Bitcoin Difficulty and Hashrate Chart - BitcoinWisdom

Bitcoin Wisdom's difficulty estimator is broken, right? It says BTC difficulty will drop by -15.38% (approximately) at the end of this next round... but it said that the last time too and it jumped 18.11%!

submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Consensus Mechanism of Wisdom Chain Document Knowledge Base

At present, there is a consensus mechanism in the global public chain infrastructure. It stipulates how to compete between the nodes. The most popular consensus mechanism at this stage is OW, POS, DPOS, PBFT and DBFT. Its speed, safety and centralization degree have different emphasis. However, some public chains choose to use the hybrid consensus mechanism, such as ZIL adopts the POW+PBFT's mixed consensus mechanism, Wisdom Chain adopts the DPOS+Pow's mixed consensus mechanism, and what is the advantage of adopting the hybrid consensus mechanism?
📷
First of all, the early Bitcoin and Ethereum adopted a single consensus mechanism, which resulted in their slow running speed and being unable to be used in the commercial environment. Although EOS uses the consensus mechanism of DPOS, all transactions are recorded by the super node on the chain, which has greatly improved the efficiency, but it has lost another major feature of the blockchain - the security brought by decentralization 。 Therefore, the public chain with a single consensus mechanism is doomed to not have both efficiency, security and decentralization. Advantages of hybrid mechanism The biggest advantage of hybrid mechanism is that it can learn from each other's strengths. Hybrid consensus means that two or more consensus mechanisms are applied to the underlying architecture of the same blockchain public chain. Reasonable use of mixed consensus can make up for the defects of low efficiency, loss of security protection or sacrifice of centralization degree caused by single consensus mechanism.
📷
Wisdom Chain's ideas in this regard are quite creative. It adopts the hybrid mechanism of DPOS+POW, and the two accounts run simultaneously to make up for the disadvantage of any single consensus mechanism. DPOS mechanism has high efficiency. It is responsible for selecting legal transactions from the transaction storage pool, packaging them into blocks, and then broadcasting them to the network through P2P protocol. The implied POW requires miners to complete a certain amount of work proof to prevent the main chain from branching. At the same time, the elimination mechanism is established. If the nodes make false accounts or biased records within 30 seconds, they will be eliminated. As a result, speed, security and decentralization are taken into account. Of course, there are still some problems to be solved in the hybrid consensus mechanism, but any technology is not achieved overnight, and it is impossible to have a smooth journey. However, the Wisdom Chain team made a detailed and in-depth thinking on the key technical difficulties and put forward feasible technical solutions. In the future, with the popularization of blockchain technology, the problem of hybrid consensus mechanism will surely be solved one by one.
submitted by Frosty_Gene_7770 to u/Frosty_Gene_7770 [link] [comments]

The White Dragon : A Canadian Dragon Portfolio

Alright guys, Ive been working on this for a while and a post on here by a guy describing his portfolio here was the final kick in the ass for me to put this together. I started writing this to summarize what Im doing for my friends who are beginners, and also for me to make some sense of it for myself
Hopefully parts of it are useful to you, and also ideally you guys can point out errors or have a suggestion or two. I'm posting this here as opposed to investing or canadianinvestor (blech) because they're just gonna tell me to buy an index fund.
This first section is a preamble describing the Canadian tax situation and why Im doing things the way that I am. Feel free to skip it if you dont care about that. Also, there might be mistake regarding what the laws are here so dont take my word for it and verify it for yourself please.
So here in Canada we have two types of registered accounts (theres actually more but whatver). There is the TFSA "Tax Free Savings Account", and RRSP "Registered Retirement Savings Account"
For the sake of simplicity, from the time you turn 18 you are allowed to deposit 5k (it changes year to year based on inflation etc)in each of them. That "room" accumulates retroactively, so if you haventdone anything and are starting today and you are 30 you have around 60k you can put in each of them. The prevailing wisdom is that you should max out the TFSA first and you'll see why in a minute.

TFSA is post tax deposits, with no capital gains or other taxes applied to selling your securities, dividends or anything else. You can withdraw your gains at any time, and the amount that you withdraw is added to the "room" you have for the next year. So lets say I maxed out my TFSA contributions and I take out 20k today, on January of next year I can put back in 20k plus the 5 or whatever they allow for that year. You can see how powerful this is. Theres a few limitations on what is eligable to be held in the TFSA such as bitcoin/bitcoin ETFs, overseas stocks that arent listed on NYSE, TSX, london and a few others. You can Buy to Open and Sell to Close call and put options as well as write Covered Calls.

The RRSP is pre-tax deposits and is a tax deferred scheme. You deposit to lower your income tax burden (and hopefully drop below a bracket) but once you retire you will be taxed on anything you pull out. Withdrawing early has huge penalties and isnt recommended. You are however allowed to borrow against it for a down payment as a first time home buyer. The strategy with these is that a youngperson entering the workforce is likely to be in a fairly low tax bracket and (hopefully) earns more money as they get older and more skilled so the RRSP has more value the greater your pre-taxincome is. You can also do this Self Directed. Its not relevant to this strategy but I included it for the sake of context.
Non registered accounts ( or any other situation, such as selling commercial real estate etc) is subject to a capital gains tax. In so far as I understand it, you add all your gains and losses up at the end of the year. If its a positive number, you cut that number IN HALF and add it to your regular pre-tax income. So if I made 60k from the dayjob and 20k on my margin account that adds up to 70k that I get taxed on. if its a loss, you carry that forward into the next year. Theres no distinction between long term and short term. Also physical PMs are treated differently and I'll fill that part in later once I have the details down.
The reason why all that babble is important is that my broker Questrade, which isnt as good as IB (the only real other option up here as far as Im aware) has one amazing feature that no other broker has: "Margin Power"
If you have a TFSA and a Margin account with them, you can link them together and have your securities in the TFSA collateralise your Margin account. Essentially, when it comes to the Maintenance Excess of the Margin Account QT doesnt care if its in the TFSA *or* the Margin!
You can see how powerful this is.
------------------------------------------------------------------------------------------------------------------------------------------------
So as you can tell by the title, a lot of this is heavily inspired by Chris Cole's paper "The Allegory of the Hawk and the Serpent". You can read it here: https://www.artemiscm.com/welcome#research
Between it, his interviews and my mediocre options skills at the time my mind was blown. Unfortunately I didnt know how to do the Long Volatility part until after the crash in March but I've since then had nothing but time to scour the internet and learn as much as I could.
The way I interpret this isnt necessarily "what you should have right now", but what abstracted model they were able to backtest that gave them the best performance over the 90 years. Also, a lot of my portfolio I already had before I started trying to build this.
As such my allocations dont match the proportions he gave. Not saying my allocations are better, just showing where they are at this time.
I'm going to describe how I do Long Volatility at the end rather than the beginning since the way *I* do it wont make sense until you see the rest of the portflio.

Physical PMs 22%
I'm not sure wether he intended this to be straight up physical gold or include miners and royalty streaming companies so I will just keep this as physical.
I consider Silver to be a non-expiring call option on gold, so that can live here too. I am actually *very* overweight silver and my strategy is to convert a large portion of it to gold (mostly my bars) to gold as the ratio tightens up.
If youre into crypto, you can arguably say that has a place in this section.
If an ETF makes sense for part of your portfolio, I suggest the Sprott ones such as PHYS. Sprott is an honest business and they actually have the metal they say they have. If you have enough, you can redeem your shares from the Royal Canadian Mint. The only downside is that they dont have an options chain, so you cant sell covered calls etc. Simple enough I suppose.
One thing to bear in mind, there is a double edged sword with this class of assets. They're out of the system, theyre nobody's business but your own and theres no counter party. That unfortunately means that you cant lever against it for margin or sell covered calls etc. You can still buy puts though (more on that later)

Commodity Trend (CTA) 10%
https://youtu.be/tac8sWPZW0w
Patrick Ceresna gave a good presentation on what this strategy is. Until I watched this video I just thought it meant "buy commodities". A real CTA does this with futures also so aside from the way he showed, there are two other ETFs that are worth looking at.
COM - This is an explicit trend following ETF that follows a LONG/FLAT strategy instead of LONG/SHORT on a pile of commodity futures. So if they get a "sell" signal for oil or soybeans they sell what they have and go to cash.
COMT- Holds an assortment of different month futures in different commodities, as well as a *lot* of various related shares in producers. Its almost a one stop shop commodities portfolio. Pays a respectable dividend in December
If you want to break the "rules" of CTA, and include equities theres a few others that are also worth looking at
KOL- This is a coal ETF. The problems with it are that a lot of the holdings dont have much to do with coal. One of them is a tractor company. A lot of the companies are Chinese so theres a bit of a red flag.
Obviously Thermal Coal, the kind used for heating and powerplants isnt in vogue and wont be moving forward...but coking coal is used for steel manufacturing and that ain't going anywhere. The dividend is huge, pays out in December. A very very small position might be worth the risk.
Uranium- I'm in URA because thats the only way for me to get exposure to Kazatoprom (#1 producer), which is 20% of the holdings. The other 20% is Cameco (#2 producer)and then its random stuff.
Other than that I have shares in Denison which seems like its a good business with some interesting projects underway. I'm still studying the uranium space so I dont really have much to say about it of any value.
RSX- Russia large caps. If you dont want to pick between the myriad of undervalued, high dividend paying commodity companies that Russia has then just grab this. It only pays in December but it has a liquid options chain so you can do Covered Calls in the meantime if you want.
NTR- Nutrien, canadian company that was formed when two others merged. They are now the worlds largest potash producer. Pretty good dividend. They have some financial difficulties and the stocks been in a downtrend forever. I feel its a good candidate to watch or sell some puts on.
I'm trying to come up with a way to play agriculture since this new phase we're going to be entering is likely to cause huge food shortages.

EURN and NAT- I got in fairly early on the Tanker hype before it was even hype as a way to short oil but I got greedy and lost a lot of my gains. I pared down my position and I'm staying for the dividend.
If you get an oil sell signal, this might be a way to play that still.

Fixed Income/Bonds 10%

Now, I am not a bond expert but unless youre doing some wacky spreads with futures or whatever... I dont see much reason to buy government debt any more. If you are, youre basically betting that they take rates negative. Raoul Pal of Real Vision is pretty firm in his conviction that this will happen. I know better than to argue with him but I dont see risk/reward as being of much value.
HOWEVER, I found two interesting ETFs that seem to bring something to this portfolio
IVOL- This is run by Nancy Davis, and is comprised of TIPS bonds which are nominally inflation protected (doubt its real inflation but whatever) overlayed with some OTC options that are designed to pay off big if the Fed loses control of the long end of the yield curve, which is what might happen during a real inflation situation. Pays out a decent yield monthly
TAIL- This is a simpler portfolio of 10yr treasuries with ladder of puts on the SPX. Pays quarterly.

Equities 58% (shared with options/volatility below)
This is where it gets interesting, obviously most of this is in mining shares but before I get to those I found some interesting stuff that I'm intending to build up as I pare down my miners when the time comes to start doing that.
VIRT- I cant remember where I saw this, but people were talking about this as a volatility play. Its not perfect, but look at the chart compared to SPY. Its a HFT/market making operation, the wackier things get the more pennies they can scalp. A 4% dividend isnt shabby either.
FUND- This is an interesting closed end fund run by Whitney George, one of the principals at Sprott. He took it with him when he joined the company. Ive read his reports and interviews and I really like his approach to value and investing. He's kind of like if Warren Buffett was a gold bug. Theres 120 holdings in there, mostly small caps and very diverse...chicken factories, ball bearings all kinds of boring ass shit that nobody knows exists. Whats crucial is that most of it "needs to exist". Between him, his family and other people at Sprott they control 40% or so of the shares, so they definitely have skin in the game. Generous dividend.
ZIG- This is a "deep value" strategy fund, run by Tobias Carlisle. He has a fairly simple valuation formula called the Acquirer's Multiple that when he backtested it, is supposed to perform very well. He did an interview with Chris Cole on real Vision where he discusses how Value and Deep Value havent done well recently, but over the last 100 years have proven to be very viable strategies. If we feel that theres a new cycle brewing, then this strategy may work again moving forward.

I want to pause and point out something here, Chris Cole, Nassim Taleb and the guys at Mutiny Fund spend a lot of effort explaining that building a portfolio is a lot like putting together a good basketall team. They need to work together, and pick up each others slack
A lot of the ETFs I'm listing here are in many ways portfolios in and of themselves and are *actively managed*. I specifically chose them because they follow a methodology that I respect but I can't do myself because I dont have the skill, temperament or access to.
The next one is a hidden gem and ties into this. I'm not sure how much more upside there is in this one but man was I surprised.
SII- Sprott Inc. I *never* see people listing this stock in their PMs portfolios. A newsletter I'm subscribed to described this stock as the safest way to play junior miners. Their industry presence, intellectual capital and connections means that they get *the best* private placement deals in the best opportunities. I cant compete with a staff like theirs and I'm not going to try. I bought this at 2.50, and I liked the dividend. Since then they did a reverse split to get on the NYSE and like the day after the stock soared.
When it comes to mining ETFS I like GOAU and SILJ the best. None of their major holdings are dead weight companies that are only there because of market cap. I dont want Barrick in my portfolio etc.
SGDJ is a neat version of GDXJ.
Aside from that my individual miners/royalty companies are (no particular order)
MMX
SAND
PAAS
PGM
AUM
AG
MUX
RIO- Rio2 on the tsx, not rio tinto
KTN
KL
Options/Volatility: varies
So this is where we get to the part about options, Volatility and how I do it. I started out in the options space with The Wheel strategy and the Tastytrade approach of selling premium. The spreads and puts I sell, are on shares listed above, in fact some of those I dont hold anymore.
Theres tons of stuff on this in thetagang and options so I wont go into a whole bunch (and you shouldnt be learning the mechanics from me anyway) but theres one thing I want to go over before it gets wild.
If I sell a Cash Secured Put, from a risk management perspective its identical to just buying 100 shares of the underlying security. You are equally "Short Vol" as well, it just that with options
its a little more explicit with the Greeks and everything. But if I use my margin that I was talking about earlier, then I can still collect the premium and the interest doesnt kick in unless Im actually assigned the shares.
But if I sell too many puts on KL or AG, and something happens where the miners get cut down (and lets be real, they all move together) my margin goes down and then I get assigned and kaboom...my account gets blown up
So what I need to do, is balance out the huge Short Vol situation in my portfolio, be net Long Vol and directly hedge my positions. Since the overwhelming majority of my equities are all tied to bullion this is actually a very easy thing to do.

Backspreads
https://youtu.be/pvX5_rkm5x0
https://youtu.be/-jTvWOGVsK8
https://youtu.be/muYjjm934iY

So I set this up so the vast majority of my margin is tied up in these 1-2 or even 1-3 ratio put spreads that *I actually put on for a small credit*, and roll them every once in a while. I run them on SLV, and GDX.
I keep enough room on my margin so I can withstand a 10% drawdown before it sets off the long end of the spreads and then I can ride it out until it turns around and we keep the PM bull market going.
Theres another cool spread I've been using, which is a modified Jade Lizard; if already hold shares, I'll sell a put, sell a covered call, and use some of the premium to buy a longer dated call. Ive been running this on AG mostly.
I have a few more spreads I can show you but Im tired now so it'll have to wait for later.
As I said multiple times, I do intend to trim these miners later but now isnt the time for that IMO. I'm also monitoring this almost full time since I have an injury and have nothing better to do until I heal :p
submitted by ChudBuntsman to pmstocks [link] [comments]

Why EpiK’s super-large knowledge graph can stand at the “Center position” of AI

Why EpiK’s super-large knowledge graph can stand at the “Center position” of AI
What is the knowledge graph? Simply put, it is a graph-based data structure consisting of nodes and edges. Each node represents an “entity”, and each edge is a “relationship” between an entity and an entity.
Everyone pays more attention to the relationship between Marvel characters. The following picture is an example of the knowledge graph.

credit for google
So what is the relationship between knowledge graph and AI? To realize AI, knowledge of language, common sense, and industry knowledge is needed. But this knowledge is not all structured which AI cannot understand. The knowledge graph needs to be structured through certain logic, and then uploaded, stored, and applied in a form suitable for AI cognition. Therefore, the knowledge graph is the future of AI and EpiK is trying to broaden AI cognition through a large knowledge graph.
The knowledge graph is not a discipline, but more like a project. If you use an idiom to express the relationship between the two, it can be said that “if there is no skin, there is nowhere to put the hair.” Knowledge graph is the source of AI application. As the title, the center place of EpiK’s super-large knowledge graph is not an exaggeration.
Deeply understand the difficulties and pain points of the knowledge graph
In 2012, Google formally proposed the concept of knowledge graph. At that time, the main purpose of researchers was to optimize search engine technology. With the continuous popularization of AI applications, knowledge graphs have become the most important task of AI applications from a temporary gimmick. .
There is a vast river of human knowledge. At the same time, human society is constantly developing and new knowledge is constantly emerging. For this reason, the construction of a knowledge map is not a matter of overnight, nor is it what a company or an organization can accomplish. To this end, a stable system and a large number of experts and labor are needed to participate in the joint construction.
At the same time, the application of knowledge graphs to AI intelligent machines requires machines to be able to read the knowledge graphs. For this reason, knowledge graphs are also required to transform unstructured data, which also requires a lot of labor.
The Great Wall has become a spectacle because of its danger, its creativity, and its courage and spirit to overcome all kinds of dangers. Therefore, the wisdom of Chinese working people is admired by the world.
The construction of the knowledge graph also requires the power of all human beings to complete it together. Compared with the construction of the Great Wall, with strong technical capabilities, the relative choice is larger, and the realization space is more objective. The emergence of blockchain has made the knowledge map a more reliable guarantee for the realization of human eternal knowledge base.
Standing on the shoulders of giants, EpiK rides the wind and waves with the knowledge graph
Decentralized storage technology (IPFS), decentralized autonomous organization (DAO), and token economy model (Token Economy), EpiK troika is coming.
From Bitcoin, IPFS, DAO, blockchain applications continue to refresh human cognition, while also allowing more people to participate in the torrent of new technologies. Standing on the shoulders of giants, EpiK made a comprehensive attack on the knowledge graph, and the troika went all out.
As mentioned above, the knowledge graph is a labor-intensive work that requires a large number of experts to upload knowledge. At the same time, the knowledge graph is a kind of structured data. When encountering unstructured data, people need to modify or transform it.
The EpiK protocol uses Experts DAO. This is a decentralized governance mechanism used to manage domain experts, voting campaigns, and Bounty distribution. The expert alliance is a decentralized management agency responsible for managing knowledge experts and voters and bounty hunters. Once DAO is operational, it will liberate huge productivity for the construction of the global super-large knowledge graph.
According to Eric Yao, head of EpiK China, the core of decentralized storage lies in sharing. As the comprehensive and intelligent infrastructure of the fourth industrial revolution, the super-large-scale knowledge graph formed by the collection of human knowledge in various fields is suitable for the use of decentralized storage technology to build and share.
Value is the ultimate pursuit of organizational development. The token economy model is an important way to encourage participants to continue to build and share. In terms of reward distribution, EPK (EpiK token) is mainly issued in block rewards. For the rewards in each block, 90% will be rewarded to miners who store and maintain knowledge data, and the remaining 10% will be rewarded to expert alliance members in proportion to their contribution.
Currently, the EpiK testnet pre-mining activity has been open for 24 hours, and more than 1,700 people have applied for access to the testnet, which illustrates the tremendous power of the token and also promotes the construction of the knowledge graph.
In the future, whoever controls the knowledge graph data will occupy the commanding heights of AI applications. EpiK is struggling to move forward on the road to build a huge knowledge graph.
submitted by EpiK_Protocol to u/EpiK_Protocol [link] [comments]

New Lands, or New Eyes? | Monthly FIRE Portfolio Update - April 2020

The real voyage of discovery consists not in seeking new landscapes, but in having new eyes.
- Marcel Proust, Remembrance of Things Past
This is my forty-first portfolio update. I complete this update monthly to check my progress against my goal.
Portfolio goal
My objective is to reach a portfolio of $2 180 000 by 1 July 2021. This would produce a real annual income of about $87 000 (in 2020 dollars).
This portfolio objective is based on an expected average real return of 3.99 per cent, or a nominal return of 6.49 per cent.
Portfolio summary
Vanguard Lifestrategy High Growth Fund – $697 582
Vanguard Lifestrategy Growth Fund – $40 709
Vanguard Lifestrategy Balanced Fund – $76 583
Vanguard Diversified Bonds Fund – $110 563
Vanguard Australian Shares ETF (VAS) – $174 864
Vanguard International Shares ETF (VGS) – $31 505
Betashares Australia 200 ETF (A200) – $215 805
Telstra shares (TLS) – $1 625
Insurance Australia Group shares (IAG) – $7 323
NIB Holdings shares (NHF) – $5 904
Gold ETF (GOLD.ASX) – $119 458
Secured physical gold – $19 269
Ratesetter (P2P lending) – $12 234
Bitcoin – $158 360
Raiz app (Aggressive portfolio) – $16 144
Spaceship Voyager app (Index portfolio) – $2 435
BrickX (P2P rental real estate) – $4 471
Total portfolio value: $1 694 834 (+$127 888 or 8.2%)
Asset allocation
Australian shares – 40.9% (4.1% under)
Global shares – 21.7%
Emerging markets shares – 2.2%
International small companies – 3.0%
Total international shares – 26.9% (3.1% under)
Total shares – 67.8% (7.2% under)
Total property securities – 0.3% (0.3% over)
Australian bonds – 4.5%
International bonds – 9.9%
Total bonds – 14.4% (0.6% under)
Gold – 8.2%
Bitcoin – 9.3%
Gold and alternatives – 17.5% (7.5% over)
Presented visually, below is a high-level view of the current asset allocation of the portfolio.
Comments
This month featured a sharp recovery in the overall portfolio, reducing the size of the large losses experienced over the previous month.
The portfolio increased by over $127 000, representing a growth of 8.2 per cent, which is the largest month-on-month growth on record. This now puts the portfolio value significantly above the levels of a year ago.
[Chart]
The expansion in the value of the portfolio has occurred due to an increase in Australian and global equities markets, as well as substantial increases the price of Bitcoin. This is effectively the mirror image of the simultaneous negative movements last month.
From a nadir of initial pessimism in late March, markets have generally moved upwards as debate continues about the path of a likely economic recession and recovery from Coronavirus impacts over the coming year.
[Chart]
First quarter distributions from the Australian and Global Shares ETFs (A200, VAS and VGS) were received this month. These were too early to fully reflect the sharp economic activity impacts of the Coronavirus and lockdown period on company earnings.
Despite this, they were significantly down on a cents per unit basis on the equivalent distributions last year. Totalling around $2700, these distributions formed part of new contributions to Vanguard's Australian shares ETF (VAS).
The rapid falls in equity have many participants looking forward to a return to normalcy, or at least more open to the pleasing ideas that nerves have been held in a market fall comparable to 2000 or 2008-09, and that markets now represent clear value. As discussed last month, there should be caution and some humility about these questions, if some historical perspective is taken. As an example, the largest global equity market in the world - the United States - remains at valuation levels well above those experienced in previous market lows.
Portfolio alternatives - tracking changes under the surface
A striking feature of the past year or so has been the expansion of the non-traditional or 'alternatives' components of gold and Bitcoin as a proportion of the overall portfolio. Currently, when combined these alternative assets form a greater part of the portfolio than at any point over the past two years.
The chart below shows that since January 2019 the gold and Bitcoin component of the portfolio has lifted from around its long term target level of 10 per cent, to now make up over 17 per cent of the portfolio. In the space of the last four months alone, it has lifted from 13 per cent.
[Chart]
With no purchases of either gold or Bitcoin over the period, the growth in the chart is the result of two reinforcing factors:
A substantial fall in the value of the equity portfolio - reaching nearly $200 000 since the recent February market peak has naturally and mathematically led to a commensurate increase the proportion of other assets.
Increases in the value of gold and Bitcoin - have also played a role with a total appreciation of around $150 000 across the two assets over the past 16 months.
In fact, the value gold holdings alone have increased by over 40 per cent since January last year. Further appreciation of either gold or Bitcoin prices, particularly if any further falls in equity markets occur, could easily place the portfolio in the same position as experienced in January 2018.
At that time these alternative assets made up 1 in every 5 dollars of the portfolio, an unusual, and in that case temporary phenomenon. This represents a different portfolio and risk exposure than that envisaged in my portfolio investment plan.
Yet, equally it is critical to recall what the circumstances would likely be for this to arise. Simultaneously high gold and Bitcoin prices are more likely to occur in a situation of severe capital market dislocation, or falling confidence. On the other hand, should confidence and equity market growth be restored, both of these portfolio components could fall back to lower levels.
It is difficult to tell which state of the world will eventuate, a key reason for diversification across asset types. United States government debt is already at record levels - equivalent in real terms to levels last seen when it emerged out of the Second World War - despite no similar national effort having being undertaken.
Future inflation can potentially partly manage this burden, however, the last sustained episode of persistently high inflation rates during the decade of the 1970s spelt negative real returns. Where investors expect future inflation or financially 'repressive' policies of inflation exceeding interest rates, the economic growth required to 'grow out' of debt can be affected.
At this point, my inclination is to address this circumstance gradually through time by re-balancing of distributions and new contributions, rather than to realise capital gains by selling assets at one, or several, points in time.
Chasing down the lines - falling average spending in lockdown
Since the implementation of lockdown restrictions, average credit card expenditure has fallen by nearly 30 per cent. This has taken credit card expenditure to lower than any similar period in the past six years.
Partly as a result of this - as the chart below shows - a new development is occurring. The previously fairly steady card expenses line (red) is now starting to bend down towards, or 'chase', the rolling average distributions line (in blue).
[Chart]
The declining distributions line is a result of some previous high distributions gradually falling outside of the data 'window' for the rolling three-year comparison of distributions and expenditure.
This intriguing picture will probably change before a cross-over occurs, as lockdown restrictions ease, and as the data feeding into the three year average slowly changes over time.
Progress
Progress against the objective, and the additional measures I have reached is set out below.
Measure Portfolio All Assets
Portfolio objective – $2 180 000 (or $87 000 pa) 77.7% 104.6%
Credit card purchases – $71 000 pa 94.8% 127.6%
Total expenses – $89 000 pa 76.0% 102.3%
Summary
Last month market volatility theoretically took progress down to below most of my financial independence benchmarks on an 'All Assets' (i.e. portfolio and superannuation assets) basis. This position has reversed this month. As markets have recovered and with additional spare time in the lockdown period, I have continued to seek out and think about different perspectives on the history and future of markets.
Yet it must be recognised that there is a natural limit to the utility of these ponderings. The shape of the future is always uncertain, and in this world, confident comparisons and analogies with past events can be perilous. Comparisons with past periods of financial market crises miss the centrality of government action as a causal influence on the path of virus affected economies and markets.
A virus and recovery is not the same as a global financial crisis originating in housing finance markets addressed through monetary and fiscal stimulus. Most developed country governments have quickly applied the same, if not larger versions of responses as applied in the global financial crisis, a distinguishing step that also makes analogies with the great depression era problematic.
Similarly, a pandemic is not hitting and interacting with the shattered economic and health systems of the 1918-19 Spanish flu. Overlaying all of this is the imperfect and partially disconnected relationship between the economy today, and equity markets that discount and focus on the future.
This makes all history's lessons more than usually caveated and conditional. One avenue for managing through these times is to focus on what does not change - the psychological difficulty of accepting alterations in financial circumstances and the capacity of markets movements to cruelly surprise us in both timing and direction.
One of the best texts to read to get a sense of both of these in such times is Benjamin Roth's A Great Depression Diary. This tells of the day-by-day changes observed in everyday urban life and investment markets, from the point of view of an American small retail investor living through the times.
This month also saw the exciting news that Pat the Shuffler and Strong Money Australia are combining efforts to produce a new podcast. Speaking of which, Big ERN's reflections on the current implications of sharemarket market movements for seekers of financial independence have been filled with insight and wisdom.
This interesting piece (video) - the latest in a 'virus' market series - from New York University's Professor of Finance Aswath Damodaran on asset performances through the past few months - is a more technical and detailed discussion of how markets have re-priced businesses and profits. Finally, the recently released Hmmminar interview series provides a more heterodox set of speakers and ideas on current markets, presented by Grant Williams.
Unlike predicting the future, seeking out different perspectives on it is perhaps the easiest it has ever been in history. While it is not always possible to change the course taken, it is possible to look at the same horizon with new eyes.
The post, links and full charts can be seen here.
submitted by thefiexpl to fiaustralia [link] [comments]

The Blackmail Email Scam (part 4)

THIS THREAD IS NOW ARCHIVED, THE LATEST THREAD CAN BE FOUND HERE: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

TEXT, PHONE CALL, AND PHYSICAL MAIL VARIANTS ARE COVERED IN THE LATEST THREAD.

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

FIRST THREAD: https://www.reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://www.reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/###

THIRD THREAD: https://old.reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. In al cases, the threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it
Good day,
If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you.
I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work.
Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it.
I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF)
So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts.
P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
I Have YOUR code. I rule phone xxxx
I SENT this newsletter from YOUR ACCOUNT.
I look your device.
I am in daze of your sex act fantasies!
I made backup your contacts and files. I made screenshots from your digital camera of yours device.
I want 888 $ to my (Bitcoin
My )Bitcoin currency
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts!
If you do not know how to do this - enter into Google/
=how to transfer money to a Bitcoin& wallet-
Time 30 hours.
This excellent post as Subway & Dairy Queen.
Hello!
I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it.
Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time.
Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account.
Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you.
You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit.
I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting!
So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site.
Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ...
I will not do this if you pay me a little amount. I think $877 is a nice price for it!
I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system.
My Trojan have auto alert, after this email is looked, I will be know it!
You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours)
Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data).
Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites!
I hope you will be prudent. Bye.
Same as before but they increased the amount
I got an order from someone to kill you and your family
but I am far from your house
if you still love your family, I ask you to transfer 0.1 BTC to me.
If you report this email, I will immediately kill your family.
FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION!
We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account.
After analyzing documents. We found Illegal activity - HIDING TAXES.
That we want?
I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
That we do if you don't pay bitcoin?
We send these Documents and Proofs to your Tax Department.
And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack
We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack
This is our guarantee, that you don't clean evidence and building a protection policy.
If you don't pay by in 7 days, attack will start.
Attack including.
1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament
Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack.
This is not a joke.
Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help.
Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
AND YOU WILL NEVER AGAIN HEAR FROM US!
If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom.
All mistakes in text we do specily.
Bitcoin is anonymous, nobody will ever know you cooperated.
Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link
Hello!
I am a hacker who has access to your operating system.
I also have full access to your account.
I've been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.
If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.
I also have access to all your contacts and all your correspondence.
Why your antivirus did not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.
I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks.
I can also post access to all your e-mail correspondence and messengers that you use.
If you want to prevent this,
transfer the amount of $500 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin").
My bitcoin address (BTC Wallet) is: x
After receiving the payment, I will delete the video and you will never hear me again.
I give you 50 hours (more than 2 days) to pay.
I have a notice reading this letter, and the timer will work when you see this letter.
Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.
If I find that you have shared this message with someone else, the video will be immediately distributed.
Best regards.
Hey, I know your password is:
Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit".
My malware gave me full access and control over your computer, meaning, I got access to all your accounts (see password above) and I can see everything on your screen, turn on your camera or microphone and you won't even notice about it.
I collected all your private data and I was spying on you, I RECORDED (through your webcam) embarrassing moments of you, you know what I mean!
After that I removed my malware to not leave any traces.
I can publish all your private data everywhere and I can send the videos to all your contacts, post it on social network, publish it on the whole web, including the darknet, where the sick people are!
Only you can prevent me from doing this and only I can help you out in this situation.
Transfer exactly 1200$ with the current bitcoin (BTC) price to my bitcoin address.
It's a very good offer, compared to all that horrible shit that will happen if I publish everything!
You can easily buy bitcoin here: www.paxful.com , www.coingate.com , www.coinbase.com , or check for bitcoin ATM near you, or Google for other exchanger. You can send the bitcoin directly to my address, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine.
My bitcoin address is:
Copy and paste my address, it's (cAsE-sEnSEtiVE)
I give you 3 days time to transfer the bitcoin!
As I got access to this email account, I will know if this email has already been read. If you get this email multiple times, it's to make sure you read it and after payment you can ignore it. After receiving the payment, I will remove everything and you can life your live in peace like before.
Next time update your browser before browsing the web!
НЕLLО!
I’m going to cut to thе chӓsе.I know ӓbout thе sеcrеt you ӓrе kееping from your wifе.Morе importӓntly,I hӓvе еvidеncе of whӓt you hӓvе bееn hiding.I won’t go into thе spеcifics hеrе in cӓsе your wifе intеrcеpts this,but you know whӓt I ӓm tӓlking ӓbout.
You don’t know mе pеrsonӓlly ӓnd nobody hirеd mе to look into you.Nor did I go out looking to burn you.It’s just your bӓd luck thӓt I stumblеd ӓcross your misӓdvеnturеs whilе.I thеn put in morе timе thӓn I probӓbly should hӓvе looking into your lifе.Frӓnkly,I ӓm rеӓdy to forgеt ӓll ӓbout you ӓnd lеt you gеt on with your lifе.And I ӓm going to givе you two options thӓt will ӓccomplish thӓt vеry thing.Thosе two options ӓrе to еithеr ignorе this lеttеr,or simply pӓy mе $822.Lеt’s еxӓminе thosе two options in morе dеtӓil.
Option 1 is to ignorе this lеttеr.Lеt mе tеll you whӓt will hӓppеn if you chosе this pӓth.I will tӓkе this еvidеncе ӓnd sеnd it to your wifе. And ӓs insurӓncе ӓgӓinst you intеrcеpting it bеforе your wifе gеts it,I will ӓlso sеnd copiеs to hеr friеnds ӓnd fӓmily.So,Evеn if you dеcidе to comе clеӓn with your wifе,it won’t protеct hеr from thе humiliӓtion shе will fееl whеn hеr friеnds ӓnd fӓmily find out your sordid dеtӓils from mе.
Option 2 is to pӓy mе $822.Wе’ll cӓll this my ‘confidеntiӓlity fее.’Now lеt mе tеll you whӓt hӓppеns if you choosе this pӓth.Your sеcrеt rеmӓins your sеcrеt.You go on with your lifе ӓs though nonе of this еvеr hӓppеnеd.Though you mӓy wӓnt to do ӓ bеttеr job ӓt kееping your misdееds sеcrеt in thе futurе.
At this point you mӓy bе thinking,‘I’ll just go to thе cops.’Which is why I hӓvе tӓkеn stеps to еnsurе this lеttеr cӓnnot bе trӓcеd bӓck to mе.So thӓt won’t hеlp,ӓnd it won’t stop thе еvidеncе from dеstroying your lifе.I’m not looking to brеӓk your bӓnk.I just wӓnt to bе compеnsӓtеd for thе timе I put into invеstigӓting you. $822 will closе thе books on thӓt.
Lеt’s ӓssumе you hӓvе dеcidеd to mӓkе ӓll this go ӓwӓy ӓnd pӓy mе thе confidеntiӓlity fее.In kееping with my strӓtеgy to not go to jӓil,wе will not mееt in pеrson ӓnd thеrе will bе no physicӓl еxchӓngе of cӓsh.You will pӓy mе ӓnonymously using bitcoin.If you wӓnt to kееp your sеcrеt thеn sеnd $822 in bitcoin to thе Rеcеiving Bitcoin Addrеss listеd bеlow.Pӓymеnt must bе rеcеivеd within 1 dӓys of thе post.
You should mӓkе ӓ trӓnsӓction of using bitcoins (cryptocurrеnsy): x
[Bitcoin dеtӓils]
Tеll no onе whӓt you will bе using thе bitcoin for or thеy mӓy not givе it to you.Thе procеdurе to obtӓin bitcoin cӓn tӓkе ӓ dӓy or two so do not put it off.Agӓin pӓymеnt must bе rеcеivеd within 1 dӓys of this lеttеr’s post mӓrkеd dӓtе.If I don’t rеcеivе thе bitcoin by thе dеӓdlinе,I will go ӓhеӓd ӓnd rеlеӓsе thе еvidеncе to еvеryonе.If you go thӓt routе,thеn thе lеӓst you could do is tеll your wifе so shе cӓn comе up with ӓn еxcusе to prеpӓrе hеr friеnds ӓnd fӓmily bеforе thеy find out.Thе clock is ticking.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material"
submitted by EugeneBYMCMB to Scams [link] [comments]

I've reached the extent that I think I can tell this story. This is my experience with the cult

Introduction
I am hesitant to begin writing about these memories, and for two reasons. The first is out of fear - fear of retaliation. You see, I was taken advantage of by a cult that I escaped a few years ago in the summer of 2018. I wasn’t involved for long - ten months - but that wasn’t the end of the cult’s influence on me, as they cleverly had a previously unaffiliated visitor contact me and try to bring me back during the period afterwards. I believe they are still keeping tabs on be covertly, but this may just be my paranoid nature.
For nearly the entire first year afterwards, I was always looking over my shoulder to see if I was being followed. They definitely have an interest in roping me back into the fold, as you will see how sociopathic these people are. I’m still traumatized, and although I have healed a great deal from these trials, there is still lingering conditioning that causes me panic attacks and anxiety, which exemplifies my schizoaffective disorder. I attribute much of the reason I’m houseless now to the combination of my mental health and trauma caused by this group.
The second reason I am hesitant to begin writing is also out of fear, but this is instead a fear of not being able to deliver on my promise to expose this cult. I know I have the ability to write about my account, but will it be good enough? Will I be throwing these words into the electronic ocean like so many others with little effect on the world? I feel that no matter how hard I try, I will be unable to capture the cult’s devious acts in such a way to convey what it was like for me, a vulnerable individual, to be slowly turned into an obedient slave.
Inadequacy. This is an important piece of my psychology. After watching my mother decay and die for the first nine years of my life, followed by being raised by an abusive, narcissistic father, I have a profound feeling of inadequacy ruling me. I never feel like I am good enough; that I have to self-sacrifice - to the point where I believed I had to be as good as Jesus Christ - in order to achieve a passable level of human adequacy. The cult took advantage of these feelings in spades and left me a shell of who I was previously.
Fortunately, the period of houselessness that has extended the last year or so of my life has been a radically transformative period where I feel able to step out from barriers that previously trapped me. I feel freer than I ever have been, and to be honest, I owe a lot to the cult for pushing me to my breaking point and learning where my boundaries are. In fact, I don’t believe I could have stepped away from the denial of having a feminine side if it weren’t for the ridiculousness of how far I was pushed.
Now, I stand strong, ready to accomplish this mission life has presented me. It is my basic civic duty to tell my story and warn the public about this group and others who prey on vulnerable individuals in an unstable socioeconomic period. They deliberately attract people who are vulnerable for personal or financial reasons. For instance, there was a flat-earther from Belgium who was here illegally that got roped into our group by being attracted to the messages of sovereignty and their abundance of kooky new age beliefs. They even tried to get me to recruit more members using the same strategies they hooked me with - which is standard cult behavior.
This leads right into how I got involved with the cult in the first place. Part of it is my fault, as I was young and naive. I still am, but now I have the wisdom to not throw myself out there for any group to start manipulating. There are many people who can be drawn into their preying behavior, and it is important that I elaborate on how easy it is to get duped, so others don’t follow in my footsteps.
As you will see, the group was bizarre in many ways. I want to start off by saying that I did not join an organization of pee-drinkers who practiced blood-magick on the side of Main Street. Instead, I started working for a nonprofit that promised to change the world, and appeared to have the ability to do that. The weirdness grew exponentially over time, gradually as they conditioned us to accept their way of life.
On my own end, I wanted to join an intentional community; one where everyone involved works towards a singular end as one unit. I longed for the camaraderie and an alternate way of life. I wanted something different than what - as the cult called the common culture - “The Matrix,” or “Babylon” offered. There are such communities, but because of devious groups like this, everyone needs to be cautious when attempting to find them. I still seek to find or create an alternative lifestyle for myself where I can live amongst my brothers and sisters away from the mass-produced consumer culture of the world.
It’s been a hell of a journey, but I am happy where I am now. If anything, the group taught me that self-love is our first love; if the gardener does not take care of themselves, then who takes care of the garden? With my efforts to find such a community as I wanted, it was inevitable that some group would have sunk their teeth into me. I am grateful that I was able to recognize the far-flung insanity that I was trapped in and escape. Now I just need to focus on recovering and helping others who may be searching for the same things I am.
Chapter 1
It all started early in 2017. I was working on reverse networking, like trying to place a letter on someone’s shoes to let them know I exist. I was hoping to find a project I could use my skills as a writer and juggler by broadcasting who I was on our small online community, The Shrug Life Syndicate, on Reddit. I was so desperate to find such a community that fit my ideals and goals that I didn’t even conceive that someone could be watching in order to learn about me.
They first posted a link to their site on our community’s board, when they were still going by the Awakening Sovereignty Collective. To best understand how I perceived them initially, you have to understand that I was lost in what we at the Shrug Life Syndicate call the synchronicity slip stream. An aspect of my schizoaffective disorder, I often get lost in various series of synchronicities that form a coherent narrative that compels me to behave differently than I otherwise would. It is an amazing feature of my mental health for creativity and finding alternative solutions to problems, but it can be debilitating when trying to fit in to the normal world. When the ASC posted, I believed applying on their website was the obvious thing I should do in order to accomplish my cosmic mission.
Well, nothing happened at first, and I forgot about them until several months later until I received an email stating I was hired. This came after a series of strange tasks from anonymous accounts that seemed to be tests to see if I was as capable of a writer as I portrayed myself as being. I remember one test was to see if I could write a sales pitch for “Unicorn Poop,” an edible snack with a humorous twist. I don’t have any proof that these two events are connected, but it definitely tripped my radar as odd that they happened one after another, and nothing ever came from the sales tasks.
Having passed their tests, I began working with them online. It was a slow process, as there wasn’t a lot of work right out the gate, but there was a lot to learn. Their websites were many in number and often confusing. I had difficulty navigating them and almost quit trying within days of getting started. I remember crumbling back into my addictive nature one night as the wailing cries of depression came roaring back with my initial perceived failure.
If I were not partially psychotic, believing the universe was guiding me to the salvation I sought, then that would have been the end of it. Many other people seemed to have given up while I was still new to working for them. If I were to guess, I would say that this was deliberate on their part in order to weed out only people like me, who were in some way desperate to be a part of the group. With only a small number of desperate people finding their way into the clutches of these people, it must be easier to control them as well.
The ASC promised a new way of life for anyone seeking it. They claimed to be a planetary alliance that was helping ecovillages, nonprofits, conscious businesses, and individual change agents. They were working on a cryptocurrency and software suite that would help communities better serve the world. This was at the peak of the bitcoin bubble, where many people unfamiliar with cryptocurrencies were trying to get in on the hype. They touted a number of figures and claims which ultimately turned out to be false or otherwise misrepresentative of the truth, but in the moment I believed everything they were shoveling.
It was easy for them to sell the idea and project as they were all natural sales personalities. I attended a lot of meetings, particularly with the writer’s team, and started to get to know the people behind the project. In the moment, they appeared to be down-to-Earth and relatable, but highly conscious individuals who really cared about the world and were motivated to do the work necessary to make the changes needed for the planet. In hindsight, they really only cared about money, and were playing a part to catch people like me.
The leader was named Dakota, if that was his real name (I believe most of the main group had adopted a second name to hide who they really were). He was a young man claiming to have graduated high school at ten, and he founded a company known as STADA which was facilitating much if not all of the software needs of the ASC. He was brilliant, but I believe most of his brilliance was self-generated through his ability to sell himself as more than he really was. He always acted like a millionaire who was going to change the world, which made it easy for him to sell the project to people like me.
The co-leader was named Lila. She was a cheerful person who always had something positive to add to the conversation. While working with her, I found this to be a powerful part of her personality. It was hard to say no to her, as she had a motherly vibe and she strategically would ask you to do things that left you feeling compelled to help her, for the good of the project. She first won me over by claiming to run a retreat center for circus skills. I only heard of this in the beginning of my journey with the group, so I believe it may have been a bogus means to shift my opinion of them.
The leader of the writer’s team was named Teahna, who was beautiful and knew how to use her womanly charm to influence others. She seemed to be new to the project as well, having recently written her first book, and my time working with her online seemed to be a learning experience for both of us. I believe this was also planned, so that I would have some support learning what I was supposed to be doing on the various websites that seemed to pile up more and more as time went on.
The work was easy at first. There were no assignments or anything like that. It was all pile work - as in, just grab a shovel and get paid for what you move. As a writer, I naturally gravitated to the writers team’s tasks, but I also helped with the education team and the core tasks of the group. Mostly I wrote articles and website content for them, but I also wrote fake twitter bios, social media posts, and began working on their constitution/manifesto before arriving at their headquarters.
I was making good money, both in real dollars and their own cryptocurrency, Equality Keys. They claimed we could trade their currency for real money at any time, which turned out to be a lie. They often only let us exchange it at certain times at a reduced value. But, I was naive enough to believe that the numbers on my screen were real and meant I was doing good. It wasn’t long before I earned upwards of thousands of dollars worth of their currency, which was promised to rise in value as the project continued to grow and evolve.
After a few weeks working with them, they began toying with a name change to Earth Nation. I believe this is a key part of their method of staying under the radar. By changing names and projects frequently, they never gather enough clout to be exposed as the charlatans that they are. They would later create a new project known as Earth Cycle, and there was a tentacle organization we got hooked into after our stay with the main group called Lovecycle. In regards to the latter, I will never forget the name Lovecycle, as that is when the bulk of bizarre and traumatic events occured.
This is around the same time that my girlfriend at the time began helping out as well. We worked together as a writer and artist combo, and they were initially excited to have another person joining to help. There was some friction though, such as bluntly being told they had no need for an artist at this time after they welcomed her onboard, and there were moments where it seemed like they did not want her to be a part of the project. As they turned her and I against each other much later in our odyssey with them, I think this must have been deliberate to sow the seeds of conflict between us. Again, this is classic cult behavior. I regret bringing her into the whole thing, as she is no doubt as traumatized as I am.
What really allowed me to lose myself in the hope of the project was the possibility to do exactly as I dreamed: travel with a caravan, juggle at festivals, help sell whatever my girlfriend and others made, and write gonzo journalism about what Earth Nation was doing. One of the main draws of the group was that they advertised in the meetings about how they had a proposal system, where anyone could come with their plan and it could be voted on to be given resources. They were interested in my idea (how much of that was just gaslighting me to believe I’ve found the perfect gig, I don’t know), and wanted me to do some journalism about my experiences moving to their headquarters just outside Eugene, Oregon - on the other side of the country.
My girlfriend and I were ecstatic at the idea of starting a new life on the west coast. It was the dream we both shared, to abandon the broken world we knew and join something better. We began preparing for the move, sold all of our stuff, and eventually took off from the airport with only three bags to our name. It was a leap of faith, and we were never happier to embrace our dreams and begin to live a much more interesting life.
Chapter 2
We left on October 25th, about a couple months after I first began working for the ASC. It was an amazing trip that we thought would represent our rebirth. I remember arriving at the airport feeling as though I was leaving a part of my past behind. I felt a wave of solemn emptiness and fear over this, but I have since learned such feelings are common with change of this magnitude. Mostly, I felt joy that a new chapter of my life was unfolding before my eyes.
It was a time where it seemed like we had infinite potential right at our fingertips. Who knew what would actually go down over the coming months? We were grateful for the opportunity and happy about the change. My girlfriend even changed her name to Awen to start over fresh as a new person. I still stuck with my birth name, Gregory, but eventually I would start going by the name Rory after having been pressured to by the group.
I remember looking out the window while Awen took pictures of everything we flew over. It was a trip in itself to see the world from such an angle. I was amazed at the number of wind farms in the middle of the country. Likewise, the closer we got to our destination, the more mountainous the ground beneath us became. The change in scenery would pale in comparison with the change in the culture of the west coast - one of the main reasons I now consider Portland my new home.
Landing in Eugene’s airport, we were regaled with Ducks memorabilia. This was a pleasant surprise, as I had forgotten that this was where an old hero from my track days, Steve Prefontaine, used to run. This made me feel hopeful while waiting for Teahna and Prism, the leader of the educational team. I remember pacing the entrance hall of the airport with a giddy smile stretching from ear to ear. This was it, I told myself: I had finally found my new home.
After a long day of airline travel, we were eventually picked up in Prism’s van. We were met with hugs and smiles, which rejuvenated us after the natural stress of the trip. We chatted the entire way back to Triangle Lake, where their headquarters supposedly was. Both Awen and I were antsy while being shaken back and forth while sitting on Prism’s bed for the duration of the drive. I distinctly remember the beautiful colors of the autumn trees as we drove past. This last little bit of our trip took roughly forty-five minutes, but it felt like we were pulling up to the headquarters in an instant.
I caught a glimpse of a sign as we pulled into the long driveway: Circle of Children. This would be where we stayed for the first two months. The area was gorgeous. Giant trees covered in green moss extended as far as the eye could see. With the abundance of fern-life, it reminded me of a Jurassic paradise. Out the cracked window of the van, I could hear tree frogs chirping in harmony. It was certainly something out of another world compared to the east coast.
We stopped in front of the main office - the only building with wifi. If I were to graph the amount of access to the internet we had across the ten months we were involved, it would have a steady, negative slope. Of course, while being conditioned by the group, it was barely noticed, as we grew less dependent on the internet as time went on. We were never barred from the outside world - in fact we interacted with it regularly - but the idea of leaving was made so impossibly far outside the bounds of possible choices through a long series of scripted events.
Which is why the entire beginning of our stay at the Triangle Lake Convention Center seemed like something out of a fantasy paradise. Everything, from the overarching narrative we were fed, to the day-to-day interactions, was designed to win us over, gaslight us, and manipulate us emotionally by using our traumas against us. In the aftermath of the whole escapade, I learned that this is the type of manipulation that cults use to prevent members from seeing reason while keeping them docile, obedient work horses for the greater project, whatever it may be.
It is clear to me now that Earth Nation and all tentacle organizations are a purely criminal enterprise - a money-making machine for those at the top of the hierarchical pyramid. Even though we were supposedly a DAO - a decentralized autonomous organization - there were clearly people who were centralized leaders profiting from everything the group did.
And everybody played their roles well upon our arrival. We were greeted with another barrage of hugs as we got out of the van. Everybody was excited to finally meet us in person, as were we to meet them. We chatted with Dakota and Lila for some time outside of the office. They were the exact same as their online personas. In the moment, this gave us a sense that these people were genuine, but in hindsight it serves as a reminder that anyone can create a convincing character and play them whenever they want - even if they choose to never take their deceptive masks off.
We were then shown where we would be staying. Up the hill and to the left we drove until we were in front of Carmen Hall. It was a quaint dorm-style lodging with a large common area and a small kitchenette. Many nights were spent in the common room with the others who were staying in the building. Because we were a couple, we were given the largest room with its own bathroom.
That’s another thing that changed in a downward slope: our living quarters. Over the course of the ten months we were with them, we were downgraded from having our own space, to sharing space, to living in a tent. And again, because of the conditioning, we were fine with the change.
Sometime during the early evening, we went back down to the dining hall and kitchen which was across the way from the main office. Here, we met a variety of characters, including Tuva, a humble appearing guy with a large social network he brought with him to the project, and Daniella, who would turn out to be mommy dearest as she was the sole woman controlling us for the majority of our adventure on the west coast. A Brazillian native, she was as good of a manipulator as she was a cook, and we all enjoyed a wonderful meal on our first night in Oregon.
Before the night was up, we went behind the kitchen to smoke with a man named Grizzly; a wild looking man who mostly kept quiet but had a mouth to use if he needed it. It was the first time we smoked in Oregon and it felt liberating to finally be in a legal state. But, as freeing and fun as being able to smoke whenever we wanted, I believe the abundance of weed we were constantly fed was a means to keep us docile. Daniella always made sure we had some weed, and would frequently smoke with us. I feel I would have been able to say something as things changed if I were not dependent on the constant stream of marijuana.
Afterwards, we went back to Carmen Hall with a couple of members who also stayed there, and Daniella performed a pendulum reading for me and my girlfriend. Holding a crystal on a chain, she “read” the direction it spun as she brought it up in alignment with our chakras. She was spot on and I wanted to say that she had excellent observation skills, but I kept my mouth shut. I didn’t want to offend anyone’s beliefs, especially my girlfriend who considered herself a mystic and bought into the act.
That night we cuddled in our room, smiling as wide as our mouths could. We had done it - we successfully started our new lives and were going to be a part of something we still had yet to fully comprehend. Everything was new and exciting, and while we were overjoyed, we were glad we had each other because things were still scary. If only we had known then how scary things would become.
Chapter 3
The next morning, we showered, dressed, and went down to the kitchen. There was a slight fog in the air, and we saw a family of deer in a clearing off the road. We would see this family of deer several times during out stay at Triangle Lake, which greatly enthused my girlfriend. She said they were a symbol of wisdom, and must be a good sign as we continued to be indoctrinated by the new age beliefs of the group.
We were early, as our daily meetings were at ten and that is when most people started to show up at the office. But Grizzly was there, as he stayed at the nurses station that sat next to the main office. He offered us some dabs, which just further enforced our belief that this was a great group to be a part of. He also offered me a metal six-shooter pipe, which proved to be the main piece I would smoke out of for the entirety of our adventure.
Breakfast consisted of whatever we could scrounge up. There was a huge walk-in freezer in the kitchen that hosted tons of food when we first got there. There were also a wide selection of dry foods such as figs and nuts. That whole selection would dwindle over time, as the group got everything as donations, usually by soliciting the local food pantries and the Eugene mission and much was close to their expiration dates. It was common to open the freezer and find something moldy.
This was the first time I really interacted with Doran. Doran looked a lot like me - complete with similar beard and glasses - but had shorter, curlier, and darker hair. It was joked that “I was another you.” He appeared to be a really kind-hearted person, and we frequently went to him with problems. This is likely planned as well, to have someone to vent the frustrations we were experiencing as the project transitioned to something different than what we signed up for. I opened up to him before I did with other members, even asking for relationship advice as they tried turning Awen and I against each other between, and received what I now consider a long-standing act of being a good ear with standard advice from the group. Still, he was funny and I enjoyed making strange mixtures of food with him.
As it neared ten, we shuffled to the office to have our meeting. The office had two rooms, and we were all huddled in a circle in one of them. This was nice during the coming months as it was also the only room with the heater. These meetings proved to be a main means to program us, as there were many exchanges that could have only been scripted. We would often talk about one thing, but there would be a subtopic that was teased that would change the meaning of the whole meeting in the context that I heard it. Often there would be some crosstalk in the kitchen beforehand, or something during the day that warped my understanding of what was said
We were required to work thirty hours a week in order to receive our basic income of two hundred dollars a month, as per our agreements before moving to the headquarters. However, it wasn’t long before they duped us by saying the basic income would be used to cover our time staying at Triangle Lake. We weren’t able to fight it, because our tongues were tied by the desire to fit in and be accepted by the group. The ways that they changed things were gradual and deliberate, so that you would never really feel like you were getting taken advantage of. It was just a change, which was alright, because there was a world to save and we were the group who was going to get it done.
That was one of the major ways they were able to get away with a lot of the back-pedaling of agreements - they would always have new, unexpected surprises waiting for us. It was gradual, but they introduced several new elements of communal living that required us to sacrifice more of our money and autonomy. They did this by having so-and-so nonchalantly bringing up these concerns in the meetings, then downplaying the resulting effects as something that should be expected, then agreeing with Dakota or Lila.
Keeping track of my hours was a joke. For everything I did, I was told I should have taken less time in order to do. The criticism I received came tongue-in-cheek and constructive at first, but steadily devolved into a series of harsh critiques that would leave me distraught and unable to think clearly. I was still unmedicated back then, and my emotional state was as turbulent as a hurricane. They did similar things to my girlfriend, as Lila took her under her wing, treating her as her child in order to take advantage of her own trauma she had with her mother.
If there was one thing these people really excelled at it is control. They figured us out quickly and efficiently and then used our traumas against us. Our second night there consisted of an informal group of the residents who stayed at Carmen Hall staring into each other’s eyes and then saying out loud what we felt at that moment. I remember staring at Daniella, who was a silhouette with the lamp directly behind her, and asking for healing. Something about the way she stared at me seemed to provoke a sense of trust and I felt that she would be able to help with a lot of the problems.
That’s one way they won over us and got us to do whatever they wanted. They are experts at gaining people’s trust and then they take advantage of that fact. Through these scripted and planned events they were able to warp our realities to the point where we were already robotic slaves right off the bat. We certainly were eager to earn their approval and work our way to a position where we were seen as valuable members of the project.
One of these planned events was Kukui’s birthday, which was just a few days after we got there. Kukui was a groundskeeper who had previously lived in Hawaii and was joked as being a ginger Jesus. He was an incredible person who really cared about the Earth. I have no idea if he was part of the manipulation or if he was there on similar beliefs that this was a group doing immense good in the world.
Early on during the night’s preparation, Dakota and Lila walked up to us and asked if we wanted to go out to eat with them. This struck us as odd that they would abandon Kukui on his birthday, but we didn’t see it as too weird at the time. We struck up a conversation, where it was revealed that Dakota had two EBT cards from different states.
One big hook they sunk into us was the idea that it was us versus the government. They managed to convince us that the institutions of the world were parasitic - which they usually are - but did it in such a way that made us feel like we were in a spiritual war against the bad boogie men of the world. And they managed this by gradually exposing us to more and more deliberate acts of defiance, in order to manifest our own sovereignty against the parasitic government.
It’s what led to us accepting some of their more diabolic schemes. For instance, there was talk about building a village in Ava, Missouri, moving all their people in, and then taking over the mayorship. They chose Missouri for this plan due to the different building codes of the state. In the moment, this seemed like a brilliant plan for expanding the influence of Earth Nation, but in hindsight appears to be a dystopian means to increase their power and continue taking advantage of people.
These were little seeds they planted that made us more comfortable with doing certain things that we otherwise wouldn’t. Awen was particularly uncomfortable with many of the things we did, but eventually they did get her to help out with their schemes. By keeping us under fear and gradually conditioning us, they were able to make us obedient as we were always looking out for our immediate survival.
Fear. That is an emotion I am now excessively familiar with as a result of this cult. While I have battled paranoia all my life, they took those primal emotions and twisted them to the point that I had no idea which way was up. Each day gradually became a battle while being on high alert, as I constantly scrambled to overcome whatever artificial set-backs were planted in my way and keep up with the workload that was presented to me.
My first exposure to this form of emotional manipulation came during Halloween. The night began jovially as Doran wore a plastic bag as a costume and invented a new dance that we all participated in. Daniella was preparing a large meal in the kitchen while we helped and played in rhythm to one another. The dinner we shared was only part of the night’s events that would change my life completely.
After dinner, Awen and I went back to our room and talked about what we wanted to do that night. The rest of the group was still down at the dining hall and preparing for a fun night of festivities. Awen was not opposed to me going, but she was and still is a pagan and wanted to celebrate her ancestors as per the tradition of Samhain. I debated spending the night with her, but the opportunity to spend time with these new people in our life made me curious as to what they would be doing. I will also admit that I was much more controlled by my addictive nature and was excited to drink with them.
So down I went. As I entered the dining hall, I saw that they were drinking tequila and generally having a great time. Naturally, I joined in and took a shot. Jovial times were had, and some time later I was offered another shot, but I did not see them pour this one. This turned out to be a crucial mistake on my part as I would find out that there was something else, something with psychedelic qualities, in the drink. It was not LSD, as I am familiar with the effects of that drug, so I am at a loss for what it could have been.
As the night went on I began to feel funny. It wasn’t until we were in a smoke circle that I began to notice something was wrong. I had trouble forming words and when Grizzly asked me a question all I could muster was a “hi!” This tripped me up and I went inside to go sit down.
This is where my memory starts to get fuzzy. I was mostly left alone as I sat cross-legged on a mat on the floor, but eventually there were three other people sitting around me, with a bottle placed in the center of us. I remember Prism and Josh, a carpenter who was doing some work on the buildings at Triangle Lake, were two of the people surrounding me, but I don’t remember any of the conversation they were having. I just remember getting really spooked at that time and tried to leave.
I don’t know how long it took me to get back to Awen, but I do remember the headlights of a vehicle coming down the hill as I was going up. It was late by the time I made it back in into Carmen Hall, which suggests that I have no memory of what happened after the apparent spin-the-bottle episode. My memory starts to get better as I remember lying there with Awen trying to articulate what was going on, but my words just spiraled into incomprehensible nonsense. She was worried for me, just as I was worried for myself.
The next morning continued on as if nothing ever happened, but I was emotionally jostled for the next few days. Nothing was ever said about what happened the night before, and a part of me was terrified that something happened Because my mother had AIDS, and that is a terror I still battle to this day, I obsessed over the idea that Prism, who was HIV positive, may have done something with me. I’ve since been tested and everything’s fine, but for a while I was terrified that I was raped.
Was that a rational or irrational fear? I’ll never know. What I do know is that they took advantage of my perturbed state by subtly twisting the knife in the following days with their synchronous set-ups, making me feel guilty that I did not choose to spend time with Awen that night, and thus making me work harder than ever before.
Chapter 4 in comments
submitted by Shrugbeternowthaneva to ShrugLifeSyndicate [link] [comments]

The Blackmail Email Scam (part 3)

THIS THREAD IS NOW ARCHIVED, THE LATEST THREAD CAN BE FOUND HERE: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

TEXT, PHONE CALL, AND PHYSICAL MAIL VARIANTS ARE COVERED IN THE LATEST THREAD.

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE

FIRST THREAD: https://www.reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://www.reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it
Good day,
If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you.
I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work.
Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it.
I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF)
So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts.
P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
I Have YOUR code. I rule phone xxxx
I SENT this newsletter from YOUR ACCOUNT.
I look your device.
I am in daze of your sex act fantasies!
I made backup your contacts and files. I made screenshots from your digital camera of yours device.
I want 888 $ to my (Bitcoin
My )Bitcoin currency
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts!
If you do not know how to do this - enter into Google/
=how to transfer money to a Bitcoin& wallet-
Time 30 hours.
This excellent post as Subway & Dairy Queen.
Hello!
I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it.
Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time.
Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account.
Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you.
You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit.
I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting!
So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site.
Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ...
I will not do this if you pay me a little amount. I think $877 is a nice price for it!
I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system.
My Trojan have auto alert, after this email is looked, I will be know it!
You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours)
Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data).
Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites!
I hope you will be prudent. Bye.
Same as before but they increased the amount
I got an order from someone to kill you and your family
but I am far from your house
if you still love your family, I ask you to transfer 0.1 BTC to me.
If you report this email, I will immediately kill your family.
FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION!
We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account.
After analyzing documents. We found Illegal activity - HIDING TAXES.
That we want?
I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
That we do if you don't pay bitcoin?
We send these Documents and Proofs to your Tax Department.
And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack
We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack
This is our guarantee, that you don't clean evidence and building a protection policy.
If you don't pay by in 7 days, attack will start.
Attack including.
1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament
Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack.
This is not a joke.
Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help.
Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
AND YOU WILL NEVER AGAIN HEAR FROM US!
If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom.
All mistakes in text we do specily.
Bitcoin is anonymous, nobody will ever know you cooperated.
Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material"
submitted by EugeneBYMCMB to Scams [link] [comments]

The Blackmail Email Scam (part 2)

THIS THREAD IS NOW ARCHIVED, THE LATEST THREAD CAN BE FOUND HERE: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

TEXT, PHONE CALL, AND PHYSICAL MAIL VARIANTS ARE COVERED IN THE LATEST THREAD.

PREVIOUS THREAD: https://www.reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it
Good day,
If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you.
I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work.
Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it.
I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF)
So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts.
P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
I Have YOUR code. I rule phone xxxx
I SENT this newsletter from YOUR ACCOUNT.
I look your device.
I am in daze of your sex act fantasies!
I made backup your contacts and files. I made screenshots from your digital camera of yours device.
I want 888 $ to my (Bitcoin
My )Bitcoin currency
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts!
If you do not know how to do this - enter into Google/
=how to transfer money to a Bitcoin& wallet-
Time 30 hours.
This excellent post as Subway & Dairy Queen.
Hello!
I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it.
Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time.
Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account.
Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you.
You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit.
I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting!
So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site.
Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ...
I will not do this if you pay me a little amount. I think $877 is a nice price for it!
I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system.
My Trojan have auto alert, after this email is looked, I will be know it!
You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours)
Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data).
Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites!
I hope you will be prudent. Bye.
Same as before but they increased the amount
I got an order from someone to kill you and your family
but I am far from your house
if you still love your family, I ask you to transfer 0.1 BTC to me.
If you report this email, I will immediately kill your family.
FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION!
We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account.
After analyzing documents. We found Illegal activity - HIDING TAXES.
That we want?
I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
That we do if you don't pay bitcoin?
We send these Documents and Proofs to your Tax Department.
And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack
We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack
This is our guarantee, that you don't clean evidence and building a protection policy.
If you don't pay by in 7 days, attack will start.
Attack including.
1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament
Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack.
This is not a joke.
Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help.
Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
AND YOU WILL NEVER AGAIN HEAR FROM US!
If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom.
All mistakes in text we do specily.
Bitcoin is anonymous, nobody will ever know you cooperated.
Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p , software on the adult, porno sitio, one of your pass word, .br , specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching", "For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss", "Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video , with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT , if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy, , and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts
submitted by EugeneBYMCMB to Scams [link] [comments]

Was du über Block/Blockchain und Difficulty/Schwierigkeitsgrad wissen musst What Is Bitcoin Mining Difficulty? - YouTube BITCOIN MINING DIFFICULTY EXPLAINED IN 10 MINUTES! Bitcoin Mining Difficulty Changes Every 2 Weeks ... BITCOIN DIFFICULTY ALL-TIME HIGH ERREICHT - YouTube

Live Bitcoin/Litecoin/Ethereum price charts with EMA, MACD and other indicators BitcoinWisdom Bitcoin Wisdom, Difficulty hashrate chart. BitcoinWisdom Blockchain, BitcoinWisdom Data, BitcoinWisdom Introduction, BitcoinWisdom Profile ... The Bitcoin network varies its difficulty levels after the discovery of every 2016 blocks to ensure a constant output. If the network hash rate is high and the time taken to discover a new block is less than 10 minutes, then the network will increase the difficulty level proportionately to increase the block discovery time. The Bitcoin difficulty chart provides the current Bitcoin difficulty (BTC diff) target as well as a historical data graph visualizing Bitcoin mining difficulty chart values with BTC difficulty adjustments (both increases and decreases) defaulted to today with timeline options of 1 day, 1 week, 1 month, 3 months, 6 months, 1 year, 3 years, and all time The difficulty. Green line The estimated next difficulty. Blue line Average block generation time of 2016 blocks. Block generation time is also known as confirmation time. Grey line Average block generation time of 1008 blocks. If grey line less than blue line, The generation time is decreasing.

[index] [12159] [23214] [34535] [28962] [11800] [46304] [45738] [11766] [19012] [27890]

Was du über Block/Blockchain und Difficulty/Schwierigkeitsgrad wissen musst

Bitcoin basics: What is the difficulty target and how does it adjust itself? - Duration: 7:12. Keifer Kif 4,486 views. 7:12. What is Crypto Mining Difficulty and How it Impacts YOUR Profits ... Why does Bitcoin have a "difficulty" and what does this difficulty represent? How is this number calculated and why is it important? In this video, shot in the Wynwood art district of Miami, I ... A non-geeky explanation of what bitcoin mining difficulty is. This also shows how to keep your bitcoin take from diminishing over time. Bitcoin Mining Difficulty. What is it? We all have heard about it. But, do we actually know what it is and how it works? We take a look at the history of Bit... Bitcoin so sicher wie nie verwahren - https://amzn.to/2JVWhkD Das Must-have für alle Bitcoin Fans - https://amzn.to/2ZfQRbp -----Mehr interessa...

#