INVESTIGATION OF MONEY LAUNDERING METHODS THROUGH

FANTASY COIN

FANTASY COIN

https://preview.redd.it/7dsnu9fyg6e21.png?width=560&format=png&auto=webp&s=0f402fc6b0f0f253b3626fc570de373d855c0fc7

INTRODUCTION

Cryptocurrency is essentially digital money traded from one person to another through the use of pseudonyms. There are no intermediaries like banks, no governmental oversight or authority, and no fees. The “crypto” in cryptocurrency refers to the use of cryptography to ensure the security and privacy of every transaction.
New coins are created through a technique called mining. The process requires powerful computers that solve complex math problems. Each problem should take about 10 minutes to solve, and results in the creation of a predetermined number of coins. The total number of coins that can be created is fixed — there’s a limit of 21 million bitcoins that can be created. The number of coins rewarded for solving each problem dwindles as time goes on.
Bitcoin is believed to have been created in 2009 by Satoshi Nakamoto, an enigmatic figure who has so far proven all but impossible to definitively identify. By using cryptography to control the creation and tracking of a digital currency, Nakamoto took that power away from central authorities like governments.
Bitcoin was the first and most famous digital currency, but you can choose from more than 1,500, including ether, litecoin and even cryptokitties. For awhile, you saw these currencies only in the darkest corners of the internet, where people used them for all sorts of questionable, even illegal, activities. Drug dealers liked them because they made transactions all but invisible, and trolls at the Kremlin-backed Internet Research Agency used bitcoin to finance their campaign to influence the 2016 election.
That started to change in 2014, when Overstock became the first major US retailer to accept bitcoin. Companies like Expedia and Microsoft followed suit.
One of the biggest misconceptions about cryptocurrencies is that you need thousands of dollars to invest. It’s an easy assumption to make, especially in the case of bitcoin, which stayed under $1,000 from about 2010 to 2017. But then it took off, surpassing thousand-dollar milestones at a pace that seemed quicker than you could refresh your phone.
The staggering value is off-putting to many. But unlike most stocks, you can buy a fraction of a bitcoin so you don’t need thousands to get into the crypto game.
As more technological advancements are uncovered, FXXX was created to disrupt issues of monetization faced by virtual reality, #fxxxcoin holders can enjoy contents posted other users in virtual reality and in return incentivize owners with FXXX.

OVERVIEW
FANTASY is a platform that allows users buy a virtual real estate inside a functional red light district (virtual reality), this invention was created to give users that exciting feeling they always dream of inside their minds. The thing is they need to have enough #fxxx coins to explore every theme, street & window on the platform else their access will be denied.


https://preview.redd.it/egwod8w4h6e21.png?width=624&format=png&auto=webp&s=54a380044e498e6092a860fe6d3b15baac52e6f5
#fantasy is backed by its own digital asset broken into 19 different themed sectors, users can pick fantasies best suitable for them and imagine themselves inside of them. They can step out of the red light window and become stars they’ve always dreamed to be. The more #fxxx coins owned the more exploration on this unique virtual reality escapade.
THE LIST OF EROTIC DREAMS OFFERED BY FANTASY
  1. Riot Kitty - Central Hub
  2. Dude Sweet - Beach Boys
  3. Booty Sector - Hip hop and Booty
  4. Disci Plinarian - Fetish
  5. Snowbirds - Snow Time
  6. City Boys - Suits and Stubble
  7. Bad Boys - Always in Trouble
  8. DJ - Shag an Idol
  9. Lovers Guide - How To!
  10. Sex Toys - Use it on me!
  11. Toy Boys - All male review
  12. Silicon Alley - I have Boobs Now
  13. Strut - Rock Stars Can Walk On Me
  14. Cherry Bomb - Gay District
  15. Femme - Girls Only
  16. Soi Cowgirl (Colony on Mars Moon)
  17. Shinjuku (Colony Mars Moon) - Anime
  18. Fast Car - Take Me For a Ride
  19. Voyeurs - I like to be watched
with each sector delivering its own type of erotic imaginations. Everyone is invited to step in and experience those desires they’ve been longing for letting go of whatever they’re going through. Viewers can receive #fxxx as an incentive for watching sexual content made available by brands.

FANTASY COIN (FXXX) & WALLET USE CASES

FXXX is the acronym of FANTASY COIN, and it will be the standard cryptocurrency used for making payments for services rendered on FXXX Network, after Initial Coin Offering no FXXX coin will ever be created, minted or mined. FXXX will fuel the development of the network and also provide fast, secure, transparent, efficient transactions on the network.
FXXX was created to disrupt issues of monetization faced by virtual reality, #fxxxcoin holders can enjoy contents posted other users in virtual reality and in return incentivize owners with FXXX. Frequent users of the platform will be able to earn enough for themselves and they will have unrestricted access to premium subscriptions.
FXXX wallet was integrated with the blockchain technology, #fxxx wallet has the functionality to power real-life merchandise purchase. Users can access the platform without the need to purchase ethereum first that is to say both masters of the blockchain technology have a chance. Tokens can exchange tokens smoothly with its decentralized exchange technology.

COIN ECONOMICS

COIN NAME: FANTASY COIN
TICKER: FXXX
NETWORK: ERC-20 COMPATIBLE
TOTAL SUPPLY: 5 BILLION FXXX
PRICE: $0.10c
HARD CAP: 10 MILLION USD

TOKEN ALLOCATION

ADVISORY BOARD: 5%
TEAM: 15%
CONTRACTORS: 10%
USER GROWTH POOL: 10%
CROWDSALE DISTRIBUTION: 60%

FUNDS DISTRIBUTION

CONTIGENCY: 5%
ADMINISTRATON: 10%
CONTRACTORS: 15%
CONTENT ACQUISITION: 20%
MARKETING: 20%
AVR PLATFORM: 30%
FOR MORE INFORMATION AND INVESTOR RESOURCE:

Website: https://www.fxxx.io/?utm_source=Bounty0x

Whitepaper: https://static1.squarespace.com/static/5b18b3bda2772ce12cb7d821/t/5b763ae56d2a730418610371/1534475009281/FANTASY+FXXX+White+Paper.pdf
Facebook: https://fb.me/FXXXcoin
Telegram: https://t.me/FXXXCoin
Linkedin: https://linkedin.com/company/fxxxcoin
Twitter: https://twitter.com/FXXXcoin

PUBLISHER

Bounty0x Username: idrixoxo
submitted by idrixoxo2015 to u/idrixoxo2015 [link] [comments]

Reasons to believe Julian Assange is in CIA custody and WikiLeaks under duress.

UPDATE (11/01/2017 - UK Date Format): Julian Assange is alive and still in the Embassy. He confirms WikiLeaks has not been compromised. Julian took questions from the Reddit AmA but answered them via live, current and interactive video. He did this very intentionally, and by so doing, was true to his word. Watch a recording of the live event here:
https://www.youtube.com/watch?v=rC2EjKYMCeg
On the 26th of September 2016 Secretary of State John Kerry (self admitted Skull and Bones member) visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial.
For over four years, the Ecuadorian embassy has been under surveillance and Julian's human rights violated as he has been unlawfully detained termed "illegal arbitrary detention" by a recent UN ruling. During that time, it has been possible for intelligence agencies to gather critical information and build a detailed profile and plan to circumvent Julian's dead man's switch.
Both John Kerry and US intelligence agencies know perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that are damaging to Hillary's campaign. It has been very clear for a long time that many US officials wanted Julian Assange dead, Hillary Clinton even has remarked, "can't we just drone the guy".
The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they know that media organisations already have the entire leaked email database and a schedule for release, they also know WikiLeaks staff would continue to leak regardless of Julian's ability to communicate.
Removing Assange would not be enough, they would need to circumvent his dead man's switch and then tarnish WikiLeaks reputation. Removing Assange's internet could have the effect of causing Assange to take steps that can be followed to prevent the automatic triggering of his DMS.
From the day Julian's internet was cut off, a series of peculiar and uncharacteristic events started to take place. The same day that Julian's internet was cut off, CBS reported that Pamela Anderson visited Assange and had "Tortured" him with a vegan sandwich. A few days before on the 14th, John Podesta tweeted "I bet the lobster risotto is better than the food at the Ecuadorian Embassy". Then on October the 16th the SHA-256 prerelease keys were issued on WikiLeaks twitter feed, although these events are odd and seemingly inconsequential, combined with John Kerry being in the UK from the 16th to the 17th sparked concern among the community for Julian's safety.
Assange supporters started to gather at the embassy to keep Assange safe and witness any foul play, some of these witnesses have claimed that a very swift police armed raid took place that lasted only 5 minutes while the crowd was kept under control and prevented from approaching, there have also been reports that they were prevented from taking photographs and that their phones were confiscated. A live periscope feed was also cut off. There have also been some reports of the presence of a mobile jamming van.
If Assange has been seized, any recognition by mainstream media would be detrimental to Hillary's campaign. A covert operation with media blackout would be the only effective way of seizing him at this time. On October the 18th Fox News said that Julian Assange would be "arrested soon, maybe in a matter of hours.". The was video was then promptly removed and articles relating to it have disappeared. However, one reddit user was able to find an alternative source and now the video can be found again on YouTube.
Although Julian's primary DMS (the release of insurance file encryption keys) did not activate, on October the 18th one of Julian's contingencies did activate, a script was activated that made https://file.wikileaks.org/file publicly visible and set all the file date and time stamps to 01/01/1984 (Orwell reference). This file repository contains many documents that had not been released prior.
Staffers Kristinn Hrafnsson and Sarah Harrison, have gone silent while the Ecuadorian embassy is refusing to provide any updates on Assange’s fate. There is a recorded call made to the embassy by a journalist where the receptionist refused to confirm that Julian was at the embassy, she also refused to confirm that Julian was even alive. Julian has not made an appearance at the window of the embassy since being cut off.
WikiLeaks suggested in a tweet that its supporters were responsible for the DDOS attacks on the 21st. Neither Assange or WikiLeaks would ever insinuate such a thing. WikiLeaks deceptively tweeted a video of Michael Moore that was actually recorded in June. The video was posted on the 24th of October giving the impression that Michael Moore had been speaking with Assange in the embassy. Why would WikiLeaks do this when they know they are already under suspicion?
WikiLeaks have been using their Twitter account to give the appearance of his safety while providing no concrete evidence of his safety. They issued a poll asking what proof would satisfy the public that Julian was safe. WikiLeaks have yet to follow up on the conclusive result of a video or window appearance.
Julian Assange is known for his attention to detail and his consistently good spelling and grammar. Currently the twitter feed has very poor spelling, there are numerous uncharacteristic spelling errors, for example, an accomplished cryptographer knows how to correctly spell algorithm and so do WikiLeaks staff.
On the 21st of October, there was a massive widespread DDOS attack that disrupted US and EU internet. Also on the 21st of October London City Airport was evacuated. The next day (the 22nd), Gavin MacFayden is reported dead. WikiLeaks made a further blunder by stating his death as the 23rd.
There has been a number of high level WikiLeaks deaths recently too. John Jones QC - WikiLeaks U.N. lawyer died on April 16th 2016. Michael Ratner - WikiLeaks chief counsel died on May 11th 2016. Seth Rich - Employee of the Democratic National Committee (DNC) was fatally shot on July 10th 2016 and Gavin MacFadyen - WikiLeaks director died October 22nd 2016.
If WikiLeaks has been compromised, it is already preparing the scene for future discrepancy to seriously tarnish WikiLeaks reputation. Nothing WikiLeaks has shared since the 15th of October 2016 should be trusted until Julian has been fully verified as alive.
My speculative fears are that Julian has been seized and removed from the Embassy. His internet being cut not being related to the release of the emails, but rather as a component of a plan of 4 years in the making to as secretly as possible remove Assange from the embassy, circumvent his DMS and hijack WikiLeaks with the key team members silenced or under duress.
My fears would be confirmed by no future public (mass witnessing and recorded/televised) appearance of Julian Assange discussing recent topics. His death by whatever means after the US presidential election would be extremely suspect. Until proof of life, assume the following compromised:
SHA-256 verification Keys posted after the 15th. WikiLeaks submission process and/or platform. WikiLeaks twitter feed. Any WikiLeaks leaks after the 15th October 2016.
EDIT: (01/11/2016 - 17:18GMT) URL and spelling corrections.
EDIT: Update 16/12/2016
Why demanding proof that WikiLeaks is not compromised is necessary:
https://www.facebook.com/events/309760466089922/ (PoL Event @ Ecuadorian Embassy London 17th December 2016) – If you live in the UK please come and let’s get REAL PoL. Please circulate.
1) Still no PGP (GPG) signed short message from WikiLeaks. 2) RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account) 3) Julian’s internet hasn’t been restored as promised 4) The pre-commitment file hashes released in October do not match the released insurance files 5) Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning. No one actually saw Julian through the whole process.
Additional points:
-UK disregard for international law -Capabilities of combined intelligence agencies -WikiLeaks down on October 17th -Mass censorship -WikiLeaks reposting old stuff -See timelines below
Various timelines, some with minor errors: https://www.reddit.com/WikileaksTimeline/wiki/index https://www.reddit.com/WhereIsAssange/comments/5dmr57/timeline_of_events_regarding_julian_assange_and/ https://regated.com/2016/11/julian-assange-missing/
[Still no PGP (GPG) signed short message from WikiLeaks] Watch this https://youtu.be/GSIDS_lvRv4 video for a simple and good explanation of public/private key cryptography. Here https://riseup.net/en/canary is an example of how a legitimate cryptographically capable organisation uses PGP to sign a message and prove authenticity. WikiLeaks has this setup too. Why do they not use it and prove they are not compromised?
WikiLeaks could easily do this. They have their private key. The public has WikiLeaks public key. Even if Julian isn’t in possession of the key, WL most certainly is, no excuse for WL not to prove themselves. This has been heavily requested of WikiLeaks. I’d like to hear from the individuals who claim that their requests were removed (please leave comments). Of all the red flags, not posting a PGP signed message is by far the most damming. If we are to believe that the person in the audio recording at the FCM 2016 is Julian Assange, then what he says about the keys is missing the point. If he himself is not in possession of the key, then WikiLeaks will be. If WikiLeaks use the key to prove themselves, then we know they are not compromised. By extension, we will also be assured that Julian is safe as an uncompromised WikiLeaks would be in a position to confirm his safety and be believed. This audio file includes everything that he says regarding PGP keys: http://picosong.com/UyVw/ (I am not convinced this is Julian).
[RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account)] RiseUp is an activist ISP providing secure services to activists. Its mission is to support liberatory social change via fighting social control and mass surveillance through distribution of secure tools (https://en.wikipedia.org/wiki/Riseup). RiseUp use a warrant canary as a means to protect their users in case RiseUp are ever issued with a NSL or gag order etc (https://riseup.net/en/canary). This is renewed quarterly, assuming no warrant has been issued. However, this is now considerably overdue so the assumption is that the canary is dead, and just like the canaries used in coal mines, everyone should get the hell out of there when it dies. https://theintercept.com/2016/11/29/something-happened-to-activist-email-provider-riseup-but-it-hasnt-been-compromised/. I would be grateful if someone could provide a source for the WikiLeaks twitter email account being hosted by RiseUp.
[Julian’s internet hasn’t been restored as promised] https://twitter.com/wikileaks/status/787889195507417088 https://twitter.com/wikileaks/status/788099178832420865 On the 26th of September 2016 Secretary of State John Kerry visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian Embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial.
Both John Kerry and US intelligence agencies knew perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that were damaging to Hillary's campaign. The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they knew that media organisations already have the entire leaked email database and a schedule for release, they also knew WikiLeaks staff would continue to leak regardless of Julian's ability to communicate.
Now it is long after the election and Ecuador have still not restored Julian’s internet. Ecuador have no grounds to continue to restrict Julian’s internet. It does nothing apart from increase tensions and raise suspicion. Ecuador have always been supportive of Julian. However, after John Kerry applied pressure on Ecuador, that whole dynamic changed. Ecuador cut Julian's Internet. He then essentially threatened Ecuador, the UK and John Kerry by submitting those pre-commitment file hashes on Twitter. Since then we have only seen hostility towards Julian from all three parties. Ecuador didn't restore his internet and didn't let his lawyer interview him and no one actually saw him. The U.K. Denied him access to Gavin's funeral and denied him access to medical treatment. The UK also continually disregard the UN. The dynamic now is totally different. He has no political friends. It seems that both the UK and Ecuador are now working against Julian and Wikileaks. An environment where a collaborated siege would be feasible.
Finally, many have speculated about mobile signals being blocked at the Embassy. I can confirm that there is 4G signal right outside the Embassy door. I was there, with my phone, and tested it. There is no reason to think Julian cannot use a MiFi device (or similar) connected to a cellular network.
[The pre-commitment file hashes released in October do not match the released insurance files] Here are the October tweets with the file hashes:
https://twitter.com/wikileaks/status/787777344740163584 https://twitter.com/wikileaks/status/787781046519693316 https://twitter.com/wikileaks/status/787781519951720449
These 3 pre-commitment Twitter posts are SHA-256 file hashes. SHA-256 file hashes are 64 characters long. They are not encryption keys for insurance files. They simply are a mathematical formula for verifying that later released files are genuine and have not been altered.
These hashes were released because Julian felt threatened and in increased danger. They specifically targeted the UK FCO, Ecuador and John Kerry. All of whom are key players in his current predicament. On November 7th, WikiLeaks released 3 new insurance files. These files names match the names given in the pre-commitment hash tweets:
2016-11-07_WL-Insurance_EC.aes256 2016-11-07_WL-Insurance_UK.aes256 2016-11-07_WL-Insurance_US.aes256
EC = Ecuador, UK = UK FCO, US = John Kerry. Soon after these files were released, the 3 files hashes were compared to the 3 hashes posted on the 16th of October. They did not match. When this was brought to WikiLeaks attention, WikiLeaks released the following statement in a tweet: https://twitter.com/wikileaks/status/798997378552299521
“NOTE: When we release pre-commitment hashes they are for decrypted files (obviously). Mr. Assange appreciates the concern.”
This firstly proved that the hashes and the insurance files were related (a fact that was already clear). Secondly, it was a lie, as it implied historical use of pre-commitment hashes in this manner. Thirdly, the (obviously) comment was also a deception and an insult to supporters. It was not obvious to anyone, not even to our crypto guys in /cryptography/, on the contrary, they thought it highly suspicious. Additionally, what they suggest would be absolutely pointless. Pointless as a threat, as the UK, Ecuador and John Kerry would have no practical way of identifying the documents to confirm the threat. There's absolutely no scenario where an uncompromised WikiLeaks would either post bad file hashes or altered insurance files.
[Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning] This is highly unusual and very suspicious. Also, Jennifer Robinson was not in the room with Assange. https://www.youtube.com/watch?v=MYR0Pw9LfUQ&feature=youtu.be&t=9m55s and neither was the chief prosecutor http://www.bbc.co.uk/news/world-europe-37972528 “Swedish chief prosecutor Ingrid Isgren will not speak to Mr Assange directly”.
[UK disregard for international law] The UK threat is very real. Back in August 2012 the UK was poised to break international law citing the Diplomatic and Consular Premises Act of 1987 as a basis for entering the Embassy and arresting Assange (http://www.bbc.co.uk/news/world-19259623). It all became very public, very quickly and fortunately never happened (http://www.telegraph.co.uk/news/worldnews/southamerica/ecuado9488996/Ecuadors-president-raiding-embassy-to-snatch-Julian-Assange-suicidal.html). I expressed my concern at the time that the UK shouldn’t have even been contemplating such action, let alone threatening it in writing to Ecuador. More recently, the UK disregarded the UN ruling that Julian Assange was being arbitrarily detained (https://www.theguardian.com/media/2016/feb/04/julian-assange-wikileaks-arrest-friday-un-investigation). The UK appealed, and then finally lost their appeal in November (https://www.rt.com/news/368746-un-ruling-free-assange/). Julian has also been refused to leave the Embassy with a police escort for medical treatment as well as denied to attend Gavin MacFadyen’s funeral. The UK’s behaviour is appalling and clearly has no respect for international law. The reported raid on the Embassy during the latter part of October seems more plausible when taken in the context of past behavior.
This is the Britain I now live in: http://www.independent.co.uk/life-style/gadgets-and-tech/news/investigatory-powers-bill-act-snoopers-charter-browsing-history-what-does-it-mean-a7436251.html. I never used to be ashamed to be British.
[Combined capabilities of intelligence agencies] We know much about the combined powers of the intelligence agencies. We know what they are capable of, thanks to the leaks of Edward Snowden. The combined powers of the NSA, CIA and the UK’s GCHQ are capable of pulling off such a massive takeover of Wikileaks. We know the NSA works with other US intelligence agencies, we know that the NSA works with GCHQ.
We know about Tempora, we know about JTRIG, we know about PRISM, we know about HAVOK. We know that websites can be altered on the fly, we know that real-time voice profiling is trivial for these agencies. We know that censorship is happening.
https://usnewsghost.wordpress.com/2014/07/15/new-july-14-edward-snowden-nsa-leaks-gchq-attacks-and-censors-internet-nsa-leaks-recent/ http://www.independent.co.uk/life-style/gadgets-and-tech/gchqs-favourite-memes-and-sexual-slang-reveals-a-shared-culture-with-trolls-and-hackers-9608065.html https://en.wikipedia.org/wiki/Tempora https://en.wikipedia.org/wiki/PRISM_(surveillance_program)
The NSA has a remit to be 10 years ahead of the curve. We have commercial products that can be purchased off the shelf today that can easily manipulate audio and video. Just imagine what the NSA and the military are capable of.
Real time facial manipulation: https://www.youtube.com/watch?v=ohmajJTcpNk Signs of editing: https://www.youtube.com/watch?v=2O9t_TEE1aw. Both Julian Assange and John Pilger are not filmed together at any time during the interview. There is also no establishing shot. It is also claimed that Assange’s audio is spliced and edited. No recent events mentioned by Assange, only Pilger. Unfortunately, this interview is not sufficient proof of life.
What the NSA can’t do, is that they cannot break PGP encryption. This has been expressed by Glenn Greenwald who was one of the journalists that Edward Snowden leaked to. He commented that he knows how secure PGP is because the NSA keep moaning about not being able to crack it in their documents he is reading. This is another reason why a signed PGP message can be the only true proof that WL isn’t compromised. Mathematics cannot lie, people can and do. A compromised WL can’t sign a message without the private key. Edward Snowden revealed that in 2013 the NSA were capable of 3 trillion password attempts per second. As it is now almost 2017, that number will likely be multiple times higher (anywhere between 9 to 15 trillion attempts per second would be my guess based on Moore’s law).
https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group https://en.wikipedia.org/wiki/Tempora https://en.wikipedia.org/wiki/PRISM_(surveillance_program) https://www.schneier.com/gchq-catalog/ https://en.wikipedia.org/wiki/Government_Communications_Headquarters
[WikiLeaks down on October 17th] The alleged raid on the Embassy supposedly took place on the 17th just after 1am GMT. On Monday the 17th of October 2016 WikiLeaks website was reported down (http://www.isitdownrightnow.com/wikileaks.org.html expand the comments) https://postimg.org/image/6t68fe4kj/. The internet was alive with reports of mass censorship around this time. This all coincides with when the alleged WikiLeaks takeover occurred. It also coincides with John Kerry being in the UK.
[Christine Assange audio only radio interview] Julian's family had their identities changed quite a few years ago after receiving death threats. It is odd that his mother has now revealed herself to a news agency. If you do a YouTube search for Christine Assange (her original name), you'll find all the videos are older than 3 years. She's in hiding, not openly talking on radio shows (https://en.wikipedia.org/wiki/Julian_Assange scroll down to the personal life section).
[WikiLeaks bitcoin account was emptied on the 18th of November] Interestingly it was after the bitcoin account was emptied that the encoded message in the blockchain was left. Why would WikiLeaks go to all that trouble when they could just sign a message with their PGP key? Is it because bitcoin accounts can be cracked and the PGP keys can’t?
[Mass censorship] Facebook is censoring this event (https://www.facebook.com/events/309760466089922/). It has been advertised for weeks now any only a handful of people are attending. Recently Wikileaks was live on FB. 50% of the viewers (roughly 2.5k) were commenting #PoL, #Whereisassange, RIP etc. The live event was only a prerecorded video being played in loop. Once it concluded, the whole Live event along with all the comments including the comments asking for PoL and PGP signed message were deleted. It was as if it never took place. When Julian’s DMS had supposedly been activated, I saw posts in threads being deleted within minutes. Supposedly with encryption keys, but it all happened too fast for anyone to collate. I took PDF printouts of the pages and then later noticed that posts and entire links were taken down. I have PDF's of pages that now no longer exist. I've been following this since mid-October and seen the censorship first hand. I know many people here on reddit witnessed the same (please comment with your experiences).
[WikiLeaks reposting old stuff] There are many examples of this already mentioned in the timelines. One for example is the Palantir Technologies report. Palantir Technologies prepared a report on how to destroy WikiLeaks that was leaked in 2011. The proposal was submitted to Bank of America through its outside law firm, Hunton & Williams. Palantir later apologised for their involvement. But WikiLeaks has recently regurgitated it as if it was new. There are many examples of this. I have watched as WikiLeaks have increasingly destroyed their credibility.
submitted by neonnexus to conspiracy [link] [comments]

DFINITY (DFN)

ICO Verdict

Difinity is a global 'blockchain computer', infinitely scalable with unlimited capacity. Dfinity is a true blockchain 3.0 project with crypto:3 and cloud:3 implementations, revolutionizing and disrupting traditional cloud hosting solutions. Dfinity is Ethereum compatible, DAPPs from Ethereum can easily be ported to the network with significant performance gains and scalability. Dfinity project has been in development for over 3 years, with top researchers and scientists from the blockchain and cryptography fields. If cryptocurrency bubble ever pops, of the few survivors left, Dfinity will definitely be one of them.
Reason to invest:
Hype Rate: Medium
Risk Rate: Very Low
ROI Rate: High
Potential Growth: Very High
Overall Rating: Very High

ICO Information

Public Fundraise (presale round)

Date: Soon (Team announced whitelisting within a few weeks, a few weeks ago)
Ticker: DFN
Token type: Native DFN
ICO Token Price: TBA
Fundraising Goal: TBA
Total Tokens: TBA
Available for Token Sale: TBA
Whitelist: TBA
Know Your Customer (KYC): YES. (Including AML)
Bonus for the First: NO
Min/Max Personal Cap: TBA
Token Issue: TBA
Accepts: TBA

Funding History

**A clearer break down was explained by a Dfinity team member in this thread
Q: The 7th Feb announcement says $100m raised in private funding, but email update says $61m - can anyone enlighten?
Sure, so the project funding is as follows: $4MM raised in the Seed Round in February 2017. After expenses and appreciation, this is roughly $40MM, held by DFINITY Stiftung. In the Strategic Round, which began in July of 2017, $21MM was raised. This is also held by the Stiftung, bringing total funding to ~$61MM As part of the Strategic Round, Polychain Capital spun up an ecosystem fund to help projects migrate to DFINITY and build new businesses on the platform. This is entirely under their management and totals $40MM.
All together this brings funding to ~$101MM. It's been reported in a number of confusing ways, but that is the actual break down.
The Seed Round was in the model of an ICO but it occurred before the actual ICO boom. Just under 25% of the network was distributed.
Fall 2016
A not-for-profit Swiss foundation is created
Feb 2017
Distributed "Seed" fundarise using Ethereum technology (~250 people, 25% token distributed)
2017-2018
Strategic fundraising round led by Andreessen Horowitz and Polychain ($61m total, $21m go toward development, $40m to Dfinity Ecosystem Venture Fund)
Feb 2018
With the Dfinity Ecosystem Venture Fund, the project has raised $101m in funding
2018
Presale round, involves contributors who can pass stringent KYC and AML, with some possible geographical restrictions
2018
The second round, may or may not happen and will be termed the "ICO"
*The team's honest approach in fundraising is quite a rare breed in today's ICO standards, their philosophy behind fundraising The DFINITY Main Round: Preconditions & Our “Don’t be Evil” Rules which gained applauses from the likes of Vitalik Buterin.

Full Review

At a Glance

Difinity is a single 'internet computer', infinitely scalable with unlimited capacity. Dfinity is crypto:3, enabling a global blockchain computer utilizing Threshold Relay chain, generating incorruptible, unmanipulable and unpredictable randomness. Threshold Relay chain addresses key attacks and vulnerabilities such as 'selfish mining' and 'nothing at stake' found in traditional PoW and PoS consensus. Dfinity is cloud:3, allowing business applications running on this computer performant with unlimited capacity, reducing human capital required in traditional IT systems, effectively cutting cost down by 90%. Dfinity introduces a new governance model, a novel decentralized decision-making system called "Blockchain Nervous System (BNS). This new design paradigm embraces "The AI is Law" (as opposed to "The Code is Law"), combing crowd wisdom and traditional AI technologies to prevent malicious smart contracts and hacks.
Dfinity was built as a complementary network to Ethereum, compatible for all DAPPs deployed on the Ethereum network, making migration easy with 50x performance improvement and unlimited capacity. Difinity is in fact often described as "Ethereum's crazy sister".

Project Timeline Overview

Jan 2014 - Pebble Project
CC for micropayments with custom BFT consensus algorithm
Jan 2015 - Dfinity Project
Infinite blockchain computer with the new idea: apply randomness (Threshold Relay Chain)
July 2016 - Dfinity Stiftung
Zug based foundation, an incubation by String Labs for organizational build-outs
Feb 2017 - Seed Fundrasing
$10 new funds for R&D
Aug 2017 - Main fundrasing (delayed until announcement)
Estimated 20M CHF cap

Crypto:3

Dfinity was formed to research ways of enabling public decentralized networks to host a virtual computer of unlimited capacity, secure, speedy, and scalable. The core approach involves adding a top-level Threshold Relay Chain that produces randomness and progresses with minimal reorganizations of the blockchain. Threshold Relay Chain creates incorruptible, unmanipulable, unpredictable randomness for a deterministic chain of randomness, unforkable and robust. At current state, Dfinity reaches block finality in about 5 seconds with 2 confirmations and low variance. Putting numbers into perspective, Bitcoin requires 6 confirmations, 60 minute finality and very high variance. Ethereum under current PoW design and network congestion, takes about 37 minutes at a finality time of 10 minutes with high variance.
Threshold Relay Chain's performance properties provide 'scale-up' gains, Dfinity further applies a three-level 'scale-out' architecture that addresses in order consensus, validation and storage, to handle unlimited computation.
Threshold Relay chain that creates a random heartbeat that drives a Validation Tree of Validation Towers in the validation layer, which does for validation what a Merkle tree does for data and provides almost infinitely scalable global validation. The random beacon also defines the organization of mining clients into storage (state) shards in the storage layer, which use their own Threshold Relay chains to quickly reach consensus on received transactions and resulting state transitions that are passed up to the validation layer. The top-level Threshold Relay consensus blockchain then records state roots provided by the Validation Tree that anchor all the storage in the network.
Dfinity is an intelligent decentralized cloud governed by the Blockchain Nervous System (BNS). The BNS has privileged access to the virtual machine to run special opcodes like freezing contracts, redistribute tokens or even run arbitrary code to reorganize the blockchain. This 'super user' can return funds and reverse the damage of hacks or programmatic errors, protecting users in case of vulnerabilities. The BNS also seamlessly upgrades the protocol on a regular basis, as opposed to disruptive 'hard forks', driving network evolution forward as quickly as possible.
Full reading on Threshold Relay Chain
The Dfinity Consensus White Paper
Full reading on Blockchain Nervous System
*Dfinity also plans to include privacy-preserving technology as seen in this tweet by Dominic

Cloud:3

Dfinity is an intelligent decentralized cloud governed by Blockchain Nervous System, recreating monopolistic traditional cloud hosting solutions such as Microsoft Azure or Amazon Web Services. The costs of owning enterprise IT systems are dominated by human capital, with redundant tasks such as configuring database, file distribution, backup/restore, load balancing, firewall configurations etc. While computing costs may be dramatically higher with Dfinity, actual cost of operation is estimated to be cut down by 90%.
Reimagine and reinvent enterprise IT, blockchains inhereit these properties making it possible
Autonomous : System without intermediaries
Verifiable : Know what code you execute
Tamperproof : No servers to meddle with
Simple : Distribution abstracted
Unstoppable : Open code and governance
Interoperability : No server boundaries
Dfinity is interoperable in that it takes a hybrid approach to private and public blockchains, users don't have hard choices to make. It is a similar design paradigm to the internet, where people have the http protocol as common meeting point while maintaining sensitive information within their local area network.
This design paradigm is emergent for the mass adoption for blockchains, there will be common services like identity validation readily availalble as a public service. There will also be more complex systems where users can simply adopt instead of rebuilding. You can have a private dfinity consortium or private instances with the ability to call into those public blockchain services, connecting these private chain instances using common blocks.
Let's further explore this with a real life example, say there's a trade financing supply system of a large manufacturer with thousands of vendors. Before their enrollment, you'll probably need to do some identity and reputation check in the public chain in order to validate their legitimacy. Next step these vendors need trade financing where they'll need more complex systems like stable coins or bank coins to avoid volatility, and move the money around. Instead of rebuilding a coin, they could just adopt a coin system within the dfinity network. In the next round there can be disbutes with goods lost or quality problems, vendors can call for public arbitration system where there'll be a network of lawyers who specialize in cross-border disbutes or arbiters to provide the service. So a chain of services that can be called throughout the life cycle, interoperable between the private and the public blockchains.

Staking Mechanism

Dfinity is a PoS (Proof of Stake) model, managed by its BNS (Blockchain Nervous System). This system is reliant on a human-controlled "neurons" (similar to masternodes in terms of staking and voting functions). In order to secure the role, users will run special client software with a delegate key, deposit fixed amount of dfinities to ensure consistency and reliability of the network, then in turn will receive economic incentives for its voting services.
People can pay a fee in dfinities to submit a proposal to the BNS, be it technical proposals like protocol upgrades or governance proposals eg. how much should be deposited to create a mining identity given the current value of DFN, this is much like liquid democracy.
Currently it takes 3 months to dissolve a neuron, client software can create a follow list (synchronous and non-deterministic to the rest of the network), which are the addresses of the neurons you follow on different topics. This captures the expertise of the community but at the same time being an opague liquid democracy, nobody knows what the follow lists are, you can't see how the brain makes its decisions.

Utility Value of Dfinities

Dfinity vs Ethereum

At a top level, Dfinity tries to stay compatible to the Ethereum network, meaning DAPPs currently running on Ethereum can be migrated to Dfinity easily, with significant gains in performance, scalability, security etc. Essentially where the name "Ethereum's crazy sister" came from.
There are some fundamental differences in design philosophy and approach to consensus agreements. Ethereum embraces the design paradigm "The code is law" where rules of the network is a result of community management. Dfinity embraces "The AI is law" where management is by the Blockchain Nervous System. Ethereum's Casper (POS) will be focused on extreme availability while Dfinity aims to achieve performance and infinite scale. In Dfinity's design, consistency and reliability outweighs availability.
A great debate on several fundamental design differences between Ethereum Casper and Dfinity's Threshold Relay Chain+Blockchain Nervous System (also part of the debate is Cosmos/Tendermint's Jae Kwon) can be watched here Proof of Stake Panel Discussion - Silicon Valley Ethereum Meetup

Team

Dominic Williams is Chief Scientist of the DFINITY project, headquartered in Zug, Switzerland, and is President and CTO of String Labs, a Palo Alto-based studio, incubator, and investor focused on advanced open protocol projects. His recent technical works include DFINITY technologies such as the Threshold Relay/Probabilistic Slot Protocol blockchain consensus mechanisms, the Blockchain Nervous System (algorithmic governance for decentralized networks), and the PHI “crypto fiat” autonomous loan issuance system.
Notable team members include Professor Timo Hanke, creator of AsicBoost. Ben Lynn, the 'L' from 'BLS' cryptography applied by Threshold Relay Chain. The team is stacked with postdoctoral researchers and scientists, they also run a scholarship program for PhD students researching secure distributed systems.

Useful Reading

Links

Video

Community

Press & Review

Due Diligence

DFINITY (DFN)

Company

Dfinity Stiftung, Zug Switzerland

Team

Dominic Williams (Chief Scientist) | LinkedIn Profile
Timo Hanke (Head of Engineering) | LinkedIn Profile
Ben Lynn (Senior Staff Scientist & Engineer) | LinkedIn Profile
Mahnush Movahedi (Senior Researcher and Engineer) | LinkedIn Profile
Paul Liu (Staff Engineer) | LinkedIn Profile
Enzo Hausseker (Senior Engineer) | LinkedIn Profile
Derek Chiang (Senior Engineer) | LinkedIn Profile
Norton Wang (Software Engineer) | LinkedIn Profile
Steve Omohundro (Senior Contributor - AI/Governance Research) | LinkedIn Profile
Robert Lauko (Contributor - Research/Community) | LinkedIn Profile

Github

GitHub

Product

Not yet, but testnet demo is available

Vesting

TBA

Additional Info

Token Allocation

TBA

Use of Proceeds

TBA
submitted by msg2infiniti to icoverdict [link] [comments]

How to get 100% FREE UNLIMITED Bitcoin in 2020!  New Easy Working Method To 3 Free BTC Mining Sites 2020Free Bitcoin EarningEarn Free Bitcoin A Beginner’s Guide to Bitcoin Best Bitcoin Free Mining Site. You Can Free Withdraw BITCOIN MINING (THE EASIEST WAY POSSIBLE!) UPDATED 2020

This page describes the behavior of the reference client.The Bitcoin protocol is specified by the behavior of the reference client, not by this page. In particular, while this page is quite complete in describing the network protocol, it does not attempt to list all of the rules for block or transaction validity.. Type names used in this documentation are from the C99 standard. Buying crypto like Bitcoin and Ether is as easy as verifying your identity, adding a payment and clicking "Buy". Sign up for our Wallet today. Create Wallet. Trade Crypto at the Exchange. Integrated with the Blockchain Wallet, our Exchange is a one-stop shop where you can deposit funds and place trades seamlessly in minutes. Bitcoin Cash brings sound money to the world, fulfilling the original promise of Bitcoin as "Peer-to-Peer Electronic Cash". Merchants and users are empowered with low fees and reliable confirmations. The future shines brightly with unrestricted growth, global adoption, permissionless innovation, and decentralized development. of this electronic cash. The first step to start using bitcoins is a choice of a wallet on the site “bitcoin.org” [4] and its subsequent installation. The wallet can be desktop (is established on the computer), mobile (phone wallet) and Internet wallet. Bitcoin-address is generated automatically after creating a wallet. This is bitcoin mining software... Step 1 Download and install How to choose a more profitable cryptocurrency: Bitcoin vs. Ethereum... download the following software... using a mining calculator, digital currency mining. With Follow us: Twitter Facebook.

[index] [2100] [28951] [14193] [28921] [17844] [21821] [25504] [15180] [5154] [23564]

How to get 100% FREE UNLIMITED Bitcoin in 2020! New Easy Working Method

My most comprehensive treatment of bitcoin and the theory of money so far is “On the origins of Bitcoin: Stages of monetary evolution” (3 Nov 2013) [PDF] [ePub]. Here are 3 actions to assist you begin utilizing Bitcoin Cash right now: A Bitcoin wallet is an app or program that allows you send out and receive BCH. Wallets also keep an eye on your BTC ... bitcoin mining bitcoin wallet bitcoin atm near me bitcoin app ... l'étalon bitcoin pdf l'echo bitcoin l'express bitcoin l'avenir du bitcoin ... a step by step guide - Duration: 22:08. A Beginner’s Guide to Bitcoin Looking for a general understand of ‘what’ bitcoin is, ‘what’ gives it value and ‘where’ it comes from? This is the video for you. As the topic of ... But you can likewise sell a service or product in exchange for Bitcoin. The third way is to earn Bitcoin through Bitcoin Mining. #RAWealth #howtoinvestingold #goldinvestment how to get started ...

Flag Counter