer accounts are never used on safer devices) Cleopatra is my choice, its simple to use. Make sure you back up the private key multiple times, on safe devices. (Dont let the private key fall into anyone's hands) Give it a generic name like "HighSecurityPGP" do not give the pgp key pair a name that could identify you. (No initials etc) (Some pgp key pair programs want an associated email for a key pair, you can create a safe email, or which I recoend you can use a different program (like Cleopatra) (Feds & LEOs are known to copy private keys if they have your machine, so you will need to set up a new key pair if they ever take a device with a private key copy)
a high security machine that facilitates criminal activity can not use many programs. Many programs collect your devices mac adress, which is a unique identifier, amongst other things. It's should be used only for the activity you want to do.
-------_ How to use dark net markets (DNMs) If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential. Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money. -A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist) -Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature) -Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
I recommend using Monero, it's hard to track, so it makes your job a lot easier. (If you use bitcoin you should run it through a scrambler, because BTC is tracable to anyone who knows what they are doing)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
decide where you want to ship it. You can send to your home, to a PO box, to a PO box that you opened with a fake ID (I don't recommend), an abandoned house, general mail (sending to a post office instead of a street adress) pickup up with fake ID, use a remailing service. These are some options, sending it to your own home, isn't ideal, but its pretty much the only easy way.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen) -now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct. -wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in -test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews. Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask. No idea how long this will stay up, I might purge it in 7 days, or never.
What I currently use for privacy (after almost 2 years of long investing into it)
2975 points: deleted's comment in hentAI: Detecting and removing censors with Deep Learning and Image Segmentation
2772 points: I_DONT_LIE_MUCH's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
2485 points: api's comment in Stripe Workers Who Relocate Get $20,000 Bonus and a Pay Cut - Stripe Inc. plans to make a one-time payment of $20,000 to employees who opt to move out of San Francisco, New York or Seattle, but also cut their base salary by as much as 10%
2464 points: iloveparagon's comment in Google engineer breaks down the problems he uses when doing technical interviews. Lots of advice on algorithms and programming.
2384 points: why_not_both_bot's comment in During lockdown my wife has been suffering mentally from pressure to stay at her desk 100% of the time otherwise after a few minutes her laptop locks and she is recorded as inactive. I wrote this small app to help her escape her desk by periodically moving the cursor. Hopefully it can help others.
2293 points: ThatInternetGuy's comment in Iranian Maintainer refuses to merge code from Israeli Developer. Cites Iranian regulations.
2268 points: xequae's comment in I'm a software engineer going blind, how should I prepare?
2228 points: turniphat's comment in AWS forked my project and launched it as its own service
2149 points: Rami-Slicer's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
New England New England 6 States Songs: https://www.reddit.com/newengland/comments/er8wxd/new_england_6_states_songs/ NewEnglandcoin Symbol: NENG NewEnglandcoin is a clone of Bitcoin using scrypt as a proof-of-work algorithm with enhanced features to protect against 51% attack and decentralize on mining to allow diversified mining rigs across CPUs, GPUs, ASICs and Android phones. Mining Algorithm: Scrypt with RandomSpike. RandomSpike is 3rd generation of Dynamic Difficulty (DynDiff) algorithm on top of scrypt. 1 minute block targets base difficulty reset: every 1440 blocks subsidy halves in 2.1m blocks (~ 2 to 4 years) 84,000,000,000 total maximum NENG 20000 NENG per block Pre-mine: 1% - reserved for dev fund ICO: None RPCPort: 6376 Port: 6377 NewEnglandcoin has dogecoin like supply at 84 billion maximum NENG. This huge supply insures that NENG is suitable for retail transactions and daily use. The inflation schedule of NengEnglandcoin is actually identical to that of Litecoin. Bitcoin and Litecoin are already proven to be great long term store of value. The Litecoin-like NENG inflation schedule will make NewEnglandcoin ideal for long term investment appreciation as the supply is limited and capped at a fixed number Bitcoin Fork - Suitable for Home Hobbyists NewEnglandcoin core wallet continues to maintain version tag of "Satoshi v0.8.7.5" because NewEnglandcoin is very much an exact clone of bitcoin plus some mining feature changes with DynDiff algorithm. NewEnglandcoin is very suitable as lite version of bitcoin for educational purpose on desktop mining, full node running and bitcoin programming using bitcoin-json APIs. The NewEnglandcoin (NENG) mining algorithm original upgrade ideas were mainly designed for decentralization of mining rigs on scrypt, which is same algo as litecoin/dogecoin. The way it is going now is that NENG is very suitable for bitcoin/litecoin/dogecoin hobbyists who can not , will not spend huge money to run noisy ASIC/GPU mining equipments, but still want to mine NENG at home with quiet simple CPU/GPU or with a cheap ASIC like FutureBit Moonlander 2 USB or Apollo pod on solo mining setup to obtain very decent profitable results. NENG allows bitcoin litecoin hobbyists to experience full node running, solo mining, CPU/GPU/ASIC for a fun experience at home at cheap cost without breaking bank on equipment or electricity. MIT Free Course - 23 lectures about Bitcoin, Blockchain and Finance (Fall,2018) https://www.youtube.com/playlist?list=PLUl4u3cNGP63UUkfL0onkxF6MYgVa04Fn CPU Minable Coin Because of dynamic difficulty algorithm on top of scrypt, NewEnglandcoin is CPU Minable. Users can easily set up full node for mining at Home PC or Mac using our dedicated cheetah software. Research on the first forked 50 blocks on v1.2.0 core confirmed that ASIC/GPU miners mined 66% of 50 blocks, CPU miners mined the remaining 34%. NENG v1.4.0 release enabled CPU mining inside android phones. Youtube Video Tutorial How to CPU Mine NewEnglandcoin (NENG) in Windows 10 Part 1 https://www.youtube.com/watch?v=sdOoPvAjzlE How to CPU Mine NewEnglandcoin (NENG) in Windows 10 Part 2 https://www.youtube.com/watch?v=nHnRJvJRzZg How to CPU Mine NewEnglandcoin (NENG) in macOS https://www.youtube.com/watch?v=Zj7NLMeNSOQ Decentralization and Community Driven NewEnglandcoin is a decentralized coin just like bitcoin. There is no boss on NewEnglandcoin. Nobody nor the dev owns NENG. We know a coin is worth nothing if there is no backing from community. Therefore, we as dev do not intend to make decision on this coin solely by ourselves. It is our expectation that NewEnglandcoin community will make majority of decisions on direction of this coin from now on. We as dev merely view our-self as coin creater and technical support of this coin while providing NENG a permanent home at ShorelineCrypto Exchange. Twitter Airdrop Follow NENG twitter and receive 100,000 NENG on Twitter Airdrop to up to 1000 winners Graphic Redesign Bounty Top one award: 90.9 million NENG Top 10 Winners: 500,000 NENG / person Event Timing: March 25, 2019 - Present Event Address: NewEnglandcoin DISCORD at: https://discord.gg/UPeBwgs Please complete above Twitter Bounty requirement first. Then follow Below Steps to qualify for the Bounty: (1) Required: submit your own designed NENG logo picture in gif, png jpg or any other common graphic file format into DISCORD "bounty-submission" board (2) Optional: submit a second graphic for logo or any other marketing purposes into "bounty-submission" board. (3) Complete below form. Please limit your submission to no more than two total. Delete any wrongly submitted or undesired graphics in the board. Contact DISCORD u/honglu69#5911 or u/krypton#6139 if you have any issues. Twitter Airdrop/Graphic Redesign bounty sign up: https://goo.gl/forms/L0vcwmVi8c76cR7m1 Milestones
Sep 3, 2018 - Genesis block was mined, NewEnglandcoin created
Sep 8, 2018 - github source uploaded, Window wallet development work started
Sep 11,2018 - Window Qt Graphic wallet completed
Sep 12,2018 - NewEnglandcoin Launched in both Bitcointalk forum and Marinecoin forum
Sep 14,2018 - NewEnglandcoin is listed at ShorelineCrypto Exchange
Sep 17,2018 - Block Explorer is up
Nov 23,2018 - New Source/Wallet Release v1.1.1 - Enabled Dynamic Addjustment on Mining Hashing Difficulty
Nov 28,2018 - NewEnglandcoin became CPU minable coin
Nov 30,2018 - First Retail Real Life usage for NewEnglandcoin Announced
Dec 28,2018 - Cheetah_Cpuminer under Linux is released
Dec 31,2018 - NENG Technical Whitepaper is released
Jan 2,2019 - Cheetah_Cpuminer under Windows is released
Jan 12,2019 - NENG v1.1.2 is released to support MacOS GUI CLI Wallet
Jan 13,2019 - Cheetah_CpuMiner under Mac is released
Feb 11,2019 - NewEnglandcoin v1.2.0 Released, Anti-51% Attack, Anti-instant Mining after Hard Fork
Mar 16,2019 - NewEnglandcoin v126.96.36.199 Released - Ubuntu 18.04 Wallet Binary Files
Apr 7, 2019 - NENG Report on Security, Decentralization, Valuation
Apr 21, 2019 - NENG Fiat Project is Launched by ShorelineCrypto
Sep 1, 2019 - Shoreline Tradingbot project is Launched by ShorelineCrypto
Dec 19, 2019 - Shoreline Tradingbot v1.0 is Released by ShorelineCrypto
Jan 30, 2020 - Scrypt RandomSpike - NENG v1.3.0 Hardfork Proposed
Feb 24, 2020 - Scrypt RandomSpike - NENG core v1.3.0 Released
Jun 19, 2020 - Linux scripts for Futurebit Moonlander2 USB ASIC on solo mining Released
Jul 15, 2020 - NENG v1.4.0 Released for Android Mining and Ubuntu 20.04 support
Jul 21, 2020 - NENG v188.8.131.52 Released for MacOS Wallet Upgrade with Catalina
Jul 30, 2020 - NENG v184.108.40.206 Released for Linux Wallet Upgrade with 8 Distros
Aug 11, 2020 - NENG v220.127.116.11 Released for Android arm64 Upgrade, Chromebook Support
Aug 30, 2020 - NENG v18.104.22.168 Released for Android/Chromebook with armhf, better hardware support
2018 Q3 - Birth of NewEnglandcoin, window/linux wallet - Done
2018 Q4 - Decentralization Phase I
Blockchain Upgrade - Dynamic hashing algorithm I - Done
Cheetah Version I- CPU Mining Automation Tool on Linux - Done
2019 Q1 - Decentralization Phase II
Cheetah Version II- CPU Mining Automation Tool on Window/Linux - Done
Blockchain Upgrade Dynamic hashing algorithm II - Done
2019 Q2 - Fiat Phase I
Assessment of Risk of 51% Attack on NENG - done
Launch of Fiat USD/NENG offering for U.S. residents - done
Initiation of Mobile Miner Project - Done
2019 Q3 - Shoreline Tradingbot, Mobile Project
Evaluation and planning of Mobile Miner Project - on Hold
Initiation of Trading Bot Project - Done
2019 Q4 - Shoreline Tradingbot
Shoreline tradingbot Release v1.0 - Done
2020 Q1 - Evaluate NENG core, Mobile Wallet Phase I
NENG core Decentralization Security Evaluation for v1.3.x - Done
Light Mobile Wallet Project Initiation, Evaluation
2020 Q2 - NENG Core, Mobile Wallet Phase II
NENG core Decentralization Security Hardfork on v1.3.x - Scrypt RandomSpike
Light Mobile Wallet Project Design, Coding
2020 Q3 - NENG core, NENG Mobile Wallet Phase II
Review on results of v1.3.x, NENG core Dev Decision on v1.4.x, Hardfork If needed
Light Mobile Wallet Project testing, alpha Release
2020 Q4 - Mobile Wallet Phase III
Light Mobile Wallet Project Beta Release
Light Mobile Wallet Server Deployment Evaluation and Decision
So this is what software I currently use for privacy, would like some opinions if possible: Starting with my cellphone, my device is a Google Pixel 3A XL with GrapheneOS flashed, I have the following apps installed: F-Droid and AuroraOSS (as my app stores), NewPipe (youtube client), Vanadium (web browser), Tutanota and K-9 Mail (for e-mails), OsmAnd+ (for maps), Joplin (notes), Open Camera (camera), OpenBoard and Mozc for Android (Keyboard and Japanese Keyboard), Aegis Authenticator, KeePassDX (password manager), LibreTorrent (torrent client), Librera PRO (pdf/epub/mobi reader, I don't own a Kindle nor want to own one so I use my cellphone to read), Tachiyomi (manga reader), Signal (for messaging), Vinyl Music Player, VLC, Simple Gallery Pro and Simple Calendar Pro (I prefer them over stock Graphene options) and I also use Electrum and Samourai (Bitcoin Wallet) and Monerujo (Monero Wallet) I also have OpenVPN (for VPN) and use a private DNS for ad and tracking blocking (provided by my VPN provider) I have 3-4 PCs, will go over every single one of them: my main PC is a desktop PC (that I built myself) that I mainly use for working and other tasks. It runs Artix Linux (basically Arch Linux without systemd), I use UFW as my firewall (denying all incoming and also denying all outgoing only allowing what is useful) and I also use AppArmor Profiles, I disabled IPV6 and SWAP, configured my VPN connection as well on network settings and I currently run OpenVPN on my computer (my VPN provider allows for multi-hop cascade through OpenVPN in which I can create a custom VPN cascade up to four servers, each consecutive hop re-encrypts my traffic and assigns me a new IP address) and I've also set disk encryption on installation (have set in all of my computers) As for software: I use Mozilla Firefox as my web browser (I set it to always be in private mode, unchecked suggestions for browsing history, bookmarks, and open tabs, I've also disabled the Firefox data collection in settings and block dangerous and deceptive content, I use DuckDuckGo as my search engine, I use Firefox Home as my default as my homepage. The rest of my tweaks were done in about:config (using privacytools.io site tweaks + geo.enabled = false, network.cookie.lifetimePolicy = 2 and dom.security.https_only_mode as true which are not listed on the site) and the only addons I use are uBlock Origin on Hard Mode and Decentraleyes), KeePassXC (password manager), VIM (use it as a Text Editor and as an IDE for coding), LibreOffice (for working stuff), GIMP (image editor), VLC, qBitTorrent and Tutanota's Desktop Client and Thunderbird (for e-mails) I also use KVM/QEMU for virtual machines (usually in case I wanna test some distro or use Tails/Whonix) For my gaming PC (also a desktop I've built myself) I run Manjaro KDE on it, the only apps I have in the system are Firefox (same settings as above), OBS and KVM/QEMU (which I use a Win10 virtual machine for games, there are tutorials on YouTube on how to do so if you're interested). I have the same firewall settings as above, using AppArmor as well and I've also disabled IPV6 and SWAP, I run OpenVPN on it as well as my VPN DNS settings on network settings. I also use different mouse and keyboard on both my PCs and never mix them together. My other 2 PCs are both laptops, one is a Acer Aspire Nitro I've bought for work (in case I need to work while in a trip or if I wanna work outside etc), it has the same settings and programs as my main PC but I run Gentoo on it. The other laptop is an old ThinkPad that runs Slackware on it, but I rarely use it and this laptop is most of the times not with me for safety reasons. For some other devices and stuff: I have an Asus RT-AC86U router with OpenWRT flashed on it that I also run OpenVPN config files (this one coming from another provider, I use two VPN providers, on in my PCs and the other in my router), I have a Ledger Nano S as a hardware wallet for both Bitcoin and Monero (most of my cryptocurrency is there, I use hardware wallet for hodling purposes and as my emergency funding) and I have LOTS of USB flash drivers (all of them for Linux Live ISOs purposes), I also have a Nintendo Switch Lite (only gaming console I have, although have not been playing that much on it recently) that I only connect to the internet in case I need to download some updates or play online and after I'm done I immediately disconnect it from the internet. Some other privacy habits I have are: I don't own any smart device like Smart TVs (I've been more than 10 years now without watching TV, doesn't even bother me), Smart Fridges or Dishwashers that connect to your internet, ROOMBAS, Smart Home etc, I keep all my money on crypto (and I have a small amount in gold as well, but I rarely invest on it, all my gold is stored in a manual safe here in my apartment) and I only have like, 10 bucks or so in my back account (as soon as I receive any money I just left the necessary in my account to pay bills and put all the rest on crypto, I try to pay everything on crypto or cash), I RARELY use cloud storage, but if I need to, I go with NextCloud and encrypt all my files with VeraCrypt before uploading it, all my VPN services were paid with Bitcoin (I try to pay everything with crypto as previously said) and I never write directly into any website, I usually write my text on a text editor, copy it and paste it on the website (needless to say that I don't use mainstream social media as well) So, what do you guys think? anything that you would add your recommend me? (before anyone mentions about self-hosting a DNS server using Pi-hole on a Raspberry Pi, I'm actually thinking on doing it in a near future) EDIT: forgot to mention that I don't watch YouTube on PC on youtube site, I mostly watch youtube's videos on invidio.us and only use the youtube site for watching live streams honestly. And I also barely go outside with my smartphone (only if I really need to) and I usually keep it away from my computers etc. EDIT 2: also another thing: I covered all my laptop's webcams with black electrical tape, I have a Logitech C922 Pro webcam for my desktop PCs but rarely use it, and when I need to use it, I unplug it as soon as I'm done with it.
From online hacker attacks could be a hardware wallet a safe solution. BUT it says always: "Not your keys - not your coins" But with a hardware wallet i dont see my private key. This feels me unsafe with my 100% control. They can just roll out an update and block your hardware wallet or whatever. So technically I dont have my private key. What if I am create an bootable USB Stick with an fresh Linux Live. I install a software wallet on it and copy down my public key / private key (and restore words). After this I format/delete/destroy my usb stick. Is it not the same safe like an hardware wallet when I put my restore words on safe place (Like the same place I would dump my hardware wallet restore words)? And with this method i have my private key additional to my restore words.
Alright, i am paranoid now. -I use Ubuntu 18.04, i rarely install software on it, i don't have pirated software either. -I try to stick with trusted sources for package distribution (Don't think i even added an untrusted one) -I do not download attachments from sketchy emails, and almost none in general -I don't remember seeing porn on the PC, very rarely ever did it; - I am the sole user of this desktop; I am running clam AV through the whole system rn. Will update if something comes up. Now, this appeared out of nowhere (gift icon appeared on desktop [for google]), i use chrome browser exclusively and if it was the case of me downloading it, it would appear on "downloads", i think.I don't use any other browser.And i didn't download it... but i would admit the possibility of having it downloaded unwillingly, but again, no record of downloading anything on chrome. This seemed like a visitation card, or a joke - [After some introspection might be something more serious].My sensitive information is all relative to bank accounts, i have 2 factor authentication on almost everything, but if this a real threat should i have to go through the labor of changing every password? What should i do?Thanks guys
A suspicious file appeared on my desktop, i didn't put there, only i use the computer;
There is one major detail that i forgot to add as i didn't pay much importance to it. I was given an external HDD to look at , out of curiosity, that came from a friend. His entire company network was affected by a ransomware. As it seems, his backup disks were too. And he handed me one just to look at. I never intended to connect this HDD to my computer with my main OS running I've tried to peek into it by launching a live Kali session , thought it safer than a VM session.The disk wasn't mounting so i gave up pretty quickly. Now, i did end up restarting the computer, the HDD stayed connected almost until the Ubuntu login prompt appeared, i removed it immediately and didn't think much of it (As i thought this was probably a malware targeting Windows machines). I might have a time bomb at hands, as i don't know if this Ransomware could be triggered remotely or if it really infected the machine, would it take immediate effect. I am taking no chances, luckily i keep backups offline every week of important files, so i'll wipe the machine and be more careful next time. You got to know how to play stupid games, to win stupid prizes . Thanks guys.
User u/Frankstwo recommended to run last and coincidentally the last reboot date is consistent with the date of the file creation:
$ lastsousa :0 :0 Sun May 3 16:07 still logged inreboot system boot 5.3.0-51-generic Sun May 3 16:07 still running
The file creation appears as Sun May 3 16:08. I haven't rebooted the computer ever since. I am curious if some kind of DMA Attack was performed, because i haven't logged in BEFORE i removed the device from USB port. or could it be any other attack vector....
Update 3: i got hacked!
Holy crap! I rebooted the machine and I got a ransomware! In 15 years of using computers and internet this is the first time i got really hacked (that i know of...) I keep minimal information on site luckily, i'm very intriged by what's in that HDD but i will toss it out... i'm kind of flabbergasted and dumbstruck . What a dumbass i was... Never thought it possible on a linux environment though... To finalize, why these guys always go with Bitcoins? I wonder if monero or ZCash isn't more suited for the purpose...
https://preview.redd.it/1w0e6fmjil751.png?width=379&format=png&auto=webp&s=08bf18acc2832c08e610dc74005f57d602f63b75 Best Security When you own crypto, what you really own is a private key. You need to secure it to secure your funds. Ledger offers the best level of protection: your key remains protected in a certified secure chip. Easy to manage One app to secure, own, buy and manage 26 coins & more than 1500 tokens from your smartphone or computer. Install between 3 to 6 applications, depending on app size, on your device. It supports Bitcoin, Ethereum, XRP, Bitcoin Cash, EOS, Stellar and many more. You can safely install & uninstall applications on your device to optimize your capacity needs. Condition: Brand New And Sealed Dimensions & weight Size 56.95mm x 17.4mm x 9.1mm Weight 16.2g Box Content 1 hardware wallet, 1 USB cable Compatibility 64-bits desktop computer (Windows 8+, macOS 10.10+, Linux) excluding ARM Processors. Price: ₱3900
Have you read the sidebar and rules? (Please do) Yes. What is your intended use for this build? The more details the better. This i7 920 build was originally a gaming desktop I bought in 2008. In 2015 I built a new Haswell rig to replace it and I have been using this i7 920 machine as an experimental home server where I played with VMs to study for my career in IT. It had run many sorts of workloads including databases (MSSQL, MySQL, PostgreSQL, Oracle), Active Directory servers, Linux LAMP stacks, and bitcoin nodes amongst others on originally ESXi and now Hyper-V hypervisors, and have served me very well throughout the years. I have been feeling the need to have more RAM as I cram more and more VMs into it and I think it is now high time for an upgrade. If gaming, what kind of performance are you looking for? (Screen resolution, framerate, game settings) I am not looking to game on this build, but I will need good performance for a multiple VM environment. What is your budget (ballpark is okay)? Money is not really an issue but I want to be spending at the right performance/value curve i.e. I do not want to be paying a high price increase for a marginal performance gain. In what country are you purchasing your parts? Malaysia. Post a draft of your potential build here (specific parts please). Consider formatting your parts list. Don't ask to be spoonfed a build (read the rules!).
Intel i7 920 4C/8T
AMD Ryzen 5 3600 6C/12T
GIGABYTE X570 AORUS ELITE
6x 8GB DDR3 Kingston Value RAM
2x KINGSTON HyperX Fury 32GB 2666MHz DDR4
- reuse -
PC Power & Cooling 1000W
Corsair CXM 750W
Cooler Master CM690
Fractal Design Define R6
Western Digital 1TB
- reuse -
Western Digital 2TB
- reuse -
Western Digital 1TB
- reuse -
Crucial MX100 256GB
- reuse -
- none -
ADATA XPG SX8200 PRO 512GB
Provide any additional details you wish below. Justifications:
The CPU is in my opinion the best bang for buck right now.
I chose this motherboard because I like Gigabyte and I am now in a financial position to be looking to upgrade the CPU immediately once Zen 3 comes out (no more waiting 5-7 years between builds, hopefully!). Also, USB-C.
Since I won't be overclocking, I am thinking of using Value RAM instead of premium RAMs. However, it seems funny to have Value RAM paired with this kind of motherboard.
32GB sticks, so that I can easily upgrade to 128GB in the future.
The new SSD to make use of PCIe NVME speeds.
Define R6, because HDD bays.
It would be great if I can get your thoughts on this plan. Any feedback is greatly appreciated. Thanks!
Interface of ethOS cryptocurrency mining OS. Though those two are the best I came across, I also found SMOS Linux, but it doesn’t seem to have been updated for some time. Litecoin BAMT and KopiemTu are others that I could not determine their development statuses. Though not designed for mining, ROKOS Flavors is a Debian-based distribution for Raspberry Pi zero, 2, 3, PINE64+ and other IoT ... Transcript - USB - Bitcoin Mining Setup Guide. What’s going on every one? This is Fred and today we’re going to build a Bitcoin miner. All right. So, if you’re unfamiliar with Bitcoin I do have another video that has all the 10 things that you need to know about Bitcoin. So, give that a watch, get caught up, come back and we’ll get started. So, here’s all the pieces that you need to ... Your new USB thumb drive bitcoin wallet is now complete. For those interested in learning how to create portable encrypted USB with ‘Puppy Linux’ and Electrum check out this great tutorial ... BTCMiner ist ein Open Source Bitcoin Miner für ZTEX USB-FPGA Module 1.5. Der BTCMiner verfügt über folgende Features: Er wird mit unterstützten FPGA-Boards geliefert, die eine USB-Schnittstelle für die Kommunikation und Programmierung enthalten. - CGMiner: Linux, Windows Bitcoin Core ist ein vollständiger Bitcoin-Client und bildet das Rückgrat des Netzwerks. Er bietet ein hohes Maß an Sicherheit, Privatsphäre und Stabilität. Er bietet allerdings weniger Funktionen und benötigt viel Festplatten- und Arbeitsspeicher. Features: Bech32 × Bech32: Bech32 ist ein spezielles Adressformat, dass erst durch SegWit möglich wurde (weitere Informationen finden Sie ...
Bitcoin using Linux boot USB and secondary for a cold storage wallet
How to run a Bitcoin Full Node(Linux + Build from Source) - Duration: 14:13. Coding with Canbo Recommended for you. 14:13 ... I Bought a $3 2TB USB Drive and Got More Than Just Malware - Duration: ... [EASY] How To Mine Bitcoin Using ASIC USB Block Erupters and BitMinter - Duration: 3:56. Daniel St.Pierre 9,104 views Bitcoins https://amzn.to/2Rqc3cx Mastering Ethereum https://amzn.to/2BSRpYX My litecoin / bitcoin setup - using Linux BAMT, how to restart the process, what it looks like, where the important ... Electrum on Puppy Linux - Offline Bitcoin Wallet on USB - Duration: 6:52. Vedran 2,444 views. 6:52. How to Repair a DEAD Computer - Duration: 37:05. CareyHolzman Recommended for you. 37:05 . How ... Most Powerful USB Litecoin Miner Put to the Test - Duration: 4:06. How Much? 44,817 views. 4:06 . How to Speed Up your Kali Linux OS 2018 - Duration: 4:28. nxtech Hacks 32,417 views. 4:28. How ...