How to remove CryptoWall Virus - virus removal steps (updated)

Safer to store Bitcoins on my iPhone instead of my computer as it's encrypted and can't get viruses?

submitted by Hi2985 to btc [link] [comments]

Disturbing Bitcoin Virus: Encrypts (instead of deleting) victims files, then demands transaction ID to decrypt proving they made a 2BTC payment to attacker... QuickBT received 2 separate calls about this just yesterday...

Preface: We allow Canadians to buy .4 Bitcoin quickly using debit.
As the title describes, yesterday we received a panic call from an innocent business owner who's business files (this virus targets AutoCAD, Illustrator, Quickbooks, powerpoint and other business file.ext's) had been encrypted by this virus. His staff and business were at a standstill until he could buy "Bitcoin" (which of course he had never heard of and this was such a great first exposure for him...)
Apparently, the virus gave him an address, and was requested a transaction ID proving he made the payment. He only has 30 hours to do so, and cannot sign up for exchanges etc.
Has anyone else heard of this? It's TERRIBLE the more we think about it.
We are extremely reluctant to facilitate this type of transaction. However we CAN help very easily using our system.
If you goto a bank to take out ransom money to get a child back, is the bank complicit? One option we are considering is requiring a police report and approval, however we are simply fuelling this scam then...
Thoughts?
EDIT: Apologies to the community for the aggressive "Bitcoin Virus" title. We can't change it now, but we will be more careful in the future not to slander the Bitcoin brand. We were just upset at how powerful this ransomware could be.
EDIT 2: Fast forward a few years - those attacks were common for a bit, but now security is stronger and taken far more seriously by consumers :) We are doing what we can: https://quickbt.com/pdf/20131010_QuickBT_and_cybercrime_requests.pdf
submitted by QuickBT to Bitcoin [link] [comments]

Bitcoin mentioned around Reddit: TronScript help with Removing Encryption Virus? /r/TronScript

Bitcoin mentioned around Reddit: TronScript help with Removing Encryption Virus? /TronScript submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Safer to store Bitcoins on my iPhone instead of my computer as it's encrypted and can't get viruses? /r/btc

Safer to store Bitcoins on my iPhone instead of my computer as it's encrypted and can't get viruses? /btc submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Bitcoin mentioned around Reddit: Several hospitals in Germany have come under attack by ransomware, a type of virus that locks files and demands cash to free data it maliciously encrypted. It will take weeks until all systems are up /r/besteurope

Bitcoin mentioned around Reddit: Several hospitals in Germany have come under attack by ransomware, a type of virus that locks files and demands cash to free data it maliciously encrypted. It will take weeks until all systems are up /besteurope submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Newbie Tuesdays - Don't know where to start? Worried about your security? Other questions? Post in here!

Welcome to /onions! What do you want to know?
Have a lot of questions? Read our wiki first
To get started using Tor, first download and run the Tor Browser Bundle: https://www.torproject.org/projects/torbrowser.html.en
Then, try some of the links in the sidebar and explore!
submitted by AutoModerator to onions [link] [comments]

Blockchain in Healthcare: Bridging Trust in response to COVID-19

Blockchain in Healthcare: Bridging Trust in response to COVID-19
Link to our article: https://block.co/blockchain-in-healthcare/
There’s never been a better time to provide proof-of-health solutions in the healthcare system globally. While it’s difficult to comprehend the significance of the role that technology may offer in such difficult times, essentially it can be nailed down to its basic concept of simplifying work and coordinating activities, which could have helped avoid the worst crisis people have experienced in their lifetime. If the healthcare system would adopt technological innovations in the early stages, it could have benefited and saved many lives.
Although the healthcare system has traditionally been slow in embracing the latest digital solutions, just like many other industries, we’ve observed in a previous article how the Covid-19 crisis has accelerated the adoption of digital technologies on a global scale in several industries, including healthcare.
The latest webcast brought to the audience by Block.co hosted some high profile experts from the industry. They illustrated how blockchain especially, together with other technologies such as IoT, and AI could in the future help elevate prompt responses, and provide more secure and efficient storage of data, something that has been missed in the recent pandemic.
Ahmed Abdulla from Digipharm, Dr. Alice Loveys from EY, and Dimitrios Neocleous from VeChain were hosted by Georgina Kyriakoudes, one of the first in the world to hold an MSc in Digital Currency, founder of Dcentric.Health and creator of the permissioned blockchain ecosystem app called Aria, which aims to transform the patient healthcare experience by giving individuals full control of their medical records.
Blockchain’s benefits in healthcare are primarily identified by efficiency, specifically on the transfer of data, facilitation of goods transport via the supply chain, prevention of counterfeit medicines sale, secure storage, and exchange of data around ID management. The impressive projects all the webcast guests have developed in the industry enable just these features, from the digitization of patient records to storage and exchange of medical data as well as easier processing of funds.
https://preview.redd.it/7k85objjz1851.png?width=768&format=png&auto=webp&s=237293e731024ae8f50861682c434b04d7742e05
Ahmed Abdulla founded Digipharm with the idea of issuing tokens to allow patients to be in control of their medical records at all times. Moreover, tokens are issued to be paid for anonymously sharing personal medical data to help research; pay for healthcare based on how it has improved quality of life.
We have experienced a disparity in Covid-19 tests costs around the world. For instance, getting tested in Cyprus costs around €60 while in the US it may add up to a few thousand dollars. This is due to the way countries arrange payment setups from payers to providers. Blockchain empowers people to take ownership of their records and funds while providing transparency of processes. This is where blockchain can be robust, by increasing transparency and allowing the patient to secure money transfer and hold their own records”, stated Ahmed.
His work as blockchain advisor at the UN Economic Commission for Europe is helping set up standards for the blockchain ecosystem, namely how the system should be used safely, and in a way that benefits all stakeholders.
“I lead the blockchain and healthcare team at the UN center for trade facilitation and e-business where we developed a blockchain and trade facilitation white paper; the second phase will soon provide an advanced technology advisory board to advise private or public stakeholders on what’s the best technology to use. It might not always be blockchain, hence we first understand and then advise if the tech is right for them or not. Blockchain is clunky, expensive, and not always proper for the organization we work with”, continued the blockchain expert.
Most people may prefer public and permissionless blockchain because it has major advantages over a private and permissioned one. Transparency stands out for the way the ledger is shared and for due diligence becoming unnecessary as a result. This means costs are also cheaper, in the range of 100% lower. On the other hand, a public decentralized blockchain has a major disadvantage since no legal framework is laid out. This means uncertainty as there is still a grey area in the legal field that might create confusion.
Dimitrios Neocleous is Ecosystem Manager at VeChain Tech and directly supported digital and technological solutions provider I-DANTE with the creation of the E-NewHealthLife and the E-HCert for the Mediterranean Hospital of Cyprus. Both apps give patients control over their health records, improve medical data sharing, and increase hospital operational efficiencies by simplifying the process of visiting a hospital.
E-NewHealthLife is a complex ecosystem solution that starts from a patient’s visit to an emergency room. A card with the reason for a patient’s visit is issued; it gets time-stamped; the patient is sent to the waiting room; once the patient’s turn comes and the medical check is completed, the card is scanned and the visit is closed. Patients can digitally access all diagnoses that took place anytime at the hospital.
“The platform produces a digital health passport, which is an encrypted non-fungible card that patients can use to identify themselves automatically when registering at the hospital’s emergency room. The passport is stored within a mobile app called E-HCert, which keeps track of each patient’s medical data and can be shared as needed”, announced Dimitrios.
E-HCert App is a Covid-19 lab test electronic wallet and pushes up the results of a patient who’s been tested for COVID. It has been proven to be very successful so far; currently, 2000 people who transited through the Larnaca airport in Cyprus have downloaded the app. With time-stamped records, it’s able to provide data such as the day and time when the sample was collected, it offers immutability, security, and integrity of data.
https://preview.redd.it/kqq7jfgpz1851.png?width=940&format=png&auto=webp&s=2c9a121e0a4839125418db7ff61ae3957c3fff41
“Covid-19 showed a deficiency in healthcare. The spread of the virus could have been prevented if we had digitization of processes and transparency of data through blockchain, and transfer of data through an authorized share of records. An open permissionless decentralized blockchain helps bring ownership of medical records back to the patient, and that is not possible in a centralized system”, continued the VeChain representative.
Dr. Alice Loveys is EY ‘s healthcare blockchain leader in the US and has been at the forefront of emerging healthcare technologies for her entire career including being a pioneer in electronic health record adoption, health information exchange, and privacy and security.
She believes that “blockchain technology is like a plumbing system that brings clean and transparent trusted data that can be used. It’s not proper for a track and trace system as it invades privacy unless there is the consent from patients, in that case, blockchain transparent share of data would be extremely useful for medical research and testing”.
One problem we experienced during the crisis is the confusion that arose with divulged information and the frustration that comes with it. People do not understand anymore which information can be trusted; at first, it looked like COVID-19 symptoms were not dangerous, then it came out that they actually were. Masks were not useful at the beginning, then they suddenly became necessary.
“Blockchain could have prevented lockdown and economic crisis through data management in that a much faster response would have been provided to tackle misinformation because blockchain can help manage data from different sources”, continues Dr. Loveys. “Moreover, it’s a great way to protect the database. Instead of moving any private sensitive medical data through the more traditional digital systems, blockchain simply allows us to send an algorithm, encrypted data that safeguards the information. It’s not a great use as a database as it does not scale, therefore we would not be able to store information for billions of people in it. But for the data that is in the blockchain, using algorithms, makes it very convenient and secure”.
Another topic discussed during the webcast was the GDPR compliance for blockchain. GDPR (General Data Protection Regulation) was created before blockchain therefore it doesn’t account for decentralized technologies. Generally speaking, it all comes down to how the technology is used and what kind of data is incorporated in it. Timestamping data without invading anyone’s privacy, or timestamp of consented data, should determine no issue at all. This is what privacy by design stands for, taking human values into account in a well-defined manner throughout the whole process.
Block.co, powered by the University of Nicosia, is establishing itself as a global leader in the issuance of digital immutable and secure certificates timestamped on the Bitcoin blockchain. In the field of healthcare, it could include medical records, prescription issuance, insurance disputes, supply chain documentation, and any type of verifiable certificate that requires authenticity at its core.
For more info, contact Block.co directly or email at [[email protected]](mailto:[email protected]).
Tel +357 70007828
Get the latest from Block.co, like and follow us on social media:
✔️Facebook
✔️LinkedIn
✔️Twitter
✔️YouTube
✔️Medium
✔️Instagram
✔️Telegram
✔️Reddit
✔️GitHub
submitted by BlockDotCo to u/BlockDotCo [link] [comments]

Explanation of codes in used my first HTML project on pirple.com

Hi guys, HELLO and welcome.
The past few week has seen a lot of us having to work from home as a result of the corona-virus pandemic ravaging the nations of the world. While it might have been a lock down on our physical movement, I realised wasn’t targeted towards our brains, thus I decided to make ample use of the time and engage my brain in developing numerous skills during and amongst others I decided to sign up on Pirple.com frontend fundamentals course, I happened to have learned quite a lot very recently and in so that it is a perquisite to move to the next stage of the course, I’m really delighted to share with you some of the things I’ve learnt, I’m not much of a teacher so this might really not be your regular teaching module but then I hope you are able to pick one or two thing out of it. Let’s begin.
The knowledge of HTML and CSS which the very foundations of frontend, so far I have learnt to use various HTML tags in developing the frontend of a website and that’s what I intend sharing with you. in no particular order;
  1. There are six header sizes in HTML and are called the h1, h2, h3, h4, h5 and the h6. While the h1 is the accommodates the largest font size, the h6 is home to the smallest font and you would notice the changes in sizes as you checkout the h2 to h5.
  2. The 'hr' tag brings about an horizontal line in HTML.
  3. The 'p' tag is a short for for paragraph and it’s responsible for bringing about paragraphs in HTML.
  4. The 'br' tag ensure whatever is been written on a particular line breaks to the following line, it take the form of a full stop by bringing an end to every write up on a particular line and automatically shifts it to the next line.
  5. The 'mark' tag is simply for highlighting in yellow.
  6. The 'a' tag is called the anchor tag and used for adding links to the HTML document.
  7. The 'ul' tag is used in creating an unordered list and is makes us of the 'li' tag in it to list out various items. The 'ul' tag takes an unordered arrangement while the 'ol' tag is used for creating an ordered list and takes an ordered arrangement.
  8. The 'img' tag is used for adding images to an HTML document.
  9. The 'iframe' tag is used to embed videos into an HTML document.
  10. The 'video' tag is used for adding videos to an HTML document.
  11. The 'form' tag is used for creating a form in an HTML document and the following
  12. the 'fieldset', 'legend', 'label', 'input', 'option' and 'select' tag are all used inside the form tag to build a form in an HTML document.
This all appears very basic, but they all used to form the frontend of my website, so do well to look at it and I hope you will learn a thing or two from, in the advent of any question, I would be in the comment section to provide answers to them. Thanks for reading, Stay Safe.

    Welcome to my website   this is the h1 (header one) tag 

Welcome to my website

this is the hr (horizontal line) tag
this is the p (paragraph) tag this is the br (line break tag) tag Hi guys, HELLO and welcome to my website...

Today, i will be sharing with you all my favourite book. it's almost very natural to have a favourite book if you happen to be the kind that appreciates Reading (not everyone does). Over time i have had the privilledge of reading several books which has helped me share in other person's knowledge and understanding of the world. Before i picked this book as a favourite, i had come to terms with the fact that i have one or two favourite for different aspect of life but i'm settling for the crypto space today.
without further ardue,guys my favourite book in the crypto space is titled CRYPTO 101 by Chris Ani.
The word 101 should bring about a conciousness of elementary or basic knowlege and yes that's exactly what this book seeks to point out, it's pretty much the simplest book you would ever find to read about bitcoin, crypto-currencies and the blockchain technology.
I could go on and on about this book but due to some certain restrictions i can't but you can click here to get useful information.
Below are also links to different channel for you to make a order, don't sleep on it.

this is an unordered list this is the h3 (header three) tag

Take a sneak peak at the front and back page of the book as well

this is the img src (image source) and alt (attribute) tag front page_crypto 101 by chris ani back page_crypto 101 by chris ani
this is the h3 (header three) and q (quote) tags

Do well to also check out this book review on the author's youtube channel...

...and also this simple video where the author talks about cryptocurrency

this is the video (video player) tag

I would love to hear your reviews after going through this book

this is the form (for creating tags) tage
this is the fieldset (for creating a fieldset for some details) tag
this is the legend (for writing some details in the fieldset) tag Your Details

Email
Yes No Maybe



end of the form

Thanks for reading, till i come your way again, STAY SAFE!

submitted by gidionline to code [link] [comments]

South Korean NGO Announces Blockchain-Based Healthcare Platform

You can find the original article here: https://cointelegraph.com/news/south-korean-ngo-announces-blockchain-based-healthcare-platform
The Commons Foundation unveiled plans to build a blockchain platform to track COVID-19 cases in South Korea.
The Commons Foundation, a South Korean non-governmental organization, revealed its plans to develop a blockchain-based platform that aims to handle health epidemics in the wake of the COVID-19 crisis.
According to Digital Today, the NGO will rely on blockchain public services to create an epidemiological research system to suit the coming post-coronavirus era.
The article quotes a statement from Choi Yong-gwan, chairman of the Commons Foundation, who expressed concerns regarding the ongoing violation of personal information due to the pandemic emergency. Such a situation motivated the NGO to develop a solution.

Guaranteeing privacy through the platform

Choi says that the platform will help to prevent future viruses from having such a strong impact in South Korea.
The NGO explained that a public blockchain network, called “MicroBitcoin”, will be the one that the Common Foundation relies on to develop the platform. They have chosen it for its solidity and security, and state the technology is robust enough to prevent the compromisation of hackers.
The platform will encrypt all personal records on a public blockchain network to “increase reliability and make data forgery impossible.”
As the Common Foundation explains, the application will issue a personal encryption key through personal authentication of the mobile phone and records the user’s movement in the city on the blockchain.

Tracking confirmed COVID-19 cases with Blockchain

If person A is found to be a COVID-19 confirmed case, they can directly enter the encryption key value and provide data that cannot be forged to an epidemiologist.
Researchers can schedule a visit with person A, and determine the best was to ensure that a quick investigation can be conducted.
The Commons Foundation’s chairman said:
“It is important to quickly overcome the pandemic, but it will become more important in the post-corona era to protect the individual’s freedom and human rights while wisely overcoming the pandemic.”
Recently, Busan, the second-largest city in South Korea, launched an identification app that uses a public blockchain to verify citizen information.
On May 23, Cointelegraph reported that South Korea’s Suseong University reached a deal with the Korea Artificial Intelligence Association, or KORAIA, to create a blockchain and AI campus in Daegu.
submitted by BlockDotCo to u/BlockDotCo [link] [comments]

Weekly Discussion - Interested in Joining? - (2020.01.29)

How can I become a Freemason?
First of all, welcome to /freemasonry! This is a weekly thread for you to ask questions. Being one of the largest online communities on the topic of Freemasonry, we hope that you won't find difficulty getting information you need to decide if you would like to join your local lodge.
General Information: 1. Requirements for membership vary from jurisdiction to jurisdiction, but generally if you're a man 21 or over (18 or 19 in some states), believe in a Supreme Being, are of good character and reputation, and ask to join, you're eligible. 2. To get started, email or call a local lodge. They would love to hear from you, every lodge welcomes new candidates. They'll set up a meeting to get to know you a bit (we're careful about who we admit as members). Also to tell you a bit about the fraternity, the lodge, etc. 3. To find your local lodges, first, find the Grand Lodge website for your state, province, or country. This is a good resource for the US: bessel.org, or just use Google. They should have a way to find out what lodges meet near you. Then check out your local lodge's websites. If you have a choice of lodges, try to pick one that meets on a weeknight that would be convenient for you, and that appears to be active. 4. Nothing happens quickly in Freemasonry, so it might take awhile to hear back from a lodge after you make contact. Every step takes quite a bit of time.
Have something you want to ask? Post it here! (Previous Weekly Threads)
submitted by AutoModerator to freemasonry [link] [comments]

LOEx Market Research Report on May 28: BTC halved and tightened as inflation hedging tool, the market may be not over

LOEx Market Research Report on May 28: BTC halved and tightened as inflation hedging tool, the market may be not over
[Today's Hot Tips]
1. [Russian authorities do not agree to lift the Telegram ban]
According to Cointelegraph on May 28, the Ministry of Digital Development, Communications and MinComSvyaz of the Russian Federation announced on May 26 that it does not support the lifting of the ban on Telegram encrypted communication applications. According to previous reports, Russia may lift the Telegram ban due to a corona virus outbreak.
2. [there are only 1,535 BTC pull orders in the two exchanges]
During the short-term price increase of BTC, the main pull-up signs were obvious. Judging from the current capital inflow exchanges, Binance and Coinbase exchanges have large capital inflows, and are the key exchanges that drive the rise of BTC prices. At the same time, it should also be seen that BTC is currently rebounding when the transaction volume is very low. Whether there is a unilateral market depends on the price performance. The short-term pull-up occurred suddenly, and the continued strength depends on multiple factors.
3. [The number of Bitcoins held by crypto exchanges has reached a record low in 18 months]
According to Coindesk, Glassnode data showed that on Monday, the total number of bitcoins in cryptocurrency exchange wallets fell to an 18-month low, slightly above 2.3 million. This drop marks an 11% reduction in the number of bitcoins held by the exchange so far this year. In addition, during the same period, the number of Ethereum in exchange wallets increased by more than 7%. Some market participants believe that this indicates that more Bitcoin investors are turning to Ethereum.
[Today's market analysis]
Bitcoin (BTC)In the early hours of this morning, BTC rose slightly, and it briefly returned to above 9200 USDT, reaching a maximum of 9127.85 USDT. At around 5 o'clock, it quickly fell, and the lowest fell to 9052 USDT, then rebounded slightly. At present, BTC is adjusted within a narrow range around 9150 USDT. The mainstream currencies followed the consolidation, and each currency fell after a slight rise in the early morning hours. BTC is currently reported at 9181.0 USDT at LOEx Global, with a 247% increase of 0.37%.
The price of BTC is driven by liquidity tightening and bullish sentiment accompanied by a halving, which makes investors more willing to treat Bitcoin as an inflation hedging tool.
Now, according to a recent article by Messari, as Bitcoin enters the next stage of adoption, it is necessary to understand how encryption technology is related to other assets under these newly discovered macro characteristics.
In the past, market investors and traders could only express interest in Bitcoin through spot market transactions, but the current competitive environment has changed. Now companies can choose to hedge or speculate. They have the ability to trade derivatives, not potential ones, so they can express positive and negative views on Bitcoin's price action.
With the increasing participation of institutions in this field, once Bitcoin is out of the current adjustment stage, the asset may end at a higher than the annual high of $ 13,800 in 2019 by the end of the year.
Operation suggestions:
Support level: the first support level is 9100 points, the second support level is 9000 integers;
Resistance level: the first resistance level is 9500 points, the second resistance level is 9800 points.
LOEx is registered in Seychelles. It is a global one-stop digital asset service platform with business distribution nodes in 20 regions around the world. It has been exempted from Seychelles and Singapore Monetary Authority (MAS) digital currency trading services. Provide services and secure encrypted digital currency trading environment for 1 million community members in 24 hours.
https://preview.redd.it/ahsoehv86g151.png?width=827&format=png&auto=webp&s=9f4529356e1a8cec40dc5635f7a5207be92a149e
submitted by LOEXCHANGE to u/LOEXCHANGE [link] [comments]

From Chaos, Comes Order

I feel it is important to discuss what is happening at the moment.
We're gonna break this down into 4 parts...
Let's start with the virus.

Part 1 - The Virus
Now, this virus.
First of all, I just want as a disclaimer to say that it's important to rely on official sources of information regarding the virus since they would never lie to you...
OK, so what's up? Well, here's what's up:
This virus is the trigger for the biggest power play we've seen since 2001.
This is a perfect excuse for an economic crash.
This defers responsibility from those who are actually responsible and blames it all on this virus.
It also accelerates the inevitable trend towards a cashless society, and the much desired Central Bank Digital Currency (CBDC).
We've had Christine Lagarde (former head of the IMF and current President of the ECB) and Mark Carney (former Governor for the Bank of England and current UN special envoy on climate action and climate finance) speak on digital currencies.
We've had reports from the Bank for International Settlements (BIS). The BIS is essentially the Central Bank for Central Banks.
Coincidence is a funny thing (just ask Larry Silverstein...):
In 2019, 1200 CEOs left their positions. That was a record year.
In the first month of 2020, 219 CEOs left. A new record.
On the topic of CEOs...

Part 2 - CEOs and Stock Buybacks
The financial metrics which incentivise executives have become far removed from operating performance.
As an example, here is a story from the end of 2014...
This summarises perfectly what has happened!
The main source of demand for equities has been corporations (i.e.stock buybacks).
And this makes sense, incentives drive human behaviour. Pretty simple.
Now, this is the really infuriating part.
These corporations now want bailouts.
By the way, this will happen.
And just like '08, profits are privatised and losses are socialised.
The Airlines, which feel they are entitled to bailouts, spent 96% of their free cash flow on stock buybacks over the past decade.
Now they want a bailout. Ridiculous!

Part 3 - Encryption and Privacy
While all of this is going on, the US Government has been sneakily trying to remove end-to-end encryption and it's been working it's way through Congress.
This concerns the EARN IT Act.
The premise of the bill is that technology companies have to earn Section 230 protections rather than being granted immunity by default, as the Communications Decency Act has provided for over two decades.
If the EARN IT Act were passed, tech companies could be held liable if their users posted illegal content. When internet companies become liable for what their users post, those companies aggressively moderate speech.

Part 4 - Practicality
Central Bank Digital Currencies are inevitable.
The NSA created the SHA-256 algorithm in 2001.
The NSA could of stopped Bitcoin early on if it truly wanted to (51% attack for example).
Why NOW allow a decentralised network of value transfer to develop, whereas previous attempts were snuffed out?
Well, going back to central banking: how about a centralised Central Bank Digital Currency (CBDC) that will allow a greater level of control, can facilitate negative interest rates, easier collection of taxes, etc.
For this to work, you need to usher it in gradually such that people have a decentralised alternative (i.e. BTC) and the mass public is more receptive to digital currencies more broadly. So BTC is the gold and CBDC is the ‘new fiat’.
The current situation is pretty chaotic.
But... ORDO AB CHAO
https://www.youtube.com/watch?v=jfx7PnMtCeY
submitted by financeoptimum to Bitcoin [link] [comments]

From Chaos, Comes Order

I feel it is important to discuss what is happening at the moment.
We're gonna break this down into 4 parts.
Let's start with the virus.
Part 1 - The Virus
Now, this virus.
First of all, I just want as a disclaimer to say that it's important to rely on official sources of information regarding the virus since they would never lie to you...
OK, so what's up? Well, here's what's up:
This virus is the trigger for the biggest power play we've seen since 2001.
This is a perfect excuse for an economic crash.
This defers responsibility from those who are actually responsible and blames it all on this virus.
It also accelerates the inevitable trend towards a cashless society, and the much desired Central Bank Digital Currency (CBDC).
We've had Christine Lagarde (former head of the IMF and current President of the ECB) and Mark Carney (former Governor for the Bank of England and current UN special envoy on climate action and climate finance) speak on digital currencies.
We've had reports from the Bank for International Settlements (BIS). The BIS is essentially the Central Bank for Central Banks.
Coincidence is a funny thing (just ask Larry Silverstein...):
In 2019, 1200 CEOs left their positions. That was a record year.
In the first month of 2020, 219 CEOs left. A new record.
On the topic of CEOs...
Part 2 - CEOs and Stock Buybacks
The financial metrics which incentivise executives have become far removed from operating performance.
As an example, here is a story from the end of 2014...
This summarises perfectly what has happened!
The main source of demand for equities has been corporations (i.e.stock buybacks).
And this makes sense, incentives drive human behaviour. Pretty simple.
Now, this is the really infuriating part.
These corporations now want bailouts.
By the way, this will happen.
And just like '08, profits are privatised and losses are socialised.
The Airlines, which feel they are entitled to bailouts, spent 96% of their free cash flow on stock buybacks over the past decade.
Now they want a bailout. Ridiculous!
Part 3 - Encryption and Privacy
While all of this is going on, the US Government has been sneakily trying to remove end-to-end encryption and it's been working it's way through Congress.
This concerns the EARN IT Act.
The premise of the bill is that technology companies have to earn Section 230 protections rather than being granted immunity by default, as the Communications Decency Act has provided for over two decades.
If the EARN IT Act were passed, tech companies could be held liable if their users posted illegal content. When internet companies become liable for what their users post, those companies aggressively moderate speech.
Part 4 - Practicality
Central Bank Digital Currencies are inevitable.
The NSA created the SHA-256 algorithm in 2001.
The NSA could of stopped Bitcoin early on if it truly wanted to (51% attack for example).
Why NOW allow a decentralised network of value transfer to develop, whereas previous attempts were snuffed out?
Well, going back to central banking: how about a centralised Central Bank Digital Currency (CBDC) that will allow a greater level of control, can facilitate negative interest rates, easier collection of taxes, etc.
For this to work, you need to usher it in gradually such that people have a decentralised alternative (i.e. BTC) and the mass public is more receptive to digital currencies more broadly. So BTC is the gold and CBDC is the ‘new fiat’.
The current situation is pretty chaotic.
But... ORDO AB CHAO
https://www.youtube.com/watch?v=jfx7PnMtCeY
submitted by financeoptimum to conspiracy [link] [comments]

Customer hit with crypto-virus looking for advice

Have a customer hit with a Crypto virus on the 11th only just told us today. Able to retrieve company files from shadow copies on NAS but PC running QuickBooks is past point of no return.
First question is, files have .smile at the end, does anyone have any ideas what virus may have infected the system?
Second question, customer is prepared to pay ransom, against my advice he emailed them and they want .5 of a bitcoin. I'm not advocating this but he wants to try. What's the safest way to buy Bitcoin?
We know and he knows he should have backups in place, he was meant to take manual backups of QuickBooks but for whatever reason it did not happen, I'm not looking to portion blame and lesson has been learned.
Just looking for some guidance and advice on options.
Thanks guys.
EDIT: Thanks for all the input, everyone has been so helpful. We managed to figure out the virus was one of two MedusaLocker or GlobeImposter 2.0. Neither have a public decrypter and unlikely to be one due to a unique key assigned to each encrypted PC. Determined that source was an email with a zip file disguised as a .odt file. Police were called but referred to a site already recommended on this post. No cyber cover in insurance. Most files now recovered but some that can't and deciding whether to pay ransom or rebuild files. Post has been really helpful, wish I could share the amazing chocolate truffles that were supplied as a thanks.
submitted by dvdkp to msp [link] [comments]

How Ransomware Encryption Happens & 4 Methods for Recovery

We know how overwhelming it can feel to be the victim of a ransomware attack and how your business cannot operate due encrypted or locked files. This page delivers insight on why your files were encrypted or locked, and the options you have to decrypt ransomware. As a ransomware recovery service provider, we have helped thousands of clients successfully recover their data and decrypt their data.
Evaluating all options will include analyzing the encrypted files, and the least desirable option to pay the ransom demand if necessary. Our process helps provide critical insight into decrypting ransomware and the available options that clients have.
By the end of this piece, it is our goal to show you what is involved to successfully recover your files. This guide outlines what steps and research are necessary to decrypt or unlock your files from a ransomware attack.

You’re the victim of a ransomware attack

You arrive to work and start noticing suspicious alerts coming from your servers, and none of the databases are functional. Your co-workers are frantic and cannot access any of their data. You investigate further and find all of the files on your network are renamed and discover ransom notes, and a screen asking you to email someone if you want your data back. You finally realize that you are a victim of a ransomware attack, and all of your files are locked or encrypted.

3 Common Ways Your Files Were Encrypted or Locked

Ransomware succeeds when businesses have poor security hygiene. Organizations that lack policies & procedures around data security will have a higher risk of ransomware attacks. Here are some of the most common ways to fall victim to a ransomware attack:

Open Remote Desktop Protocol Ports (RDP)

Businesses that have improperly configured network security may leave their Remote Desktop Protocol (RDP) ports open. Unknowingly, this is the equivalent of leaving the front door unlocked when you leave your home: it provides an opportunity for cyber attacks to come through with little deterrence.
Once a hacker is connected to your network, they can install ransomware and additional back doors to access your network at a later date. A large percentage of ransomware attacks still use this method of attack because so many organizations are not even aware of this security vulnerability.

Phishing Attacks

Ransomware can infiltrate your network by a malicious email campaign known as a phishing attack. Ransomware operators use massive networks of internet-connected devices (botnets) to send phishing emails to unsuspecting victims. These emails intend to trick the receiver into clicking on a malicious attachment or link, which can secretly install the ransomware virus or other malware.
Phishing emails are becoming increasingly difficult to detect as cybercriminals find clever ways to make a malicious email look legitimate. This underscores the importance of security awareness training for everyone in the organization, not just the I.T. department.

Compromised Passwords

The ransomware operators may have used previously compromised passwords from employees at your organization to gain unauthorized access to the networks. This derives from the poor security practices of reusing the same passwords for multiple accounts and authentication processes.
If your employees have been using old & weak passwords to access your business data, a cyber criminal can use a previously compromised password to initiate the attack. Remember to always to follow good password hygiene.
The variety of attack vectors highlights the importance of a digital forensics investigation that can help victims understand how the ransomware came onto your computer and what steps you can take to remediate the vulnerability.

4 Options for Ransomware Recovery

In this section, we cover the options to restore files encrypted or locked by ransomware.

1. Recover files with a backup

If your files become encrypted in a ransomware attack, check to see if you have backups to restore and recover (in order).

2. Recreate the data

Even though your files are encrypted by ransomware, you might be able to recreate the data from a variety of sources as outlined below:

3. Breaking the ransomware encryption

The harsh truth is that the majority of ransomware encryption is unbreakable. This impossibility is a tough concept for many of us to accept, given the technological advances of our society.
Does this mean you should skip looking into whether the ransomware encryption can be broken? This option should always be explored if presented by a ransomware recovery firm, although the final choice is yours to make. We will lay out a real life example at Proven Data below to outline why this was a great decision for a company that was infected with ransomware.
While it tends to be rare, there are poorly constructed ransomware encryptions that have been broken by security researchers. If you can avoid paying a ransom, you should at all costs.
There can be flaws in the malware or weaknesses in the encryption. Businesses can look at these options, especially if time is on your side. There are also free ransomware decryption resources that provide tools for previously decrypted ransomware variants. A client of ours had hired a ransomware recovery company to recover their files until we discovered at the very last moment through our analysis that the encryption was breakable. With less than 20 minutes to spare, we saved the client out of paying a $450,000 ransom.

Why can’t most ransomware encryption be broken?

Ransomware is a cryptovirus, which means it uses cryptography in combination with malware to lock your files. Modern cryptography uses sophisticated mathematical equations (algorithms) and secret keys to encrypt and decrypt data. If strong encryption is used, it can take thousands, if not millions of years to break the encryption given the strength of today’s computers.
Encryption is a security tool created with the intent of data protection. It is a defensive tool to provide security, privacy, and authentication. Sadly, ransomware attackers are using it as a weapon against innocent victims.

How do I know if the encryption can be broken?

You can start off with this free ransomware identification resource to determine the feasibility of decryption. You will need to upload the ransom note and a sample file into the ID-Ransomware website, and it will tell you if there is a free decrypter or if it is an unknown ransomware variant. Please note that the tool is not always 100% accurate. If the variant is still under analysis, you will need a malware or encryption analyst to determine whether or not there is a possibility for decryption.
Encryption is designed to be unbreakable, which is why security researchers can’t simply make a tool for ransomware decryption. These unbreakable encryptions protect our bank accounts, trade secrets, government data, and mobile communications, among other things. It would be a significant security concern if there were a master decryption tool that could break encryption algorithms.

4. Paying the ransom to decrypt ransomware files

If the encryption is too strong, the only way to obtain the decryption key for your files is to pay the ransom. Many ransomware victims don’t have time on their side because they are facing significant business disruption. Each minute that passes could be a lost client, or worse for a medical organization.
Here is a list of the most prevalent ransomware variants that are known to be “cryptographically secure,” which means that Proven Data or the security community has confirmed the encryption is unbreakable:

I don’t want to pay the hackers ransom.

Businesses and individuals have the option of choosing not to pay the ransom in a ransomware attack to regain access to their files. For personal, political, or moral reasons, there has been resentment of the ransomware economy, and victims do not have to engage in extortion. If paying the ransom is the only option, you should know what to expect before considering moving forward.

How a ransomware recovery specialist can help

If you do decide to use a ransomware recovery company and if there is one thing you get out of this article, it is this: You should always question how a ransomware recovery company is recovering your data. If you are unsure, asking the right questions will ensure a transparent experience:
A ransomware recovery specialist can analyze your current situation and determine what options are available to you at the time of the inquiry. A competent and experienced ransomware recovery company should be able to provide the following:
Understanding how your files were affected by ransomware in the first place will provide you with the insight needed to prevent another attack. Whether you choose Proven Data or another company to decrypt your ransomware files, it’s important to know what unknowns there may be out there.
Our threat intelligence that we’ve gathered from the thousands of previous cases enable you to make informed decisions in helping restore your data after a ransomware attack. If you require a company with such experience, we’re standing by to assist 24/7.
submitted by Proven_Data to u/Proven_Data [link] [comments]

How do I archive Ransomware files? (7zip)

I'm aware that files encrypted via viruses in the Crysis family are undecryptable until the creator releases the master key.
Knowing the history of users on bleepingcomputer forums releasing master keys to decrypt files, I'm counting on this slim chance to put my encrypted data in long-term storage until I have a chance to decrypt them.

This is not a "help me my files are encrypted" problem, but a "how do I compress encrypted video files if I can restore them in the future" type of question.



Backstory:
My son Jared was never the kind of kid that listened, he and his college buddies partied one night, his buddies were drunk, and was hit by a truck, only my son survived.
He had pieces of metal in his brain and needed to remove them surgically; I decided to put on a Go-Pro and record our journey, maybe someday we'll both look at these videos at laugh at each other.

To do his surgeries, I borrowed as much money as I could, even taking out my 401k with penalty. After three years of fighting, he had a brain infection on his left brain and was in a vegetated state, I was not financially capable of helping him, and I made a decision I still regret to this day... to cut off his life support.

It was the worst moment in my life, but I had accumulated terabytes of recordings, like him doing dumb things and telling inappropriate jokes, I often look at these recordings when I'm feeling down.

Last year, I was traveling to see my stepmother. Stupid as I am, I Googled how to remotely control my computer, as I wanted to look at my computer when I'm able to. I was recommended with windows rdp, not knowing what security risk it poses, I opened up my system to the interwebs, and made it vulnerable to hackers.

I was devastated when I came home, my work files are gone, that's fine for me, but my videos. Everything I worked for is now unopenable, attached with a ransom note demanding me to contact "support," the hackers asked for $5000 in bitcoin, I'm not a rich guy, and I do not have that kind of money.

After doing my research, I figured out how everything (technical) happened, but at this point, I'm counting on another computer guru to release a master key to decrypt these files.
All these files have their original file name, with an id, an email, and ends with .harma.

For now, I just need to put them in storage. How can I lossless compress them? If I use lossy compression, will I still be able to uncompress and decrypt them if someday the master keys are released?
I'm willing to sit and wait, maybe ten years down the road, these computer hackers will find some good inside them.
submitted by FolleyMel779 to techsupport [link] [comments]

What Is Bitcoin Private Key: Beginner’s Guide

What Is Bitcoin Private Key: Beginner’s Guide
Most of the people in this sub probably already know what the Bitcoin private key is and how it works, but there are many newcomers who do not fully understand all the technical aspects of it. I hope you guys will find it useful.

Bitcoin Private Keys: The Basics

Let’s start with some main principles.
  • A private key is functionally similar to a password to your email account. Unlike your email address, you never share it.
  • You need your private key to be able to receive the crypto someone sends you and to have access to your funds.
  • The BTC network does not store your private keys, they are generated and stored by the wallet software. There are different types of wallets.
IMPORTANT: The private key concept does not apply exclusively to Bitcoin. Other cryptocurrencies use it too.
Now, let’s see how a private key looks and works.

Bitcoin Private Key Definition

Bitcoin private key is an alphanumeric piece of code. It includes letters and numbers, just like your public address.
However, while a public address is like your plastic card number, a private key is like your CVC. You know, those secret three digits on the back of a card?
A private address is created in a random manner when you get a cryptocurrency wallet. The possibility of creating two identical private keys is almost zero, due to the sophisticated encryption algorithm, we apply for the purpose.
In the BTC network, a private key contains 256 symbols, as we obtain it using the SHA256 encryption algorithm. This function always returns 256 symbols, no matter the input.

Bitcoin private key in various formats, including WIF.

Wallet Import Format (WIF)

Using such a long string of code is inconvenient, so a private key is often presented in WIF (Wallet Import Format). It’s a shortened version that includes only 51 characters (numbers from 0 to 9 and letters in the range of A-F) and begins with 5.
Here is a Bitcoin private key example in WIF:
5Kb8kLf9zgWQnogidDA76MzPL6TsZZY36hWXMssSzNydYXYB9KF
WIF has a few advantages over a full BTC private key version. As we have said, it’s shorter and more convenient to use. Also, it contains special pieces of code that serve to check the address for typos and correct them automatically.
WIF associates with only one private key and can be easily converted back into it, using an established algorithm.

Encrypting Private Keys

If a key looks like WIF but starts with 6, it is an encrypted version of a private key. People encrypt keys to ensure an extra layer of protection. To obtain such a string of code, we apply another algorithm. To decode (decrypt) the key we need to enter the password that we set when we were encrypting it.

How Bitcoin Private Key Works

You probably know Bitcoin as a digital payment system. To explain how it works, it would be better to compare it to a web-messenger, with massages transferring value. These ‘value messages’ are BTC transactions.
And what role a private key plays in sending these financial messages?
Let’s take a look at a real-life example.

https://preview.redd.it/fgtn8h63veu41.png?width=1261&format=png&auto=webp&s=9855f9aba70ebe7ca1f02b32c160ae78b2b42400

Using Private And Public Keys For a Transaction

Imagine you are sending 1 BTC to your friend Bill. You create a transaction and indicate yourself as the sender and Bill as the receiver of this amount. Then, you will broadcast the transaction to make the Bitcoin network aware of it.
  1. You start by choosing a private key. Using a special encryption algorithm, you derive a public key from it. You send this public key to Bill.
  2. You create a message for Bill and sign it with your digital signature. To obtain it, you pass your private key through a special encryption algorithm and attach the resulting code to the message. Every signature is unique, and you can use the same private address to produce an infinite number of them.
  3. Bill receives your message, public key, and signature and passes it through a signature algorithm. If it’s the message you sent, the algorithm returns ok.
Why we need a digital signature in the first place? There are three reasons. First, it tells the recipient that the message is from the sender he knows. Second, a digital signature makes it impossible for the sender to deny he sent the message. Third, it confirms that no one has altered the message in transit.
Unlike a traditional signature, a digital one cannot be forged. To produce it, you have to possess a secret private key.
https://preview.redd.it/k8n0vcg4veu41.png?width=624&format=png&auto=webp&s=9ab6c0bc25c0a638c4d3bfdbf86056f5462aa7d0

Why Keeping Your Private Key Secret Is Important

As we have mentioned, anyone in possession of your private key can steal your funds anytime.
If your wicked colleague Alice gets your private key (because you carelessly left your paper wallet on your desk), she can use it to create a digital signature. She can then use that signature to sign a transaction that will look like yours for the network. For instance, Alice can send all your crypto to another address. You will never be able to cancel this transaction and you are highly unlikely to know that she made it.
For this reason, you should be very careful with your private keys. Never send it to anyone using a messenger, or an email client, or a social media channel. Don’t share photographs of your private key. Never store a private key in a Google Doc file.
Please note that some desktop wallet apps store your private key in a standard directory on your hard drive. This place is a honeypot for hackers who know you are a cryptocurrency user. That’s why it’s extremely important to have up-to-date anti-virus software installed on your device.
https://preview.redd.it/bg2zd50aveu41.png?width=723&format=png&auto=webp&s=0e692f5c73c7c68ea854342b7fbeaf6aaa62f71f
Also, you may encrypt this wallet file to make it immune to malware. Many wallet apps provide this option. You will have to set a password to decrypt the private key, and the hacker will have to break this password to do it. If the password is strong, it will be a really difficult and time-consuming task.

Where To Store Private Keys: Mobile, Desktop And Hardware Wallets

As we have mentioned, the Bitcoin network does not store these keys. Instead, wallet services do it.

Mobile Wallets

Some of them allow you to keep and protect your private key, others do it automatically, applying various safety measures like 2FA or encryption. Note that nobody is responsible for it, your bitcoins will be gone if the service is hacked.

Desktop Wallets

Desktop wallets may be a good option. They provide a BTC public and private keys in the format of a file that you can download and import. You can protect this file with a strong password and safely store it on a hard drive. Don’t forget about safe storage for this drive, too. For instance, use a bank vault for this purpose.

Cold (Hardware) Wallets

Hardware wallets are the safest ones. They are small USB devices designed to store your funds and private keys offline, away from anyone who could steal them. For this very reason, hardware (or cold) wallets are impossible to hack. If you accidentally lose, damage or destroy such a device, you can recover your BTC and private keys using a backup phrase. The best-selling models of hardware wallets are Tresor and Ledger Nano S, supporting several popular coins.

https://preview.redd.it/7wlozgvcveu41.png?width=803&format=png&auto=webp&s=9c438a47a47f6bb2ba5dbd4fdfba924e8c960f47

Paper Wallets

These wallets are sheets of paper with BTC private keys and public address printed on them. Paper wallets look pretty basic and not very innovational, but it’s a safe way to store your BTC-related sensitive data. The main reason is that they are not connected to the Internet and thus are unreachable for malware attacks. This format is also immune to many mishaps that can affect electronic devices. To create a paper wallet you use a special web service like WalletGenerator.

P.S. Check out our blog if you are interested in more articles on crypto and finance
submitted by EX-SCUDO to btc [link] [comments]

The ultimate dark web anonymity privacy & security course free download - freecoursessites.com

Learn how to access & use the dark net and the clear net privately, anonymously and securely

Privacy And Security Course
Created by Zaid Sabih, z SecurityEnglish English [Auto-generated] What you’ll learn
Requirements
Description
Welcome to the ultimate dark net, privacy, anonymity and security course. With no prior knowledge required this course will take you from a beginner to advanced in all of these topics; teaching you how to properly and securely discover data and websites on both the dark web and clear web, access hidden (onion) services, communicate privately and anonymously using instant messages and email, manually use end-to-end encryption to protect your privacy and make it impossible to read even if it gets intercepted, sign and verify files, share files anonymously, transfer funds anonymously using crypto currencies such as Bitcoin and Monero and much more! You’ll also learn how to do all of this in a secure manner making it very difficult for hackers or other entities to hack you or de-anonymise you, and even if you get hacked these entities won’t be able to easily control your system or de-anonymise you.
This course is highly practical but won’t neglect the theory, first you’ll understand the inner-workings of each topic and each technique covered, then you’ll learn how to apply it in real-life scenarios ultimately teaching you how to use the dark net and the clear net in a more private, more anonymouse and more secure manner, so by the end of the course you’ll be able to combine the skills you learned and use them in any situation that requires more privacy, more anonymity or more security.
This Privacy And Security Course covers four main topics, I chose to cover all of these topics in one course because I think it is very difficult to learn one without the others as they are very related, these main topics are:
1. Anonymity – anonymity is a state where your identity is unknown, achieving this on the internet is not easy because of the way it is designed, so in this course you’ll learn a number of techniques to improve your anonymity, you’ll first learn what the TOR network is, understand how it works and how it can significantly improve our anonymity, then you’ll learn how to connect to it using the TOR Browser, using TAILS and using Qubes OS, you’ll also learn how configure TOR properly to bypass censorship and connect even if its blocked!
2. Privacy – Using an anonymising network such as TOR is not enough to stay private and anonymous because the operating systems we use (Windows, OS X, Linux) constantly collect data about us, therefore in this course you’ll learn how to use two operating systems designed to be more private, more anonymous and more secure; TAILS and Qubes OS, you’ll learn how to install these operating systems on a USB stick so you can use them on any computer without affecting the original operating system and without leaving any traces!
There’s also a fully section on encryption in which you’ll learn how the two main types of encryptions work (symmetric and asymmetric), what is end-to-end encryption and how to use it to encrypt / decrypt and sign / verify data, this allows you to privately communicate and share any sort of data; whether it is simple text, or files such as images, videos…etc without worrying about it being intercepted.
The course also contains a full section on crypto-currencies, because the payment methods we are used to use are not private and not anonymous, so in this section you’ll learn about block chains, crypto-currencies is and how they work, and how to anonymously obtain two crypto currencies; Bitcoin and Monero and use them to send / receive funds.
3. Dark Net – This is the portion on the internet that is not indexed by search engines and require special configuration to access. Using anonymising networks and privacy-focused operating systems are 2 steps in the right direction of becoming more private and more anonymouse but unfortunately it is not enough, the services we use everyday are not private and constantly collect data about us, so the the search engines (Google or Bing), the email provers (ex: Gmail, or Yahoo), the instant messaging platforms (Whatsapp or Skype), the file sharing services (Dropbox or Google Drivet) ….etc all of these services are not private, not anonymouse and can be used to track us and de-anonymise us. Therefore in this course I will teach you how to carry out your normal day-to-day tasks in a more private and anonymous manner, so first I’ll teach you how to search for websites and content on both the clear net and on the dark net, then I’ll tech you how to discover hidden services (onion services) to carry out your normal day-to-day tasks privately and anonymously (such as communicating using emails, or instant messages, file sharing….etc) – Privacy And Security Course
4. Security – All of the above will drastically enhance your anonymity and privacy and allow you to access both the dark web and the clear web privately and anonymously, but if you get hacked, the hacker will gain control over your system and therefore will be able to easily bypass whatever anonymity techniques you’re using and de-anonymise you, so all of the above is useless without security. Therefore in this course I will teach you how to do all of the above securely, then at the last section of the course I’ll show you how to take your security to the next level by dividing your operating system into a number of security domains, these domains are completely isolated and used for different purposes, therefore even if you get hacked only a small portion of your system will be compromised and it would be very difficult for the hacker to compromise the entire system or de-anonymise you.
With this course you’ll get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you within 15 hours.
Notes:
Who this course is for:
Size: 6GB
Download link: https://www.freecoursessites.com/the-ultimate-dark-web-anonymity-privacy-security-course-free-download/
submitted by free_tutorials to u/free_tutorials [link] [comments]

Is Bitcoin Core a good wallet?

submitted by MichaelScottOfReddit to Bitcoin [link] [comments]

CMV: Requiring a password for "sudo" access on desktop Linux systems is nothing but security theater.

Furthermore: on desktop systems it is perfectly fine to put NOPASSWD:ALL in your /etc/sudoers and similar in /etc/polkit-1/rules.d. In fact, I think this should be the default so users do not get a false sense of security.
For clarity, I'm not saying that all accounts should have sudo access, just saying that there's no meaningful security distinction between "sudo access with password" and "sudo access without password", and the "with password" path does nothing but wasting the user's time and giving them a false sense of security.
Argument #1: compromising a user account effectively compromises everything you care about.
As the relevant XKCD says, if your user account is compromised, the attacker cal already do everything he probably cares about. This includes:
Yes, you can run a remote access tool without root. Starting programs at boot does not require root (see systemctl --user, .bashrc, crontab -e, whatever). Internet access does not require root (see: your browser). I frequently see users thinking that remote access kits require root for some reason. Thanks to the X protocol, keylogging does not require root access either on most systems.
The uses for root-level access I can think of is (1) to infect other users of the system, and (2) to install a rootkit infecting your firmware to survive OS reinstallation. The alleged other users do most likely not exist on desktop systems, and only advanced viruses would put rootkits in firmware—viruses with that level of sophistication may as well use the following point to gain root access after compromising an user account.
Argument #2: compromising access to a user account with sudo access effectively compromises root, and a password check won't stop that.
If your account is in the sudoers file, actively used, and an attacker compromises your account, there are a bazillion ways to get access to root. Here are some examples:
Since Linux has made it effectively impossible to use a system without occasional root usage, you will elevate yourself to root at some point, and at that point the attacker will be able to steal said root access one way or another.
Often-heard counterargument: "If you allow sudo without password and leave your computer unattended without locking it, then some passerby may be able to sudo something, but if sudo required a password, he wouldn't have the time to do one of the advanced techniques above."
Reply: targeted attacks can "curl URL_OF_REMOTE_ACCESS_KIT_INSTALLATION_SCRIPT | bash". Random passerby trolls can ruin your day with "rm -rf ~". Both can be typed fairly quickly and neither requires root-level access.
Although I do consider myself a security-focused person, entering my password upon every sudo is still something I consider a waste of keystrokes and a source of security myths. Since the majority of the Linux world seems to disagree with me, I would like to know whether there's something major I'm overlooking.
submitted by ArchaicArchivist to changemyview [link] [comments]

What Is Bitcoin Private Key: Beginner’s Guide

What Is Bitcoin Private Key: Beginner’s Guide
Most of the people in this sub probably already know what the Bitcoin private key is and how it works, but there are many newcomers who do not fully understand all the technical aspects of it. I hope you guys will find this guide useful.

Bitcoin Private Keys: The Basics

Let’s start with some main principles.
  • A private key is functionally similar to a password to your email account.
  • You need your private key to be able to receive the crypto someone sends you and to have access to your funds.
  • The BTC network does not store your private keys, they are generated and stored by the wallet software. There are different types of wallets.
Also, it is important to note that the private key concept does not apply exclusively to Bitcoin. Other cryptocurrencies use it too.
Now, let’s see how a private key looks and works.

Bitcoin Private Key Definition

Bitcoin private key is an alphanumeric piece of code. It includes letters and numbers, just like your public address.
However, while a public address is like your plastic card number, a private key is like your CVC. You know, those secret three digits on the back of a card?
A private address is created in a random manner when you get a cryptocurrency wallet. The possibility of creating two identical private keys is almost zero, due to the sophisticated encryption algorithm, we apply for the purpose.
In the BTC network, a private key contains 256 symbols, as we obtain it using the SHA256 encryption algorithm. This function always returns 256 symbols, no matter the input.
Bitcoin private key in various formats, including WIF.

Wallet Import Format (WIF)

Using such a long string of code is inconvenient, so a private key is often presented in WIF (Wallet Import Format). It’s a shortened version that includes only 51 characters (numbers from 0 to 9 and letters in the range of A-F) and begins with 5.
Here is a Bitcoin private key example in WIF:
5Kb8kLf9zgWQnogidDA76MzPL6TsZZY36hWXMssSzNydYXYB9KF
WIF has a few advantages over a full BTC private key version. As we have said, it’s shorter and more convenient to use. Also, it contains special pieces of code that serve to check the address for typos and correct them automatically.
WIF associates with only one private key and can be easily converted back into it, using an established algorithm.

Encrypting Private Keys

If a key looks like WIF but starts with 6, it is an encrypted version of a private key. People encrypt keys to ensure an extra layer of protection. To obtain such a string of code, we apply another algorithm. To decode (decrypt) the key we need to enter the password that we set when we were encrypting it.

How Bitcoin Private Key Works

You probably know Bitcoin as a digital payment system. To explain how it works, it would be better to compare it to a web-messenger, with massages transferring value. These ‘value messages’ are BTC transactions.
And what role a private key plays in sending these financial messages?
Let’s take a look at a real-life example.
https://preview.redd.it/lt1gwme8seu41.png?width=1261&format=png&auto=webp&s=87137c6ad2566affef82a6513090022f7dbb931e

Using Private And Public Keys For a Transaction

Imagine you are sending 1 BTC to your friend Bill. You create a transaction and indicate yourself as the sender and Bill as the receiver of this amount. Then, you will broadcast the transaction to make the Bitcoin network aware of it.
  1. You start by choosing a private key. Using a special encryption algorithm, you derive a public key from it. You send this public key to Bill.
  2. You create a message for Bill and sign it with your digital signature. To obtain it, you pass your private key through a special encryption algorithm and attach the resulting code to the message. Every signature is unique, and you can use the same private address to produce an infinite number of them.
  3. Bill receives your message, public key, and signature and passes it through a signature algorithm. If it’s the message you sent, the algorithm returns ok.
Why we need a digital signature in the first place? There are three reasons. First, it tells the recipient that the message is from the sender he knows. Second, a digital signature makes it impossible for the sender to deny he sent the message. Third, it confirms that no one has altered the message in transit.
Unlike a traditional signature, a digital one cannot be forged. To produce it, you have to possess a secret private key.

https://preview.redd.it/8ta8ds3jseu41.png?width=624&format=png&auto=webp&s=79186fecbe58ecd8a393f644ad35e590361fbe86

Why Keeping Your Private Key Secret Is Important

As we have mentioned, anyone in possession of your private key can steal your funds anytime.
If your wicked colleague Alice gets your private key (because you carelessly left your paper wallet on your desk), she can use it to create a digital signature. She can then use that signature to sign a transaction that will look like yours for the network. For instance, Alice can send all your crypto to another address. You will never be able to cancel this transaction and you are highly unlikely to know that she made it.
For this reason, you should be very careful with your private keys. Never send it to anyone using a messenger, or an email client, or a social media channel. Don’t share photographs of your private key. Never store a private key in a Google Doc file.
Please note that some desktop wallet apps store your private key in a standard directory on your hard drive. This place is a honeypot for hackers who know you are a cryptocurrency user. That’s why it’s extremely important to have up-to-date anti-virus software installed on your device.
https://preview.redd.it/187j0ucmseu41.png?width=723&format=png&auto=webp&s=c9bccdd66ffabde2e623846c7e95930d5e62a625
Also, you may encrypt this wallet file to make it immune to malware. Many wallet apps provide this option. You will have to set a password to decrypt the private key, and the hacker will have to break this password to do it. If the password is strong, it will be a really difficult and time-consuming task.

Where To Store Private Keys: Mobile, Desktop And Hardware Wallets

As we have mentioned, the Bitcoin network does not store these keys. Instead, wallet services do it.

Mobile Wallets

Some of them allow you to keep and protect your private key, others do it automatically, applying various safety measures like 2FA or encryption. Note that nobody is responsible for it, your bitcoins will be gone if the service is hacked.

Desktop Wallets

Desktop wallets may be a good option. They provide a BTC public and private keys in the format of a file that you can download and import. You can protect this file with a strong password and safely store it on a hard drive. Don’t forget about safe storage for this drive, too. For instance, use a bank vault for this purpose.

Cold (Hardware) Wallets

Hardware wallets are the safest ones. They are small USB devices designed to store your funds and private keys offline, away from anyone who could steal them. For this very reason, hardware (or cold) wallets are impossible to hack. If you accidentally lose, damage or destroy such a device, you can recover your BTC and private keys using a backup phrase. The best-selling models of hardware wallets are Tresor and Ledger Nano S, supporting several popular coins.

https://preview.redd.it/jmpyl3yoseu41.png?width=803&format=png&auto=webp&s=ef70101a853eaaedea8d0fb5d2d1690cce16c989

Paper Wallets

These wallets are sheets of paper with BTC private keys and public address printed on them. Paper wallets look pretty basic and not very innovational, but it’s a safe way to store your BTC-related sensitive data. The main reason is that they are not connected to the Internet and thus are unreachable for malware attacks. This format is also immune to many mishaps that can affect electronic devices. To create a paper wallet you use a special web service like WalletGenerator.

P.S. Check out our blog if you are interested in more articles on crypto and finance
submitted by EX-SCUDO to Bitcoin [link] [comments]

Order From Chaos

I feel it is important to discuss what is happening at the moment.
We're gonna break this down into 4 parts.
Let's start with the virus.
Part 1 - The Virus
Now, this virus.
First of all, I just want as a disclaimer to say that it's important to rely on official sources of information regarding the virus since they would never lie to you...
OK, so what's up? Well, here's what's up:
This virus is the trigger for the biggest power play we've seen since 2001.
This is a perfect excuse for an economic crash.
This defers responsibility from those who are actually responsible and blames it all on this virus.
It also accelerates the inevitable trend towards a cashless society, and the much desired Central Bank Digital Currency (CBDC).
We've had Christine Lagarde (former head of the IMF and current President of the ECB) and Mark Carney (former Governor for the Bank of England and current UN special envoy on climate action and climate finance) speak on digital currencies.
We've had reports from the Bank for International Settlements (BIS). The BIS is essentially the Central Bank for Central Banks.
Coincidence is a funny thing (just ask Larry Silverstein...):
In 2019, 1200 CEOs left their positions. That was a record year.
In the first month of 2020, 219 CEOs left. A new record.
On the topic of CEOs...
Part 2 - CEOs and Stock Buybacks
The financial metrics which incentivise executives have become far removed from operating performance.
As an example, here is a story from the end of 2014...
This summarises perfectly what has happened!
The main source of demand for equities has been corporations (i.e.stock buybacks).
And this makes sense, incentives drive human behaviour. Pretty simple.
Now, this is the really infuriating part.
These corporations now want bailouts.
By the way, this will happen.
And just like '08, profits are privatised and losses are socialised.
The Airlines, which feel they are entitled to bailouts, spent 96% of their free cash flow on stock buybacks over the past decade.
Now they want a bailout. Ridiculous!
Part 3 - Encryption and Privacy
While all of this is going on, the US Government has been sneakily trying to remove end-to-end encryption and it has been working it's way through Congress.
This concerns the EARN IT Act.
The premise of the bill is that technology companies have to earn Section 230 protections rather than being granted immunity by default, as the Communications Decency Act has provided for over two decades.
If the EARN IT Act were passed, tech companies could be held liable if their users posted illegal content. When internet companies become liable for what their users post, those companies aggressively moderate speech.
Part 4 - Practicality
Central Bank Digital Currencies are inevitable.
The NSA created the SHA-256 algorithm in 2001.
The NSA could of stopped Bitcoin early on if it truly wanted to (51% attack for example).
Why NOW allow a decentralised network of value transfer to develop, whereas previous attempts were snuffed out?
Well, going back to central banking: how about a centralised Central Bank Digital Currency (CBDC) that will allow a greater level of control, can facilitate negative interest rates, easier collection of taxes, etc.
For this to work, you need to usher it in gradually such that people have a decentralised alternative (i.e. BTC) and the mass public is more receptive to digital currencies more broadly. So BTC is the gold and CBDC is the ‘new fiat’.
The current situation is pretty chaotic.
But... ORDO AB CHAO
https://www.youtube.com/watch?v=jfx7PnMtCeY
submitted by financeoptimum to InvestmentEducation [link] [comments]

(Solved)How to Recover Ransomware Encrypted Files Corona-lock Virus (.corona-lock Files) Removal + Decryption How to remove Cryptorbit/Bitcrypt virus and Bitcoin's Long-Term Cycle  And Why Coronavirus Will Spark A Global Recession Unedited: BitCoin mining Virus/Malware found, explained.

Bitcoin accounted for about 98% of ransomware payments made in the first quarter of 2019, according to data from Coveware. As a result, it’s become an inextricable part of the ransomware model. “Not only does it offer anonymity and untraceability to criminals it is also something that victims are willing to engage with, said Cartwright. This basically means that the virus infects your computer after which runs a set of processes which create a copy of the original file and this copy has parts of data replaces with data from the encryption algorithm used (RSA, AES, etc.). The original file is then deleted and the virus leaves the file to appear as if it is corrupt. CryptoWall virus removal instructions What is CryptoWall? (encrypted using RSA 2048 encryption) affected by this malicious program is impossible without paying the ransom. At time of research, there were no tools or solutions capable of decrypting files encrypted by CryptoWall. CryptoWall 2.0 creates a unique bitcoin payment address for your unique key will be destroyed in 1 week from encryption! To recover your files, you must send 0,1 Bitcoins ( ~$37 ) to the next Bitcoin address… The virus demands you to pay the sum of 37 dollars and it’s primary purpose is to scare you into paying by giving you a deadline of one week time to pay the ransom. Bitcoin is a distributed, worldwide, decentralized digital money. Bitcoins are issued and managed without any central authority whatsoever: there is no government, company, or bank in charge of Bitcoin. You might be interested in Bitcoin if you like cryptography, distributed peer-to-peer systems, or economics.

[index] [444] [22574] [6028] [21548] [628] [25830] [11639] [15675] [2715] [22068]

(Solved)How to Recover Ransomware Encrypted Files

The Mosk virus is the name of a ransomware infection, whose primary purpose is to encrypt your files and drop a _readme.txt ransom note to convince victims to pay ransom in BitCoin to the cyber ... How to Decrypt Files Encrypted by Ransomware for Free - do not pay the Bitcoin Ransom - Duration: 4:14. Kierin Mulholland - Ethereum DeFi & Crypto Videos 10,107 views 4:14 Full hard encryption Ransomware attack payment via bitcoin worst virus ever - Duration: 9:02. Fintech Repair Shop 1,048 views. 9:02. Do you think the US will go negative & bitcoin will rise in response? Feel free to leave a comment below! Thank you all so much for watching the video. If you enjoyed the video, please consider ... Cryptorbit called HowDecrypt or Bitcrypt virus that has been released that encrypts your files and requires a $500 USD or .5 Bitcoin ransom in order to get a decrypter.

Flag Counter