Craig Wright - The Myth of Bitcoin as a Voting System
Craig Wright - The Myth of Bitcoin as a Voting System
A Developer's Guide To Running A Bitcoin Full Node And ...
Bitcoin - RaspiBolt
Running A Full Node - Bitcoin
installation - Why is downloading blocks taking longer and ...
DV/ABUSIVE COURT There's more to this Nightmare
[Table] IAmA dark web expert, investigative journalist and true crime author. I’ve met dark web kingpins in far flung prisons and delved the murky depths of child predator forums. I’ve written six books and over a dozen Casefile podcast episodes. AMA (part 2/2)
Around here nobody talks about the argument that increased regulation of the internet would help stop child predators. Is that true, and if so where do you fall on the Net Neutrality vs law enforcement spectrum?
No I don't think that's true at all. Child predators have been around much longer than the internet, and I would argue child abuse was more prevalent 50+ years ago when children were seen and not heard and it wasn't talked about. The dark web hasn't created more predators, it has just given them a new place to gather and hang out.
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused.
the below is a reply to the above
That's so interesting, thanks for the AMA! Can you remember any other thing that a child could do in order to protect himself from being abused? What other characteristics do the abusers hate in potential victims?
That seems to be the main one. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What do folks talk about in the child predator forums? Do they like give each other advice on how to improve their craft?
Yes, quite literally. The give each other tips on how not to get caught, how to edit out incriminating details in videos, how to drug children, techniques for convincing kids not to tell etc
the below is a reply to the above
Given your insight into how predators operate, do you have any advice for parents on protecting their kids?
I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
Has the exponential increase in Bitcoin value affected darknet dealers in any profound way? I can imagine that some drug dealers were sitting on quite a large sum of Bitcoin when the value shot up.
Crypto purists hate to admit it, but bitcoin would not be where it is today without Silk Road. It was sitting at less than a dollar when Silk Road began and the markets showed a robust use case for cryptocurrency and as the markets grew, so did the demand for bitcoin. It also provided real-life use data for those who were not interested in drugs but who weren't sure if it had practical application. When SR went down, Bitcoin was at about $650 and it continued to grow as adoption became more mainstream. There are many many stories of drug dealers (and at least one faux-hitman!) who gained most of their wealth not by selling the drugs, but by the growth in value of their bitcoin holdings
Since you have a lot of experience with them online. Do you think pedophiles(not child abusers) should be treated as criminals, or as people suffering from a mental illness?
Contact offenders should be treated as criminals, because they are criminals. They have abused or hurt someone. Same with those who support the creation and dissemination of child abuse materials.
Pedophiles who do not act on their urges should be given as much help as humanly possible.
Are there any mysterious or suspicious pages or communities that you haven’t been able to access? Anything that seems especially weird?
there are a lot of Russian communities that I can't access, mostly because I don't speak Russian. Some of the more technical hacking communities have entry barriers that I'm not technical enough to score an invite to
How much these bad people really exist out there? Hundreds? Thousands? More?
It depends what you mean by bad. If you mean people who use the dark web to buy drugs (who I do not consider bad) then there are many many thousands. There are also thousands of people who deal in stolen information to make money.
Unfortunately there are also thousands of child predators and the dark web has provided a "safe space" for them to come together to share materials and "tips". I hope this is where most of the resources of law enforcement are concentrated
Ehy mine is a rare question: what do you know about art on dark web? I'm talking about the black market made of stolen important pieces from museums, art used as value to money laundry and other criminal affairs I'm an artist and what I know is people don't think too much about the dark side of art and probably they need to open their eyes about
I really haven't come across much in the way of that. Some of the markets have an "art" section, but that is mostly blotter art
How accurate are the legends?
Any legends in particular? For a lowdown copied from a post I made in another forum:
1Red Rooms ￼ The one that is most persistent is the myth of the "Red Room" - live streaming of torture/rape that ends in the murder of the victim and which people can pay to watch, or even bid to type in commands for the torturer to carry out (highest bid wins!). The most famous was the “ISIS Red Room” pictured above, where people could provide instructions to torture captured terrorists - you can read what happened here.
People have this idea of Hostel with webcams exist all over the dark web, but you just need an invite to get into them. It's ridiculous. They don't exist. They certainly wouldn't exist on Tor. But people are desperate to believe and they always come back with "You can't prove they don't exist, people are crazy, therefore they must exist." Picture my eyes rolling here.
I don't think many people are taken in by the hitmen sites anymore, though the press loves playing up the fact that there are sites offering up hitman services. But every single one of them has turned out to be a scam, especially Besa Mafia, the one that did the most marketing. Again, you can read about it at the same link as above.
3.Exotic animals ￼ People are always asking where they can find markets for exotic animals. Obviously the illegal trade in exotic animals exists, and some communications and transactions may well take place over Tor, but there are no markets like the drug markets where you can go and look at a picture and then put a tiger or ocelot or something into your basket and buy it with bitcoin.
SO WHAT DOES HAPPEN ON THE DARK WEB?
1.People buy and sell drugs.
The drug markets are more busy than ever. You have probably heard of Silk Road, the most famous online drug market that got busted a few years ago and the owner sent to prison for two consecutive life terms? A lot of people thought that was the end of drugs being sold on the dark web. In fact, dark web sales of drugs have tripled since the shutdown of Silk Road.
The reason people buy drugs this way is that for many they offer a safer alternative for people who are going to do drugs anyway. There is no possibility of any violence. The vast majority of the time a buyer knows exactly what they are getting, because of the feedback and rating system. That's not the case in a nightclub, or even friends-of-friends, where you just blindly accept that the pill, powder or tab is what the seller says it is.
2.People buy and sell other illegal things
Mostly they buy and sell stolen credit cards and financial information, fake IDs (though lots of these are scams), personal information, “dumps” of hacked data and fraud-related items. For a long time, a seller was making a fortune selling fake discount coupons that really worked.
3.People access and create childporn ￼ Unlike the other markets, the CP market is generally not for money, but rather they are groups who swap vile images and videos for free. The worst of the worst is called “hurtcore’. Thankfully, most of the people behind the worst sites have been arrested and put in jail.
4.People talk about stuff
There are plenty of sites, forums and chatrooms where people talk about all sorts of things - conspiracies, aliens, weird stuff. They take advantage of the anonymity.
5.People anonymously release information
Whistleblowers use the dark web to release information and make sure their identities won't be compromised. You will find Wikileaks, for example, on the dark web.
6.People surf the web anonymously
The number 1 thing people use the dark web for is just to surf the web completely anonymously. Not everybody wants to be tracked by advertisers.
I have a question: what are the odds of the casual Darkweb drug buyer - not buying mega loads all the time - the occasional purchase - what are the risks of being busted? Kinda figuring pretty low. But you’re the expert. What do you think?
Obviously there is always a risk, but the risk is very low. It is rare for personal amounts to be seized. Even if a package is seized, there's usually no resources to follow it up. Many people report simply receiving a letter from Customs saying they have seized what they believe is contraband and the person has a choice of going to claim it or it will be destroyed. Even if LE does knock on the door there is plausible deniability: "I don't know who sent that stuff to me".
So yeah, rare, but it does happen. You might be the unlucky one
How do you find things on the dark web without search engines?
There are a lot of entry sites, set up with links to the most popular places. You can generally get a link to one of them by browsing places like reddit. From there it is a matter of checking out different places, people will put links in forums etc.
I also use a Pastebin where people paste sites they have made/found, and a Fresh Onion site, which crawls all the newly-populated .onion addresses
Hi. there!! Thank you for answering questions. Mine is very simple. How do sellers get the drugs to people? Regular mail? That's always puzzled me bc I'd assume USPS, UPS, fedEx or any other mail carrier would catch at least some goods.
If people are ordering drugs, particularly in powder form, for personal use, they can be flattened, sealed in MBB (moisture barrier baggies) and sent in a regular business envelope, indistinguishable from billions of other envelopes going through the postal system every day. The chances of a particular package being intercepted is very low.
Some people take the extra precaution of having the person taking delivery of the drugs different to the person/household that is ordering them.
How did you move from being a corporate lawyer to researching and writing about dark web?
I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there
I've always wanted to check out the dark web, what is a normal day for you look like on there? Can you give me any tips on how to safely surf the dark web?
A normal day looks like me sitting at my desk writing things on my computer. When I'm researching a book or a case I venture away from my computer to trials and to interview people (at least I did pre-COVID)
There is nothing inherently unsafe in surfing the dark web. All the usual precautions you take surfing the clearweb apply. Don't visit any child exploitation sites - it will be pretty obvious that's what they are by the names/descriptions before you log in.
It is only when you want to do more than surfing - e.g. buying drugs etc - that you need to do a LOT of homework or you will absolutely get scammed
Is there anything good about the dark web?
It depends what you are into. A lot of academic research has concluded that the darknet markets provide a safer way for people to buy and use drugs, due to the ratings of vendors, services that independently test and report back on batches of drugs, doctor on staff ready to answer questions, no violence in transactions etc.
News sites provide a dark web option so that whistleblowers can safety provide information and upload documents that get stripped of any identifying metadata before being available.
It bypasses firewalls and allows for secure communications under hostile regimes
the below is a reply to the above
How does this make you feel about the idea of the decriminalization of drugs?
I've always been for full legalization of drugs, and studying the darknet markets just proved I was right.
I was invited to an experts roundtable in Portugal about drugs and cybercrime a few years ago and the Portugal model of decriminalisation has been a great success
the below is a reply to the above
Hey, you are still answering. Been reading this thread for 1-2 hours now. Thank you so much for all the good work and info! Always been intrigued by this topic, downloaded tor once to explore a bit but couldn’t and deleted it right away, to be on the safer side. Great insights. Thanks!
I've been writing it for about 14 hours. Going a bit loopy
How was working on Casefile? What's the production process like? Which episodes did u do?? I have listened to... all of them....
I absolutely LOVE working for Casefile. I am a freelancer, so I source and write my own cases and then sell the scripts to Casefile. I've done at least a dozen, but some of my most popular are Amy Allwine, Mark & John, Ella Tundra, Leigh Leigh, Rebecca Schaeffer...
As for the production process, once I have sold the script to them, a staff member edits them and then they are passed on to Casey to narrate. After that, they go to Mike for sound editing, music etc. They are the best team ever
the below is a reply to the above
Oh, Leigh Leigh was so well written!! How do you choose which stories to write? Do you just pick true crime you're interested in?
Thank you! I have a huge list of potential episodes. Any time I come across an interesting crime on reddit, or in the news or wherever I make a note of it. Then I just pick one when it comes time to write a new script.
Sometimes I've been personally involved (e.g. Amy Allwine), gone to trials etc. Those are always the best ones
Hi Eiley, your twitter just reminded me of this AMA :) What are your thoughts on bitcoin? And would you prefer to be paid in crypto or fiat?
OOOOH, I know that name! Love & Light to you!
I like Bitcoin and I wish I had a whole lot of it and like many many people, I wish I had kept the first crypto I bought at something like $4 a coin :D I do not have a whole lot of it but I do have a little bit. I like the philosophy behind it and in theory it should change the world. However the reality is that the vast majority of it is concentrated in a very few hands which allows for market manipulation and stops it being useful as a post-fiat currency.
As long as I'm getting paid, I'm pretty happy!
the below is a reply to the question
I too remember your name Pluto! Such a decent human ❤
he is!! True OG right there <3
Is the dark web subject to more racism than its counterpart, the world wide web?
There are some white power sites and that sort of thing and the chans are even more uncensored than the clearweb ones (4chan, 8chan) but to be honest they are the same cesspools in different spots. Drug forums don't seem to be very racist. I've seen worse on Twitter
Have you seen any consequential political or social organizing being carried out on the dark web?
Not directly, but the dark web helped facilitate the Arab Spring uprising in 2010 by allowing activists to remain anonymous and to access blocked websites and social media. Wikileaks, obviously. Some white supremacy organizations seem to use it to coordinate attacks, but they are not places I'm keen to hang out in.
What’s the most expensive thing for sale you’ve seen on the dark web? What was surprisingly inexpensive?
I can't remember specific listings, but there were sometimes sales of things like coke by the kilo, so that sort of thing I guess.
LSD could easily be found for $1/tab and one huge dealer gave it away for free if it was for personal use
the below has been split into separate questions
1. I’m going to ask a couple in hopes that one will catch your interest! I know you’re anonymous on the dark web, but even so, have you ever felt worried about your safety?
I actually made the decision to be upfront and honest about who I am on the dark web, so I use the name OzFreelancer (which is easily traceable to my real name) on all the dark web sites where i went looking for interviews. The people there had the option of talking to me or not, so they had no reason to want to harm me.
2. I’ve found your comments about your relationship with Yura fascinating. Did y’all develop a friendship? Did you build any other relationships that stand out in your mind? Since you were straightforward about being on the dark web for stories, did people seem reluctant to communicate, or were they excited for the opportunity to divulge a secret?
We do have a friendship of sorts, it is really quite weird. I do hope to met him one day. I met all of the senior staff of Silk Road other than the Dread Pirate Roberts himself and keep in touch with some. Some people wanted nothing to do with me of course, but many more were happy to talk to me. i think sometimes it was a relief to them to be able to talk to one person who they knew was who they said they were.
3. On violent forums, did users ever express remorse, guilt, shame, or anything indicative of some recognition that what they were viewing/seeking was awful? Do you see doxxing teams on the dark web working together to uncover info, or is the info already there through previous hacks/breaches, and someone just accesses and releases it? Sorry if any of those don’t make sense! I’m not familiar with the dark web lingo but am so intrigued by your work.
Not really. I think if they were contributing to the forums, they were comfortable with who they were and what they were doing. Many of the "regular" pedophiles expressed revulsion about Lux and hurtcore sites though
these have probably been asked before but has there ever been a time where you where genuinely been scared for your life and whats the most messed up thing you've witnessed did you have any help?
Yeah both things have been answered in this thread, so I'll cut'n'paste
The only time I've felt even slightly in danger despite all this nosing around in there was when I helped uncover a hitman scam. The owner of Besa Mafia, the most profitable murder-for-hire site in history, came after me when I started writing about him. He made loads of threats ("you don't know who I am, but I know who you are and where you live") but that wasnt scary, as I had access to the backdoor of his site thanks to a friendly hacker and knew he didn't really want to hurt anybody.
It took a bit of a darker turn when he told the people who had signed up to work as hitmen on his site - and who he made video themselves burning cars with signs on them to advertise how legit his site was, then never sent them the promised money for doing so - that I was the owner of the site who had ripped them off. That could have become ugly, but luckily even the thugs weren't dumb enough to believe him.
The only other time I've been a bit nervous was when Homeland Security wanted to have a "friendly" meeting with me on one of my trips to the US to attend a trial. They were friendly, but scary too.
The most frightening experience I've ever had is coming face to face with Lux, the owner of Pedoempire and Hurt2theCore, the most evil and reviled person on the entire dark web. He was responsible for procuring and hosting Daisy's Destruction, the most repulsive video ever made, created by Peter Scully, whose crimes were so bad, the Philippines are considering reinstating the death penalty especially for him.
It wasn't frightening because Lux was frightening - he was anything but. It was frightening because he looked so inoffensive and normal.
It was frightening because he was living proof that monsters walk among us and we never know.
It is absolute crap for browsing the clearweb, and a lot of sites detect that it is odd traffic and you have to solve their CAPTCHAs before doing the most basic things
I’m sure you’ve seen some really bad stuff, do you regularly talk to a therapist to help?
I've never seen a therapist (they don't really seem to be a thing in Australia they way they are in the US), but I have been known to unload on my partner and my dog
the below is a reply to the question
Yo, speaking as an Aussie, they absolutely are a thing, you can get them covered thru medicare, and I recommend it if you possibly can! Bro, therapy is awesome.
I'm not against therapy as a thing, but I've honestly never been so traumatised that I feel I need it. Also I had a bad experience with a psychologist after I watched my partner die in an accident - they suggested I find God, and I noped out of there
the below is another reply to the answer
Therapist is an American term- we call them psychs. And the one who told you to find God was terrible and out of line.
Yeah she didn't last long before I was over it. Also a doctor decided I needed Xanax, which was also a bad move, because what I really needed was to grieve and Xanax doesn't let you do that properly
Do you find any good things on the dark web? Happy stuff that gives people hope? Or just the trash?
I like the psychonaut communities. They just want peace, love and mungbeans for everybody
Have you heard of "The Primarch System" rumor of the dark web? Sounds downright silly to me. But I'm curious if anyone who spends time on the deep web actually takes it seriously, or if as an idea it is connected to anything serious at all.
Nah, up there with the Shadow Web and Mariana's Web. There's always people who want to find out where the "deeper" "more secret" "really dark" stuff is. To them I say what, hurtcore isn't dark enough for you?
Doesn't delving the murky depths of child predator forums categorize you with the child predators in the eyes of an investigating law enforcement agency? Do you have some sort of amnesty due to your journalism, or is that something you worry about having to explain away? Has your presence there ever caused some sort of a scare?
No, I never went into any of the sites that had actual photos or videos (you can't un-see that shit), but did spend a lot of time in pedophile discussion forums. I also went to a hurtcore hearing and saw screenshots in the police files, as well as listening for two days to videos being described frame-by-frame and private communications between the site owner and the sadists.
Besides drugs and sex crimes, what else is going on in the dark web? Are there other interesting nooks and crannies?
I often post screenshots of bizarre sites I find on my Twitter. However, the main uses for the dark web are drugs, digital/fraud goods and child exploitation
I have one, it might be rather boring though, but here goes. On these "child predator forums" are they actually forums devoted to stalking children and do they share social media profiles of children among themselves? That would be kik ids, snapchat and facebook ids, instagram, stuff like that, info that would allow online access and that may have been chosen for suitability? Creepy question I know, but anyway I would be interested to hear your answer. I came here from TrueCrime, you referred to these things in your post on that sub. I suspect I already know the answer yet would like to hear your take on it.
Yes, they provide information and tips on how to approach children, how to ensure they won't tell, how to sedate them in some instances, where to find child exploitation material, how to remove metadata and any identifying characteristics in photos and videos before sharing and so on.
They don't tend to share socia media, as that is the sort of thing that can be traced easily. They do talk about how to approach kids on social media and on the worst forums how to blackmail children into stripping/meeting etc
the below is a reply to the above
So you're saying they have a more general approach rather than identifying individual children on the internet? Again a creepy question because what I suggest is that a child's social media could be used and circulated on the dark web as potential information to gain access by anonymity, even if it was just online access only. I actually wonder as I have recently read of the anonymity of apps like ''kik messenger'' and how the police are often unable to get any information from the communications as they remain encrypted and off the server and require little if any valid ID to make an account.
No doubt photos from social media are uploaded as part of the materials they have. I haven't seen anything where they get together and try to track down a specific child, but I'm sure some predators do this. Most are more likely to abuse children in their orbit - family, kids of friends, or they work where they have access to children
I heard there are forums to download books but it was really dangerous, Is it true? I'm just a poor guy who wants to finish the young Jack sparrow series
Whenever you download anything from a pirate site you run the risk of infection
What do you think of QAnon?
the below is a reply to the above
Who should the conspiracy theorists actually be worried about if they actually care about thwarting pedophilia?
The vast, vast majority of child abuse takes place within the child's personal orbit - relatives, family friends, parents of their own friends, people involved in their activities (coaches, leaders, etc)
So, those people
the below is another reply to the answer
Also how to we get people to stop believing in QAnon?
Outside my area of expertise, sorry
do you personally believe there was/is any truth to the "defense" (story) that DPR was a title handed down to different admins for the original silk road, or was it just a convenient defense? do you have any theories as to who satoshi nakamoto is? besides the original SR, are there any other darkweb markets that you think have a good enough story to turn into a book? eg sheep market? i've seen you talk a little about the child predator forums, and (as with h2tc) noted are mainly populated by males. i'm curious if you've ever encountered females on such forums/websites (eg. btfk)
No. There was a time that I believed the person posting on the forums as DPR changed, but the ownership and administration of the market I believe never changed hands. Variety Jones is claiming a part ownership (which may or may not be true) but I believe that is so he can run a Fourth Amendment argument
So many theories have some credibility to them, but no one theory ticks all the boxes. Highly recommend the 3-part youtube deep dive by Barely Sociable
I'm not sure any one market has the story that Silk Road had, but I would like to write a definitive history that encompasses the most compelling features of all the markets. Backopy of BMR apparently got away clean. The admins of Atlantis got wind of a security issue and closed shop, trying to warn DPR. AlphaBay ended in Alexander Cazes death in a Bangkok prison cell. Then everyone flocked to Hansa, which by that time was being run by law enforcement. Evolution ended in the most brazen exit scam, followed by a bizarre cloak'n'dagger situation played out right here on reddit. The WSM/DDW follow-the-money case. And these are just some that come right off the top of my head. I just need a publisher to provide me an advance I can live off while I write it!
There were a very few people on the forums who identified as female (obvs anyone can be anyone on a dark web forum) and there have been one or two arrests of women in relation to dark web child pornography. Peter Scully's female assistant who carried out some of the torture was originally one of his victims, turned into a sadist.
What’s the one lingering unanswered question you have about SR?
I am hanging out for Joel Ellingson to go to trial so that I can find out once and for all whether redandwhite, lucydrop and Tony76 are one and the same person.
There are several people who I got to "know" by their handles who I wonder about from time to time, but mostly I hope they are safe and well and i don't want to track them down or expose them
the below is a reply to the above
Eileen, I am fangirling PRE-TTY hard right now. Talking SR and Tony76 with you is how I imagine it feels to talk to a royal correspondent about Prince Andrew 😅 Ellingson being all three would be a very neat end to an otherwise insane story. Part of me wants to pin Oracle in with that trio too but that’s mostly a desperate attempt from me to add another layer to the madness. I miss the twists and turns that came with the rise and fall of SR. From your own experience - would you agree with the idea that more than one person staffed the DPR account? Thanks for the reply!
Ha! You have no idea what it is like when I find someone who really knows about this stuff and can have informed conversations about it. I latch onto them and don't let go. The very BEST was meeting up with DPR's three deputies (SSBD in Australia, Inigo in US and Libertas in Ireland) so I could actually have conversations with people who knew more than I did! Variety Jones was cool too, but the conversation couldn't flow too freely thanks to him being incarcerated in Bangkok prison at the time.
I think others sometimes posted from the forum account, but Ulbricht kept a vice-like grip on his market account
the below is a reply to the above
I can imagine it’s so satisfying and exciting to get those tidbits of info that piece the jigsaw together. The bedlam that played out over the forum in the aftermath was a cloud of paranoia and adrenaline that kept me refreshing pages for days. Would love to hear accounts from SSBD, Inigo and Libertas from this time. One last question: what were your thoughts when the Chloe Ayling story first broke?
I assumed it was a publicity stunt. I don't think that any more. I guess I can't blame her for milking her kidnapping for publicity in the aftermath, though I don't think she does herself any favors the way she goes about it sometimes
Sorry if this has been covered before but in your research, mainly related to child abuse, where are these children coming from? Children in their care/ family? Kidnapped?
The vast majority of child abuse is carried out by someone within their social circle - family and acquaintances. However, the hurtcore stuff was often carried out in third world countries on orphans or where desperate families gave up their children to "benefactors" who they believed were going to provide food an education
What Casefile episodes have you written? I became obsessed with it and ripped through all the episodes and now nothing will fill that void. Thanks for your efforts!
Casefile – the murder of Amy Allwine
Casefile – Blue Skies, Black Death
Casefile – Ella Tundra
Casefile – Dnepropetrovsk Maniacs
Casefile – Motown Murders
Casefile – Rebecca Schaeffer
Casefile – Sian Kingi
Casefile – John & Mark
Casefile – Shauna Howe
Casefile – Chloe Ayling
Casefile – Johnny Altinger
Casefile – Killer Petey
Casefile – The Santa Claus Bank Robbery
Casefile – Martha Puebla
Casefile – Leigh Leigh
Is there any way parents can keep their kids safe from this without being helicopter parents?
I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What does it take in terms of degrees and experience to get into this business?
Nothing official. I was a lawyer, but that had no bearing on what I do now (I did corporate law). I didn't have any official credentials when I began as a freelance journalist, though later I got a diploma of professional writing and editing. Anyone can be an author, provided they can write
If you could take a guess from your findings, what would be some speculative statistics on these abuse/torture sites? How many people (tens of thousands?) are involved? Do they generally come from the same places in the world or are they seemingly geographically random (based on victim ethnicity, or language spoken, perhaps)... what are some quantifying stats to wrap our heads around how prevalent this shit is?
Most dark web users come from western countries, just because infrastructure supports it. The sites often have tens of thousands of registered users, but a lot of them would be people for whom curiosity got the better of them and who signed up then left. Active users more like in the thousands, hyper-active users the hundreds.
One of the things that makes life difficult for law enforcement is that most of these sites don't operate on a commercial basis - people aren't making money from them, so there is no cryptocurrency chain to follow. They operate on a sharing basis and to get access to the more private parts of the sites, a user has to upload "fresh" material and/or prove they are actively abusing a child. Hurt2theCore used to get users to have the children hold up signs or have the site name or a username written on their bodies with a marker. This stopped law enforcement from getting access to those parts (like the "producers lounge") of the sites unless they were able to take over an account of a user who already had access. Even then, the rules of the hurtcore sites would require constant new proof in order to maintain access.
Some sites allowed people to buy access, such as one called "Welcome to Video" and then were taken down by law enforcement carrying out blockchain analysis of the Bitcoin transaction that led to the owner when they cashed out to fiat without moneylaundering precautions
the below is a reply to the above
Do you think LE uses deep fakes to simulate a picture to gain access? Is that possible?
It is definitely possible, but I don't know whether they are doing it as they are understandably secretive about their methods. I know it is deeply problematic, as even fake child porn is still illegal (even cartoon stuff, including some Hentai in some countries). But they have used questionable methods before, most notably running the dark web's largest site, Playpen, for over a year in order to identify contact offenders
the below is another reply to the original answer
Am I hearing you that many people are NOT doing this for financial gain? Just to do it and share it??
Child exploitation, yes, it is mostly a sharing community. Some people make some money out of it, but it is not like drugs where a lot of people are making a LOT of money
On the subject of abused kids... did you ever help the kids in any way?
I never met any of the kids. I never saw any of the photos and videos. I don't know who any of the kids are.
Daisy has been taken into care and her identity changed. I hope she is doing okay
What exactly does the dark web look like? You hear about it often, but don’t know if it looks like Google Chrome, Safari, or just a page full of code.
It looks like a normal browser and operates just like a normal browser. It's just that it can access sites that your normal browser can't.
How do you keep yourself from hating all humanity?
I am happy to report that, even on the dark web, the good people outnumber the bad
Hi! First off I'd like to say that I find what you do quite fascinating and would love to do something like that in the future. My question is in regards to art and other forms of artistic expression on the dark web. Is it true that the dark web is a place where you can also find awesome things such as art and literature?
Not really, because all that stuff is readily available on the clearweb. There are sites like the Imperial Library of Trantor, which is a pirate site for books, where you can read thousands of books for free, but that's really no different to The Pirate Bay. Some people share their LSD art, but again, nothing you won't find on the clearweb
Disclaimer: This is my editing, so there could be some errors, misunderstandings or exaggerations. Waiting for "IOTA TIME " (an era where IOTA defines nearly everything in terms of the block-chain world) niels12어제 오후 4:51 IOTA funds are public:https://thetangle.org/address/IDNAFP9FWWKYGNDMKGJWZD9GATGRPTJYTYHLKFNDEQSISPSETLZQOSPGOHC99LMPXDEHSH9XYHNVOLUBBQPCEGHYK9But they have probably other sources of income, like funding by government etc. And maybe also other IOTA funds on other addresses. I don't know. Balance: 59.68 Ti David Sønstebø어제 오후 9:41 I wonder how many times an out of context 2 year old private DM has to be addressed. At the time IOTA was approaching stagnation due to the actions of primarily CFB**, thus since we both started Jinn together which lead to IOTA,** I tried repeatedly to talk sense into him.I.E. "If you are going to torpedo all progress, let's just sell it all and start from scratch, fuck it"It's a figure of speech, while trying to talk sense into someone who insists that 1 + 1 = 3.59 My tax records show when I last sold iotas. February of 2018. Now stop reading into private DMs, especially ones taken out of context and especially those leaked by someone who's proclaimed he is going to ruin IOTAand my life. You need to go back to school if you think there is anything to 'speculate' on there. dom어제 오후 4:15 u/unsywe will release the condensed version of them once we want to.Just because you so desperately desire them for whatever reason doesn't make us do it faster. Being in this space for so fucking long,last thing I want is to attempt to act in good faith again and then be screwed over by those trying to misconstrue reality and spread lies.We've been at that for too long.Once they are fully ready, and we have them in a format we like, we will publish them. dom어제 오후 4:16 Our objective of the finance / legal department is to become one of the most trustworthy / transparent organizations in this space. Which is why we're setting up new and stricter policies in general dom어제 오후 4:18 quite frankly, with everything that has happened up until now, I would certainly say thatwe are one of the most transparent organization(if we wanted it or not)u/unsy dom어제 오후 4:21 u/unsyI am not worried about it.If we have problems, we always solve them - I think we've proven that by now. And as it stands right now with our current funding + our strategy, we are in good hands David Sønstebø오늘 오전 6:41 Don't worry, a shitty FUD piece in a cryptoblog is nada [오전 6:41] We were once numero uno target by Jeffrey Epstein funded Joi Ito's MIT DCI [오전 6:41] This is nothing ------------------------------------------------------------------------------------ Antonio Nardella [IF]어제 오후 11:13 IMO the community has matured a lot, we have community and certified developers working with the IF in the X-Teams, there are new people coming in with direct interest in the tech (yeah, also spec is still popular) and from the chats that I've had, there are devs waiting for the breaking changes of Chrysalis P2, before starting to develop again..But that's my assessment.. Jelle Millenaar [IF]어제 오후 9:15 Well, I can say the DID developments are going smooth. Starting publishing the first DIDs to the Tangle ;D Jelle Millenaar [IF]어제 오후 9:15 And since I am totally not biased towards Identity, but its gonna be revolutionary ;D Jelle Millenaar [IF]어제 오후 10:06 This is the perfect time to loose faith in the IOTA Foundations capability to deliver, especially after the network just received a major update with many improvements. Its just crypto being crypto, dom오늘 오전 2:12 Yeh we'll go through it. This is the usual game... Dominik Schiener There is more tech maturity, more adoption and more progress than ever. We are one of the only projects which gets funding from government grants and corporations.Stop the attention grabbing headlines and get your sources right. Long field You can track their iota address, and I can tell they didn't sell any iota tokens in last two months HusQy IOTA is like a large decentralized network cable that connects any number of nodes with each other and that enables data and values to be exchanged with one another, whereby the data is protected against manipulation and the value transactions against double spends. Thereon ... ... you can run any decentralized application (we call this layer) - e.g. a blockchainthat stores certain data for as long as you want and limits the amount of data to be saved via fees like Bitcoin.Each of these uses inherit ... ... your security from the basic protocol and can specifically only save the data that is relevant for you (also decentralized).To say that IOTA is not a DLT is in principle not that wrong -it is a platform for DLTs and therefore much more powerful than all ... ... existing DLTs because it is much more flexible. For example, you can run Hashgraph in IOTA, or Bitcoin or whatever. And IOTA is the token that connects the entire ecosystem. This is of course "not yet" the case, but Chrysalis Part 2 is the first step. HusQy @blocktrainerperhaps this explanation will enable you to understand where the journey is going.If a decentralized data storage is required, then you can build it with IOTA and it then has exactly the same properties in terms of permanent storage as Bitcoin. Block trainer We can also get a little more technical.The way you describe it, it sounds like an interoperability layer ... something like that here, which then equates to a polkadot etc. 📷 HusQy In principle yes, only that it doesn't connect Bitcoin and ETH but "IOTA Smart Contracts" with "IOTA Storage" etc. It is not there to connect other projects but to offer the same as other projects, only faster and cheaper. ------------------------------------------------------------------------------- Bitcoin Coach And in 5 years there will be a completely new project, which then claims to be better than IOTA. And then should all the infrastructure be thrown overboard and the partners simply change the DLT? HusQy This is how technology works.It makes no sense to run the Internet on the basis of 64k modems just because many people have one at home.The change does not take place overnight but creeping and if you look at the BTC Dominance you can see that too. Ultimately, everything will switch to the best technology and we'll see which that is :) Block trainer The "best" must also be defined. What are the classes to master? HusQy All classes. If there is a technology that can represent even one aspect better, then it is not yet good enough. Blockchain, for example, is a "degenerate" DAG with only one reference. The goal is that IOTA can also use blockchains if the use case requires it. HusQy The future is not "either DAG or blockchain" but both seamlessly linked within the same ecosystem. IOTA smart contracts use a blockchain, for example, but a separate chain for each smart contract and the blockchain is within the tangle. Block trainer According to the new definition, they are no longer saved ... A doublespent could change the reference retrospectively. HusQy That's not quite true.The tangle itself contains all information for all eternity and you cannot remove any information. Once the data has reached a certain age, it is no longer stored by every node in the network. But you can still ... ... still prove what happened in the part of the tangle that was "forgotten" by the nodes after a certain time. Now there are two ways to keep this evidence: 1. You save the evidence personally and can present it at any time. 2. Man ... ... writes a plug-in for the node, which monitors the Tangle for information of a certain type and keeps a copy of all car purchase-related data forever (or for at least 30 years, for example). All dealerships could then install this plugin and ... ... jointly store this data decentrally in order to query the information if necessary. However, you would only selectively save the data that interests you. The evidence they produce can still be verified by any node on the network. If the server of a car dealership fails, it can download the data again from one of the other dealerships. Quasi like an application-related private blockchain which is secured by the Tangle. It is also conceivable that there are service providers for this ... ---------------------------------------------------------------------------------- HusQy Data is only kept immutable. How do you intend to execute a token transaction over pure data? I'm simply sending the following two data transactions at the same time: 1. I'm sending $ 100 from address A to address B. 2. I'm sending $ 100 from address A to address C. HusQy In order to determine which transaction is successful / came first, you need consensus. Data transactions do not allow token transfer. Block trainer Why doesn't that allow token transfer? I can simply use it to sign my values. The question is about the meaning of the token. I can also sign that I have transferred € 10 for the petrol station. Or I transmit the proof via curled BTC ... HusQy Did I just describe you can publish two conflicting data transactions and no one knows which is the correct one: P Block trainer Unless you agree on a consensus. Time stamp + BTC (locked) in hash = value transmitted ... What else is the IOTA token for? HusQy Whether information is correct can only be seen in the context. Take a look at the difference between "data" and "information". For example, you can claim that you locked Bitcoin even though it didn't. Block trainer I may need a proof of this. See how, for example, BTC is unlocked in liquid or in the LN. The IOTA data layer is extremely similar to the principle of Lightning. Accordingly, the sending of tokens would be possible here, which means that I see the use case of the IOTA coin at risk HusQy Such a proof is impossible. The reason why this works with LN nodes is because LN nodes are Bitcoin nodes that know what is happening in the Bitcoin network and have "information" and not just "data": P What you are describing is technically impossible. Block trainer Data = information What can the LN not, what IOTA can sometimes? HusQy That's not rubbish.There is a huge difference between data and information, and inter-chain transactions are not possible because of that very difference. LN won't work - there are too many game theory problems: P -------------------------------------------------------------------------------------------- Dominik Schiener There is more tech maturity, more adoption and more progress than ever. We are one of the only projects which gets funding from government grants and corporations.Stop the attention grabbing headlines and get your sources right. Dominik Schiener As an innovation leader in Europe, I certainly say we deserve to get grants.There is a below 7% success chance usually. And yes,everything is fully audited (by externals ofc), showing clearly how and that the money was used in achieving the milestones of the grant. ----------------------------------------------------------------------------------------------------------------------------------
Edit: solved! Just needed to wait for indexing to catch up Hi all I'm trying to use btc-rpc-explorer https://github.com/janoside/btc-rpc-explorer I have a full node via bitcoin qt. Can I use qt for block explorer? I launch block explorer and I'm getting rpc error. The webpage states "check rpc connection info" The github project states I need server=1 and txindex=1. Can I make qt run with these settings? I tried adding them to the .conf but how can I confirm qt is running with these options, in console somehow? In case I can't use qt for this I downloaded bitcoind. It looks like I can start the daemon with txindex=1 and server=1 but still getting same connection problem with btc-rpc-explorer. Do I have to do -reindex=1? Can I do that within qt? If not and I use bitcoin cli will it disrupt qt in any way? Thanks Edit: this is on Ubuntu
Hello, people of 4anime! Dedicated subreddit moderator Real here. This is the official and most up-to-date FAQ post made by the site support team. Please, read through this before posting about your issue, in case the solution or answer you are looking for is already here! Also feel free to join the discord server to get in touch with the support team directly or just have a great time talking to other anime viewers!
Website FAQ (Frequently Asked Questions)
ACCOUNT (QUESTIONS ABOUT YOUR 4ANIME ACCOUNT)
- Where is the RegisteSign Up button?
After you click "Login", you can then click "Don't have an account?" under the login button.
- I did not receive my registration/password reset email, what can I do?
We are currently having problems with the email servers, your account will be created regardless of email confirmation for the moment being.
- How can I change my profile picture on site?
The current profile page is only a placeholder, we expect to incorporate more profile features in the future.
- How can I edit/delete my 4Anime account?
The site does not offer this functionality yet. Message Wolfwood on Discord, and he will help you with your concern.
ADS (QUESTIONS ABOUT ADS AND HOW THEY WORK)
- I wanna support the site, but I don't have any money to, is there any other way I can?
Yes, when browsing the site, you can enable popunder, skyscraper, banner ads, or the new 10-Hourly Ad. Pick which ones to enable if you wanna support the site.
- What are Popunder Ads?
Popunder Ads are once a day popup ads. You'll get the ad when it pops up, after that, it doesn't appear again until the next day.
- What are Skyscraper Ads?
Skyscraper Ads are very long-in-length ads that are displayed on the sides of your screen. You can disable them if you don't prefer them.
- What are Banner Ads?
A Banner Ad is a small ad that you'll see on one side of your screen. You can disable it if it displays content you don't want to see.
- What are 10-Hour Ads?
10-Hour Ad is a removable ad you'll get only on the homepage once very 10 hours, after that, you won't see it again until another 10 hours have passed. Click the x to remove it.
- Why am I getting weird pop ups while watching on phone?
These are the popup ads and can not be turned off on phone. The ads cannot harm your device in any way if you don't download anything from them. You do not need to click on them and can just watch your anime in fullscreen without a problem.
- I have been getting a lot of popups lately, what is going on?
We are currently having some issues with PayPal and Patreon where we needed more support from ads to keep the servers up.
ANIME (QUESTIONS ABOUT ANIME ON THE SITE)
- When is episode (number) of (currently airing anime) gonna be added to site?
We follow HorribleSubs' release schedule, and series usually appear on site ~15 minutes after released there.
- Can I request (currently ongoing anime) to be added if it isn't on the website?
Before requesting, check HorribleSubs' website for their schedule, and check if the anime isn't already on the site. If it isn't there, we suggest to watch it on other available websites.
- Are there any Dubbed/English anime?
We do not offer dubbed anime, except for a couple handpicked series, which can be found here.
- Why isn't (anime) on the site?
Only airing anime is automatically added to the site. You can join the Discord server to request animes to the site. Permissions to do so might fluctuate over time as the backlog shrinks and grows.
- The new (anime movie/film) just released in theaters, can you guys add it to the site now?!
We are unable to upload it until the blu-ray releases. A rip of said film recorded on a camera will not be uploaded. The release dates on MyAnimeList/AniList are the cinema/theatrical release dates, which differ from the blu-ray release.
- The quality of the series/movie I'm watching tends to dip in quality when I'm watching, why does this happen?
Streaming anime on 4anime requires at least a decent internet connection to not impact streaming performance, we don't have very strong servers at the moment, but are working towards it.
- Is there a movie section, so I can only find movies?
You can find movies [here]. You can also use the "Browse" section, and filter your results to movies manually. You can also click the word "Movie" when you're viewing the page for a movie on the website.
- Will site originals (Netflix, CrunchyRoll Originals, Amazon, etc.) be on the website?
Yes, in fact some from Netflix are already available!
BUGS & TROUBLESHOOTING (QUESTIONS ABOUT BUGS, ERRORS, & ISSUES)
- Why did my anime progress disappear?
The progress tracking is currently cache based, meaning it is stored in your browser. If you've reset your cache they will therefore be removed. Having progress be tied to your account is on the roadmap for the future.
- The subtitles consist of a bunch of random numbers/characters that cover up the screen, can you fix this?
Issues during encoding can cause these visual bugs, please use the "Report" button under the video player or report the series/movie to the Discord so that it can be reencoded.
- The audio and video are desynced, can you fix this?
Its an issue with the encoding, please use the "Report" button under the video player or report the series/movie to the Discord so that it can be reencoded.
- Sometimes when I try to enter the site, I get some kind or error, is the problem on my end.
Most of the time yes. The issue could stem from your general internet connection, your Internet Service Provider (ISP) blocking the website, or some other smaller issues.
- I'm using the website on my non-computemobile device (TV of some kind, console, etc.), and its not working properly, what do I do?
4anime isn't optimized to run on every device known to man, so anything outside of PCs, Phones, and Tablets is a grey area. Performance and functionality differs depending on what other method of watching you're using.
- I've found a bug/issue/error with the anime I'm watching that doesn't apply to the following above, what do I do?
Use the "Report" button under the video player, or if you're already in the Discord server, report it there.
- I've found a bug/issue/error with the website, that isn't related to the series/movie I'm watching, what do I do?
Whatever you've encountered on the website you think should be fixed, please report it to the Discord server.
DONATION (QUESTIONS ABOUT DONATING OR SUPPORTING THE SITE)
- I wanna support the site financially, where can I do so?
We prefer payment through Patreon, but you can also make donations through PayPal, or via Bitcoin.
- What are the benefits of being a Donator?
By donating one of the tiers on Patreon (Donating via PayPal or Bitcoin won't get you any benefits unfortunately, but we still appreciate your donation) you get the "Donator" role on the server. After donating, contact Wolfwood on Discord and he will grant your user access to it's own server on site, which has less traffic than the other ones.
- Is my user on the donator server?
You can tell if you're using the donator server or not by the color of your username on site. A red username indicates that you are currently using the donator server, while normal users have their color set to Grey.
DOWNLOADING (QUESTIONS ABOUT DOWNLOADING ANIME)
- How do I download anime?
Clicking the download button sends you the raw mp4 file for the episode. You can download this file by right clicking the button and pressing "Download link".
- Why does the download button only let me download 1 episode at a time?
4Anime is primarily a streaming service, and we do not specialize in downloading. To preserve bandwidth we prevent mass downloading. If you need to do this we would suggest using a torrenting site, such as Nyaa.
FEATURES (QUESTIONS ABOUT SITE FEATURES)
- Is there support for MyAnimeList or AniList integration?
- Is there a 4anime App for my mobile phone/tablet?
Not currently, but but the possibility is being considered.
- Will there be a "Skip Intro/Opening" button in the future?
The addition of it is extremely unlikely, as we'd have to go the tremendous effort to go through hundreds of anime, and pinpoint when an opening starts and ends, it would essentially be a pain to implement. Openings are usually 90 seconds for the most part.
- The Bookmark system seems kinda barren, is there any work being done on it?
Yes, the Bookmark functionality is going to be completely overhauled, it is a work in progress.
- Is there a way to change the streaming quality? (360p, 480p, 720p, etc.)
To save on storage space, we only provide 1080p streaming quality.
- Is there an option for Casting?
When pressing play, a cast button should appear in one of the corners. Support may vary depending on which browser you are using.
- What does the "Random" and "A&M" switches do?
"Random" adds a row of randomly generated anime on the frontpage, while "A&M" generates one random anime and movie. You can refresh the anime given to you by clicking the icon in the top right corner.
- What is the "Hall of Fame"?
The Hall of Fame displays the most popular series ranked by view count.
- How does the Popular This Week section work?
The Popular this Week section is ranked by view count for a 7-day period, and resets back to zero after that period.
- How does the search system work?
For popular anime at least, you can search by their Japanese (Romaji) name, English name, and some common abbreviations. Example being Attack on Titan. You can search "Shingeki no Kyojin", "Attack on Titan", and "AOT". Plans to have EVERY English, Japanese, Romaji, and Localized name (Example: "Detective Conan" is the English translated name of "Meitantei Conan", its japanese title, while "Case Closed" is the official title used in English) is in the works.
- Some features seem unfinished or aren't fully developed, are they being worked on?
Yes, the website is run by one person, so when work on something is being done, everything else has to sit in the back temporarily.
- There's a feature I think would be make the site better, where can I request such a thing?
You can suggest features on our Discord server, and depending on the feature, it may one day become a reality! Do keep in mind that if its been requested a ton before, there's already a chance we've seen the demand. Suggestions for realizable features (or already deconfirmed features) will be IGNORED.
- Why does the schedule link to an external site?
HorribleSubs supply the site with subbed animes, therefore we link to their official release schedule.
Help: I think I just had BSV stolen from me while using ElectrumSV
EDIT: NOTHING WAS STOLEN! ElectrumSV and BSV in general are perfectly fine (and have a great community). The problem is my understanding of replay protection. The problem occurred because I had restored an old Electrum Bitcoin wallet to Electron Cash a day or two ago to transfer the funds to Coinbase to consolidate them. They were confirmed in the account, so I figured the wallet now had nothing to do with BCH any longer. Then last night, I restored the same seed to ElectrumSV and transferred some of these BSV funds to a wallet at another exchange as well as a separate local wallet. I won't pretend that I completely understand it yet, but somehow replay protection between the two blockchains messed up the BSV transfers. The part that I still don't understand is how a confirmed BCH transaction from a day before could affect transactions on the BSV blockchain a day later. I'd love an explanation of how that works, but I'm going to be doing some heavy research on it tomorrow. Thanks to everyone who replied and helped troubleshoot in this thread, but especially u/Deminero30 for taking almost three hours to work with me to sort this out. Yesterday I decided to move my BSV out of an old wallet I had, so I downloaded the Windows version of the ElectrumSV wallet from https://electrumsv.io/ and imported a pre-split BCH wallet into it. When I went to send a test amount to another address, I got an error from the client that
"Your transaction was not sent: it conflicts with one already in the server's mempool".
The error apparently relayed from the server was
"'the transaction was rejected by network rules\n\n258: txn-mempool-conflict..."
I tried sending the same transaction again, but got the same error. The transaction didn't show up in ElectrumSV, and didn't show up in a search on two block explorers. At the time I figured it was a problem with my PC, network congestion, or too low of a fee, so I worked on it for a while and then tried again later. I upped the sats/byte to 2, and then created a new transaction spending from a different wallet. This one went through, so I figured nothing was wrong. Then I sent a few more test transactions, a couple of which went through. Then there were two larger ones that got the same error as before. I wasn't too worried becuase I thought they would just clear from the mempool at some point. But then I saw that the transaction from last night showed up in my wallet and on the block explorer, but it was sent to an address I'd never seen before! This is when I got more worried about what was going on. I looked up the transaction on Blockchair, and I saw that the transaction ID showed up not just on the BSV chain, but also on the Bitcoin Cash chain with different addresses but the same amounts! This is extra strange because I had extracted all of the BCH from the wallet a while back. Since then I saw one more of these transactions that had errored out initially get confirmed with a different address that isn't mine. The transaction ID is the same between the two chains as well. Also, I had upped the fee to 2 sats/byte, but this transaction had just 1 sat/byte. So it definitely wasn't the one I initially broadcast. At this point I'm convinced that either ElectrumSV or one of the servers is hacked somehow. I don't understand any other way this could have happened. I looked at https://ccoin.cash as suggested by u/deminero30 in another thread to try to double-spend the ones that aren't gone yet, but I haven't been able to figure it out yet (and no, I haven't and wouldn't upload a private key to a website; I'd do it offline). I would really appreciate it if someone could tell me what's going on here. I really hope that I'm just making some stupid mistake, but I realize that the BSV that are gone aren't likely to come back. I also have at least one transaction that errored and hasn't been confirmed yet, so I'd love to know if there's any way to cancel what's out there in the mempool. The first transaction is this one: [removed] Thank you
EDIT: Nord is having a 75% off sale AND All plans have 30-day money-back guaranteeYou can claim that deal by using our special link! @ www.buy-nord.com NordVPN has been growing at a very fast pace since launching in 2012, and it’s now one of the largest VPN services on the market with over 12 million customers worldwide (according to NordVPN themselves). NordVPN has grown so much that it now claims to be the “best VPN service provider of 2019” but we all know that’s easier said than done, right? We needed to understand how good NordVPN really is and answer questions our readers have been asking us:
Is NordVPN safe?
How fast is it?
Does it work with Netflix?
Is torrenting and P2P allowed?
Is NordVPN easy to use?
We, therefore, tested it extensively for weeks, and in this detailed review, you will see exactly what we discovered.
But before we dive into it, let's take a quick look at NordVPN’s pros and cons: Pros
Very fast VPN speeds
Log-free & no IP, DNS & WebRTC leaks
Works with Netflix, BBC iPlayer & more
P2P & torrenting allowed on many servers
Huge server network: 5,600+ servers across 60 countries
User-friendly apps for PC, Mac, iOS, & Android with ad-blocker
Alternative VPN protocols have to be manually configured
Obfuscated servers don't always work in China
No obfuscated servers for iOS
Works with Netflix, Amazon Prime Video, Hulu, BBC iPlayer, Sky, HBO, Torrenting, Kodi Available on Windows Mac Ios Android Linux Price from $2.99/mo Still, want to know more about NordVPN and whether it’s the right VPN for you? We’ve carefully tested every single NordVPN app so you can rest assured that we left no stone unturned. Without further ado, let's get right into this review starting with NordVPN’s speed. Speed & Reliability Very fast speeds across the world NordVPN is a very fast VPN – as long as you connect to nearby VPN servers. It’s not the fastest VPN there is (these VPNs are currently faster), but NordVPN is still very quick and you won’t experience any speed issues. Both same-country (UK server to UK server) download and upload speeds are impressive, with minimal internet slowdown (around a 5-6% drop from our normal internet speeds). This makes NordVPN a very good choice for both streaming fans and torrenters. Speed results from our physical location in London (100Mbps fibre optic connection) to a London test server. Before using NordVPN: DOWNLOAD Mbps 94.83 UPLOAD Mbps 91.8 PING ms 3 When connected to NordVPN: DOWNLOAD Mbps 90.51 UPLOAD Mbps 86.28 PING ms 5 Download speed without NordVPN: 94.83Mbps Download speed with NordVPN: 90.51Mbps Our download speed loss when NordVPN is running: 5% As you can see, NordVPN registered very impressive speeds when we connected to a nearby VPN server. It’s less impressive – but still very usable – over long-distance connections, though. Here are the average download and upload speeds connecting out from the UK to NordVPN’s servers: USA: 47Mbps (download) & 48Mbps (upload) Germany: 78Mbps (download) & 77Mbps (upload) Singapore: 17Mbps (download) & 6Mbps (upload) Australia: 22Mbps (download) & 3Mbps (upload) Ping times are also fairly low on most of NordVPN’s servers, which is good for gaming although there are better VPNs available to gamers. Server Locations Over 5,600 VPN servers spread across 60 countries worldwide Globe with a blue flag 60 Countries Image of a city landscape 90+ Cities Image of a pink marker 5,600+ IP Addresses See all Server Locations NordVPN’s server list covers 60 countries – it isn’t the widest VPN server range we’ve seen, but it should almost certainly ensure there is a server located near you. Screenshot of NordVPN Server List in App NordVPN provides a whopping 5,600 VPN servers, none of which are virtual, with each server given a static IP address. This is the highest number of VPN servers provided by a top VPN service, which is impressive. Even better, NordVPN owns all of the servers in its network. NordVPN’s server network covers all of the popular server locations such as the UK, the US, Australia, and Canada, as well as less common locations including Argentina, Egypt, and Albania. NordVPN provides city-level server choices in five different countries, too: Australia (five locations, 200+ servers) Canada (three locations, 400+ servers) Germany (two locations, 200+ servers) India (two locations, 20+ servers) The US (20 locations, 1,800+ servers) NordVPN used to offer city-level choice in the UK (London and Manchester) but recently removed the Manchester VPN servers as “their performance was lacking.” NordVPN have added even more servers in London in order to ensure the best speeds for those located in the UK. Streaming & Torrenting An excellent choice for streaming & torrenting Thanks to its SmartPlay technology, NordVPN consistently works with popular streaming services like Netflix and BBC iPlayer. To watch Netflix, simply click on the US or UK VPN country server and the NordVPN app will automatically find the best option for you. NordVPN also unlocks loads more Netflix libraries, including Canada, Japan, France, Italy, and Germany. Not all of NordVPN’s UK servers provide access to BBC iPlayer, but a quick message to live chat will let you know which ones are currently working. That will save you the trial-and-error of testing out all of NordVPN’s hundreds of UK servers. This is a big plus, as many other VPN providers can’t unlock BBC iPlayer. Unrestricted access to streaming services doesn’t stop there. Many of NordVPN’s customers use the VPN service to stream: Amazon Prime Video Hulu HBO Sling TV Sky Now TV Torrenting Torrenting (and other P2P traffic) isn’t allowed on every single NordVPN server, but there’s still more than enough server choice to keep torrenters and Kodi streamers happy. You can torrent while connected to almost every country on NordVPN’s server list – these are listed under ‘Speciality Servers’ within in the app settings. However, the following countries do not permit P2P: Argentina Costa Rica Chile Cyrpus Egypt Georgia Indonesia Malaysia South Korea Taiwan Thailand Vietnam Ukraine United Arab Emirates If you attempt to torrent while connected to a VPN server that doesn’t support P2P NordVPN will simply re-route your traffic through a dedicated server located in either Canada or the Netherlands. With plenty of added security features – such as its VPN kill switch – and a no-logs policy, NordVPN is without a doubt one of the safest VPNs for torrenting. Fast uploads and downloads make it a great choice too. Bypassing Censorship Obfuscated VPN servers work in China intermittently Since the VPN crackdown in China, NordVPN has become a little less reliable for residents or visitors in China, but it’s still a pretty good choice of VPN. Users have reported that NordVPN’s obfuscated servers often bypass the Chinese censors, but others have experienced difficulties connecting to them. NordVPN’s obfuscated servers are spread out fairly evenly, with options in North America, North Africa, Asia, and Europe, so you shouldn’t be too far away from one. There are no obfuscated VPN servers available on the NordVPN iOS app, though, so iPhone users may struggle to connect from China without some manual configuration. See our latest VPN recommendations if you’re looking for a reliable VPN for China, or you can read our ExpressVPN review or our VyprVPN review, two of our top choices. That’s just China, though – in other high censorship countries like Saudi Arabia and Russia NordVPN remains a solid VPN choice to bypass censorship. Platforms & Devices Protect all your devices with a wide range of custom VPN apps Apps Windows Logo Windows Mac Logo Mac iOS Logo iOS Android Logo Android Linux Logo Linux Router Logo Router NordVPN has simple native VPN apps for all major operating systems: Windows macOS iOS Android Linux (yes, even Linux) If your device is not compatible with the custom apps above, you can also install NordVPN on your router. What’s more, you can use NordVPN on up to six devices at the same time using just one VPN subscription, which is one of the highest allowances we’ve seen. Games Consoles & Streaming Devices AppleTV Logo AppleTV Amazon Fire TV Logo Amazon Fire TV Chromecast Logo Chromecast Nintendo Logo Nintendo PlayStation Logo PlayStation Roku Logo Roku Xbox Logo Xbox NordVPN has an Android TV app, meaning you can use the VPN app with streaming devices such as Android TV and the Amazon Fire TV Stick without any manual configuration. In fact, NordVPN is one of the best VPNs for the Fire TV although it is not our top recommendation. If you own a Firestick and want to use a VPN app with it, take a look at our roundup of the best VPNs for Fire TV and Fire TV Stick. If you want to run NordVPN on your other streaming devices or games consoles like Xbox and PlayStation, though, you’ll need to install it at router level. It’s not too difficult and it means that all devices connected to the router will be protected. Browser Extensions Chrome Logo Chrome Firefox Logo Firefox NordVPN provides VPN extensions for Google Chrome and Mozilla Firefox. These VPN add-ons encrypt your browser traffic, but protection ends there so we always suggest using NordVPN’s extensions in conjunction with the main VPN application or client. The extensions also have an in-built WebRTC leak blocker, which is an extremely useful bonus. NordVPN doesn’t yet have VPN extensions for Safari or Opera browsers. Encryption & Security Secure VPN with advanced features but lacking protocol flexibility Protocol IKEv2/IPSec OpenVPN (TCP/UDP) WireGuard Encryption AES-256 Security DNS Leak Blocking First-party DNS Supports TCP Port 443 VPN Kill Switch WebRTC Leak Blocking Advanced features Double VPN TOR via VPN Server Please see our VPN Glossary if these terms confuse you and would like to learn more. NordVPN has only one choice of VPN protocol by default, but it’s our personal favourite: OpenVPN. The iOS and macOS apps (available to download directly from the Apple App Store) run on IKEv2, though. OpenVPN provides the perfect blend of speed and security. It encrypts all your internet traffic using the ‘unhackable’ AES-256 cypher. Screenshot of NordVPN Settings Menu in App You can also use IKEv2 with NordVPN’s Windows and Android apps if you like, but it requires an extra download and a lot of advanced setup (manual configuration). The VPN kill switch feature protects your IP address in the event of a connection drop, and NordVPN’s privately owned and operated DNS servers ensure end-to-end protection. NordVPN provides Double VPN (multi-hop) and Tor over VPN (Onion over VPN) for extra encryption. As with all the VPN providers we review, we carried out extensive testing to find IP and DNS leaks when using NordVPN and we are happy to report that we found no leaks whatsoever. Screenshot of browserleaks.com test results for NordVPN Leak test results on browserleaks.com while connected to a NordVPN US server. We test from the UK. NordVPN has recently released a new technology for Linux users called NordLynx that’s based on the WireGuard VPN protocol. WireGuard is a new VPN protocol that aims to be faster and more secure than the current standards, but it’s still in development so should be considered experimental at this point. Logging Policy No-logs VPN in a privacy-friendly jurisdiction NordVPN doesn’t log your traffic or store any user logs, making it a safe and trustworthy VPN. Here’s a comprehensive list of all the information it does collect: Server loads That is the full extent of the information NordVPN collects, making it a true no-logs VPN. Server loads are monitored to maintain the optimal performance of VPN servers for users, and nothing else. Your privacy is upheld above all else, and NordVPN absolutely will not sell your personal data to any third parties. Jurisdiction NordVPN was founded in 2012 is operated by Tefincom & Co S.A. which is headquartered under the legal jurisdiction of Panama, putting it beyond the reach of US and EU data retention laws. Panama does not require VPN companies to store or report any of their data, nor is it part of any agreements that compel it to share information with other countries. Being based in Panama gives NordVPN the power to deny any third-party data requests, so there is absolutely no way that any of your online activity can be traced back to you. In 2018, NordVPN came under some heat as it was accused of not being headquartered in Panama. The reason for the controversy is that when you purchased NordVPN on Google Play Store, at the time the Seller of NordVPN was listed as CloudVPN INC. (a company registered in the US), and not Tefincom & Co S.A. It turns out that CloudVPN INC. is a payment processor and NordVPN was simply using it to handle payments, similarly to how other VPN providers use payment processing companies to manage these type of transactions. Ease of Use Quick and easy setup with simple custom apps How to Install & Set Up NordVPN Screenshot of NordVPN Download Button Downloading the software is as simple as going to Nord's website and clicking the download button for the appropriate platform. Screenshot of NordVPN Installation Progress You can check the progress of your installation here, which usually only takes a couple of minutes at most. Screenshot of NordVPN App Login Screen Once the software is installed, all that's left to do is log into the app and you're ready to go. Screenshot of NordVPN Desktop App Main Screen The main NordVPN app view with server locations to the left, which are also presented as pins on the map. Screenshot of NordVPN Specialty Servers On the left-hand side of the app, you can see the full list of server locations and speciality servers for P2P, Double VPN, etc. Screenshot of NordVPN City-Level Servers Hover over a country name and click on the three horizontal dots that appear in order to select a city-level server. Screenshot of NordVPN Connected Screen You will know when NordVPN is working because the server location you are connected to and your new IP address will be displayed at the bottom of the app. Screenshot of NordVPN General App Settings You can find the general settings by clicking 'Settings' at the top of the app. These consist of simple toggles for general settings, including the VPN kill switch. Screenshot of NordVPN Advanced App Settings Scroll down to the bottom of the settings menu to find the advanced options. After confirming that you know what you're doing, you can toggle between TCP/UDP and use obfuscated servers. The NordVPN website has comprehensive VPN setup guides for whatever platform you happen to be using, but it’s unlikely you’ll ever need them. All of NordVPN’s custom VPN apps run smoothly and are almost entirely self-explanatory. If you want to play around with advanced settings then you’re welcome to do that too – they’re clearly labelled and the app even warns you not to do so unless you know what you’re doing. Browser Extensions Screenshot of NordVPN Chrome Extension It couldn’t be much easier to set up NordVPN’s browser extensions – just go to the Google Chrome or Mozilla Firefox store and download the add-on to your browser. Once you’ve logged on you can choose a server and connect. We’d recommend enabling ‘Block WebRTC’ from the settings menu to prevent any potential IP leaks. Customer Support Helpful live chat support & useful online resources 24/7 Live chat support Online Resources NordVPN provides excellent quality customer support both through its extensive knowledge base and via online live chat. Email support isn’t as good and we’ve found responses to be slow at times. There is really no reason to email customer support, though, as NordVPN’s live chat service is 24/7. Encounter any issues? NordVPN running slow, perhaps? No problem – support agents respond quickly and are extremely friendly and helpful, managing to fix most of our VPN issues within a couple of minutes. NordVPN’s troubleshooting guides are very useful, too, covering a variety of potential VPN issues and providing a range of possible solutions. Pricing & Deals Fantastic value for money on longer plans NordVPN Coupon NordVPN logo NordVPN Get 58% off NordVPN's 12-month plan TestedEnds 1 Sep Get Code10 Terms NordVPN Pricing Plan NordVPN is one of the best VPN services on the market, and it’s not very expensive at all. Also, every NordVPN price plan offers exactly the same VPN features. NordVPN costs a fairly pricey $11.95 if you pay month-by-month, but the price drops by almost half to $6.99 a month for annual plans. For the biggest savings, NordVPN’s three-year special deal costs just $2.99 per month, a saving of 75%. Monthly US$11.95/mo Billed $11.95 every month 12 Months US$6.99/mo Billed $83.88 every 12 months Save 41% 2 Years US$3.99/mo Billed $95.75 every 2 years Save 66% 3 Years US$2.99/mo Billed $107.55 every 3 years Save 75% All plans have 30-day money-back guarantee This is the best option available, $107 for 3 years coverage is unbeatable in the VPN sector. You can claim that deal by using our special link! @ www.buy-nord.com Payment & Refund Options NordVPN accepts a few different payment options, but it recently made the decision to stop accepting PayPal. The VPN service now uses Adyen for credit card payments, which it claims offers a greater level of privacy for customers due to its self-contained nature. Here are the accepted payment methods, which include some cryptocurrencies for those seeking higher levels of privacy: Credit and debit cards Direct debit Amazon Pay Bitcoin Ethereum Ripple Alipay UnionPay NordVPN no longer comes with a free VPN trial, but it does offer a 30-day money-back guarantee. You can cancel your NordVPN subscription within 30 days by contacting the customer support team through live chat. You will have to go through a troubleshooting process first, but the refund should be processed within 10 business days.
How much would a Bitcoin node handling 1GB blocks cost today? I did some back-on-the-envelope calculations.
1GB blocks would be able to confirm more than 5000tx/s. That would be VISA-level scale (which handles, on average, 1736tx/s). We often hear that we shouldn't raise the blocksize because then nodes would become too expensive to run. But how expensive exactly? We have the following costs to take into account:
For now, I'm going to assume a non-pruned full node (i.e. a node that stores all transactions of the blockchain) for personal use, i.e. for a computer built at home. I'll add in the calculations for a pruned node at the end, which would likely be the prefered option for people who merely want to verify the blockchain for themselves. If you don't care about the assumptions and calculations, you can just jump right to the end of this post. If you spotted any error, please inform me and I'll update my calculation.
There's, on average, one block every 10 minutes, that is 144 every day and 4320 blocks every thirty days. I was able to find a 3TB HDD for $47,50 on Amazon, that is $0.018/GB. Storing all blocks with all transactions of a month (4320GB) would be $78.96/mo. Prices for storage halved from 2014 to 2017, so we can assume that to half in 2022, thus we can reasonably assume it'd cost around $40/mo. in 2022. But would such an inexpensive hard disk be able to keep up with writing all the data? I found a comparable cheap HDD which can write 127MB/s sequentially (which would be the writing mode of Bitcoin). That would be enough even for 76GB blocks! Edit: For the UTXO set, we need very fast storage for both reading and writing. Peter__R, in his comment below, estimates this to be 1TB for 4 billion users (which would make ~46,000tx/s if everyone would make 1tx/day, so id'd require about 10GB blocks). jtoomim seems more pessimistic on that front, he says that much of that has to be in RAM. I'll add the $315 I've calculated below to account for that (which would be rather optimistic, keep in mind).
Bandwidth is more complicated, because that can't just be shipped around like HDDs. I'll just take prices for my country, Germany, using the provider T-online, because I don't know how it works in the US. You can plug in your own numbers based on the calculations below. 1GB blocks/10 minute mean 1.7MB/s. However, this is an average, and we need some wiggle room for transaction spikes, for example at Christmas or Black Friday. VISA handles 150 million transactions per day, that is 1736tx/s, but can handle up to 24,000tx/s (source). So we should be able to handle 13.8x the average throughput, which would be 1.7MB/s x 13.8 = 23.46M/s, or 187.68Mbit/s. The plan on T-online for 250Mbit/s (translated) would be 54.95€/mo (plus setup minus a discount for the first 6 months which seems to cancel out so we'll ignore it), which would be $61.78/mo. This plan is an actual flatrate, so we don't have to worry about hitting any download limit. Note, however, that we don't order bandwidth for only our Bitcoin node, but also for personal use. If we only needed 2MB/s for personal use, the plan would be 34.95€, thus our node would actually only cost the difference of 20€ per month, or $22.50/mo. Nielsen's Law of Internet Bandwidth claims that a high-end user's connection speed grows by 50% per year. If we assume this is true for pricing too, the bandwidth cost for ~200Mbit/s/mo. would go down to 12.5% (forgot how exponential growth works)29.6% of its today's cost by 2022, which decreases our number to $2.81/mo.$6.66/mo. Edit: jtoomim, markblundeberg and CaptainPatent point out that the node would have a much higher bandwidth for announcing transactions and uploading historical blocks. In theory, it would not be necessary to do any of those things and still be able to verify one's own transactions, by never broadcasting any transactions. That would be quite leechy behaviour, though. If we were to pick a higher data plan to get 1000MBit/s downstream and 500MBit/s upstream, it would cost 119.95€/mo., however this plan isn't widely available yet (both links in German). 500MBit/s of upstream would give us max. 21 connected nodes at transaction spikes, or max. 294 connected nodes at average load. That would cost $39.85 in 2022 (with correct exponential growth).
CPU/Memory will be bought once and can then run for tens of years, so we'll count these as setup costs. The specs needed, of course, depend on the optimization of the node software, but we'll assume the current bottlenecks will have been removed once running a node actually becomes demanding hardware-wise. This paper establishes that a 2.4GHz Intel Westmere (Xeon E5620) CPU can verify 71000 signatures per second... which can be bought for $32.88 a pair on Ebay (note: this CPU is from Q1'10). We'd need to verify 76659tx/s at spikes (taking the 13.8x number), so that pair of CPUs (handle 142,000tx/s) seem to just fit right in (given one signature per tx). We'd also have to account for multiple signatures per transaction and all the other parts of verification of transactions, but it seems like the CPU costs are neglegible anyway if we don't buy the freshest hardware available. ~$100 at current prices seem reasonable. Given Moore's Law, we can assume that prices for CPUs half every two years (transistor count x1.4162), so in three years, the CPU(s) should cost around $35.22 ($100/1.4163). For memory, we again have to take into account the transaction spikes. If we're very unlucky, and transactions spike and there won't be a block for ~1h, the mempool can become very large. If we take the factor of 13.8x from above, and 1h of unconfirmed transactions (20,000,000tx usually, 276,000,000tx on spikes), we'd need 82.8GB (for 300B per transaction). I found 32GB of RAM (with ECC) for $106, so three of those give us 96GB of RAM for $318 and plenty remaining space for building hash trees, connection management and the operating system. Buying used hardware doesn't seem to decrease the cost significantly (we actually do need a lot of RAM, compared to CPU power). Price of RAM seems to decrease by a factor of x100 every 10 years (x1.58510), so we can expect 96GB to cost around $79.89 ($318/1.5853) in 2022. Of course, CPU and memory need to be compatible, which I haven't taken into account. Chug a mainboard (~$150) and a power supply (~$50) into the mix, and the total would be just over $600 for today's prices. Even if mainboard and power supply prices remain the same, we'd still only have to pay around $315 for the whole setup in 2022.
I found a comparable harddrive with 6W. We need N*6W, where N is the number of hardrives (17.28 per year).
Edit: We also need fast memory for the UTXO set, so we'll take some 3x NVMe SSDs for that (see below), which require 18.6W in total.
So we'd have 129W147.6W + N*6W. Electricity cost average at 12ct/kWh in the US, in Germany this is higher at 30.22ct/kWh. In the US, it would cost $11.14$12.75 + N*$0.52 (P*12ct/kWh / 1000 * 24h/day *30days / 100ct/$), in Germany 28.06€32.11€ + N*1.30€. At the end of the first year, it would cost $20.12$21.73/mo. in the US and 50.52€54.57€/mo. in Germany. At the end of the second year, it would cost $29.11$30.72/mo. for the US and 72.98€77.03€/mo. for Germany. It increases by $8.98/mo. per year in the US and by 22.46€/mo. per year in Germany. Electricity prices in Germany have increased over time due to increased taxation; in the US the price increase has been below inflation rate the last two decades. As it's difficult to predict price changes here, I'm going to assume prices will remain the same.
In summary, we get:
Storage: $78.96/mo., $40/mo in 2022, (E:) +$315 initially for NVMe SSDs
Bandwidth: $22.50/mo., $2.81/mo. $6.66/mo. in 2022, Edit: or $95.37/mo. for additional broadcasting, or $28.25/mo. in 2022 prices.
If we add everything up, for today's prices, we get (E: updated all following numbers, but only changed slightly) $132/mo. (US), $187/mo. (DE) for the second year and $71.92/mo. $78/mo. (US), $115.79/mo.$124/mo. (DE) in 2022. It definitely is quite a bit of money, but consider what that machine would actually do; it would basically do the equivalent of VISA's payment verification multiple times over, which is an amazing feat. Also, piano lessons cost around $50-$100 each, so if we consider a Bitcoin hobbyist, he would still pay much less for his hobby than a piano player, who'd pay about $400 per month. So it's entirely reasonable to assume that even if we had 1GB blocks, there would still be lots of people running full-nodes just so. How about pruned nodes? Here, we only have to store the Unspent Transaction Output Set (UTXO set), which currently clocks in at 2.8GB. If blocks get 1000 times bigger, we can assume the UTXO set to become 2.8TB. I'll assume ordinary HDD's aren't goint to cut it for reading/writing the UTXO set at that scale, so we'll take some NVMe SSDs for that, currently priced at $105/TB. Three of them would increase our setup by $315 to$915, but decrease our monthly costs. E: However this UTXO set is also required for the non-pruned node, therefore the setup costs stay at $915. Even in the highest power state, the 3 SSDs will need only 18.6W in total, so we'll get a constant 147.6W for the whole system. In total, this is:
New Storage: $0/mo.
Bandwidth: $22.50/mo., (E:) $6.66/mo. in 2022, Edit: or $95.37/mo. for additional broadcasting, or $28.25/mo. in 2022 prices. (same as above)
Electricity: $12.75/mo. (US), 32.11€/mo. (DE)
CPU: Initially $915
In total, this is $35.25/mo. in the US and $58.57/mo. in Germany for today's prices, or (E:) $19.41/mo. (US) and (E:) $42.73/mo. (DE) in 2022's prices. Which looks very affordable even for a non-hobbyist. E: spelling E²: I've added the 3 NVEe SSDs for the UTXO set, as pointed out by others and fixed an error with exponentials, as I figured out.
Dear Groestlers, it goes without saying that 2020 has been a difficult time for millions of people worldwide. The groestlcoin team would like to take this opportunity to wish everyone our best to everyone coping with the direct and indirect effects of COVID-19. Let it bring out the best in us all and show that collectively, we can conquer anything. The centralised banks and our national governments are facing unprecedented times with interest rates worldwide dropping to record lows in places. Rest assured that this can only strengthen the fundamentals of all decentralised cryptocurrencies and the vision that was seeded with Satoshi's Bitcoin whitepaper over 10 years ago. Despite everything that has been thrown at us this year, the show must go on and the team will still progress and advance to continue the momentum that we have developed over the past 6 years. In addition to this, we'd like to remind you all that this is Groestlcoin's 6th Birthday release! In terms of price there have been some crazy highs and lows over the years (with highs of around $2.60 and lows of $0.000077!), but in terms of value– Groestlcoin just keeps getting more valuable! In these uncertain times, one thing remains clear – Groestlcoin will keep going and keep innovating regardless. On with what has been worked on and completed over the past few months.
UPDATED - Groestlcoin Core 2.18.2
This is a major release of Groestlcoin Core with many protocol level improvements and code optimizations, featuring the technical equivalent of Bitcoin v0.18.2 but with Groestlcoin-specific patches. On a general level, most of what is new is a new 'Groestlcoin-wallet' tool which is now distributed alongside Groestlcoin Core's other executables. NOTE: The 'Account' API has been removed from this version which was typically used in some tip bots. Please ensure you check the release notes from 2.17.2 for details on replacing this functionality.
Builds are now done through Gitian
Calls to getblocktemplate will fail if the segwit rule is not specified. Calling getblocktemplate without segwit specified is almost certainly a misconfiguration since doing so results in lower rewards for the miner. Failed calls will produce an error message describing how to enable the segwit rule.
A warning is printed if an unrecognized section name is used in the configuration file. Recognized sections are [test], [main], and [regtest].
Four new options are available for configuring the maximum number of messages that ZMQ will queue in memory (the "high water mark") before dropping additional messages. The default value is 1,000, the same as was used for previous releases.
The rpcallowip option can no longer be used to automatically listen on all network interfaces. Instead, the rpcbind parameter must be used to specify the IP addresses to listen on. Listening for RPC commands over a public network connection is insecure and should be disabled, so a warning is now printed if a user selects such a configuration. If you need to expose RPC in order to use a tool like Docker, ensure you only bind RPC to your localhost, e.g. docker run [...] -p 127.0.0.1:1441:1441 (this is an extra :1441 over the normal Docker port specification).
The rpcpassword option now causes a startup error if the password set in the configuration file contains a hash character (#), as it's ambiguous whether the hash character is meant for the password or as a comment.
The whitelistforcerelay option is used to relay transactions from whitelisted peers even when not accepted to the mempool. This option now defaults to being off, so that changes in policy and disconnect/ban behavior will not cause a node that is whitelisting another to be dropped by peers.
A new short about the JSON-RPC interface describes cases where the results of anRPC might contain inconsistencies between data sourced from differentsubsystems, such as wallet state and mempool state.
A new document introduces Groestlcoin Core's BIP174 interface, which is used to allow multiple programs to collaboratively work to create, sign, and broadcast new transactions. This is useful for offline (cold storage) wallets, multisig wallets, coinjoin implementations, and many other cases where two or more programs need to interact to generate a complete transaction.
The output script descriptor (https://github.com/groestlcoin/groestlcoin/blob/mastedoc/descriptors.md) documentation has been updated with information about new features in this still-developing language for describing the output scripts that a wallet or other program wants to receive notifications for, such as which addresses it wants to know received payments. The language is currently used in multiple new and updated RPCs described in these release notes and is expected to be adapted to other RPCs and to the underlying wallet structure.
A new --disable-bip70 option may be passed to ./configure to prevent Groestlcoin-Qt from being built with support for the BIP70 payment protocol or from linking libssl. As the payment protocol has exposed Groestlcoin Core to libssl vulnerabilities in the past, builders who don't need BIP70 support are encouraged to use this option to reduce their exposure to future vulnerabilities.
The minimum required version of Qt (when building the GUI) has been increased from 5.2 to 5.5.1 (the depends system provides 5.9.7)
getnodeaddresses returns peer addresses known to this node. It may be used to find nodes to connect to without using a DNS seeder.
listwalletdir returns a list of wallets in the wallet directory (either the default wallet directory or the directory configured bythe -walletdir parameter).
getrpcinfo returns runtime details of the RPC server. Currently, it returns an array of the currently active commands and how long they've been running.
deriveaddresses returns one or more addresses corresponding to an output descriptor.
getdescriptorinfo accepts a descriptor and returns information aboutit, including its computed checksum.
joinpsbts merges multiple distinct PSBTs into a single PSBT. The multiple PSBTs must have different inputs. The resulting PSBT will contain every input and output from all the PSBTs. Any signatures provided in any of the PSBTs will be dropped.
analyzepsbt examines a PSBT and provides information about what the PSBT contains and the next steps that need to be taken in order to complete the transaction. For each input of a PSBT, analyze psbt provides information about what information is missing for that input, including whether a UTXO needs to be provided, what pubkeys still need to be provided, which scripts need to be provided, and what signatures are still needed. Every input will also list which role is needed to complete that input, and analyzepsbt will also list the next role in general needed to complete the PSBT. analyzepsbt will also provide the estimated fee rate and estimated virtual size of the completed transaction if it has enough information to do so.
utxoupdatepsbt searches the set of Unspent Transaction Outputs (UTXOs) to find the outputs being spent by the partial transaction. PSBTs need to have the UTXOs being spent to be provided because the signing algorithm requires information from the UTXO being spent. For segwit inputs, only the UTXO itself is necessary. For non-segwit outputs, the entire previous transaction is needed so that signers can be sure that they are signing the correct thing. Unfortunately, because the UTXO set only contains UTXOs and not full transactions, utxoupdatepsbt will only add the UTXO for segwit inputs.
getpeerinfo now returns an additional minfeefilter field set to the peer's BIP133 fee filter. You can use this to detect that you have peers that are willing to accept transactions below the default minimum relay fee.
The mempool RPCs, such as getrawmempool with verbose=true, now return an additional "bip125-replaceable" value indicating whether thetransaction (or its unconfirmed ancestors) opts-in to asking nodes and miners to replace it with a higher-feerate transaction spending any of the same inputs.
settxfee previously silently ignored attempts to set the fee below the allowed minimums. It now prints a warning. The special value of"0" may still be used to request the minimum value.
getaddressinfo now provides an ischange field indicating whether the wallet used the address in a change output.
importmulti has been updated to support P2WSH, P2WPKH, P2SH-P2WPKH, and P2SH-P2WSH. Requests for P2WSH and P2SH-P2WSH accept an additional witnessscript parameter.
importmulti now returns an additional warnings field for each request with an array of strings explaining when fields are being ignored or are inconsistent, if there are any.
getaddressinfo now returns an additional solvable Boolean field when Groestlcoin Core knows enough about the address's scriptPubKey, optional redeemScript, and optional witnessScript for the wallet to be able to generate an unsigned input spending funds sent to that address.
The getaddressinfo, listunspent, and scantxoutset RPCs now return an additional desc field that contains an output descriptor containing all key paths and signing information for the address (except for the private key). The desc field is only returned for getaddressinfo and listunspent when the address is solvable.
importprivkey will preserve previously-set labels for addresses or public keys corresponding to the private key being imported. For example, if you imported a watch-only address with the label "coldwallet" in earlier releases of Groestlcoin Core, subsequently importing the private key would default to resetting the address's label to the default empty-string label (""). In this release, the previous label of "cold wallet" will be retained. If you optionally specify any label besides the default when calling importprivkey, the new label will be applied to the address.
getmininginfo now omits currentblockweight and currentblocktx when a block was never assembled via RPC on this node.
The getrawtransaction RPC & REST endpoints no longer check the unspent UTXO set for a transaction. The remaining behaviors are as follows:
If a blockhash is provided, check the corresponding block.
If no blockhash is provided, check the mempool.
If no blockhash is provided but txindex is enabled, also check txindex.
unloadwallet is now synchronous, meaning it will not return until the wallet is fully unloaded.
importmulti now supports importing of addresses from descriptors. A desc parameter can be provided instead of the "scriptPubKey" in are quest, as well as an optional range for ranged descriptors to specify the start and end of the range to import. Descriptors with key origin information imported through importmulti will have their key origin information stored in the wallet for use with creating PSBTs.
listunspent has been modified so that it also returns witnessScript, the witness script in the case of a P2WSH orP2SH-P2WSH output.
createwallet now has an optional blank argument that can be used to create a blank wallet. Blank wallets do not have any keys or HDseed. They cannot be opened in software older than 2.18.2. Once a blank wallet has a HD seed set (by using sethdseed) or private keys, scripts, addresses, and other watch only things have been imported, the wallet is no longer blank and can be opened in 2.17.2. Encrypting a blank wallet will also set a HD seed for it.
signrawtransaction is removed after being deprecated and hidden behind a special configuration option in version 2.17.2.
The 'account' API is removed after being deprecated in v2.17.2 The 'label' API was introduced in v2.17.2 as a replacement for accounts. See the release notes from v2.17.2 for a full description of the changes from the 'account' API to the 'label' API.
addwitnessaddress is removed after being deprecated in version 2.16.0.
generate is deprecated and will be fully removed in a subsequent major version. This RPC is only used for testing, but its implementation reached across multiple subsystems (wallet and mining), so it is being deprecated to simplify the wallet-node interface. Projects that are using generate for testing purposes should transition to using the generatetoaddress RPC, which does not require or use the wallet component. Calling generatetoaddress with an address returned by the getnewaddress RPC gives the same functionality as the old generate RPC. To continue using generate in this version, restart groestlcoind with the -deprecatedrpc=generate configuration option.
Be reminded that parts of the validateaddress command have been deprecated and moved to getaddressinfo. The following deprecated fields have moved to getaddressinfo: ismine, iswatchonly,script, hex, pubkeys, sigsrequired, pubkey, embedded,iscompressed, label, timestamp, hdkeypath, hdmasterkeyid.
The addresses field has been removed from the validateaddressand getaddressinfo RPC methods. This field was confusing since it referred to public keys using their P2PKH address. Clients should use the embedded.address field for P2SH or P2WSH wrapped addresses, and pubkeys for inspecting multisig participants.
A new /rest/blockhashbyheight/ endpoint is added for fetching the hash of the block in the current best blockchain based on its height (how many blocks it is after the Genesis Block).
A new Window menu is added alongside the existing File, Settings, and Help menus. Several items from the other menus that opened new windows have been moved to this new Window menu.
In the Send tab, the checkbox for "pay only the required fee" has been removed. Instead, the user can simply decrease the value in the Custom Fee rate field all the way down to the node's configured minimumrelay fee.
In the Overview tab, the watch-only balance will be the only balance shown if the wallet was created using the createwallet RPC and thedisable_private_keys parameter was set to true.
The launch-on-startup option is no longer available on macOS if compiled with macosx min version greater than 10.11 (useCXXFLAGS="-mmacosx-version-min=10.11" CFLAGS="-mmacosx-version-min=10.11" for setting the deployment sdkversion)
A new groestlcoin-wallet tool is now distributed alongside Groestlcoin Core's other executables. Without needing to use any RPCs, this tool can currently create a new wallet file or display some basic information about an existing wallet, such as whether the wallet is encrypted, whether it uses an HD seed, how many transactions it contains, and how many address book entries it has.
Since version 2.16.0, Groestlcoin Core's built-in wallet has defaulted to generating P2SH-wrapped segwit addresses when users want to receive payments. These addresses are backwards compatible with all widely used software. Starting with Groestlcoin Core 2.20.1 (expected about a year after 2.18.2), Groestlcoin Core will default to native segwitaddresses (bech32) that provide additional fee savings and other benefits. Currently, many wallets and services already support sending to bech32 addresses, and if the Groestlcoin Core project sees enough additional adoption, it will instead default to bech32 receiving addresses in Groestlcoin Core 2.19.1. P2SH-wrapped segwit addresses will continue to be provided if the user requests them in the GUI or by RPC, and anyone who doesn't want the update will be able to configure their default address type. (Similarly, pioneering users who want to change their default now may set the addresstype=bech32 configuration option in any Groestlcoin Core release from 2.16.0 up.)
BIP 61 reject messages are now deprecated. Reject messages have no use case on the P2P network and are only logged for debugging by most network nodes. Furthermore, they increase bandwidth and can be harmful for privacy and security. It has been possible to disable BIP 61 messages since v2.17.2 with the -enablebip61=0 option. BIP 61 messages will be disabled by default in a future version, before being removed entirely.
The submitblock RPC previously returned the reason a rejected block was invalid the first time it processed that block but returned a generic "duplicate" rejection message on subsequent occasions it processed the same block. It now always returns the fundamental reason for rejecting an invalid block and only returns "duplicate" for valid blocks it has already accepted.
A new submitheader RPC allows submitting block headers independently from their block. This is likely only useful for testing.
The signrawtransactionwithkey and signrawtransactionwithwallet RPCs have been modified so that they also optionally accept a witnessScript, the witness script in the case of a P2WSH orP2SH-P2WSH output. This is compatible with the change to listunspent.
For the walletprocesspsbt and walletcreatefundedpsbt RPCs, if thebip32derivs parameter is set to true but the key metadata for a public key has not been updated yet, then that key will have a derivation path as if it were just an independent key (i.e. no derivation path and its master fingerprint is itself).
The -usehd configuration option was removed in version 2.16.0 From that version onwards, all new wallets created are hierarchical deterministic wallets. This release makes specifying -usehd an invalid configuration option.
This release allows peers that your node automatically disconnected for misbehaviour (e.g. sending invalid data) to reconnect to your node if you have unused incoming connection slots. If your slots fill up, a misbehaving node will be disconnected to make room for nodes without a history of problems (unless the misbehaving node helps your node in some other way, such as by connecting to a part of the Internet from which you don't have many other peers). Previously, Groestlcoin Core banned the IP addresses of misbehaving peers for a period (default of 1 day); this was easily circumvented by attackers with multiple IP addresses. If you manually ban a peer, such as by using the setban RPC, all connections from that peer will still be rejected.
The key metadata will need to be upgraded the first time that the HDseed is available. For unencrypted wallets this will occur on wallet loading. For encrypted wallets this will occur the first time the wallet is unlocked.
Newly encrypted wallets will no longer require restarting the software. Instead such wallets will be completely unloaded and reloaded to achieve the same effect.
A sub-project of Bitcoin Core now provides Hardware Wallet Interaction (HWI) scripts that allow command-line users to use several popular hardware key management devices with Groestlcoin Core. See their project page for details.
This release changes the Random Number Generator (RNG) used from OpenSSL to Groestlcoin Core's own implementation, although entropy gathered by Groestlcoin Core is fed out to OpenSSL and then read back in when the program needs strong randomness. This moves Groestlcoin Core a little closer to no longer needing to depend on OpenSSL, a dependency that has caused security issues in the past. The new implementation gathers entropy from multiple sources, including from hardware supporting the rdseed CPU instruction.
On macOS, Groestlcoin Core now opts out of application CPU throttling ("app nap") during initial blockchain download, when catching up from over 100 blocks behind the current chain tip, or when reindexing chain data. This helps prevent these operations from taking an excessively long time because the operating system is attempting to conserve power.
How to Upgrade?
Windows If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer. OSX If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications. Ubuntu http://groestlcoin.org/forum/index.php?topic=441.0
ALL NEW - Groestlcoin Moonshine iOS/Android Wallet
Built with React Native, Moonshine utilizes Electrum-GRS's JSON-RPC methods to interact with the Groestlcoin network. GRS Moonshine's intended use is as a hot wallet. Meaning, your keys are only as safe as the device you install this wallet on. As with any hot wallet, please ensure that you keep only a small, responsible amount of Groestlcoin on it at any given time.
Groestlcoin Mainnet & Testnet supported
Multiple wallet support
Electrum - Support for both random and custom peers
Biometric + Pin authentication
Custom fee selection
Import mnemonic phrases via manual entry or scanning
BIP39 Passphrase functionality
Support for Segwit-compatible & legacy addresses in settings
Support individual private key sweeping
UTXO blacklisting - Accessible via the Transaction Detail view, this allows users to blacklist any utxo that they do not wish to include in their list of available utxo's when sending transactions. Blacklisting a utxo excludes its amount from the wallet's total balance.
Ability to Sign & Verify Messages
Support BitID for password-free authentication
Coin Control - This can be accessed from the Send Transaction view and basically allows users to select from a list of available UTXO's to include in their transaction.
HODL GRS connects directly to the Groestlcoin network using SPV mode and doesn't rely on servers that can be hacked or disabled. HODL GRS utilizes AES hardware encryption, app sandboxing, and the latest security features to protect users from malware, browser security holes, and even physical theft. Private keys are stored only in the secure enclave of the user's phone, inaccessible to anyone other than the user. Simplicity and ease-of-use is the core design principle of HODL GRS. A simple recovery phrase (which we call a Backup Recovery Key) is all that is needed to restore the user's wallet if they ever lose or replace their device. HODL GRS is deterministic, which means the user's balance and transaction history can be recovered just from the backup recovery key.
Simplified payment verification for fast mobile performance
Groestlcoin Seed Savior is a tool for recovering BIP39 seed phrases. This tool is meant to help users with recovering a slightly incorrect Groestlcoin mnemonic phrase (AKA backup or seed). You can enter an existing BIP39 mnemonic and get derived addresses in various formats. To find out if one of the suggested addresses is the right one, you can click on the suggested address to check the address' transaction history on a block explorer.
If a word is wrong, the tool will try to suggest the closest option.
If a word is missing or unknown, please type "?" instead and the tool will find all relevant options.
NOTE: NVidia GPU or any CPU only. AMD graphics cards will not work with this address generator. VanitySearch is a command-line Segwit-capable vanity Groestlcoin address generator. Add unique flair when you tell people to send Groestlcoin. Alternatively, VanitySearch can be used to generate random addresses offline. If you're tired of the random, cryptic addresses generated by regular groestlcoin clients, then VanitySearch is the right choice for you to create a more personalized address. VanitySearch is a groestlcoin address prefix finder. If you want to generate safe private keys, use the -s option to enter your passphrase which will be used for generating a base key as for BIP38 standard (VanitySearch.exe -s "My PassPhrase" FXPref). You can also use VanitySearch.exe -ps "My PassPhrase" which will add a crypto secure seed to your passphrase. VanitySearch may not compute a good grid size for your GPU, so try different values using -g option in order to get the best performances. If you want to use GPUs and CPUs together, you may have best performances by keeping one CPU core for handling GPU(s)/CPU exchanges (use -t option to set the number of CPU threads).
Fixed size arithmetic
Fast Modular Inversion (Delayed Right Shift 62 bits)
SecpK1 Fast modular multiplication (2 steps folding 512bits to 256bits using 64 bits digits)
Use some properties of elliptic curve to generate more keys
SSE Secure Hash Algorithm SHA256 and RIPEMD160 (CPU)
Groestlcoin EasyVanity 2020 is a windows app built from the ground-up and makes it easier than ever before to create your very own bespoke bech32 address(es) when whilst not connected to the internet. If you're tired of the random, cryptic bech32 addresses generated by regular Groestlcoin clients, then Groestlcoin EasyVanity2020 is the right choice for you to create a more personalised bech32 address. This 2020 version uses the new VanitySearch to generate not only legacy addresses (F prefix) but also Bech32 addresses (grs1 prefix).
Ability to continue finding keys after first one is found
Includes warning on start-up if connected to the internet
Ability to output keys to a text file (And shows button to open that directory)
Show and hide the private key with a simple toggle switch
Show full output of commands
Ability to choose between Processor (CPU) and Graphics Card (GPU) ( NVidia ONLY! )
Features both a Light and Dark Material Design-Style Themes
Free software - MIT. Anyone can audit the code.
Written in C# - The code is short, and easy to review.
Groestlcoin WPF is an alternative full node client with optional lightweight 'thin-client' mode based on WPF. Windows Presentation Foundation (WPF) is one of Microsoft's latest approaches to a GUI framework, used with the .NET framework. Its main advantages over the original Groestlcoin client include support for exporting blockchain.dat and including a lite wallet mode. This wallet was previously deprecated but has been brought back to life with modern standards.
Works via TOR or SOCKS5 proxy
Can use bootstrap.dat format as blockchain database
Import/Export blockchain to/from bootstrap.dat
Import wallet.dat from Groestlcoin-qt wallet
Export wallet to wallet.dat
Use both groestlcoin-wpf and groestlcoin-qt with the same addresses in parallel. When you send money from one program, the transaction will automatically be visible on the other wallet.
Rescan blockchain with a simple mouse click
Works as a full node and listens to port 1331 (listening port can be changed)
Fast Block verifying, parallel processing on multi-core CPUs
Mine Groestlcoins with your CPU by a simple mouse click
All private keys are kept encrypted on your local machine (or on a USB stick)
Lite - Has a lightweight "thin client" mode which does not require a new user to download the entire Groestlcoin chain and store it
Free and decentralised - Open Source under GNU license
Fixed Import/Export to wallet.dat
Rescan wallet option
Change wallet password option
Address type and Change type options through *.conf file
Import from bootstrap.dat - It is a flat, binary file containing Groestlcoin blockchain data, from the genesis block through a recent height. All versions automatically validate and import the file "grs.bootstrap.dat" in the GRS directory. Grs.bootstrap.dat is compatible with Qt wallet. GroestlCoin-Qt can load from it.
In Full mode file %APPDATA%\Groestlcoin-WPF\GRS\GRS.bootstrap.dat is full blockchain in standard bootstrap.dat format and can be used with other clients.
Groestlcoin Electrum Personal Server aims to make using Electrum Groestlcoin wallet more secure and more private. It makes it easy to connect your Electrum-GRS wallet to your own full node. It is an implementation of the Electrum-grs server protocol which fulfils the specific need of using the Electrum-grs wallet backed by a full node, but without the heavyweight server backend, for a single user. It allows the user to benefit from all Groestlcoin Core's resource-saving features like pruning, blocks only and disabled txindex. All Electrum-GRS's feature-richness like hardware wallet integration, multi-signature wallets, offline signing, seed recovery phrases, coin control and so on can still be used, but connected only to the user's own full node. Full node wallets are important in Groestlcoin because they are a big part of what makes the system be trust-less. No longer do people have to trust a financial institution like a bank or PayPal, they can run software on their own computers. If Groestlcoin is digital gold, then a full node wallet is your own personal goldsmith who checks for you that received payments are genuine. Full node wallets are also important for privacy. Using Electrum-GRS under default configuration requires it to send (hashes of) all your Groestlcoin addresses to some server. That server can then easily spy on your transactions. Full node wallets like Groestlcoin Electrum Personal Server would download the entire blockchain and scan it for the user's own addresses, and therefore don't reveal to anyone else which Groestlcoin addresses they are interested in. Groestlcoin Electrum Personal Server can also broadcast transactions through Tor which improves privacy by resisting traffic analysis for broadcasted transactions which can link the IP address of the user to the transaction. If enabled this would happen transparently whenever the user simply clicks "Send" on a transaction in Electrum-grs wallet. Note: Currently Groestlcoin Electrum Personal Server can only accept one connection at a time.
Use your own node
Uses less CPU and RAM than ElectrumX
Used intermittently rather than needing to be always-on
Doesn't require an index of every Groestlcoin address ever used like on ElectrumX
UPDATED – Android Wallet 7.38.1 - Main Net + Test Net
The app allows you to send and receive Groestlcoin on your device using QR codes and URI links. When using this app, please back up your wallet and email them to yourself! This will save your wallet in a password protected file. Then your coins can be retrieved even if you lose your phone.
Add confidence messages, helping users to understand the confidence state of their payments.
Handle edge case when restoring via an external app.
Count devices with a memory class of 128 MB as low ram.
Introduce dark mode on Android 10 devices.
Reduce memory usage of PIN-protected wallets.
Tapping on the app's version will reveal a checksum of the APK that was installed.
Fix issue with confirmation of transactions that empty your wallet.
Groestlcoin Sentinel is a great solution for anyone who wants the convenience and utility of a hot wallet for receiving payments directly into their cold storage (or hardware wallets). Sentinel accepts XPUB's, YPUB'S, ZPUB's and individual Groestlcoin address. Once added you will be able to view balances, view transactions, and (in the case of XPUB's, YPUB's and ZPUB's) deterministically generate addresses for that wallet. Groestlcoin Sentinel is a fork of Groestlcoin Samourai Wallet with all spending and transaction building code removed.
Initial block download refers to the process where nodes synchronize themselves to the network by downloading blocks that are new to them. ... go to the Bitcoin Core download page and verify you have made a secure connection to the server. In the “Linux (tgz)” section of the Download page, choose the appropriate file for your Linux install (either 32-bit or 64-bit) and download the file ... 1. Install Bitcoin-Qt Since version 0.9, Bitcoin-Qt was renamed to Bitcoin Core t o reduce confusion between Bitcoin-the-network and Bitcoin-the-software. Bitcoin Core is a full Bitcoin client. It is a thick client, meaning it requires the full blockchain (explained below) on local disk to operate and expose blockchain back to the network to help relay and verify transactions. For your first question, the message "Bitcoin is downloading blocks" is produced if the client hasn't yet downloaded all the checkpoint blocks. For testnet, there is exactly one checkpoint block, at height 546. So until your client has mined 546 blocks, you will continue to get this message. BetterHash then will receive the profit switching info from the server, so it will not automatically start doing benchmarks periodically. The Profit Switching option provides a continuous flow of mining, so it will not stop your regular activity when checking what is more profitable. Detailed information on this will be provided in a log file available on the Profit Switching tab in BetterHash ... Bitcoin Core . The base of a sovereign Bitcoin node is a fully validating Bitcoin client. We are using Bitcoin Core, the reference implementation, but not the only option available.This application will download the whole blockchain from other peers and validate every single transaction that ever happened.
How to Fix Download Failed - Blocked Error in Chrome
How to fix an error occurred during download/ an error occurred creating security connection. How to fix any problem while downloading with IDM How to Fix Download Failed - Blocked Error in Chrome [Fix] Unable to connect to server. If you have a firewall, it may be blocking the connection. - Duration: 2:34. Twisted Shorts 405,888 views When i download a file from Internet using google chrome browser, i am getting the error Failed - Download error. Solution: Antivirus real-time protection mi... How to fix web server is downError 521 in Google chrome and Mozilla firefox-error 521 web server is down-google chrome error 521,this error is occurred in b...