bitcoin-qt command line arguments · GitHub

I ruin people's lives for fun, this is my story.

Let me start by introducing myself, my name is Alex. I am 20 years old and clinically diagnosed with ASPD or Antisocial personality disorder. My diagnosis was given to me back in high school in my Junior year. It was pretty hard making friends or at least keeping them. You see when I try to make friends I usually only go into a relationship because of one thing; to get something in return. You could call it manipulating or deceiving people but, I don’t see it that way. I’ve had many therapists and physiatrists try to help me or figure out what’s wrong with me in the past but, I would just feed them the information they want to hear. Its pretty simple, give them all the shit they need to write down on their little piece of paper and it is music to their ears. Besides that, let us get to the story. Now you see the two key people back in high school were “Mike” and “Connor” and they were it. They had the girls, the popularity, the friends. They both were the biggest athletes in the entire school. This is important because I wanted that, but I couldn’t have it. Call it jealousy or whatever but, who wouldn’t want people to look up at you and have their names written in the daily paper.
High school was a bitch for me. I never had many friends or any real ones at least. I was known as the weird kid but, whatever right. Everyone says high school is tough for everyone. I believe it. Life gets back at people who deserve it though. Now Mike was the quarterback of the football team and he knew everyone and everyone knew him. I one day sent him a message on Snapchat and said: “Hey Mike, I know you don’t know me but, I think you’re a cool guy.” He then replied with “Who are you? Whatcha want dickhead?” I told him “Nothing much man, just thought we could be friends or something, we’re in the same Spanish class.” He said, “Oh, cool your that kid that sits in the back right?” I said, “Yeah, what you doing?” He then said, “Nothing much man, listen I got a party next weekend with a free crib if you tryna come.” I then told him I’d let him know. This was perfect because I knew exactly what I would do. I planned on seeing Connor there with his girlfriend Liz. That was important because I hated seeing the way Connor would treat her. He just used her for sex and shit and never really respected her. I knew how I would fix that though, and it would be at that party.
Well, I got to the party and there were at least 50 kids there. I saw a couple of familiar faces but couldn’t care at all. I was there for one thing and one thing only. To ruin their relationship. Call me a dick but, he was way worse than me. I once saw Liz come into school with a bruise on her face and knew it was from him. I finally saw them out back near the pool. I had a plan. I would text Connor’s phone from a different number making it look like it was some other chick texting him and Liz would be right there to see it. I went outside and he was drinking, probably already drunk. I could see them from across the pool and haven’t seen Mike yet. I was about to text him and then Mike came up and tapped me on my shoulder with two drinks in his hand. He said “Yooo, Alex you came!” I laughed awkwardly and said, “Yeah man, wouldn’t miss it.” He said, “You want a drink?” Gesturing the second cup to me. I took it and said “Thanks, man.” He said, “I’ll see you around, there’s more beer in the kitchen.” He walked away and now I pulled my phone out. I went on to the app which I would text him from and texted: “Hey Connor, I had a really good night last night with a winkie emoji.” I then sent it waiting for Liz to look over his shoulder. She did and read the message. They started to argue and Liz poured his beer all over his face. My plan was working just right. I then saw Liz walk inside in a rush. I pretended to bump into her and said: “Oh my fault didn’t see you there.” She laughed and said, “Oh my god, it’s you, Alex.” I then laughed as well and said, “You good?” She replied with, “No actually, I just found out Connor was cheating on me with some slut.” I said “Oh, that blows … you want a ride home?” She said, “No I’m good, I’ll just have Grace drive me home.” I preceded with, “You sure, I live super close to here anyways, I was just about to go home too.” She said, “Ok, sure that’s fine.” I then got in my car and we started to talk. I said, “So, how’d you find out?” She said, “Some bitch texted him saying that they slept together last night.” I then said, “Damn, what’s your address by the way?” She then said something that surprised me. “I can’t go home like this, my moms gonna know I’m drunk and I’ll never be able to go out again.” I said, “Well, what you wanna do then?” She said, “Um, I don’t know .. we should go to a park.” I said, “Oh ok, what park?” She gave me the name and we went there. I parked my car in the parking lot and said: “Whatcha tryna do now?” She then said, “Shut up stupid.” Hushing my lips for me. We made out that night and I dropped her back off and went home as well.
That week in school I got a snap from Connor. It was during lunch and I clicked on it. I saw the five words that couldn’t make me happier: “I know what you did.” I replied with, “What? What did I do now?” He said, “you hooked up with Liz.” I left him on open and went about my day. I then saw him in the parking lot after school near my car. He came up to me and screamed in my face: “SO YOU THINK YOU CAN JUST STEAL MY GIRL WITHOUT ME DOING ANYTHING?” I laughed right in his face and said, “Well, she isn’t with you anymore now, is she?” He then yelled: “Well, you think you’re just going to go about your day or something?” I said laughing, “Yeah, I was planning on going to Liz’s house after school.” He then jumped on top of me pinning me to the ground, socking me right in the jaw multiple times. I tried throwing some back but, he had my hands pinned to my side. He got up and said, “Fuck with her again and you won’t be getting up.” I got up with my nose bleeding and got into my car and went home.
That was 2 years ago and boy have I got my revenge. Let me start by saying I have no regrets about what I did. Everything I had done was for my satisfaction. You see I don’t care who’s life I ruin … as long as I get something out of it. Connor graduated high school with not much going for him. He had a job at a car dealership as a mechanic or something like that and never went to college. I never went to college so I won’t judge but, I had other plans after high school. I wanted to ruin Connor’s life, and I never stopped until I completed that process. It started with pretty small things like when I tried ruining his relationship back in high school. He was always a dick and who better to fuck with then a worthless piece of shit like Connor. I messaged him a couple of months ago saying: “Hey old friend … remember me?” He replied with “Yeah, the kid I beat the shit out of … I remember you.” I knew he would say something like this so, I sent him a picture of myself and his sister I photoshopped to look as if we were together. He replied with, “What the hell are you doing with my sister … she doesn’t date weird fucks like you.” I replied with, “Oh well looks like her type changed?” I was just sitting on my computer laughing my ass off from how gullible this kid was. He then messaged his sister Claire, which I thought he would do. “Are you dating a kid named Alex?” I had hacked into her phone which was pretty easy because I sent her a phishing email that looked like a women’s clothing company that I knew she had an interest in because of her Facebook. She clicked it and it then downloaded a key logger onto her phone which would send anything that was on her phone to me directly. I override it and replied as her saying: “Haha, yeah … me and him just started talking.” Everything that was being sent right now would delete as soon as I exited the software. I then texted him saying, “Claire is one beautiful woman, kind of reminds me of Liz…” He then said, “You know you’re a real dick you know ….” I said, “Haha the one who beat the shit out of their girlfriend in highschool right … I’m the dick.” I then said, “Hey how’s life going for you ... washing people’s cars ….” He replied with “Fuck you man … go do something with your time.” I ended the conversation with “Ok bud, I’ll let you know how she is in bed…” Now, this was just the first thing I would do to fuck with Connor’s life. A couple google searches for his name and I now had his address … He was still living with his parents at the time. I then went ahead and waited for him to get done work to order a couple of pizzas to his house and make him pay for them. A couple I mean by ordering 20 pizzas all with extra toppings. That was definitely a pricy delivery. A total of $300 if you want to round up. I called in and said I would pay in cash and my name was Connor; I gave the lady on the phone his address and it was as easy as that. You might be asking why I care so much to fuck with someone’s life … It’s easy, I get joy out of it. You see these were the baby steps to ruin someone’s life.
My next attempt would be going to a personal level. Connor had a laptop at home and I went ahead and hacked it. It was easy knowing how stupid he was. He would fall for anything. So I sent him an email that led him to a link that would automatically download a fake porn movie. He would run the download and I would then have access to everything on his computer. Everything. I had every username and password of every website he used including bank accounts, emails, videogames, documents, social media, and much more. I also could see what he was doing by his webcam which he never turned off. He also had a new girlfriend at the time and her name was Jessica or Jess for short. I planned on ruining their relationship too. One night I logged into one of his bank accounts to see what his balance was … It was $1,243.50. So I went ahead and requested a withdrawal to a website that would transfer it into bitcoin. I requested $500 to see if it would work without causing any attention. The transfer went through and I now had $500 in bitcoin. I went ahead and logged out and disconnected my VPN. I also knew Connors social because he had everything saved on his laptop like his passport, birth certificate, and social security. The next morning I drove over to his house and waiting for him to leave for the morning. I watched him get into his car from a street over and pull out of his driveway. He then sped off to the local bank, I proceeded to follow. I guess he found out $500 had been withdrawn from his account. After he was done in the bank he drove to Dunkin donuts. I then thought of an idea as he was inside. I got out of my car in the same parking lot and went over to his car and took my pocket knife out. I flipped it open and sliced his back tire open. I quickly got back in my car which was parked on the other side of the parking lot and waited for him to come out. He was pissed. I could tell because he just stood there and looked around trying to find the person who had done it. I sat in my car looking at him just snickering to myself. I was getting so much joy from watching him in anger. He took his phone out and called someone. He got back in his car and just sat there. I then saw another car pull in the parking lot about 15 minutes later. It was Jess. She pulled in and parked next to Connor’s car. He got out and sat in the front seat of Jessica’s car. I could care less now to watch so I went out of the back entrance and went back home.
I went onto my computer when I got home to open the software to view Connor’s laptop. I had a feeling that the bank would have told him to look for spyware on his computer when he got home so I made sure to get on before he could. I went ahead and deleted every traceable script that was linking the laptop to the RAT. I had scripted another code to perform as a startup manager which looked like windows software. It wouldn’t be picked up by antivirus so I just copied the RAT onto my new script and loaded onto his laptop remotely. I then went ahead and logged back onto his bank account and it was frozen. I wasn’t surprised. I thought they would have done something like this. I had a backup plan though. I went ahead and logged into his iCloud with his username and password which was conveniently saved from google. I searched for “Wheres my iPhone” and found where Connor was. I saw that he was at some apartment complex not far from me so I left my house and went there. It was dark out at this point and he was inside Jessica’s apartment. I parked my car and got out to search for his car. I took my jacket with me and wrapped it around my hand. I found his shitty old Honda just sitting there with a popped tire still. I took my knife which had a glass breaker and put it right against his window. It then cracked and I hit that window as hard as I could with my hand wrapped in my jacket. It broke and glass was everywhere. His car alarm was going off at this point so I had to do what I did next very fast. I looked inside his glove compartment and found his registration and insurance papers. I stuffed them in my pockets and looked through the center console. I found his wallet and a couple of condoms. I took his wallet and got the hell out of there. I sped out of the apartment complex and went back home fast, hoping no cops would see me.
I got back inside my house and looked inside Connor’s wallet. It had about $40 in cash and a little baggie of weed. There were credit cards in there as well. I had a perfect idea. I went onto a proxy and searched for the same bitcoin website I had recently been on. I went ahead and bought approximately $4,500 worth in bitcoin from every single credit card Connor had. I knew that this would destroy his credit score. I knew he wouldn’t be able to get an apartment with bad credit but, he was still living with his mom anyways. I now had extra resources to destroy Connor’s life. I knew that Connor wouldn’t be able to fix that broken window and most definitely wouldn’t be able to drive to work now because all of his papers to legally drive were now in my possession including his driver’s license. He had no money. I needed to move on with my next step to remove Jess from the equation.
I need to find a flaw in their relationship or something to exploit. I went ahead and completed my research on Jessica. Before I go on, I need to mention that Connor had now pulled the police into this. The bank and the police were now going to try and find out who had been messing with him. They won’t be able to find a link between the two. I know this for sure. Although knowing the police are involved it just made this game more fun. I like the attention that I am causing. Let me get back to what I had found on Jessica. What do you know? She was fucking with another dude. How do I know this you might ask? Well, I went ahead and looked around her Facebook and Instagram followers looking at mostly male followers. I ran a program that looked through her direct messages and found an account of another guy in the area. It looks like they went to the same high school. I looked through the messages and they were all flirts back and forth and she finally told him to message her on Snapchat. I, unfortunately, do not have access at this moment to look into her Snapchat messages but this is enough for now. I went ahead and took some screenshots of the messages and spoofed a text message to her saying “Looks like you got a little problem here don’t you?” Attaching the screenshots. She replied saying, “Who are you??? What do you want??” I simply replied back with “Oh nothing much, just pick who you want to keep … Connor is a dick anyway.” She replied, “You have no business in this … how did you even get into my messages?” I then said, “Don’t worry about it Jess, just tell Connor you guys aren’t working out anymore… and you won’t hear from me again.” A simple blackmail is all it took.
Guess he wasn’t really worth it. Never knew how to treat a woman right anyways. Now that Jess was out of the equation I could go ahead and proceed with ruining his life. I went ahead and called into his work. A lady picked up “Hello, [Name of car dealership] this is Lisa speaking, How may I help you?” I went ahead and said, “Ah yes, I recently had my car worked on here and I would like to make a complaint against one of your workers…” She replied with “Ok sir, and do you know the name of the employee?” I said, “Yes I do, Connor [last name]. I saw a scratch on the back of my car which looked like a key or something pulled the paint off. I saw this as soon as I got home from getting my car maintained on.” She said, “Ok sir, I will go ahead and mark down your complaint and we will handle it accordingly… if you would like you could come back so we can get more info from you and we could have someone take a look at the damage?’ I said, “No that won’t be necessary after what you guys have already done, thanks.” I then hung up the phone. I know that this will most definitely get him fired.
I called him a couple of days after this with a masked voice from software that changed my voice. He picked up and I said, “How’s life been? … Shitty let me guess.” He replied with “Can I ask who the fuck is calling? And why do you care how my life’s been?” I said “Maybe this would help … you missing that $4,500? … Lifes a bitch isn’t it.” He said, “You’re going to be arrested for stealing that money .. the police are looking into it.” I said “Oh, Connor I already know that … I’m three steps ahead of them already. I mean I guess Jess doesn’t want to date poor guys huh?” He said, “How the hell do you even know me … what do you want from me?” I said, “Connor go outside there’s a package for you and maybe a couple of your answers will be in there.” I hung up. Before calling him I made sure that a package with nothing except a USB was in there. It was meant to be plugged in and it would be erased within 1 hour of opening the contents … the contents were a txt file with the title of README.txt. It wasn’t a virus or anything it was just a document meant to be read. Once opened it would have a paragraph saying:
Hello Connor, the man that you were just speaking with knows everything about you and will not hurt you. You are playing the game of life. Its simple. You are a pawn in my game. I pick and choose what you do and how you do it. You may not see it but, everything that has been going on in your life the last couple of months has been of my choosing. I’ve been in the process of taking little bits of your life away. One by one. You see it all started back in high school when I took your little girlfriend away. I made her think you cheated on her. Easy. My next step would be to take away all of your money. Poof just like magic. All gone. Your credit is down the drain. The second step was to take away your transportation. No way to drive without any money. The broken window doesn’t help either. Or maybe no driver’s license. I then took your love life away. Jessica is no longer in your life. Well, maybe you might just go back to work to make more money …. Wrong you see. You no longer have a job. Don’t bother going in tomorrow because there was a report of you “damaging” a customer’s car. You may be reading this pretty upset because you have no way of fighting back. Well, that’s where I come in. I will give you a chance. In order to stop playing my game, I will send you an address and all you have to do is show up. Sounds easy? I hope so, for your own sake.
P.S: If you bring the police … the game ends differently. Not in your favor.
I was almost finished with Connor. I needed to do one more thing before I send him the address. I was never going to let him have an easy way out, no. I planned to make him go to a park that was at least an hour out of the direction. This would be a diversion away from his house so I could carry out my plan. I had recently bought with “Connors” money from the $4,500 that I converted into bitcoin approximately 4 kilos of crack cocaine. It would ship domestically so it wouldn’t be searched by customs. I then planned on having it shipped to a nearby drop zone which was an abandoned factory outside of town. I then would take this and put it into a backpack without putting my fingerprints on it. I then also had a USB that would boot up into the dark web which had all of Connors’s personal info like it was his. I also made the password his most commonly used password for the USB. This would link directly back to Connors’s local IP address which I had set onto the USB. I also remotely bought the drugs with Connors’s laptop. My plan here would be to send in an anonymous tip from a payphone to the local police station that there was a large package of crack cocaine shipped to Connors’s address. I also planted the baggie of weed which had Connors fingerprints on them in the back porch of his house. This would give the police probable cause to search the house for drugs. I would assume that they would have already brought a warrant but, just in case I had done that for precautionary reasons. This all would happen tonight. This is when I would successfully ruin Connor’s life. I would send him to prison for years. He would be sentenced with multiple felonies of drug possession and intent to sell. The large quantity that he would be possessing would give him no parol either.
I had the vendor on the dark web pack baggies of grams pre-bagged and one large quantity as well. This would give him the charge of intent to sell as well. The investigation would come down to that he purchased them from his laptop with his credit cards. Nothing would be traced back to me. I made sure of this because I had corrupted all of my hard drives back at home by microwaving them. There was no personal connection to Connor with me. So, I would not be looked into. I was just a kid from his high school with a thousand other students. I had no connection to anyone in his family either. I went ahead and sent him the name of the park through a random phone number I generated and said, “Connor you have 90 minutes to be here, or the game continues.” I was outside his house a street over waiting for him to leave. I saw him leave which was around 12:30 am and everyone was asleep in his house. I set a timer on my phone for an hour which was my time to plant everything and get out before Connor was home. I then went to his back porch and planted the baggie of weed at his bedroom window. He was stupid enough to leave his window open and I opened it and went inside his room. I had gloves on at this point before I left my car. I dropped the backpack inside his closet and plugged in the USB that I had prepared into his laptop which was sitting on his desk. I then left through his window locking it before stepping out. I made sure the weed was sitting nicely on the outside of his window. I then walked back to my car. I checked the timer on my phone and it was at 35 minutes. I knew he would be at the park before the timer was up. I went to a closed parking lot that I scoped out before planting the evidence which had a payphone. I called in and said, “392 [Street] there is a large number of drugs which is owned by Connor [last name]. I am sending this tip in and would like to keep it anonymous for my safety.” I hung up and left the parking lot immediately. On my way back home I got a text from Connor replying with “I’m here … what do you want me to do to end this stupid game?” I replied with “It easy … take your phone and throw it into the lake … You will receive your money back after this last task is done.” He said, “How do I know you’re going to follow through on your end?” I said, “If you don’t do it, you don’t get your money …you are a player of my game remember, you follow my rules and you can win.” I then sent another message saying, “Tomorrow check the balance of your bank, and all the money will be back where it rightfully belongs. Goodbye now.” This would be the last step in covering up everything I had messaged him. He is just playing every card I told him without even knowing. I then called the phone 5 minutes later to see if it connected me through. I called and it said, “The phone number you’ve dialed is no longer in service … please call back later.” My plan was now complete and Connor will be arrested within the hour. I got home and went to sleep without a problem. I woke up the next morning and turned the news on. The headline was “Breaking News: Man in local [county] was arrested last night for drug trafficking.” This was music to my ears hearing the lady speak about the details of the arrest and hearing her say Connor’s name. She said it like he was some criminal and boy did I love that. I looked up the details of the arrest on google and clicked on the first link. [Connor ****** arrested last night for drug traffiking] I saw his mug shot and it said under it that he could be sentenced up to 25 years and up to $20,000 in fines for intent to sell crack cocaine. This was the end of Connor’s free life. He was now a convicted felon and would never have his original life back. My game was now completed and he was the pawn to complete it.
Chapter 2

submitted by idonthavemuchtime12 to mrcreeps [link] [comments]

I ruin people's lives for fun, this is my story.

Let me start by introducing myself, my name is Alex. I am 20 years old and clinically diagnosed with ASPD or Antisocial personality disorder. My diagnosis was given to me back in high school in my Junior year. It was pretty hard making friends or at least keeping them. You see when I try to make friends I usually only go into a relationship because of one thing; to get something in return. You could call it manipulating or deceiving people but, I don’t see it that way. I’ve had many therapists and physiatrists try to help me or figure out what’s wrong with me in the past but, I would just feed them the information they want to hear. Its pretty simple, give them all the shit they need to write down on their little piece of paper and it is music to their ears. Besides that, let us get to the story. Now you see the two key people back in high school were “Mike” and “Connor” and they were it. They had the girls, the popularity, the friends. They both were the biggest athletes in the entire school. This is important because I wanted that, but I couldn’t have it. Call it jealousy or whatever but, who wouldn’t want people to look up at you and have their names written in the daily paper.
High school was a bitch for me. I never had many friends or any real ones at least. I was known as the weird kid but, whatever right. Everyone says high school is tough for everyone. I believe it. Life gets back at people who deserve it though. Now Mike was the quarterback of the football team and he knew everyone and everyone knew him. I one day sent him a message on Snapchat and said: “Hey Mike, I know you don’t know me but, I think you’re a cool guy.” He then replied with “Who are you? Whatcha want dickhead?” I told him “Nothing much man, just thought we could be friends or something, we’re in the same Spanish class.” He said, “Oh, cool your that kid that sits in the back right?” I said, “Yeah, what are you doing?” He then said, “Nothing much man, listen I got a party next weekend with a free crib if you tryna come.” I then told him I’d let him know. This was perfect because I knew exactly what I would do. I planned on seeing Connor there with his girlfriend Liz. That was important because I hated seeing the way Connor would treat her. He just used her for sex and shit and never really respected her. I knew how I would fix that though, and it would be at that party.
Well, I got to the party and there were at least 50 kids there. I saw a couple of familiar faces but couldn’t care at all. I was there for one thing and one thing only. To ruin their relationship. Call me a dick but, he was way worse than me. I once saw Liz come into school with a bruise on her face and knew it was from him. I finally saw them out back near the pool. I had a plan. I would text Connor’s phone from a different number making it look like it was some other chick texting him and Liz would be right there to see it. I went outside and he was drinking, probably already drunk. I could see them from across the pool and haven’t seen Mike yet. I was about to text him and then Mike came up and tapped me on my shoulder with two drinks in his hand. He said “Yooo, Alex you came!” I laughed awkwardly and said, “Yeah man, wouldn’t miss it.” He said, “You want a drink?” Gesturing the second cup to me. I took it and said “Thanks, man.” He said, “I’ll see you around, there’s more beer in the kitchen.” He walked away and now I pulled my phone out. I went on to the app which I would text him from and texted: “Hey Connor, I had a really good night last night with a winkie emoji.” I then sent it waiting for Liz to look over his shoulder. She did and read the message. They started to argue and Liz poured his beer all over his face. My plan was working just right. I then saw Liz walk inside in a rush. I pretended to bump into her and said: “Oh my fault didn’t see you there.” She laughed and said, “Oh my god, it’s you, Alex.” I then laughed as well and said, “You good?” She replied with, “No actually, I just found out Connor was cheating on me with some slut.” I said “Oh, that blows … you want a ride home?” She said, “No I’m good, I’ll just have Grace drive me home.” I preceded with, “You sure, I live super close to here anyways, I was just about to go home too.” She said, “Ok, sure that’s fine.” I then got in my car and we started to talk. I said, “So, how’d you find out?” She said, “Some bitch texted him saying that they slept together last night.” I then said, “Damn, what’s your address by the way?” She then said something that surprised me. “I can’t go home like this, my moms gonna know I’m drunk and I’ll never be able to go out again.” I said, “Well, what you wanna do then?” She said, “Um, I don’t know .. we should go to a park.” I said, “Oh ok, what park?” She gave me the name and we went there. I parked my car in the parking lot and said: “Whatcha tryna do now?” She then said, “Shut up stupid.” Hushing my lips for me. We made out that night and I dropped her back off and went home as well.
That week in school I got a snap from Connor. It was during lunch and I clicked on it. I saw the five words that couldn’t make me happier: “I know what you did.” I replied with, “What? What did I do now?” He said, “you hooked up with Liz.” I left him on open and went about my day. I then saw him in the parking lot after school near my car. He came up to me and screamed in my face: “SO YOU THINK YOU CAN JUST STEAL MY GIRL WITHOUT ME DOING ANYTHING?” I laughed right in his face and said, “Well, she isn’t with you anymore now, is she?” He then yelled: “Well, you think you’re just going to go about your day or something?” I said laughing, “Yeah, I was planning on going to Liz’s house after school.” He then jumped on top of me pinning me to the ground, socking me right in the jaw multiple times. I tried throwing some back but, he had my hands pinned to my side. He got up and said, “Fuck with her again and you won’t be getting up.” I got up with my nose bleeding and got into my car and went home.
That was 2 years ago and boy have I got my revenge. Let me start by saying I have no regrets about what I did. Everything I had done was for my satisfaction. You see I don’t care who’s life I ruin … as long as I get something out of it. Connor graduated high school with not much going for him. He had a job at a car dealership as a mechanic or something like that and never went to college. I never went to college so I won’t judge but, I had other plans after high school. I wanted to ruin Connor’s life, and I never stopped until I completed that process. It started with pretty small things like when I tried ruining his relationship back in high school. He was always a dick and who better to fuck with then a worthless piece of shit like Connor. I messaged him a couple of months ago saying: “Hey old friend … remember me?” He replied with “Yeah, the kid I beat the shit out of … I remember you.” I knew he would say something like this so, I sent him a picture of myself and his sister I photoshopped to look as if we were together. He replied with, “What the hell are you doing with my sister … she doesn’t date weird fucks like you.” I replied with, “Oh well looks like her type changed?” I was just sitting on my computer laughing my ass off from how gullible this kid was. He then messaged his sister Claire, which I thought he would do. “Are you dating a kid named Alex?” I had hacked into her phone which was pretty easy because I sent her a phishing email that looked like a women’s clothing company that I knew she had an interest in because of her Facebook. She clicked it and it then downloaded a key logger onto her phone which would send anything that was on her phone to me directly. I override it and replied as her saying: “Haha, yeah … me and him just started talking.” Everything that was being sent right now would delete as soon as I exited the software. I then texted him saying, “Claire is one beautiful woman, kind of reminds me of Liz…” He then said, “You know you’re a real dick you know ….” I said, “Haha the one who beat the shit out of their girlfriend in highschool right … I’m the dick.” I then said, “Hey how’s life going for you ... washing people’s cars ….” He replied with “Fuck you man … go do something with your time.” I ended the conversation with “Ok bud, I’ll let you know how she is in bed…” Now, this was just the first thing I would do to fuck with Connor’s life. A couple google searches for his name and I now had his address … He was still living with his parents at the time. I then went ahead and waited for him to get done work to order a couple of pizzas to his house and make him pay for them. A couple I mean by ordering 20 pizzas all with extra toppings. That was definitely a pricy delivery. A total of $300 if you want to round up. I called in and said I would pay in cash and my name was Connor; I gave the lady on the phone his address and it was as easy as that. You might be asking why I care so much to fuck with someone’s life … It’s easy, I get joy out of it. You see these were the baby steps to ruin someone’s life.
My next attempt would be going to a personal level. Connor had a laptop at home and I went ahead and hacked it. It was easy knowing how stupid he was. He would fall for anything. So I sent him an email that led him to a link that would automatically download a fake porn movie. He would run the download and I would then have access to everything on his computer. Everything. I had every username and password of every website he used including bank accounts, emails, videogames, documents, social media, and much more. I also could see what he was doing by his webcam which he never turned off. He also had a new girlfriend at the time and her name was Jessica or Jess for short. I planned on ruining their relationship too. One night I logged into one of his bank accounts to see what his balance was … It was $1,243.50. So I went ahead and requested a withdrawal to a website that would transfer it into bitcoin. I requested $500 to see if it would work without causing any attention. The transfer went through and I now had $500 in bitcoin. I went ahead and logged out and disconnected my VPN. I also knew Connors social because he had everything saved on his laptop like his passport, birth certificate, and social security. The next morning I drove over to his house and waiting for him to leave for the morning. I watched him get into his car from a street over and pull out of his driveway. He then sped off to the local bank, I proceeded to follow. I guess he found out $500 had been withdrawn from his account. After he was done in the bank he drove to Dunkin donuts. I then thought of an idea as he was inside. I got out of my car in the same parking lot and went over to his car and took my pocket knife out. I flipped it open and sliced his back tire open. I quickly got back in my car which was parked on the other side of the parking lot and waited for him to come out. He was pissed. I could tell because he just stood there and looked around trying to find the person who had done it. I sat in my car looking at him just snickering to myself. I was getting so much joy from watching him in anger. He took his phone out and called someone. He got back in his car and just sat there. I then saw another car pull in the parking lot about 15 minutes later. It was Jess. She pulled in and parked next to Connor’s car. He got out and sat in the front seat of Jessica’s car. I could care less now to watch so I went out of the back entrance and went back home.
I went onto my computer when I got home to open the software to view Connor’s laptop. I had a feeling that the bank would have told him to look for spyware on his computer when he got home so I made sure to get on before he could. I went ahead and deleted every traceable script that was linking the laptop to the RAT. I had scripted another code to perform as a startup manager which looked like windows software. It wouldn’t be picked up by antivirus so I just copied the RAT onto my new script and loaded onto his laptop remotely. I then went ahead and logged back onto his bank account and it was frozen. I wasn’t surprised. I thought they would have done something like this. I had a backup plan though. I went ahead and logged into his iCloud with his username and password which was conveniently saved from google. I searched for “Wheres my iPhone” and found where Connor was. I saw that he was at some apartment complex not far from me so I left my house and went there. It was dark out at this point and he was inside Jessica’s apartment. I parked my car and got out to search for his car. I took my jacket with me and wrapped it around my hand. I found his shitty old Honda just sitting there with a popped tire still. I took my knife which had a glass breaker and put it right against his window. It then cracked and I hit that window as hard as I could with my hand wrapped in my jacket. It broke and glass was everywhere. His car alarm was going off at this point so I had to do what I did next very fast. I looked inside his glove compartment and found his registration and insurance papers. I stuffed them in my pockets and looked through the center console. I found his wallet and a couple of condoms. I took his wallet and got the hell out of there. I sped out of the apartment complex and went back home fast, hoping no cops would see me.
I got back inside my house and looked inside Connor’s wallet. It had about $40 in cash and a little baggie of weed. There were credit cards in there as well. I had a perfect idea. I went onto a proxy and searched for the same bitcoin website I had recently been on. I went ahead and bought approximately $4,500 worth in bitcoin from every single credit card Connor had. I knew that this would destroy his credit score. I knew he wouldn’t be able to get an apartment with bad credit but, he was still living with his mom anyways. I now had extra resources to destroy Connor’s life. I knew that Connor wouldn’t be able to fix that broken window and most definitely wouldn’t be able to drive to work now because all of his papers to legally drive were now in my possession including his driver’s license. He had no money. I needed to move on with my next step to remove Jess from the equation.
I need to find a flaw in their relationship or something to exploit. I went ahead and completed my research on Jessica. Before I go on, I need to mention that Connor had now pulled the police into this. The bank and the police were now going to try and find out who had been messing with him. They won’t be able to find a link between the two. I know this for sure. Although knowing the police are involved it just made this game more fun. I like the attention that I am causing. Let me get back to what I had found on Jessica. What do you know? She was fucking with another dude. How do I know this you might ask? Well, I went ahead and looked around her Facebook and Instagram followers looking at mostly male followers. I ran a program that looked through her direct messages and found an account of another guy in the area. It looks like they went to the same high school. I looked through the messages and they were all flirts back and forth and she finally told him to message her on Snapchat. I, unfortunately, do not have access at this moment to look into her Snapchat messages but this is enough for now. I went ahead and took some screenshots of the messages and spoofed a text message to her saying “Looks like you got a little problem here don’t you?” Attaching the screenshots. She replied saying, “Who are you??? What do you want??” I simply replied back with “Oh nothing much, just pick who you want to keep … Connor is a dick anyway.” She replied, “You have no business in this … how did you even get into my messages?” I then said, “Don’t worry about it Jess, just tell Connor you guys aren’t working out anymore… and you won’t hear from me again.” A simple blackmail is all it took.
Guess he wasn’t really worth it. Never knew how to treat a woman right anyways. Now that Jess was out of the equation I could go ahead and proceed with ruining his life. I went ahead and called into his work. A lady picked up “Hello, [Name of car dealership] this is Lisa speaking, How may I help you?” I went ahead and said, “Ah yes, I recently had my car worked on here and I would like to make a complaint against one of your workers…” She replied with “Ok sir, and do you know the name of the employee?” I said, “Yes I do, Connor [last name]. I saw a scratch on the back of my car which looked like a key or something pulled the paint off. I saw this as soon as I got home from getting my car maintained on.” She said, “Ok sir, I will go ahead and mark down your complaint and we will handle it accordingly… if you would like you could come back so we can get more info from you and we could have someone take a look at the damage?’ I said, “No that won’t be necessary after what you guys have already done, thanks.” I then hung up the phone. I know that this will most definitely get him fired.
I called him a couple of days after this with a masked voice from software that changed my voice. He picked up and I said, “How’s life been? … Shitty let me guess.” He replied with “Can I ask who the fuck is calling? And why do you care how my life’s been?” I said “Maybe this would help … you missing that $4,500? … Lifes a bitch isn’t it.” He said, “You’re going to be arrested for stealing that money .. the police are looking into it.” I said “Oh, Connor I already know that … I’m three steps ahead of them already. I mean I guess Jess doesn’t want to date poor guys huh?” He said, “How the hell do you even know me … what do you want from me?” I said, “Connor go outside there’s a package for you and maybe a couple of your answers will be in there.” I hung up. Before calling him I made sure that a package with nothing except a USB was in there. It was meant to be plugged in and it would be erased within 1 hour of opening the contents … the contents were a txt file with the title of README.txt. It wasn’t a virus or anything it was just a document meant to be read. Once opened it would have a paragraph saying:
Hello Connor, the man that you were just speaking with knows everything about you and will not hurt you. You are playing the game of life. Its simple. You are a pawn in my game. I pick and choose what you do and how you do it. You may not see it but, everything that has been going on in your life the last couple of months has been of my choosing. I’ve been in the process of taking little bits of your life away. One by one. You see it all started back in high school when I took your little girlfriend away. I made her think you cheated on her. Easy. My next step would be to take away all of your money. Poof just like magic. All gone. Your credit is down the drain. The second step was to take away your transportation. No way to drive without any money. The broken window doesn’t help either. Or maybe no driver’s license. I then took your love life away. Jessica is no longer in your life. Well, maybe you might just go back to work to make more money …. Wrong you see. You no longer have a job. Don’t bother going in tomorrow because there was a report of you “damaging” a customer’s car. You may be reading this pretty upset because you have no way of fighting back. Well, that’s where I come in. I will give you a chance. In order to stop playing my game, I will send you an address and all you have to do is show up. Sounds easy? I hope so, for your own sake.
P.S: If you bring the police … the game ends differently. Not in your favor.
I was almost finished with Connor. I needed to do one more thing before I send him the address. I was never going to let him have an easy way out, no. I planned to make him go to a park that was at least an hour out of the direction. This would be a diversion away from his house so I could carry out my plan. I had recently bought with “Connors” money from the $4,500 that I converted into bitcoin approximately 4 kilos of crack cocaine. It would ship domestically so it wouldn’t be searched by customs. I then planned on having it shipped to a nearby drop zone which was an abandoned factory outside of town. I then would take this and put it into a backpack without putting my fingerprints on it. I then also had a USB that would boot up into the dark web which had all of Connors’s personal info like it was his. I also made the password his most commonly used password for the USB. This would link directly back to Connors’s local IP address which I had set onto the USB. I also remotely bought the drugs with Connors’s laptop. My plan here would be to send in an anonymous tip from a payphone to the local police station that there was a large package of crack cocaine shipped to Connors’s address. I also planted the baggie of weed which had Connors fingerprints on them in the back porch of his house. This would give the police probable cause to search the house for drugs. I would assume that they would have already brought a warrant but, just in case I had done that for precautionary reasons. This all would happen tonight. This is when I would successfully ruin Connor’s life. I would send him to prison for years. He would be sentenced with multiple felonies of drug possession and intent to sell. The large quantity that he would be possessing would give him no parol either.
I had the vendor on the dark web pack baggies of grams pre-bagged and one large quantity as well. This would give him the charge of intent to sell as well. The investigation would come down to that he purchased them from his laptop with his credit cards. Nothing would be traced back to me. I made sure of this because I had corrupted all of my hard drives back at home by microwaving them. There was no personal connection to Connor with me. So, I would not be looked into. I was just a kid from his high school with a thousand other students. I had no connection to anyone in his family either. I went ahead and sent him the name of the park through a random phone number I generated and said, “Connor you have 90 minutes to be here, or the game continues.” I was outside his house a street over waiting for him to leave. I saw him leave which was around 12:30 am and everyone was asleep in his house. I set a timer on my phone for an hour which was my time to plant everything and get out before Connor was home. I then went to his back porch and planted the baggie of weed at his bedroom window. He was stupid enough to leave his window open and I opened it and went inside his room. I had gloves on at this point before I left my car. I dropped the backpack inside his closet and plugged in the USB that I had prepared into his laptop which was sitting on his desk. I then left through his window locking it before stepping out. I made sure the weed was sitting nicely on the outside of his window. I then walked back to my car. I checked the timer on my phone and it was at 35 minutes. I knew he would be at the park before the timer was up. I went to a closed parking lot that I scoped out before planting the evidence which had a payphone. I called in and said, “392 [Street] there is a large number of drugs which is owned by Connor [last name]. I am sending this tip in and would like to keep it anonymous for my safety.” I hung up and left the parking lot immediately. On my way back home I got a text from Connor replying with “I’m here … what do you want me to do to end this stupid game?” I replied with “It easy … take your phone and throw it into the lake … You will receive your money back after this last task is done.” He said, “How do I know you’re going to follow through on your end?” I said, “If you don’t do it, you don’t get your money …you are a player of my game remember, you follow my rules and you can win.” I then sent another message saying, “Tomorrow check the balance of your bank, and all the money will be back where it rightfully belongs. Goodbye now.” This would be the last step in covering up everything I had messaged him. He is just playing every card I told him without even knowing. I then called the phone 5 minutes later to see if it connected me through. I called and it said, “The phone number you’ve dialed is no longer in service … please call back later.” My plan was now complete and Connor will be arrested within the hour. I got home and went to sleep without a problem. I woke up the next morning and turned the news on. The headline was “Breaking News: Man in local [county] was arrested last night for drug trafficking.” This was music to my ears hearing the lady speak about the details of the arrest and hearing her say Connor’s name. She said it like he was some criminal and boy did I love that. I looked up the details of the arrest on google and clicked on the first link. [Connor ****** arrested last night for drug traffiking] I saw his mug shot and it said under it that he could be sentenced up to 25 years and up to $20,000 in fines for intent to sell crack cocaine. This was the end of Connor’s free life. He was now a convicted felon and would never have his original life back. My game was now completed and he was the pawn to complete it.
Chapter 2
submitted by idonthavemuchtime12 to creepypasta [link] [comments]

IPVanish Review - Why its a great VPN

IPVanish is a popular VPN service particularly with Android and Fire TV Stick users, and it makes a very strong claim on its homepage – that it’s the “World’s Best VPN.”
Seen this sort of statement before, right? It’s certainly one of the leading VPN providers out there, but is it really the best VPN overall?
We never take a provider’s word for it, so we decided to put IPVanish to the test – a very extensive one – to see if its claims are to be believed.
We were particularly keen to find out:
How good is IPVanish? Is it safe to use? Is IPVanish very fast? Does it work with Netflix? Is torrenting and P2P allowed? Is it the best VPN app for Firestick? But before we answer each of these (and many more) questions, lets see the pros and cons of IPVanish VPN:
Pros Cons Very impressive speeds Works with Netflix Great for torrenting & Kodi No-logs policy & no IP/DNS/WebRTC leaks User-friendly apps for PC, Mac, iOS, & Android Good server network across 50 countries Won't work with BBC iPlayer, or in China Short refund period Based in privacy-unfriendly US Desktop app could be more user-friendly Works with
Netflix, HBO, Torrenting, Kodi
Available on
Windows Mac Ios Android Linux Price from
$4.87/mo
As you can see IPVanish certainly does have many strengths to shout about.
It’s now time to take a very close look at the attributes and features of each IPVanish app, starting with how fast it is.
Speed & Reliability IPVanish is a consistently fast VPN
IPVanish is a very fast VPN service, with some of the quickest speeds we’ve seen in our tests.
IPVanish didn’t slow down our connection too much, and it is more than fast enough for HD or 4K streaming.
Speed results from our physical location in London (100Mbps fibre optic connection) to a London test server.
Before using IPVanish:
DOWNLOAD Mbps 93.76
UPLOAD Mbps 97.58
PING ms 2
When connected to IPVanish:
DOWNLOAD Mbps 84.13
UPLOAD Mbps 90.33
PING ms 7
Download speed without IPVanish: 93.76Mbps
Download speed with IPVanish: 84.13Mbps
Our download speed loss when IPVanish is running: 10%
Downloads, uploads and latency when using IPVanish are among the best we’ve seen, making this VPN a very smart choice for gamers and torrenters alike.
It’s also one of the most reliable VPN services we’ve seen, providing consistently fast speeds from one test to the next.
Here are the average speeds you can expect when using IPVanish to connect out to various locations around the world (from the UK):
USA: 53Mbps (download) & 37Mbps (upload) Germany: 76Mbps (download) & 81Mbps (upload) Singapore: 25Mbps (download) & 2Mbps (upload) Australia: 24Mbps (download) & 6Mbps (upload) Server Locations Over 40,000 IP addresses across 77 locations
Globe with a blue flag 50 Countries Image of a city landscape 77 Cities Image of a pink marker 40,000+ IP Addresses See all Server Locations IPVanish VPN gives access to more than 1,300 servers worldwide and over 40,000 IP addresses, which is one of the highest numbers of IP addresses we’ve ever seen. This means that you’re unlikely to experience VPN server congestion and slow speeds while connected to IPVanish.
The 50 countries in IPVanish’s VPN server network are well spread-out, including some less common nations like Moldova and the Philippines (in addition to all the typical countries like US, UK, Canada, Australia, and more).
List of IPVanish server locations
IPVanish provides its customers with city-level options in the US (19 cities), UK (4), Canada (3) Australia (2) and Brazil (2).
US-based users can choose from IPVanish servers in:
Central – Chicago, Dallas, Denver, Houston, Jackson, Milwaukee, St. Louis East – Ashburn, Atlanta, Boston, Cleveland, Miami, New York West – Las Vegas, Los Angeles, Phoenix, Salt Lake City, San Jose, Seattle We’d love to see more city-level selections in Australia – mainly Perth which is located on the West coast – and more server options in South America, where only Brazil and Colombia are served.
The high number of VPN servers in IPVanish’s network is enough to offset these minor complaints, though.
IPVanish is one of the few VPN providers to own its entire (or very close to) server infrastructure, meaning they rent very few servers from third-parties.
Streaming & Torrenting Excellent choice for torrenting & Netflix
Despite IPVanish being one of the fastest VPNs we’ve seen, it’s just not a great VPN for streaming.
Most of IPVanish’s US servers work for Netflix, although it can occasionally take a while to load, but all of its UK servers are currently blocked by BBC iPlayer and according to IPVanish they are not looking to work on fixing this.
If streaming BBC iPlayer is important to you, read through our dedicated guide or take a look at our NordVPN or CyberGhost reviews, two VPN services that work well with BBC iPlayer.
IPVanish has also confirmed it isn’t working with Amazon Prime Video or Hulu at the moment.
Torrenting IPVanish is, however, one of the best VPN services for torrenting we’ve tested, with very fast speeds and a watertight logging policy.
Torrenting is permitted on all of its servers and when we checked for IP/DNS leaks, we found none.
Not to mention that it has a VPN kill switch, but more on this below.
Therefore, we recommend IPVanish VPN for all P2P activity including Kodi for which IPVanish is currently the #1 VPN service.
Bypassing Censorship No good for China
IPVanish is very upfront in saying that the VPN service won’t work in China, despite being equipped with an array of obfuscation tools.
We really appreciate IPVanish’s honesty on this topic. IPVanish also provides a useful list of other countries the VPN won’t work in: you can find this on the support section of the IPVanish website.
List of IPVanish banned countries
IPVanish states that it is “forbidden to do business in”:
Myanmar Cuba Iran North Korea Sudan Syria IPVanish states that its domain, ipvanish.com, is blocked in:
Qatar Saudi Arabia United Arab Emirates (UAE) China Kazakhstan It’s not just IPVanish’s domain that is blocked in these countries, and many users have reported that IPVanish’s apps don’t work either.
If you live or are travelling to a high censorship country then we suggest you consider using VPN services like ExpressVPN or VyprVPN to bypass aggressive internet censors.
Platforms & Devices Works with all major platforms & devices
Apps Windows Logo Windows Mac Logo Mac iOS Logo iOS Android Logo Android Linux Logo Linux Router Logo Router IPVanish has custom VPN apps for all popular mobile and desktop operating systems so you can use them on:
PCs Apple Macs iPhones Android devices You can also setup IPVanish on other devices using manual workarounds (see the ‘Games Consoles & Streaming Devices’ section below).
Games Consoles & Streaming Devices AppleTV Logo AppleTV Amazon Fire TV Logo Amazon Fire TV Chromecast Logo Chromecast Nintendo Logo Nintendo PlayStation Logo PlayStation Roku Logo Roku Xbox Logo Xbox IPVanish is a good VPN to use with gaming consoles and streaming devices.
IPVanish is our number 1 VPN pick for the increasingly popular Amazon Firestick, and it’s super easy to install and use.
You can also use IPVanish on 10 devices at once, which is very generous (the average among the top VPN services is about 5 simultaneous connections).
You can also install IPVanish on your home router so that all your internet traffic at home is protected.
Browser Extensions Unfortunately, IPVanish doesn’t have any VPN browser extensions, which is a shame and one of the very few areas where it seriously lags behind its competitors.
If you want to use a VPN extension with your web browser then take a look at our:
Best VPN extensions for Chrome Best VPN addons for Firefox Encryption & Security One of the safest providers we’ve reviewed
Protocol IKEv2/IPSec
L2TP/IPSec
OpenVPN (TCP/UDP)
PPTP
Encryption AES-256
Security DNS Leak Blocking
First-party DNS
IPV6 Leak Blocking
Supports TCP Port 443
VPN Kill Switch
Advanced features SOCKS
Please see our VPN Glossary if these terms confuse you and would like to learn more.
We believe that IPVanish is one of the most secure and private VPN services available.
IPVanish mainly uses the OpenVPN and IKEv2 protocols and encrypts your online traffic with the ‘unbreakable’ AES-256 cipher, meaning you’re protected at all times. You can also connect using L2TP/IPsec, if you’d prefer.
IPVanish has a VPN kill switch to protect your privacy in case of a connection drop, plus a host of other advanced features to secure your web browsing. This includes SOCKS5 web proxy, which masks your IP address during P2P and VoIP connections – although this doesn’t encrypt traffic.
We also found IPVanish to be extremely safe, and free of IP or DNS leaks in our most recent tests:
IPVanish leak test results from browserleaks.com IPVanish’s leak test results when connected to its Chicago server
Logging Policy No-logs policy makes up for US jurisdiction
IPVanish doesn’t collect any user data at all, making it a no-logs VPN service.
Considering most VPN logging policies track at least server load or login information for maintenance purposes, this is what makes IPVanish a standout VPN for privacy.
In 2016, when under previous management, IPVanish was however found to be collecting logs when it handed information over to US authorities to aid in the prosecution of a user.
Since being acquired a number of times since then, IPVanish has turned things around and we have no longer concerns about its approach to user privacy.
Jurisdiction IPVanish VPN was first released in 2012 by its former US-based owner HighWinds Network Group. IPVanish has since been acquired by StackPath and in 2019 by J2 Global which are both US-based companies.
As you can see IPVanish is, and has always been, operated by companies headquartered in the US, which does have very intrusive surveillance laws and is a member of the Five-Eyes data sharing agreement.
IPVanish being based in the US is largely irrelevant though as its no-logs policy means no identifiable information is collected by the VPN provider.
Ease of Use User-friendly install with lots of advanced features
How to Install & Set Up IPVanish Screenshot of the Windows download button on the IPVanish website Beginning the installation process is as simple as clicking the button to download the relevant software from the site.
Screenshot of the progress of our IPVanish Windows download You can check the progress of the installation here, but it usually only takes a couple of minutes from start to finish.
Screenshot of the completed IPVanish download Once the software is downloaded, you'll see this screen which prompts you to run the IPVanish app.
Screenshot of IPVanish's main dashboard on its Windows app IPVanish main dashboard shows key connection info and permits server selection. We like the nice graph too.
Screenshot of IPVanish's server list in the Windows app Power users will select servers from the main dashboard rather than the server list as it's a slicker experience.
Screenshot of the server location filters in the IPVanish desktop app IPVanish server list view with filters - it's mostly pretty good but not as optimal as using the main dashboard.
Screenshot of the advanced settings in IPVanish's desktop app IPVanish is rich with advanced settings for customizing connections and it's well laid out to boot. Nice!
IPVanish’s desktop VPN apps are perfectly simple to use, even if they could do with a bit of a visual overhaul as they are starting to look a little out-dated.
The advanced privacy settings are also easy to navigate, making IPVanish suited to both VPN beginners and more experienced users.
The mobile IPVanish apps lack a few key features, such as the VPN kill switch, but they do still provide a very good, user-friendly experience.
Customer Support Helpful support with 24/7 live chat
24/7 Email support Online Resources We found IPVanish customer support agents to be friendly and helpful no matter what we asked them about the VPN service.
Thanks to a recent update, IPVanish now also has 24-hour live chat support on its website.
IPVanish also has excellent email support, which provided us with impressively well-written responses, as well as an online FAQ for straightforward solutions to the most common issues.
If for any reason IPVanish isn’t working properly, you should be able to fix it quickly by following these guides.
Pricing & Deals Well worth it for the level of service
IPVanish Coupon IPVanish logo IPVanish
Get 60% off IPVanish's 12-month plan
TestedEnds 22 Aug Get CodeED Terms IPVanish Pricing Plan IPVanish is reasonably priced and affordable. It is neither the cheapest VPN service, nor the most expensive. You can pay for IPVanish monthly or on an annual basis.
$4.87 per month on the 12-month plan is a very good price, especially as it’s 60% cheaper than the standard one-month plan, priced at $11.99.
There’s also a 3-month option for $6.75 per month.
Monthly
US$7.50/mo
Billed $7.50 for the first month Save 38% 3 Months
US$6.75/mo
Billed $20.24 for the first 3 months Save 44% 12 Months
US$4.87/mo
Billed $58.49 for the first 12 months Save 60% All plans have 7-day money-back guarantee
Payment & Refund Options The IPVanish seven-day money-back guarantee is 100% no-questions-asked and refunds your money within 10 working days.
Our only issue is with IPVanish’s iOS policy – if you sign up for an IPVanish login via the iOS Store then you don’t qualify for the money back guarantee.
IPVanish only accepts credit cards, debit cards, and PayPal.
Unfortunately neither cryptocurrencies like Bitcoin nor international options like Alipay are currently accepted.
submitted by Zinkzd to VPNsReddit [link] [comments]

Basics for how to do carding

Basics for how to do carding
Points we will go through:
- What is carding? - What are the factors relates to carding? - How it’s done - the process itself. - Precautionary measures Carder should take.
Overview:
Nowadays, if we see the credit card fraud trend, it is being increased day by day and new techniques being discovered to hack the credit card info and use it for malicious purpose so it's a good growing business.
As everything goes cashless, the use of a credit card will be necessary for everyone.
There are so many ways to get the credit card details available on the internet through Darknet sites as well as on TOR sites (Data Leak .etc.).
As we can see on social media sites and groups, most of the carders provide the offers which are collected from Online Sites, offline stores etc. and groups for your reference:
Be aware that you should never contact a ripper. A Ripper is a fraud who takes the money and never deliver the product.
Bad ways are: Facebook and WhatsApp groups
Let’s start with the basics.

Introduction to Carding and Key Points:

There are multiple definitions available per different views.
Carding itself is defined as the illegal use of the card (Credit/Debit) by unauthorized people (carder) to buy a product.
1.1 Key points in carding method.
2. Let start to understand each point one by one.
2.1 Computer (PC):
For doing carding always use a computer. I know some methods using a mobile device, but it is less secure and involves more risk.
2.2 SOCKS:
SOCKS stands for SOCKet Secure. It is internet protocol which allows client and server traffic pass through a proxy server, so real IP is getting hidden and proxy IP get reflected.
This is useful while carding because carder wants to use the credit card holder’s location while doing it.
Users can buy SOCKS.
2.3 Mac Address Changer and crypting:
MAC stands for Media Access Control. It is the unique address of every Network Interface Card (NIC).
A MAC address changer allows you to change the MAC address of NIC instantly. It is required to be anonymous and safe.
Sure the best way is to have your computer encrypted - find some software to encrypt the PC. E.x. Best Crypt. Do not forget to fully turn off the PC while moving somewhere.
2.4 CCleaner:
It is very useful tool help in cleaning your browsing history, cookies, temp files, etc.
Many people ignore this part and get caught, so be careful and don’t forget to use it.
2.5 RDP (Remote Desktop Protocol):
RDP allows one computer to connect to another computer within the network. It is protocol developed by Microsoft.
Basically, carders use it to connect to computers of the geolocation of the person whose credit card carder want to use. It is used for safety and stay anon. Here carders using others’ PC for doing carding instead of their own.
2.6 DROP:
DROP is an address which the carder uses for the shipping address in the carding process.
Let me explain in details with an example:
If I am carding with US credit card, then I use USA address as shipping address then my order will be shipped successfully, and I will be safe. If you have relatives/friends, then no problem, otherwise use sites who provide drop services only we have to pay extra for shipping it.
2.7 credit card (Credit Card):
This part is very much important so read it carefully. Any credit card it is in the following format:
| credit card Number | Exp Date | CVV2 code | Name on the Card | Address | City | State | Country | Zip code | Phone number (sometimes not included depending on where you get your credit card from)|
e.g.: (randomly taken numbedetails)
| 4305873969346315 | 05 | 2018 | 591 | UNITED STATES | John Mechanic | 201
Stone Wayne Lane | Easternton | MA | 01949 |

Types of Credit Card:

Every Credit card company starts their credit card number with a unique number to identify individually like shown below
American Express (AMEX Card) – 3
Visa Card – 4
Master Card – 5
Discover (Disco) – 6
Company wise credit card details:

Visa

Classic: The Card is used worldwide in any locations designated by Visa, including ATMs, real and virtual Stores, and shops offering goods and services by mail and telephone.
Gold – This card has a higher limit capacity. Most used card and adopted worldwide.
Platinum – Card is having limits over $10,000.
Signature – No preset spending limit – great bin to get
Infinite – Most prestigious card with having virtually no limit. There is less in circulation so be alert when buying these. Use only with reputable sellers!
Business – it can be used for small to medium sized businesses, usually has a limit.
Corporate – it can be used with medium to large size businesses, having more limit than a Business card.
Black – It has limited membership. It has no limit only having $500 annual fee, high-end card.

MasterCard

Standard – it is same as classic visa card.
Gold – it is same as visa gold card.
Platinum – it is same as visa platinum card
World – it has a very high limit.
World Elite – it is virtually no limit, high-end card.

Amex Card

Gold – it usually has around a 10k limit.
Platinum- is usually has a higher limit (around 35k).
Centurion – it has a High limit (75k+). It is also known as the black card, note: do not confuse with visa black card.
Now we can start with some of the questionnaire and Basic concepts before start practical process of Carding.
Q1. What is BIN?
It is known as Bank Identification Number (BIN). It is a 6-digit number e.g.: 431408.
Some of the reference sites which give BIN info which I also refer:
www.bins.pro
www.binlists.com
www.exactbins.com
Simply go to the site (www.bins.pro) enter BIN number and click on find to get the details. I have added first 4 digits only.
You can filter out the option as per requirement shown below
We got most of the information from the site. Now the question is how to know the balance of CC. is it possible? and answer is Yes, I will let you know step by step using normal as well as Skype method J
Q2. What is the meaning of VBV, NON VBV and MSC?
VBV (Verified by Visa) – Extra level protection is added by Visa to protect the Card from fraud.
Like DOB, password, Social Security Number and Mother’s name, etc. also sending OTP (one-time password) as extra security level to card owner mobile number to validate the transaction.
NON VBV (Verified by Visa) –Handy to use. No need extra information as specified in VBV card while doing the transaction.
Note it down (IMP)- Carders mainly buy and use NON VBV cards for carding.
MSC (MasterCard Secure Code) – security level same as VBV card.
Q3. What is AVS?
It stands for Address Verification System
It is the system which is used to identify the credit card holder original address with billing address provided by the user while shopping or online transaction.
The system is used to identify the online fraud over the internet.
Q4. How to check credit card is live or dead?
There are many sites available on the internet to verify credit card is live or dead, but they charge for it approx. $0.001 (price may vary). Also, 80% websites kill the credit card so never use it.
There are tools also available on the internet to check the credit card status, but most of them are a backdoor or Trojan so prefer not to use it.
As such there is no easy method to check it. Carder uses own ways to find it out. One of the ways is…
Most carder go to Porn sites, buy a membership and confirm the credit card is live and proceed with carding.
Q5. How to check the credit card is live or dead? (Skype Method)
(Note: method is posted on March 16)
Login into Skype account and call on Magic number +18005xx5633 (masked). You will connect to voice mail (lady’s voice). Start by entering the credit card number, and voice mail lady will stop automatically.
After that enter Expiry date of a card like 01 16 (mm: yy format).
If your credit card is live then voice mail lady will speak like “Thank you for calling, we really appreciate your business, since u are a 1st-time caller we would like to connect you .. blah blah” then just hang the call.
But if the credit card is used and voice mail lady speak like “Ohh I’m sorry please re-enter your credit card number now” then the card is dead. You can repeat the same process as many time you want.
Note: You need a good internet connection for Skype calls.
Q6. What is Bill=ship/Bill=CC/Ship=your Address?
Kindly pay attention here as it is also the main portion in carding process. Any mistake will cancel the order and id get blocked.
BILL=SHIP (Billing address: Shipping address)
Take a scenario of normal online shopping scenario, when you are doing carding you will use billing address and shipping address are same. Means in both u will use your address. No need to use credit card address.
Bill=Shipping address, Ship=your address
When you are doing carding, you will use credit card holder address as your billing address, and shipping address will be your address. Most sites use this method. Now we cleared basic concepts and start with the actual process of carding. Setup SOCKS proxy in Firefox:
Follow the steps: open Firefox, go to options, advanced options, network
A pop-up will come. It will show options
No proxy 2. Auto Detect 3. Use system proxy 4. Manual proxy configuration
Select manual proxy configuration. Enter socks host: <> and port: <> e.g.: 141.141.141.141: 8080. Press ok and restart Firefox. Now you are connected to secure Socks5 J
Ethical Hacking Training – Resources (InfoSec)
Note: when you buy a socks always match with credit card holder address. If credit card holder is from California, USA then try to get SOCKS5 at least matching state, country J
Guys now time to start the Carding process. Kindly follow the steps:
Create the email id matching with credit card holder name. If his name is John Cena ( the random name was taken), then email id should be [email protected] or near about.
Now Run RDP and connect to the credit card holder location system to proceed. If you didn’t have RDP, then follow following steps.
Open MAC changer and change the address randomly.
Run CCleaner and clean all the unwanted data (cookies/history/temp data etc.).
Setup SOCKS5 proxy in Firefox. <>.
Be sure to use SOCK5 is matching to the location of credit card holder and be aware not to use blacklisted IP. Check with www.check2ip.com
Open the site for shopping. I want to recommend a website shop from your country because you don`t need to wait a lot for your package.
Register with credit card holder information (John Cena), name, country, city, address, and email.
Shop and choose your item and add to cart. Precaution: Select item not more than $500 at first step.
In shipping address add your address or drop address where the product is going to deliver.
Then go to the payment page and choose payment method like a credit card.
Enter all details of credit card manually because most of site having copy paste detector script.
Finally, in billing address add credit card owner address info and then proceed with the payment process.
If everything all right then the order will get successfully placed.
Once the order arrives at the shipping address, receive it from delivery boy. (Few carder arrange fake id if delivery boy ask for proof).
Carding method using mobile:
Extra pro carder uses mobile for doing carding. If you followed steps carefully, you would also do that.
Basic requirement:
Require rooted Android mobile.
Install few application require for carding (proxy apps, CCleaner, IMEI changer, Photo and Android ID changer).
You can use any VPN for carding I recommend HMA or Zen mate.
You can use SOCKS5 proxy with proxy droid apps.
Also, proceed with IMEI and Android ID changer and do it.
Now connect with proxy droid with SOCKS5 proxy and connect it.
Now follow all the steps explained above.
Reference:
CC and dumps shop to buy www.antigreedy.com
Buy SOCKS
Download CCleaner
Download MAC address
Download SOCKS
Acronyms: BIN: Bank Identification Number CC: Credit Card CCN: Credit Card Number CVV/CVV2: Credit Verification Value (Card Security Code) SSN: Social Security Number MMN: Mother Maiden Name DOB: Date Of Birth COB: Change of Billing VBV: Verified by Visa MCSC: MasterCard Secure Code POS: Point of Sale VPN: Virtual Private Network BTC: Bitcoin
Personal Advice:
Be safe and have fun, get money.

*Telegram @AntiGreedy
*ICQ 743526859
*Jabber [antigreedy_[email protected]](mailto:[email protected])
* www.antigreedy.com
* antigreedy.bazar
*TOR - antig4vt6kvg7am6.onion
submitted by antigreedy to u/antigreedy [link] [comments]

A tour of the Gridcoin wallet

Hey guys, I thought I would put together an in-depth tour of the Gridcoin wallet software for all of our recent newcomers. Here I'll be outlining all the features and functions the windows GUI wallet has to offer, along with some basic RPC command usage. I'll be using the windows wallet as an example, but both linux and macOS should be rather similar. I'll be including as many pictures as I can as embedded hyperlinks.
Edit: Note that since I originally made this there has been a UI update, so your client will be different colors but all the button locations are in the same place.
This is my first post like this, so please forgive me if this appears a little scatter-brained.
This will not cover the mining setup process for pool or solo miners.
When you launch the wallet software for the first time you should be greeted with this screen.

OVERVIEW TAB

After that prompt, you should be left sitting on the main overview tab with several fields on it.
From top to bottom:

SEND TAB

Now onto the other tabs on the left side. Currently we're on the Overview tab, lets move down to the Send tab. This tab it pretty self-explanatory, you use it if you want to send coins, but I'll go over the fields here:
  • Pay To: Enter a valid gridcoin address to send coins too. Gridcoin addresses always start with an S or and R.
  • Label: Enter a label here and it will put that address in your "address book" under that label for later use. You can leave it blank if you don't want it in your address book.
  • Message: Enter a message here if you want it attached to your transaction.
  • Amount: How many coins you want to send.
  • Add Attachment: Leave this alone, it is broken.
  • Track Coins: This doesn't do anything.

RECEIVE TAB

Now down to the Receive tab. Here you should have a single address listed. If you double click on the label field, you can edit it's label.
  • New: Generate a new address.
If you click on an address, the rest of the options should be clickable.
  • Copy: Copy the selected address to your clipboard.
  • Show QR Code: Show a scan-able QR code for the selected address.
  • Sign Message: Cryptographically sign a message using the selected address.

TRANSACTIONS TAB

The Transactions tab is pretty boring considering we have no transactions yet. But as you can see there are some sorting tools at the top for when you do have transactions listed.

ADDRESS BOOK TAB

The Address Book is where all the addresses you've labeled (that aren't yours) will show up.
  • Verify Message: Verifies a message was signed by the selected address.
The rest of the functions are similar to the functions on the Receive tab.

VOTING TAB

Onto the Voting tab. There wont be any polls because we aren't in sync yet.
  • Reload Polls: Pretty self-explanatory, I've never had to use this.
  • Load History: By default, the wallet will only display active polls. If you want to view past polls you can use this.
  • Create Poll: You can create a network-wide poll. You must have 100,000 coins as a requirement to make a poll. (Creating a poll does not consume the coins)
Here's what the Voting tab will look like once you're in sync

CONTEXT BAR

Now onto the context bar menus on the top.
Under File you have:
  • Backup Wallet/Config: This lets you backup your wallet configuration file just in case.
  • Export: You can export your Transactions tab or Address Book in CSV format.
  • Sign message: Does the same thing as on the Receive tab.
  • Verify message: Does the same thing as on the Address Book tab.
  • Exit: Close the wallet.
Under Settings you have:
  • Encrypt Wallet: Encrypts your wallet with a password. (we'll come back to this)
  • Change Passphrase: Allows you to change your encryption password.
  • Options: Opens the options menu. (We'll come back to this)
Under Community you have:
Under Advanced you have:
  • Advanced Configuration: Opens the Advanced Configuration menu. (Not so advanced if you ask me)
  • Neural Network: Allows you to view solo miners project statistics. It will be largely blank if you're not in sync yet.
  • FAQ: Don't touch this, It is broken.
  • Foundation: Don't touch this, It is broken.
  • Rebuild Block Chain: Starts the client syncing from 0. Don't worry, using this will not make you lose coins.
  • Download Blocks: Downloads the latest official snapshot, can help speed up syncing. The download progress tends to sit at 99.99% for a long time, don't worry, it's working.
Under Help you have:
  • Debug window: Opens the debug window. (We'll come back to this)
  • Diagnostics: Don't touch this, it is broken. This has since been fixed. You can use this to see if there is anything wrong with your setup.
  • About Gridcoin: Opens the About Dialog. This gives you your client version and other information.

OPTIONS

Now back to the options menu under Settings > Options.
Here we have the options menu main tab:
  • Pay transaction fee: The transaction fee that will be automatically paid when you make a transaction.
  • Reserve: You can reserve an amount so that it will always be available for spending.
  • Start Gridcoin on system login: Pretty self-explanatory
  • Detach databases at shutdown: Speeds up shutdown, but causes your blockchain file to no longer be portable.
On the Network tab:
  • Map port using UPnP: Attempts to connect to nodes through UPnP.
  • Connect through SOCKS proxy: Allows you to connect through a proxy.
The window tab is pretty self-explanatory.
The Display tab is also pretty self-explanatory, with the exception of:
  • Display coin control features (experts only!): This allows you to have a great deal of control over the coins in your wallet, check this for now and I'll explain how to use it further down. Don't forget to click "Apply".

ENCRYPTING YOUR WALLET

Now that all of that is out of the way. The first thing you'll want to do is encrypt your wallet. This prevents anybody with access to your computer from sending coins. This is something I would recommend everyone do.
Go to Settings > Encrypt Wallet and create a password. YOU CANNOT RECOVER YOUR COINS IF YOU FORGET YOUR PASSWORD.
Your wallet will close and you will have to start it up again. This time when it opens up, you should have a new button in the bottom left. Now if you want to stake you will have to unlock your wallet. Notice the "For staking only" box that is checked by default. If you want to send a beacon for solo mining or vote, you will need to uncheck this box.

GETTING IN SYNC AND ICONS

Before we continue, Let's wait until we're in sync. Depending on your internet speeds, this could take from several hours to over a day or 2. This can be sped up by using Advanced > Download Blocks, but this can still take several hours.
This is what an in-sync client should look like. Notice the green check to the right of the Receive tab. All of these icons give you information when you hover your mouse over them.
The lock
The arrow tells you if you're staking. If you aren't staking, it will tell you why you're not staking. If you are staking it will give you an estimated staking time. Staking is a very random process and this is only an estimate, not a countdown.
The connection bars tell you how many connections to the network you have.
The check tells you if you're in sync.

WHAT IS STAKING?

Now I've said "stake" about a million times so far and haven't explained it. Gridcoin is a Proof of Stake (PoS) coin.
Unlike bitcoins Proof of Work (PoW), PoS uses little system resources, so you can use those resources for scientific work. PoS works by users "Staking" with their balance. The higher the balance, the higher the chance to create, or "stake" a block. This means you need to have a positive balance in order to stake. Theoretically, you can stake with any amount over 0.0125 coins, but in practice it's recommended to have at least 2000 coins to reliably stake.
Staking is important for solo miners, because they get paid when they stake. Pool miners don't need to stake in order to get paid however. So if you want to solo mine, you'll need to buy some coins from an exchange or start in the pool first and move to solo when you have enough coins.
In addition to Research Rewards for miners, anyone who holds coins (solo miners, pool miners, and investors) gets 1.5% interest annually on top of your coins. So it can be beneficial for pool miners to stake as well.
Here is a snippet of what a research rewards transaction looks like from my personal wallet. I have a label on that address of "Payout address" as you can see here.

UTXOS AND COIN CONTROL

At this point you'll need some coins. You can use one of our faucets like this one or this one to test coin control out.
First let me explain what a UTXO is. UTXO stands for Unspent Transaction Output. Say you have an address with 0 coins in it, and someone sends you 10 coins like I've done here. Those 10 coins are added to that address in the form of a UTXO, so we have an address with one 10 coin UTXO in it.
Now we receive another 5 coins at the same address, like so. Now we have an address with one 10 coin UTXO and one 5 coin UTXO. But how do we view how our addresses are split up into different UTXOs?
Earlier we checked the "Display coin control features" box in Settings > Options > Display. Once that's checked you'll notice there's another section in the Send tab labeled "Coin Control Features". If you click the "Inputs" button, you'll get a new window. And look, there's our 2 UTXOs.
All UTXOs try to stake separately from each other, and remember that the chance a UTXO has to stake is proportional to it's size. So in this situation, my 10 coin UTXO has twice the chance to stake as my 5 coin UTXO. Now wallets, especially ones that make a lot of transactions, can get very fragmented over time. I've fragmented my wallet a little so I can show you what I'm talking about.
How do we clean this up? We can consolidate all this into one UTXO by checking all the boxes on the left and selecting OK.
Now pay attention to the fields on the top:
  • Quantity: The total amount of UTXOs we have selected.
  • Amount: The total amount of coins we have selected.
  • Fee: How much it would cost in fees to send all those UTXOs (more UTXOs = more transaction data = more fees)
  • After Fee: Amount - Fees.
  • Bytes: How large the transaction is in bytes.
  • Priority: How your client would prioritize making a transaction with this specific set of UTXOs selected had you not used coin control.
  • Low Output: If your transaction is less than 0.01 coins (I think).
  • Change: What you will get back in change.
  • custom change address: You can set the address you get your change back at, by default it will generate a new address.
So let's fill out our transaction so we end up with 1 UTXO at the end.
In "Pay To:" Just put any address in your wallet, and for the amount put what it has listed in the "After Fee" Field. Just like this.
Notice how we get no change back.
Now click "Send", we'll be prompted to enter our passphrase and we're asked if we want to pay the fee, go ahead and click "Yes".
Now if we go back to the Overview tab we get this funky icon. If you hover your mouse over it, it says "Payment to yourself", and the -0.0002 GRC is the network transaction fee.
(Ignore the first one, that was me fragmenting my wallet)
Now if we look at the Coin Control menu, we can see that we've slimmed our wallet down from 7 UTXOs to 1.
Now why would you want to use coin control?
2 Situations:
  1. UTXOs less than 0.0125 coins cannot stake. So you can combine a lot of tiny, useless UTXOs into 1 bigger one that can stake.
  2. After a UTXO stakes, it cannot stake for another 16 hours. So if you have 1 large UTXO that is big enough to stake more than once every 16 hours, you can split it into smaller UTXOs which can allow you to stake slightly more often.
  3. By default, the wallet will always generate a new address for change, which can make your wallet get very messy if you're sending lots of transactions. Keep in mind that more UTXOs = larger transactions = more fees.
Sidenote - When you stake, you will earn all research rewards owed reguardless of which UTXO staked. However, you'll earn the 1.5% interest for that UTXO. Not your whole wallet.

FORKING

A fork is when the network splits into multiple chains, with part of the network on each chain. A fork can happen when 2 blocks are staked by different clients at the same time or very close to the same time, or when your client rejects a block that should have been accepted due to a bug in the code or through some other unique circumstance.
How do I know if I'm on a fork?
Generally you can spot a fork by looking at the difficulty on your Overview tab. With current network conditions, if your difficulty is below 0.1, then you're probably on a fork.
You can confirm this by comparing your blockhash with someone elses, like a block explorer.
Go to [Help > Debug Window > Console]. This is the RPC console, we can use to do a lot of things. You can type help to get a list of commands, and you can type help [command you need help with] (without the brackets) to get information on a command. We'll be using the getblockhash [block number] command.
Type getblockhash [block number] in the console, but replace [block number] with the number listed next to the "Blocks:" field on the Overview tab.
This will spit out a crazy string of characters, this is the "blockhash" of that block.
Now head over to your favorite block explorer, I'll be using gridcoinstats. Find the block that you have the hash for, use the search bar or just find it in the list of blocks.
Now compare your hash with the one gridcoinstats gives you. Does it match?
If it matches, then you're probably good to go. If it matches but you still think you're on a fork, then you can try other block explorers, such as gridcoin.network or neuralminer.io.
If it doesn't match, then you need to try to get off that fork.
How do I get off a fork?
  1. Just wait for an hour or two. 95% of the time your client is able to recover itself from a fork given a little time.
  2. Restart the client, wait a few minutes to see if it fixes itself. If it doesn't restart again and wait. Repeat about 4 or 5 times.
  3. Find where the fork started. Using the getblockhash command, go back some blocks and compare hashes with that on a block explorer so you can narrow down what the last block you and the block explorer had in common. Then use reorganize [the last block hash you had in common]. Note that reorganize takes a blockhash, not a block number.
  4. Use Advanced > Download Blocks.
  5. If none of this works, you can take a look at social media (reddit/steemit) and see what other people are saying.

CONFIGURATION FILE

Your configuration file depends on your operation system:
  • On Windows: %appdata%\GridcoinResearch\
  • On Linux: ~/.GridcoinResearch/
  • On MacOS: /Users/USERNAME/Library/Application/Support/GridcoinResearch/
And it should look like this.
If you open up your gridcoinresearch.conf, you'll see the default one it generated. Note that if you entered your email earlier, the first line will have your email on it instead of "investor". If you decided you want to solo mine but didn't enter your email when you first started the wallet, go ahead and put your email on the first line in place of "investor". If you're a pool miner, just leave it as "investor".
Next, it's recommended that you use the addnodes on the gridcoin wiki. So our gridcoinresearch.conf will look like this.
A useful line for solo miners is PrimaryCPID=[YOUR CPID]. Sometimes your wallet can pick up on the wrong CPID so it's good to have that in there if you're solo mining.

RUNNING A LISTENING NODE

A listening node is a node that listens for blocks and transactions broadcasted from nodes and forwards them on to other nodes. For example, during the syncing process when you're getting your node running for the first time, you're downloading all the blocks from listening nodes. So running a listening node helps support the network.
Running a gridcoin listening node is simple. All you need to do is add listen=1 to your gridcoinresearch.conf and you need to forward port 32749 on your router.
If you don't know how to port forward, I'd suggest googling "How to port forward [your router manufacturer]".

QUICK LINKS

Gridcoin.us Official Website
Gridcoin.science Unofficial Website
Gridcoinstats.eu Block Explorer
NeuralMiner.io Block Explorer
Gridcoinstats.eu Faucet
Gridcoin.ch Faucet
Gridcoin Wiki
Gridcoin Github
GRCPool
Arikado Pool
And that's all I have for now!
I plan to keep this post up-to-date with changes in the client. So if anyone has any suggestions, have clarifications they want made, or maybe I got something wrong, then please feel free to leave a comment below or PM me!
submitted by Personthingman2 to gridcoin [link] [comments]

Private Internet Access Review - An in-depth review

Private Internet Access talks a big game on its website. In among all the technical jargon it boasts that it’s “the most trusted name in anonymous VPN service.”
Its name certainly promises as much, but can you trust Private Internet Access to give you the VPN speeds and security you need?
We’ve spent days testing Private Internet Access to answer all your questions, such as:
Is Private Internet Access trustworthy? What does Private Internet Access do? Does Private Internet Access work with Hulu? Does Private Internet Access keep logs? Who owns Private Internet Access? Before we get stuck in, let’s take a look at the basics of Private Internet Access, along with what we found to be its main pros and cons:
Pros
Excellent speeds - 87Mbps global average Easy, high-speed access to Netflix Unlimited P2P & torrenting Keeps no usage logs & no IP/DNS leaks 3,300+ servers across 32 countries User-friendly apps for PC, Mac, iOS, & Android Cons Small server network compared to top-tier providers Based in the privacy-unfriendly US Email support can be slow, limited live chat Patchy access in China Works with
Netflix, Amazon Prime, Hulu, Now TV, HBO, Sling TV, Torrenting, Kodi
Available on
Windows Mac Ios Android Linux Price from
$2.91/mo
Private Internet Access is an incredibly fast VPN, with some excellent features that make it ideal for privacy advocates. It’s not perfect, though – read on to find out more.
Speed & Reliability Very fast and impressive speeds
Private Internet Access is a very fast VPN.
PIA’s best VPN servers are impressive for speed: if you live near London, New York or Toronto and want to connect locally you won’t find a faster provider in the current market.
We were also highly impressed with PIA’s global performance, with very fast average download speed of 87Mbps. This is one the highest we’ve seen from any provider, making it a fantastic choice for P2P users and torrenters.
Speed results from our physical location in London (100Mbps fibre optic connection) to a London test server.
Before using Private Internet Access:
DOWNLOAD Mbps 92
UPLOAD Mbps 99
PING ms 2
When connected to Private Internet Access:
DOWNLOAD Mbps 47
UPLOAD Mbps 74
PING ms 12
Download speed without Private Internet Acess: 92Mbps
Download speed with Private Internet Access: 47Mbps
Our download speed loss when Private Internet Access is running: 50%
Gamers will love PIA’s practically non-existent latency of less than 1ms in some locations.
It also has exceptional upload speeds – you can expect 268Mbps at the best of times.
We put all of the VPNs on the site through a rigorous scientific speed testing process, determining the average speeds from multiple locations across the globe. These are the average speeds you can expect to pick up from these locations:
USA: 31Mbps (download) & 38Mbps (upload) Germany: 85Mbps (download) & 72Mbps (upload) Singapore: 26Mbps (download) & 9Mbps (upload) Australia: 35Mbps (download) & 10Mbps (upload) Server Locations Important locations are covered, the server list is small
Globe with a blue flag 32 Countries Image of a city landscape 52 Cities Image of a pink marker 3,300+ IP Addresses See all Server Locations Private Internet Access’ servers are spread over 33 countries – a smaller selection than many of its big-name rivals, although every PIA location is courtesy of a real physical server.
While 3,300-plus VPN servers is a fantastic amount, it’s likely that there’s only one IP address for each. That’s a good number, but VPN services like IPVanish (40,000) and VyprVPN (200,000) have far more.
PIA VPN covers all the most popular locations in a good global spread, while 14 separate cities (and 1,500 servers) within the US is outstanding. There’s also city-level selection in the UK, Canada, Australia, and Germany.
Private Internet Access Server Locations on the Private Internet Access Website
Streaming & Torrenting Good for Netflix, great for torrenting
Private Internet Access’ huge array of US servers means that unblocking Netflix is never more than one or two clicks away. We found access through its Washington DC, Atlanta, Chicago and Houston servers to be very reliable, and less so with US East, New York City, Florida and California servers.
Access to BBC iPlayer had recently stopped working for us, and Private Internet Access has said that rectifying it is not a priority for the service. Our most recent tests, however, had success accessing the service.
Private Internet Access is also a popular choice with viewers of a whole range of other big streaming services. Plenty of subscribers enjoy using Private Internet Access with:
Amazon Prime Video Hulu HBO Sling TV Sky Now TV PlayStation Vue Torrenting Private Internet Access is a very, very good VPN for torrenting.
P2P traffic is permitted on all servers and the market-leading upload and download speeds ensure rapid file transfers and buffer-free Kodi.
It has a VPN kill switch to keep your identity safe while you download or seed, it’s totally protected from IP and DNS leaks, and its logging policy ensures your traffic will be kept private and anonymous.
Bypassing Censorship No good in China but works well in other countries
Private Internet Access is unusable in large parts of China as the government has successfully managed to block it via the Great Firewall. Reports and anecdotes from users suggest that it still works in Beijing at least, for example.
Unless you want to spend a lot of time tampering with long-winded manual configurations, you’ll be better off finding another VPN service, though – our roundup of the best VPNs for China should help.
PIA will still work to unlock the internet in slightly less dilligent nations though, such as Turkey, Iran or Saudi Arabia.
Platforms & Devices Works across all platforms, and router too
Apps Windows Logo Windows Mac Logo Mac iOS Logo iOS Android Logo Android Linux Logo Linux Router Logo Router There are custom apps to get Private Internet Access running on all the popular operating systems, both desktop and mobile, while a router-level installation will cover everything else.
Private Internet Access works with Microsoft Windows, Apple MacOS, Android, iPhone and more.
You can use Private Internet Access on a number of devices, up to ten in total. Manual setup guides are also available on the Private Internet Access website to help walk you through more obscure platforms or older OS versions.
Games Consoles & Streaming Devices AppleTV Logo AppleTV Amazon Fire TV Logo Amazon Fire TV Chromecast Logo Chromecast Nintendo Logo Nintendo PlayStation Logo PlayStation Roku Logo Roku Xbox Logo Xbox Private Internet Access offers a custom app for Amazon Fire TV and Stick. Installing the app requires a little bit of technical knowhow, but once installed you’ll be able to choose servers all around the world and access your favorite video content.
It’s also possible to use PIA’s software with other streaming devices and games consoles, like the PlayStation 4, Xbox One or Google Chromecast, by connecting them to a configured router.
Browser Extensions Chrome Logo Chrome Firefox Logo Firefox Private Internet Access also has browser extensions for Google Chrome, Mozilla Firefox, and Opera, which protect your browser traffic.
They’re just proxies, but still protect your IP address and prevent WebRTC leaks when surfing the web. You can learn more about the differences between VPNs and proxies with our guide.
Encryption & Security One of the most secure VPNs around
Protocol L2TP/IPSec
OpenVPN (TCP/UDP)
PPTP
Encryption AES-128
AES-256
Security DNS Leak Blocking
First-party DNS
IPV6 Leak Blocking
Supports TCP Port 443
VPN Kill Switch
WebRTC Leak Blocking
Advanced features Ad Blocker
SOCKS
Please see our VPN Glossary if these terms confuse you and would like to learn more.
After all this, you’re still probably wondering one question: is Private Internet Access trustworthy?
We can safely say that the answer is yes. Private Internet Access is one of the most advanced VPNs on the market, sure to satisfy even the most demanding of users.
A screenshot of PIA's recommended security configurations PIA’s recommended security configurations
You get a broad choice of protocols with Private Internet Access (including our favorite, OpenVPN), encryption (including AES-256), an ad and malware blocker (PIA MACE), TCP Port 443, as well as a kill switch.
It also features IPV6 leak protection, although it’s unlikely you’ll need that right now – still, it’s good future-proofing for when IPV6 eventually becomes the new internet standard (you can learn more about IPV6 here).
One small thing we’d change is that PIA VPN offers PPTP as a protocol, but not IKEv2. We prefer OpenVPN to IKEv2, but some users like that it often gives you faster VPN connection speeds. PPTP, on the other hand, is old and insecure and shouldn’t really be used by anyone.
On top of all that, we also found it didn’t leak our IP or DNS – Private Internet Access operates its own DNS servers, which helps.
Logging Policy Absolutely no logging information kept
Private Internet Access keeps absolutely no VPN logs whatsoever – you can use the service with total peace of mind that your data and traffic is not being monitored, nor can it be traced back to you.
Jurisdiction Private Internet Access first launched in 2010 and is owned by London Trust Media, a firm with a diverse portfolio of products and a particular focus on privacy and tech. It’s based in Colorado, Denver, USA.
We would normally criticize a VPN for choosing the US as its base of operations, however, in the case of Private Internet Access we’ll make an exception.
The fact that absolutely no browsing logs are stored or monitored by PIA means that any prying authorities would have nothing to uncover.
Ease of Use Updated app does wonders for usability
How to Install & Set Up Private Internet Access Private Internet Access download options screenshot in our PIA review Go to the downloads section on PIA's website to find the right software for your device.
Private Internet Access installation instructions screenshot in our PIA review We love PIA's step-by-step instructions on how to navigate the installation process.
Private Internet Access setup options screenshot in our PIA review PIA gives you the option to create a handy desktop shortcut for the app.
Private Internet Access setup wizard screenshot in our PIA review Once the installation is complete, you'll be given the option to launch PIA and begin using the software.
PIA Main Screen Screenshot for PIA Review PIA have drastically improved its app so that it is much simpler to navigate and pleasing to look at.
PIA Server List Screenshot for PIA Review When clicking on 'VPN Server' on the main screen you are taken to this list of available server connections. Its a detailed list with a search bar to find your favorite server quicker than having to scroll.
PIA Connected Screenshot for PIA Review When you choose a server, the app automatically takes you back to the home screen where the button animates itself in an attempt to connect. Once connected, it turns green.
PIA Main Screen Expanded Screenshot for PIA ReviewPIA Setting Menu Screenshot for PIA Review The advanced settings open in a new and separate tab to the app. In the Privacy Settings you can find the inclusion of a kill switch with the helpful option to have it on 'Always'. You can also block domains used for ads, trackers, and malware through the PIA MACE option.
PIA DNS Leak Protection Screenshot for PIA Review In the 'Network' screen you can protect yourself against DNS leaks, with the options to 'Set Custom DNS' alongside tick boxes for 'Request Port Forwarding' or 'Allow LAN Traffic'.
PIA Protocol and Encryption Screenshot for PIA Review
In the past, PIA’s one glaring failure was its clunky, unintuitive and grossly outdated desktop app.
PIA has since released a far more modern app which is much easier to navigate and straight-up better looking, clearly taking note from its competitors.
There are plenty of customization options for desktop notifications, launch on start-up, and a kill switch with an ‘always’ option.
PIA has come a long way, but it’s not perfect: the advanced settings still open in a new tab and the tray app remains open on top, blocking the view. Annoyingly, you have to close the whole tray app manually in order to see it.
The PIA mobile app is terrific – with just as much configurability as the desktop app, plus some extra connection details.
Customer Support Lacking 24/7 support but good online knowledge base
Live chat Support Email Online Resources 24/7 live chat is the obvious absence from Private Internet Access’ support repertoire. It’s something almost all of its higher-scoring rivals have, such as StrongVPN and VPNArea, and a feature we’d love to see soon.
With PIA VPN you can only live chat with support between 4pm-1am UTC. You must be logged in to the member area to do so, meaning it’s also only available to paying customers.
The positive flip-side to this, though, is that PIA has one of the best online knowledge bases out there. It’s well organized and should answer almost any query or issue you have.
Pricing & Deals Affordable on two-year plan
Private Internet Access Coupon Private Internet Access logo Private Internet Access
Get 65% off Private Internet Access's 2-year plan
TestedEnds 28 Aug Get CodeED Terms Private Internet Access Pricing Plan A month-long subscription with Private Internet Access costs $9.95. This is around the industry standard and isn’t very competitive.
The cost goes down the longer you subscribe for, though, with a two-year subscription costing $3.49 per month. Private Internet Access isn’t the cheapest VPN, but it is one of the best.
Private Internet Access doesn’t have a free trial and the money-back guarantee is only seven days long. However, cancelling within these seven-days is 100% no-questions-asked, with your refund arriving within seven working days.
Monthly
US$9.95/mo
Billed $9.95 every month 12 Months
US$5.99/mo
Billed $71.88 every 12 months Save 40% 2 Years
US$3.49/mo
Billed $83.87 every 2 years Save 65% All plans have 7-day money-back guarantee
Payment & Refund Options Credit Card PayPal Bitcoin PIA accepts a broad range of payment methods including most major credit and debit cards, PayPal and a few cryptocurrencies including Bitcoin, Ethereum, and Zcash.
Users in certain countries may also have access to additional international payment options like Mint, ecoPayz, and Neosurf, although they can’t be used to set up a rolling subscription.
submitted by Zinkzd to VPNsReddit [link] [comments]

[Guide] How to tether your Macbook to your iOS Device, no jailbreak required!

After upgrading to the iPhone 7 Plus from a jailbroken 6 Plus, I sorely missed having the ability to tether my Macbook Pro to my phone. I did some research today and after numerous failed attempts, I came across a relatively simple way to tether without the need to sideload any IPAs.
This guide will focus on Mac but it should be possible on Windows/Linux as well.

What you'll need:

How it works

This method takes advantage of a feature of the vSSH iOS app called port forwarding, which enables us to set up a SOCKS proxy between the iPhone and a remote Linux server. Then, we can use a proxy client on the Mac to connect to the proxy on the iPhone. Here's a crude MS-Paint diagram: http://i.imgur.com/Bt6BiqO.png

Set up DigitalOcean

If you have your own server or already know how to set one up, you can skip this section.
Follow this guide to set up your DigitalOcean Virtual Private Server (VPS) with the following settings:
When you get to the step in the guide titled "Log In To Your Droplet", take note of the IP address as you will need this later. Also, for the new root password choose something secure and memorable, or generate it with a password manager. If you choose a weak password, automated bots will potentially brute force it and use your droplet to mine Bitcoin or set up phishing sites.

Start an Ad-Hoc network on your Laptop

  1. Click on your Wireless icon in your menu bar, then select "Create Network":
    • Network Name: Whatever you want
    • Channel: 1

Connect to your Ad-Hoc network from your iPhone

  1. Settings > Wifi
  2. Choose the network you just created
  3. Click "Join Anyway"
  4. You may want to forget any other wifi networks in-range so your phone doesn't try to connect to them instead, since this network has no internet access.

Connect to your server through vSSH on your iPhone

  1. Open vSSH and tap the "+" icon in the upper left-hand corner of the "Connections" tab, then select "Connection" from the popup. Use the following settings:
    • Name: Tether
    • Protocol: SSH
    • Connection
    • Host: The IP address of your server
    • Port: 22
    • Username: root
    • Password: the password you set up earlier
    • Autoconnect: Enabled (optional)
    • No shell: Disabled
    • Screen Size: ignore
    • Port Forwarding:
    • Click "Add Port Forwarding"
      • Type: Dynamic
      • Host: 127.0.0.1
      • Port: 8080
      • Accept All Connections: Enabled
    • Leave everything else as default.
  2. Tap on your new connection profile to connect to your server. You should soon see a connection message with the Linux version, license information, and a shell prompt like "$". At this point all you need to do in vSSH is leave the app open and your phone unlocked.

Connect your Macbook to your iPhone through the vSSH proxy

  1. Make sure you have Proxifier installed.
  2. Visit this Github repo and clone it, or download it as a zip and unzip it somewhere.
  3. Open Terminal.app. You can do this through Spotlight by searching for Terminal.
  4. Drag and drop the file called tethery.sh onto the Terminal window. Press enter.
  5. Proxifier should open. If you're using the trial, click "Continue Evaluation". Give everything a moment to settle in...
  6. Your computer should now be tethered to your iPhone. You may need to restart any web browsers or applications to get them to use the proxy.
Hopefully this is helpful to someone.
Credits:
submitted by davros_ to iphone [link] [comments]

[Guide] How to tether your Macbook to your iOS Device for free, no jailbreak required!

Preface

I have an unlimited everything data plan with Sprint, but they charge an extra $20 to $50 per month for 2gb and 6gb of personal hotspot (tethering) data, respectively.
When I had a jailbroken 6 Plus, I used to use MyWi to tether my phone to my Macbook. After upgrading to the iPhone 7 Plus, I sorely missed having this ability.
I did some research today and after numerous failed attempts, I came across a relatively simple way to tether without the need to sideload any IPAs.
This guide will focus on Mac but it should be possible on Windows/Linux as well.
At first glance it looks like a lot of steps, but I have tried to elaborate on everything so that even a non-technical person should be able to follow along.
If you have a decent amount of technical knowledge, you should be able to set everything up in under 20 minutes and after that enabling tethering only takes about 30 seconds or less each time.
My other post on /iphone got downvoted to oblivion for some reason, hopefully this community is more receptive?

What you'll need:

How it works

This method takes advantage of a feature of the vSSH iOS app called port forwarding, which enables us to set up a SOCKS proxy between the iPhone and a remote Linux server. Then, we can use a proxy client on the Mac to connect to the proxy on the iPhone. Here's a crude MS-Paint diagram: http://i.imgur.com/Bt6BiqO.png

Set up DigitalOcean

If you have your own server or already know how to set one up, you can skip this section.
Follow this guide to set up your DigitalOcean Virtual Private Server (VPS) with the following settings:
When you get to the step in the guide titled "Log In To Your Droplet", take note of the IP address as you will need this later. Also, for the new root password choose something secure and memorable, or generate it with a password manager. If you choose a weak password, automated bots will potentially brute force it and use your droplet to mine Bitcoin or set up phishing sites.

Start an Ad-Hoc network on your Laptop

  1. Click on your Wireless icon in your menu bar, then select "Create Network":
    • Network Name: Whatever you want
    • Channel: 1

Connect to your Ad-Hoc network from your iPhone

  1. Settings > Wifi
  2. Choose the network you just created
  3. Click "Join Anyway"
  4. You may want to forget any other wifi networks in-range so your phone doesn't try to connect to them instead, since this network has no internet access.

Connect to your server through vSSH on your iPhone

  1. Open vSSH and tap the "+" icon in the upper left-hand corner of the "Connections" tab, then select "Connection" from the popup. Use the following settings:
    • Name: Tether
    • Protocol: SSH
    • Connection
    • Host: The IP address of your server
    • Port: 22
    • Username: root
    • Password: the password you set up earlier
    • Autoconnect: Enabled (optional)
    • No shell: Disabled
    • Screen Size: ignore
    • Port Forwarding:
    • Click "Add Port Forwarding"
      • Type: Dynamic
      • Host: 127.0.0.1
      • Port: 8080
      • Accept All Connections: Enabled
    • Leave everything else as default.
  2. Tap on your new connection profile to connect to your server. You should soon see a connection message with the Linux version, license information, and a shell prompt like "$". At this point all you need to do in vSSH is leave the app open and your phone unlocked.

Connect your Macbook to your iPhone through the vSSH proxy

  1. Make sure you have Proxifier installed.
  2. Visit this Github repo and clone it, or download it as a zip and unzip it somewhere.
  3. Open Terminal.app. You can do this through Spotlight by searching for Terminal.
  4. Drag and drop the file called tethery.sh onto the Terminal window. Press enter.
  5. Proxifier should open. If you're using the trial, click "Continue Evaluation". Give everything a moment to settle in...
  6. Your computer should now be tethered to your iPhone. You may need to restart any web browsers or applications to get them to use the proxy.
Hopefully this is helpful to someone.
Credits:
submitted by davros_ to ios [link] [comments]

[QUESTIONS] Running Monero over Whonix

For those that are unaware of it, Whonix is an excellent tool for privacy. It allows you to run a virtual machine in which all network traffic from that machine is sent out over the Tor network.
I have been trying to get bitmonerod running from within a virtual machine that routes traffic through Whonix, but have been unsuccessful in actually connecting to the Monero network so far. I was hoping that someone with more knowledge about the inner workings of Monero might have some insight into the errors I am seeing.
My setup: I am running Whonix Gateway version 9.6 on an Ubuntu 14.04 host. I have a second workstation virtual machine running 64 bit Ubuntu 14.04 which is configured to connect to the internet through Whonix Gateway, using the Other Operating Systems instructions. The workstation virtual machine is running the latest version of Monero from github (although the same errors are present when running the 0.8.8.6 binaries).
Whenever I run bitmonerod using this setup, I am unable to connect to any peers. If I run set_log 3, I see the following logged:
[P2P0]Connecting to XXX.XXX.XXX.XXX:18080(white=1, last_seen: never)... [P2P0]Connected success to XXX.XXX.XXX.XXX:18080 [P2P0][sock 12] new connection from XXX.XXX.XXX.XXX:18080 OUT to 10.152.152.50:56100, total sockets objects 1 [P2P0][XXX.XXX.XXX.XXX:18080  OUT] NEW CONNECTION [P2P9][XXX.XXX.XXX.XXX:18080 OUT]Timeout on invoke operation happened, command: 1001 [P2P9]Failed to invoke command 1001 return code -4 [P2P9][XXX.XXX.XXX.XXX:18080 OUT]COMMAND_HANDSHAKE invoke failed. (-4, LEVIN_ERROR_CONNECTION_TIMEDOUT) [P2P0][XXX.XXX.XXX.XXX:18080 OUT]COMMAND_HANDSHAKE Failed [P2P0][XXX.XXX.XXX.XXX:18080 OUT]Failed to HANDSHAKE with peer XXX.XXX.XXX.XXX:18080 
This log output is modified to protect privacy, the XXX.XXX.XXX.XXX ip address is the same each time for these log lines. The 10.152.152.50 IP address is my workstation's internal IP address. These errors repeat indefinitely every few seconds, each time with a new peer, until I kill the client.
I played around with Monero many months ago, and I am fairly certain that I had successfully run bitmonerod, and connected to the network from within a Whonix workstation at that time. However, now I am unable to connect using the same setup that I thought worked in the past. Has anything changed in the Monero codebase that would cause this new behavior? Are there any configuration options, or code changes I can make in order to get Monero to successfully connect to peers through Whonix?
Alternatively, if running Monero over Whonix turns out to be impossible, I'm curious to hear other ways of protecting your IP address when using Monero. Since bitmonerod does not have a proxy option like bitcoin does, it doesn't seem possible to run bitmonerod directly over Tor without using something like Whonix. What do people do to protect their IP address when broadcasting private transactions to the Monero network?
Thanks in advance for any help anyone can provide!
submitted by monerowhonix to Monero [link] [comments]

Connecting through proxy[HELP]

Hello, I'm having some issues syncing my Bitcoin wallet.
I have accidently checked the "connect through SOCKS-proxy". Now I have tried to uncheck the box, but whenever I click on "apply" it rechecks for some reason. Also tried uninstalling and reinstalling.
Now it doesn't want to sync anymore, does anyone have a fix? It would be much appreciated :)
submitted by Andereh to Bitcoin [link] [comments]

Prismed innocent until proven guilty: How I live with NSA Prism

A couple people have asked me details regarding some security tools I use. I figured I'd make a post for people who might be interested. It outlines some technical approaches and tradeoffs I make to retain some semblance of privacy in this modern Internet Age.
Our current administration has made it abundantly clear they could care less about the constitutionality of the Intel community's collection methods. For those who have been living in a cave (and ironically would then have nothing to fear from this), the NSA Prism program in cooperation with the FBI gives the government basically unfettered access to private information you have stored at many of America's major tech players.
The full extent of these programs is slowly being revealed, and the FISA court seems perfectly willing to allow ongoing telecommunication surveillance on American citizens who have done nothing wrong. They collect and store your information in bulk, but hold back on analyzing it. Once they go through the arduous process of legally gaining permission to investigate you, they can retroactively analyze what they have collected. It's a major loophole, but it works.
What's worse is many of the tech giants (Google, Apple, Verizon) have been playing ball silently since 2009, only pretending to care when a national PR embarrassment is thrown in their lap.
So to the point, I've been slowly removing my dependency on Google and other Prism choke points.
There's a great site I discovered from Hacker News: Prism Break. It outlines many solid alternatives for web services and computing tools that are unlikely to cooperate with Prism for a long time (if ever). As with most software, there are trade offs between the ease of use in mature commercial products and their privacy guarantees.
This post is about some of the recent changes I've made with respect to Prism-Break and my own research on Hacker News, Reddit, and general insider knowledge gained from working with smart technical people over the years. You'll notice a recurring theme of evaluating ease of use with security, and many of my decisions actually err on the side of usage, despite the tone of this post.
Web Browser:
I recently switched from Google Chrome back to Firefox. I always liked Chrome because of how quickly it rendered pages, particularly Javascript heavy pages, and made tab management easier. The web developer toolbox is second to none. Although I must admit, Mozilla Firefox has stayed very competitive with them. There is a negligible performance drop off, but it's barely noticeable and nothing significant. You can't really trust Chrome unfortunately, even with aggressive privacy settings (no analytics, etc.) . Firefox is not as malware/exploit bulletproof as Chrome, but it is close, and the open source nature makes it a very attractive alternative. I NEVER save passwords through the browser and always tell it never to ask. Both Chrome and Firefox are well know for storing passwords in plain text.
Web Browser Add-ons:
Not exactly a browser add-on, but it does help with security.
I pay $80/year for an OpenVPN subscription to Mullvad, which I discovered reading a comment thread on Reddit. They are based in Sweden and retain absolutely no information about you. They could give a fuck.
The OpenVPN standard encrypts all outbound communication from the originating device using layer 2 SSL. Traffic appears as normal HTTPS. This is different than other VPN technologies that use with IPSEC, the presence of which is easy to detect and thus limits any plausible deniability. It's also different than a simple web proxy that does not necessarily offer encryption to prevent ISP monitoring/throttling, and often only handles HTTP or SOCKS traffic, which is often slower. Mullvad is fast enough that I've just gotten in the habit of leaving it running at all times. Plus it never get old having sites show me geo-aware ads in Swedish.
The trade off is it's a bit more expensive than many of the web proxy providers. However, there are certain fringe benefits to having completely anonymous web traffic. Don't hate the player hate the game.
The fact that traffic is difficult to distinguish between secure web browsing and OpenVPN has made it an attractive countermeasure to the great firewall of China and other censorship technologies. There is a constant leap-frogging battle between those governments and OpenVPN vendors like Mullvad. It's reminiscent of the old PC gaming piracy protection vs. CD burning wars before everyone started using Steam.
Web Search:
I have configured Firefox to use StartPage as my default Search engine. They have a similar don't-give-a-fuck privacy policy to Mullvad (they're in the NE), and route all your searches anonymously through Google. It's not 100% equivalent to US Google, but it has not let me down yet. It's about 95% equivalent from my weeks testing it. There has only been one obscure search for this weird video it couldn't find. Not a big deal. For most of my research, it hits the mark. There is an extra half second of latency in the response, but I can deal with that.
They have a plugin for Firefox, but I've configured it to perform address bar searches by A) opening a new tab B) typing 'about:config' C) Searching for the property 'keyword.url' D) Change it to 'https://www.startpage.com/do/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q='
Maps:
You're basically screwed here. Nothing works like Google Maps. They are echelons past their competitors. I can say that having used OpenLayers and ArcGIS for some technical work in the past. Plus we all remember how good a job Apple did with their iphone 5 maps.
Just make sure you're not logged into your Google Account and preferably running OpenVPN when you do your search.
Instant Messaging:
This is the first example you'll see where I lean more in the ease of use than the security.
When I'm going to run IM, I use encrypted Gtalk over Adium.
Mainly because it would take too much effort to convince all my friends to use to a protocol that allowed true point-to-point encryption that's off the record. I use SSL between my host and the GTalk server, but Google still has access on their servers to the plain text messages (even if it's OTR I suspect, no proof though). Moreover, your chat partner may not be using it, in which case all those messages are still visible downstream in plaintext.
The only good alternative is just to stop using it so damn much. This is a work in progress for me.
Video VoIP:
Skype sucks. It really does. They haven't been the same since Microsoft acquired them. What's interesting is the tool was built with pretty impressive reverse-engineering countermeasures, and goes through great lengths to circumvent NAT in order to make your calls. Unfortunately there are known backdoors where third parties can ease drop. It is not to be trusted anymore for secure conversations. I don't make video VoIP that frequently anymore, but if I had to I would try out Prism-Break's suggestion for Jitsi. It looks promising.
I would also avoid Facetime like the plague, simply because I think Apple has zero credibility for protecting your privacy (just as Microsoft and Google).
Social Networking:
Not much you can do here if you enjoy the major players like Facebook. Similar to instant messaging, you're limited by the people you want to communicate with. I'm reasonable careful these days about what I post on FB/LinkedIn/Google+ when I use them (which is infrequent). And I don't mean just what is publicly available to my contacts. I mean everything.
I personally don't have a problem with these services and think they add a lot of value. I try to keep really personal stuff off them, but that guarantee is a bit naive. I know I've slipped up a few times, and FB has access to some pretty funny private messages. I mostly enjoy the read-only features of these sites, and rarely contribute, but that's not really good enough.
Just by having an account with some basic information and friend links, they can learn a lot about you. For example, one of my good friends likes to check all of us in on Facebook when we go to a listed restaurant. That's not even something I opted into, but FB gets to learn facts about me based solely on that association. I've met girls who later looked me up through FB friends and sent weird unsolicited PMs. We've all been there. Facebook, and thus the government, has access to all that shit. They even have a whole suite of creepy analytics that can tell if you're gay.
Cloud Storage:
This is one of the more interesting ones. There are so many choices for secure backups, but it's difficult to find a be-all-end-all solution that satisfies everyone.
I personally use per-file encryption on Amazon S3. It's the same storage backend as Dropbox, but I encrypted everything first by hand and don't bother with file sync.
My methods are simple but require quite a bit of micro-mangement. I run each file through a Mac OSX utility named crypt from the command line before I post it to my S3 buckets. The utility defaults to AES-256 bit encryption and is really easy to use. This custom version I modified for OSX cleans up the command entry a bit from the authors original version.
I will say there are very fancy solutions out there for users who demand a bit more.
Dropbox is really slick with file sync and ease of use, but everything is unencrypted on Amazon. Unacceptable.
To counter this, some people supplement Dropbox with a tool named EncFS. It transparently encrypts/decrypts file contents from any directory, which works with Dropbox, but you need to be a bit of power user to set it up. There's also Tarsnap, but it supposedly doesn't handle incremental syncs well and doesn't work on Windows. One interesting solution I looked at was using BitTorrent Sync to do cross-device backups and syncing, but I wanted something that backs up to the cloud, not just my own devices. There really is no easy-to-use solution that efficiently synchronizes files and is secure. Dropbox + EncFS is close, but not exactly easy to use.
Documents:
This one has been difficult. There aren't too many good solutions out there. I have looked at Zoho before and they offer a lot. It's hard to imagine it easier to use than Google Docs though. Prezi is cool for building presentations that don't look like PowerPoint vomit.
I really don't have a good suggestion here. If this became a frequent requirement, I'd probably create a new Google Account with some bogus personal information that wasn't associated with any of my previous Google Accounts. Although they could very easily correlate something written in one of my documents with a best-guess at a related Google account (also based on IP logging). Google's latest terms of service and privacy agreements allows for these types of cross-service analytics.
Media Publishing:
I use Imgur for everything.
Email Services:
Another interesting one. If I use an anonymous service like FastMail, but 70% of my emails go to Gmail recipients, am I really hiding anything from Google?
At the very least I'm not going to make it easy for them. So far I've been impressed with FastMail. The UI feels comfortably like Gmail, except much more responsive. It offers competitive features with Gmail like anti-spam, full text search, achieving, filtering and custom DNS. There are no ads, but it is a pay service.
Email Desktop Clients:
I haven't done this for quite some time. If I had to, I'd probably try Mozilla Thunderbird.
Email Encryption:
I don't bother with this. 99% of people don't want to fool with it. Just like with Dropbox + EncFS for file storage, most encrypted email systems require people who are somewhat technically competent. It's an unreasonable expectation.
Online Transactions:
Sadly I still use PayPal. A lot of people are attacking this problem right now (Stripe, Square, etc.) No one has come out victorious yet as the PayPal killer, but I am waiting anxiously.
BitCoin is a really cool technology that's gaining some traction, but many merchants don't yet accept it, and some of the security around wallet controls leaves a lot to be desired. It's interesting to read about how the currency works from a technical standpoint. It has resisted many attempts at exploitation and bot-mining, but the major weakness appears to be wallet security.
Android:
I dumped the NSA conspirator Verizon in favor of Solavei running over T-Mobile infrastructure. This involved forcefully unlocking my phone and installing a root kit to gain superuser permissions. If you're thinking of switching from Verizon to one of their competitors, don't try to port your phone unless you're prepared for USB debugging, ROM installation and a $15 unlock code (depending on the phone and whether or not you're willing to dig with a HEX editor). I learned a lot, but I wouldn't wish it on other people who just want their phone to work. I run CyanogenMod 7.2 for my Android ROM. I have no outbound encryption through for any of the common apps (Google Maps, Reddit, etc) so this is a weak point for me right now.
Operating System:
I run Mac OSX. It's just too smooth and efficient for technical work. I can't give it up. Linux is nice with respect to production scenarios, but the user-experience of most of the x-windows managers just doesn't compare to OSX. I'm very careful about what updates I perform though, and run Little Snitch so that I can approve and monitor any outbound connections my machine tries to make. It's technically possible Apple has baked some dubious reporting into the core apsd services, but there's not much more I can do without handicapping the machine.
submitted by shazzdeeds to restorethefourth [link] [comments]

Socks5 proxy and how to use it  NordVPN - YouTube How to use tools client socks5 with proxifier ( new ... VIP72.org Tutorial - How to use SOCKS5 proxies - YouTube How to set Socks5 proxy at firefox browser - YouTube How to Configure Proxifier using SOCKS5 Proxy? - YouTube

SOCKS is a protocol for handling traffic through a proxy server. It can be used with virtually any TCP/UDP application, including Web browsers and mail clients. It provides a simple "firewall" because it checks incoming and outgoing packets and hides the IP addresses of client applications. Using Socks proxy is a good solution for internet anonymity and security (pay attention to VPN - Virtual ... Remember i m using the word “almost” which means not everything will pass through tor because some installed programs can bypass local proxy settings. The first thing you are going to need is obviously the latest version of Tor from the Tor website. It’s going to download an exe file for you to open and extract. Go ahead, and extract the files to a place where you are going to have easy ... Bitcoin Core integration/staging tree. Contribute to bitcoin/bitcoin development by creating an account on GitHub. -proxy=<ip:port> Connect through socks proxy-socks=<n> Select the version of socks proxy to use (4-5, default: 5)-tor=<ip:port> Use proxy to reach tor hidden services (default: same as -proxy)-dns Allow DNS lookups for -addnode, -seednode and -connect Contribute to bitcoin/bitcoin development by creating an account on GitHub. Add -socks=<n> to select SOCKS version to use. 4 and 5 are supported, 5 is default. Skip to content

[index] [13346] [10809] [21680] [16478] [19408] [7504] [3619] [47323] [12920] [11636]

Socks5 proxy and how to use it NordVPN - YouTube

Simple steps to manually setup a proxy SOCKS 5 on Mozilla Firefox. In the video I just used an example SOCKS 5 IP address 1.2.3.4 and obviously you need to c... Proxifier can help in running applications through a proxy that do not have direct proxy setup option Only SOCKS5 proxies will work with Proxifier. About Lim... ----- Support----- Yahoo: dichvusocks Skype: dichvusocks Email: [email protected] ICQ: 678498340 ----- Hello How to use... You can get quality socks5 proxy at : http://betasocks.com Free download: https://www.mediafire.com/?kwtrvp7oasayeqi Just a basic video on how to user vip72.org proxies with proxifier 3.21 and the VIP72 socks client....

#