What Is GreenAddress and How to Use This Bitcoin Wallet ...
GreenAddress Wallet Test Vor Anmeldung UNBEDINGT LESEN
GreenAddress Wallet Review - Top 10 Best Bitcoin Wallets
Green Address Wallet Review 2020: Fees, Pros, Cons and ...
Best places to trade your Ripple/XRP (longer read)
In the past when you heard the word ‘cryptocurrency’, the first thing that came to everyone’s minds was Bitcoin. To some, this is still the case; they believe that Bitcoin is the cryptocurrency and the vice versa to also be true. Of course, the statement is correct in one way; Bitcoin is a cryptocurrency, but cryptocurrency is not made up of only Bitcoin but a host of other currencies. One of these currencies is Ripple. When it comes to the top five cryptocurrencies with the highest capitalization, Ripple needs no introduction as it has managed to secure a position of being the third most traded cryptocurrency around the world. Perhaps this is due to the fact that Ripple is the only cryptocurrency with a backing from traditional legacy financial institutions. In addition, the coin has been integrated into the operation of thousands of small businesses around the world. At this juncture, it is only fair that you learn how to be a part of this great innovation. Thankfully, that is what this guide is all about, showing you some of the best trading platforms for Ripple. There are numerous exchanges that offer decent exchange rates and well-matched trading pairs, but I’ll only narrow down to some of our best picks to help you get started fast.
What is Ripple (XRP)?
Ripple is a cryptocurrency, a currency exchange, a real-time gross settlement payment system, and a remittance network powered by Ripple. As I mentioned before, this is the third most capitalized cryptocurrency asset after Bitcoin and Ethereum. XRP allows enterprises such as banks and other financial service providers to offer their clients a reliable option to source for liquidity for cross-border currency transactions. Ripple is a distributed, open-source platform that seeks to capitalize on the weaknesses of the conventional money payment systems such as credit and debit cards, PayPal, bank transfers, among others. According to Ripple, these payment systems expose users to a lot of transaction delays and restrict the fluidity of currencies. The platform aims at replacing traditional payment systems through offering a faster, safer, and more convenient alternative for making payments. Both the platform’s exchange and tokens are called Ripple, and their mantra states one frictionless experience to send money globally.
Where Can I Trade XRP?
Most exchanges that trade Ripple are limited to crypto-to-crypto transactions. This means that you can only trade Ripple with another cryptocurrency and not fiat currencies such as the euro or the dollar. You’ll need to acquire the currency you wish to trade with XRP on a platform that accepts fiat, and once that happens, you can proceed to trade the two currencies. There are several great platforms that offer XRP trading; below are just a few:
Buying XRP on Binance
Buying XRP on Bittrex
Just like on Binance, you’ll need to create an account on Bittrex to get started. The process is pretty much straightforward, only requiring you to sign up using your email address and password. Once you’re done signing up, click on the wallet tab. You will be taken to a page where you can view all the deposit addresses of the cryptocurrencies on the Bittrex platform. You can then choose the currency to use to purchase XRP, after which, you will be required to type in the code of the currency you will be using to purchase Ripple. If you’re using Ethereum, you can type in the search bar “ETH” and then click on the green arrow to reveal the deposit address. In case you will be sending the funds from a different exchange, you’ll need to paste the address to that platform. Next, you’ll need to send funds to your Bittrex account. Bittrex permits payments using both fiat and cryptocurrencies. So, depending on what you will be using, send money to your online wallet and proceed to trade it with Ripple.
Buying XRP on Changelly
Changelly is another Ripple exchange that requires you to use either Bitcoin or Ethereum to acquire XRP. The exchange doesn’t have an inbuilt wallet, so you’ll need to store your funds on a separate hardware or software wallet. You can pretty much use any type of wallet, but the most secure ones are the hardware ones as they store your coins in an offline cold storage area. Ripple prefers not to have many unutilized accounts being set up on its platform; this is why you’ll need to have a minimum of 20 XRP in your account for you to get started. However, if your first transaction will be more than 20 XRP, then you’re all set. Once you have a wallet ready for your Ripple, head to the Changelly site and click on “input currency”. Here, you will be able to enter the currency you wish to trade for Ripple. You can basically pick and use any coin listed on the site, but it is highly recommended that you use either Bitcoin or Ethereum due to their high liquidity. The output section will have Ripple, which is the currency you wish to receive. The next step will require you to key in your XRP address, which is your Ripple address and the destination tag, which is a description of the transaction. You can now proceed to trade your chosen coins for Ripple. The transaction shouldn’t take long, and you will be able to receive the coins in your Ripple wallet.
Cryptmixer is a platform that assists users to swap XRP with 5 other assets freely. The interface lets users convert assets directly from one’s wallet, without having to create an account or register. Besides, the service helps to compare different providers and find a suitable deal for handling Ripple transactions securely, rapidly, and at the best rate. The process of using Cryptmixer is quite simple:
Go to the main page, choose the currency you’d like to swap, and enter the amount.
Choose XRP to receive.
Review the amount to see how much you will receive. Cryptmixer will automatically find the best rates for your trade.
Then, enter the wallet address that you wish to use.
Send in the deposit to the generated wallet address and wait for the transaction to be processed.
What makes Cryptmixer a great fit is that it provides a very simple layout and quick process so it’s not chore when you trade your crypto. The support line also takes on the job of solving the cases by cooperating with users with top priority. To learn more on how to exchange XRP at the best rate check https://cryptmixer.com
Buying XRP on Coinmama
Coinmama is a cryptocurrency exchange that has been around for quite a while now. The Coinmama team has been adding more coins on their platform over time to be able to provide its users with a wider variety of trading pairs. More recently, the platform included Ripple on its platform. However, Coinmama does not allow US-based users to purchase Ripple due to some stringent laws and regulations surrounding the coin. But for non-US users, you can proceed to create your account on the platform and locate Ripple among the listed assets. Once you’ve created your account, navigate your way to the area with the list of assets. Select one of the provided packages and proceed. You’re required to have a crypto wallet prior to making any purchase on the platform, so be sure to have a valid wallet address before completing the purchase. Once that’s done, purchase your Ripple coins and they will be delivered to your wallet.
Storing Your Ripple Coins
Online storages are never safe for cryptocurrency assets. Individuals have woken up to all sort of horrific sceneries on their accounts that left them bankrupt with no one to turn to. One of the most important concepts you need to grasp about online businesses is the security of your transactions. Cryptocurrency burglars are everywhere and are getting smarter by the day; this means that traditional ways of guaranteeing the security of your online assets are no longer effective. Most exchanges have top-notch security standards, but the safety of your cryptos begins with you. A great way of ensuring that your funds are secure is by getting an offline storage device for your coins. I’ve seen great reviews on two hardware wallets that I highly recommend; these are the Ledger Nano S and Trezor wallets. After getting the wallet of your choice, keep your personal data such as passwords and secret words private; this will ensure that no one else gains access to your wallet even if you misplace it. Writing your password or PIN on open places or somewhere in your phone might not be a good idea; yes, it may be convenient for you, but it will be for the burglar too.
What method of purchasing XRP is considered to be the best?
The most secure and common way of acquiring Ripple is through buying Ethereum or Bitcoin from Coinbase or Coinmama, then transferring the same to Cryptmixer to use to exchange with Ripple. This is because Ripple is currently not available for purchase by using fiat currencies.
What is the best trading platform for Ripple?
Ripple is available on a decent number of exchanges including Binance, Coinmama, Coinbase, Bittrex, Cryptmixer, and more. However, among the stated ones, I have found Cryptmixer to be more secure and easier to use while it also offers the best trading rates and fees.
The Bottom Line
As we conclude, you now have some of the best choices when it comes to the exchange to acquire Ripple coins. After buying your XRP coins, store them offline on a secure device due to the risk of being faced by threats such as hacking or system failures. If you’re serious about making cryptocurrency your investment vehicle in the long run, consider investing in a more lasting security solution such as a hardware storage device. You may not get them for a few pennies, but trust me when I say they are worth every last dime you spend on them.
Attention incoming interns! Here's a list of TIPS I WISH I KNEW starting my intern year, some things you can start working on now and some less commonly discussed but very important parts of your job
It’s that time of year and yet again I’ve seen plenty of incoming interns asking what they can do to prepare. I wrote this post to share some tips for all of the not-exactly-medical stuff I wish I knew before I started intern year and to share a few things that interns can do before they start to feel like they’re well prepared for the long white coat. As a quick background, I was a surgery intern in the first half of the 2010s and much of this is informed by my notes and memories from that time in addition to everything I’ve learned since, particularly about professionalism both in medicine and in the business world with work I’ve done in the healthcare startup arena. I’m also not perfect and very much a work in progress myself and, outside the intern-specific items here, I try to do most of these things myself—sometimes more successfully than others. So take what you think are good ideas here, leave what you don’t think would be useful, and if anyone else has anything to add, please feel free to chime in. TL;DR: Intern year is hard. Here are some not-so-commonly-disucussed tips that may help.
1. Being an effective intern is, at its core, about being responsible, effective and reliable.
Your day to day responsibilities are nearly always dominated by the need to get things done and to do so in a manner that lets your other team members focus on their own roles and responsibilities. What about learning clinical medicine? You'll learn plenty and fast. Don't worry. When reading through these tips below, view them from an angle of “would this help me develop an effective system for making sure everything gets done and nothing falls through the cracks?”
2. For your in-the-hospital life as well as your outside-the-hospital life, remember this one thing: you will forget.
You will be busy and have responsibilities in a way you likely have never experienced before. This will naturally make the day-to-day things in life more difficult than you’re used to so developing ways to outsmart your forgetful brain will pay off.
3. You are a professional now. This is your career. You’re in it.
It’s easy to view your life as a trainee as a sort of advanced student or something in between a student and a “real doctor”. But that’s not true. View yourself as a professional building your career. Your intern year is just the first step of that career. You’re a real doctor as much as any other now.
4. One of the hardest things about being an intern or resident is dealing with feelings of isolation. It will take work to actively manage and overcome those feelings.
Imposter syndrome, feeling like you don’t know what you’re doing or that you don’t belong, feeling like you’re not the person you used to be, that you don’t have time to do all the “normal” things that other people do, thinking your co-residents or attendings think you’re dumb, feeling that you don’t have time for friends/family/hobbies, ruminating on “what if I screw this up and hurt a patient?”, or “this doesn’t matter -- the patient is going to XX or YY anyway” etc are all common feelings and they all share the same undercurrent of feeling isolated in one way or another. You need to actively work to find ways to confront and overcome these feelings or else they will control you. When they control you, you’re burned out. It may not seem like it at first, but nearly every single tip below is geared towards avoiding feelings of isolation. Feeling like you’re not in control of your finances will make you feel isolated. Feeling like you’re losing a handle on your relationships will make you feel isolated. Feeling like you’re behind on your email and haven’t done all the little things in life you need to do will make you feel isolated. Read these tips through that lens.
What you can do before you start
1. Organize and update your contacts. Seriously.
Here are some ways it can help you maintain and grow your relationships.
Use the ‘Notes’ feature in your contacts for everyone important in your life and all the new people meet.
You will forget your friends’ kids names and ages. Every time you get a birth announcement or see a post on social media, go to your friend’s contact, edit the notes and put in the info. Then, when you reach out to your friends, ask about their kids...by name.
You will forget your friends’ boyfriend/girlfriend/wife/husband/partner’s name, especially if you’ve never met them or haven’t seen them for a long time. Put their name in your friends’ card with a note like “Started seeing Sam in June 2020, he/she’s a software engineer”. Someone you know gets married? Add their wedding date to their card.
You will forget how you knew people in your contacts. Met at a conference? Was a medical student on your heme onc service? Friend-of-a-friend you met at a wedding? Someone shares an interest you have? Make a note in their contact card. Tip: these notes are for you, not them. So if someone reminds you of an actor, or didn’t stop talking about bitcoin, make a note. It will help because you will forget.
Tag your contacts or add them to lists and use those tags/lists to your advantage.
Make lists or tags for your family, your medical school friends, your undergrad friends, your coresidents, your attendings, your medical students, the hospitals you’ll be working at, etc. Put those lists or tags to use like this:
You will forget to stay in touch with people important to you. Set reminders in your phone for every week / two weeks / month, etc to pull up a list (family, medical school friends, etc), pick someone on that list you haven’t chatted with in a while and text them and ask them how they’re doing. Aim to start a conversation, ask about what’s happening in their life. Texts are more personal and meaningful than liking a post on social media or sharing a meme. Initiating conversations with your friends and family will help you feel connected and will increase the likelihood they reach out to you.
Don’t label your medical students like “MS3 Laura” or “Sub-I Juan”, etc. Label them with their full name and treat them like the colleagues they are. Put them on a list, clear it out next year if you want, but don’t treat them as “MS3 XXX“ or “MS4 YYY”. I’m sure you remember feeling like a nameless/faceless medical student at times in school and I’m sure you didn’t love it. So don’t repeat that behavior. Add a note or two about them while you’re at it. Take enough interest in your medical students to treat them well. You never know when or how you’ll cross paths with them again.
If you rotate through different hospitals, you will forget which “ED” or “PACU” or “nursing station 3rd floor” numbers are which. Tag them or put them on a list. It’ll make finding them when you need them much easier.
2. Use a good note taking app and a good task manager app to help with both your in-hospital life and your outside-of-the-hospital life.
Here are some ways to use a notes app.
Make a note for each rotation you’re on. Add in any unstructured tips as they come up, like “Send all of Dr. X’s patients home with Y”, “Use the call room in the basement outside of the locker room, passcode 1234”, “Park in the X lot on the weekends”, “Dr. A likes to manage Z with Y”, “The case manager, NAME, usually sits at the computer behind the 2nd floor nurses station”, etc. Don't overthink them, just write them down when they come up. Review those notes the next time you rotate through because you will forget all those little things and they will help you in the future.
Create a master grocery list of all things you typically get at the grocery store. Share it with a roommate/partner so they can keep it updated too. That way if you ever stop to pick something up, you can review the list to make sure there’s nothing you’ll forget.
Make master lists for other things in your life too like “packing for a conference”, “packing for a family trip”, “Target/Wal-Mart household master list” so you can quickly review anytime something comes up so you minimize the chance of forgetting something
Make notes for all of the other stuff you have to manage in your life like your car, your apartment/house, your loans, etc and update them every time you work on that thing. Change your loan repayment? Add it to the note. Have to get your brakes fixed? Add to the note where you got it done, how much it cost, etc. Talk to your landlord about fixing the shower? Add it to the note. Have to call the medical board to sort something out with a license? Add it to the note.
I like two note apps on iOS: Bear for personal notes since it’s fast and has great tagging and Apple’s Notes app for shared notes
Pick a good task manager app and use it for all the things in your life that aren’t your day-to-day work
Cousin getting married and you can go to the wedding? Make tasks to ensure your time off, book your travel, buy a gift, rent a hotel room, etc. Then put all the relevant info into your note because...you will forget.
Pandemic is over and you get to present a poster at a conference? Make tasks to review your draft with your coauthors, print your poster, book your travel, submit your reimbursement, etc. Then put all the relevant info into a note. Otherwise, you’ll forget.
I like Things and have also liked OmniFocus. There is a ton of content on how to set one of these things up for productivity so review it and use it YouTube search
3. Take charge of your finances
When I was an intern, I figured all I had to do was pay my loans and not go into more debt. I wish I had done the following instead:
Read these two books: The White Coat Investor and I Will Teach You To Be Rich. Both are very good and have different strengths. The WCI is directly applicable to you and will help educate you in ways medical school didn’t about your financial future. IWTYTBR is much more of a “millennial” book but it’s very good for explaining big concepts and for providing a system to set yourself up for success. They’re both easy and relatively quick reads and don’t require any financial background. WCI is fine as an e-book but IWTY has a bunch of dialog boxes that make the e-book a poor experience, get a physical new or used copy.
Set up a budget. I use and swear by You Need A Budget. It’s the best money I spend every year. Their system is easy and straightforward and it doesn’t take long to get the hang of it. I can’t recommend it highly enough.
4. Update your CV now and keep it updated regularly
You will no doubt have to share your CV with someone at some point whether it’s for fellowship or a research project or any number of things. The time to work on it is not when someone says “can you share your CV?” -- that’s a recipe for omissions, typos and mistakes. The only thing you should be doing every time you share your CV is giving it a quick once-over to make sure you don’t spot any mistakes and to make sure it’s up to date There are plenty of templates online and your training institution may even have a preferred format somewhere on their website. Your ERAS application will give you a good head start but most of your medical school CV lines will either be condensed or removed all together unless something was particularly notable. You can almost always find example CVs online from senior people in your department or institution with a quick web search -- use a few as a guide Set a reminder / task to update your CV at regular intervals. Quarterly is good, yearly at least. Save new versions of it each time so you can refer to the old ones if you need to and name them in a way to let you know you’re always sharing the most recent version, e.g., LASTNAME_FIRST NAME_CV_2020-06. You will forget if the one marked “CV” only is the right one you want to share.
5. Subscribe to a couple of newsletters to stay up to date with the world outside of your hospital
For general news, your preferred newspaper probably has a daily email briefing. Otherwise, Axios AM/PM and Politico’s Playbook are both very good quick reads to stay up to date with current events.
Keep up with healthcare news so you know what’s going on in the healthcare system broadly
Politico’s Pulse and Morning eHealth are both very good and have quick facts at the beginning if you just want to skim
Rock Health’s Rock Weekly is a decent summary of each week in the healthcare startup and technology world
Pick a few of these and aim to get through them each day. If you can’t get through them, unsubscribe to the ones you think are least relevant to you so you never feel “behind” in staying up with the news. You can breeze through the few you pick in a few minutes here and there throughout the day -- don’t make it any harder than that to feel like you’re “up to date” on the news.
General tips for maintaining relationships
For any romantic relationship, do these things if you don’t already:
1. Make a rule: no phones at the table. * Don’t put your phone on the table face-up. Don’t put your phone on the table face-down. Keep your phone off the table and set to silent. * Focus on the person in front of you and show them you care about them by paying attention to them. We all know what it feels like to be with someone more interested in their screen than in interacting with you. If you’re on call, say “sorry, I’m on call, I may have to check something here and there”, apologize if you do check it and then put your phone away. 2. Make another rule: no phones in bed * Same principle as at the table. Want to feel like two strangers just passing through life who just so happen to share the same bed? Wake up, reach for your phone and scroll through your feeds like a zombie before getting out of bed. Same idea before bed. Your phone can wait. 3. If you’re at the point where you share finances, set a regular meeting to review how you’re doing. * Ideally, this is a “red, yellow or green” meeting and should only take a few minutes. Money can be a big conflict issue for relationships and avoiding talking about money is a surefire way to eventually turn to conflict. If you have a budget and shared goals, this should be quick. * A monthly check-in is good. Create a recurring calendar event, attach the shared notes or spreadsheet document you use, add your goals for the meeting and honor the meeting when it comes around.
Eat with people who are important to you, if you can.
There’s something about sharing a meal that’s special in human nature. Friends who are important to you? Partners? Mentors you’re looking to get to know better after you’ve had a few chats? Try to eat with them when you can. And keep your phone off the table.
The same idea works with your coresidents and teams in the hospital. Eat with them if you can. Eating with others builds, strengthens and maintains relationships. Keep your phone off the table if you can.
Think about it this way: who would you consider a better mentor, the person you’ve met with a few times in their office where they sit behind their desk and you in front of them while they glance at their computer screen every time it pings or the person who’s invited you to get coffee or food and they kept their phone away the whole time? Now turn that around and realize the power of the message you can send to people you care about by trying to eat with them and show them they have your full attention.
1. Learn to think about tasks as a continuum from start to finish instead of as a binary 'done/not done'.
Let’s say you have to order a CT for a patient of yours.
Instead of marking the task as complete the second you place the order for the CT, recognize that the whole task is not just placing the order, but also knowing when your patient is going down to the scanner, when they’re back, when the CT is up in the system, when the report is up and also that you’ve looked at the CT yourself and have read the report.
When your senior or attending asks you, “Did patient X get their CT?”, a not-so-great answer is “Yes” or “No”. A better answer is “they’re down at the scanner now” or “the scan’s done but it hasn’t been read yet. Want to look at it?” or “Yes, it’s negative for XXX but did show YYY”.
Whatever system you eventually adopt for your day-to-day task management in the hospital, whether it’s a list or index cards or a printed signout sheet, make sure you’re tracking both when orders go in, when they’re complete, when they’re cancelled, etc. Just marking things as complete once you place the order isn’t enough.
2. Signout is taken, not given.
What I mean by this is that when you take signout, that means you’re accepting responsibility for those patients. They might be your patients, you might be cross-covering, it doesn’t matter. What matters is that when those patients are your responsibility, it’s your responsibility to get what you need to know to take care of them. Is someone signing out to you in a hurry and not giving you what you need? Ask them for that relevant past medical history, those exam findings, and so on. It’s not enough for the person handing off to say “we’re worried about x or y”, you’ve got to follow that up with “in case of x or y, is there a plan for what the team wants me to do?”. Get the answers you need. A lot of covering patients on call is playing defense whereas the primary team generally plays offense. But that doesn’t mean you can play defense in isolation. The last thing you want is for the primary team to feel surprised by your choices.
* Here’s two ways for the above example to go when turning the patients you were covering back over the next day or whatever: 1. You: “For patient so-and-so, you said you were worried about x or y. Y happened.” Them: “What did you do?”. You: “Z”. Them: “Shit, my attending’s not gonna like that”. 2. You “Y happened so I did A like you said, it went fine and here’s the current status”. Them: “Great, thanks” * See the difference?
Along the lines of taking responsibility for those patients, that means that if you couldn’t get the information you needed at signout then you have to go and see those patients and get the information you need yourself.
You’ll hear this idea said a bunch of different ways like “trust but verify”, “trust no one” and your comfort level will change over the year as you become more confident and comfortable. But always error on the side of going to see the patient and getting your own information at the start.
3. If you will be miserable without something when you’re in the hospital, bring it with you. You won’t reliably be able to find it at the hospital every time you need it.
Need coffee otherwise you turn into a demon? Bring it with you. You never know when you’ll get caught doing something and won’t be able to run to the cafeteria for your fix.
On call overnight and know you need food so you don’t go insane? Bring it with you. Here’s a hospital food rule: never rely on the hospital's ability to feed you. The hospital will let you down sooner or later, I guarantee it.
Know you always get cold on call? The day you forget your jacket/sweatshirt is the day you won’t be able to find a spare blanket in the hospital to save your life. Put a backup in your locker (if your hospital respects you enough to give you one).
Miscellaneous productivity, professionalism and lifestyle tips
1. Aim to “touch” everything only once
Example: your physical mail. You know, the stuff made of dead trees that accumulates in that box you check every once in a while. For every piece of mail you get, you should either trash it, file it, or act on it. Don’t touch it until you’re ready to do one of those things.
Example: your email. Either delete it, archive it, reply to it or do the thing it’s telling you to do right away. Don’t fall into the trap of using your inbox as a to-do list -- that’s a recipe to get burned. Use a task manager for your to-do list and aim to keep your inbox at zero. Realize that email’s true power is communication and use it as a communication tool and nothing else.
I’ll use the example of going to a wedding again as something to “touch once”. Aim to accomplish all the tasks at once or at least create tasks and reminders to complete those tasks all in one go. Respond to the RSVP, create the calendar invite with all the information from the invitation, share the calendar event with your date, book your travel, book your hotel, book your rental car, buy your gift from the registry and set a reminder to get your suit/dress cleaned a few weeks ahead, etc.
2. Lean to use your calendar as a tool
Professionals in the “real world” tend to live and die by their calendars. Some people, especially many senior people in medicine, don’t manage their own calendars. But you manage yours. With it you can:
Make sure all events—even small ones like dates or errands you want to run—have locations so all you have to do is click the location for directions
Send invites to friends / family / coworkers for anything you talk about doing that has the relevant info
Make reminders for yourself to prepare for upcoming events, i.e.., don’t count on seeing your parents’/spouses’/whomever’s birthday “coming up” to remind you to get a gift or send a card. Create an event two weeks before their birthday that says “Buy Mom a birthday card”, set it to repeat yearly and buy a card when it comes up, send it a few days later and don’t worry that it won’t get there in time.
3. Learn to use email well
Ever get an email from someone and feel their tone was terse, condescending or rude? Don’t be that person. Error on the side being polite and professional and writing in complete sentences without textspeak. It’s not hard — you type fast, even with your thumbs, I’m sure of it.
Learn to communicate effectively. Keep it short but not terse. State why you’re writing to someone, be clear if you’re asking a question, and think about it this way: “How am I making it as easy as possible for this person to understand why I’m emailing them and do what I’m asking them to do?
Don’t use a canned salutation like “Best, NAME” or even worse: “Best, INITIALS”. Use your salutation to continue to communicate your message and remember that politeness and professionalism extend through your signature.
I don’t know why “Best,” is so common in medicine but it’s meaningless, unthoughtful, inherently passive aggressive and I seriously read it as if the person writing it were signing off by saying “Go f*ck yourself,”. Same thing for “Regards,” and its ilk, any abbreviation like “vr,” or any form of cutesy quote.
Write your salutation fresh each time. Did you ask someone for something? Say “Thank you for your help”. Are you writing someone senior to you and want to sound somewhat formal? “Sincerely,” never goes out of style. Are you sharing information and essentially writing a memo? Use “Please let me know if you have any questions”. Your salutation is communication, treat it that way.
Sign with your name, not your initials. Signing with initials is a common way senior people will try to remind you they’re senior to you. If you do it, it’s like you’re trying to prove you’re a Cool Guy Big Shot too. It never comes across well -- even for those senior people. Initials are terse. Lowercase initials are even terser. Although they may look different at first glance, all initial signatures functionally come across as ‘FU’. Write your name.
If it’s a few rounds back and forth of email, it’s normal drop salutations and signatures and treat email more like texting. Keep using complete sentences without textspeak, though. I promise you’ll come across better that way.
Use the ‘signature’ feature of your email client to share your professional details and contact information
Your institution (not department) will hopefully have a format for this that’s standardized and includes minimal or no graphics. If it doesn't, then I feel sorry for all the inevitable IT headaches you will eventually endure at your institution since they clearly underfund and undervalue contemporary IT and professional services. It’s the wild west out there so find some good examples of clean, professional signature formats and make one for yourself.
Note: this signature lives below your salutation and sign off. It’s essentially the letterhead for your email that lets your recipient fill in the details you may not otherwise provide like your department, mailing address or fax number. It’s not a replacement for signing off of your communication professionally.
Never use bold, italics, underlines or different font sizes in your emails. They only make emails harder to read and jumble your message.
If you want to highlight something, put it in a numbered or bulleted list.
If you can’t communicate what you want with 2-3 bulleted points, then email is not the right medium to use. Do you like reading long emails? Of course you don’t. Write a memo, attach it as a PDF or shared doc and use the email to tell your recipients to review the attachment.
You will eventually, in some way or another, ask someone to introduce you to one of their contacts and or refer you for something. Learn how to write a good forwardable email that utilizes the double opt-in concept and how to make it easy on the person doing you the favor. Read more here, here and here.
While you’re at it, understand the power of using CC and BCC to communicate effectively.
Aim to answer all emails written directly to you within 24 hours.
If you can’t respond fully right away, respond briefly saying you got the note and that you’ll work on it and get back to them. Set a reminder or create a task to do or review the thing and get back to them once you’ve done it.
Do you hate being left on read in text? You do it in email every time you don’t respond to someone in a timely fashion. It’s better to share a quick, “I got it and I’m working on it message” then not replying until days or weeks later.
4. Don’t let someone else’s negative energy and/or anxiety transfer to you
You will frequently experience things like this in the hospital:
A co-resident disagrees with a management decision made at rounds and mentions that so-and-so is an idiot. So-and-so probably isn’t an idiot. Your co-resident probably isn’t an idiot either. Form your own opinions from your own experiences.
A nurse pages you with a tone that says “THIS IS REALLY BAD”. It might be, go and see. And on your way, stay calm and go over the steps in your head of what you’d do if it is, in fact, REALLY BAD. But don’t freak yourself out before you even get to the room. You won’t be able to make decisions with a clear head if you’re already worked up.
You’re a surgery intern and all your patients are normally on the med-surg floor. Every once in a while, one goes somewhere like heme-onc if the med-surg floor is full. Someone on your team says something like “great, now they’re going to screw up our patient”. Recognize that that floor isn’t full of terrible nurses and may just have less experiences with lines and drains and that the best thing you can do is go down there, talk to the nurse and say “here’s what we want to be called about” and “this thing may look bad but it usually isn’t and we don’t need to be called, here’s why”, and so on. Doing things like this will mean you get fewer calls. Fewer calls are good.
Your attending is having a bad day and you’re not enjoying your interactions with them. Don’t let that make you have a bad day too. Medicine is hard enough as it is, stick to your own bad days instead adopting other people’s. Then pull up your friend list, text a buddy and feel better.
5. Don’t neglect your physical health. Trying to eat well and stay active are even more important when you’re insanely busy.
The #1 thing you can do to help your waistline is cook your own food and pack your own meals. It doesn’t matter what you cook or how good of a cook you are, as long as you’re aiming to pack meals that an adult would eat, it will be healthier than takeout and cafeteria food. It’s better for portion control, you control all the ingredients and you get a sense of satisfaction for being on the ball. It’s better in every way. I know it’s not realistic to always prep and pack your own food on the busiest of services but you should try to hit at least a percentage like 25% or 50% of your meals. There are no lost causes in your own health. It will be hard to exercise and work out. You should still try to do it anyway. You will go long stretches without exercising at times. Don’t beat yourself up about it. Every day is a chance to do the thing you want to do so get back out there.
6. If your social profiles are private, consider doing some housekeeping and making them public.
Instead of thinking about them as a liability to be that needs to be hidden, think about them as a narrative you can control. Nothing is private on the internet. Even your private profile. You never know who knows someone you know or what may get screenshotted and shared down the line. It’s natural to run a web search on anyone you’re meeting for a date, interviewing with for a job, or researching in general. When you search your own name, what comes up? What do you think when you’re searching for someone and they have a private page? Do you ever click on a few links to see professional stuff from LinkedIn, and then some social pages to see what else you learn? So does everyone else. Use your social pages to put forward a version of you that shows who you are, shows some interests true to yourself, makes you seem like a totally normal and reliable person (which is exactly what any potential date, partner, fellowship director or hiring manager is asking themselves about you) and doesn’t share enough information to let a patient show up at your door. Medicine lags behind other industries with people still commonly hiding behind private pages. In the tech world, it’s more strange to not have a public page. A private page says more about you that you might want to hide red flags whereas a public page says “go ahead and look, you won’t find any red flags”. One is much more powerful than the other.
Closing and something to read
When you view your professional life, it’s natural to view your professional relationships as being a binary one between patient and physician. That’s certainly essential and certainly important, but as a professional you now have relationships to consider with so many more types of people: co-residents, faculty in your department, faculty in other departments, administrators, support staff, medical students, and so on. Just as you had to learn how to work with patients, you will have to learn to work with all of the other people in your professional life. Truly effective professionals will treat all interactions importantly and give thought and consideration to each one. All these interactions and relationships will all affect your day-to-day experience, your well-being and, ultimately, your professional experience. You will find yourself being not just responsible for your patients, but also for yourself, your career and your relationships. It takes effort to succeed in all of those areas. And even with effort, sometimes you’ll be winning in an area and losing in others. And in a few months it will be different -- that’s just life. I want you to consider looking outside of books and resources written specifically for physicians when you’re trying to tackle these issues inside the hospital and out. Medicine is a much-smaller-than-you-realize bubble with a long history of personality-driven examples of “that’s just the way we do it” or “that’s how we’ve always done it”. There are good books about medicine out there, to be sure, but you’ll benefit more professionally by learning from the wide world outside of hospitals since there are quite simply many more successful and accomplished people who’ve written great resources for all aspects of professional life that medicine tends to ignore. I’d recommend you start with this book: Andy Grove’s High Output Management (a review by another Valley titan here). Andy escaped communist Hungary, taught himself English and rose to be CEO of Intel and went on to be a sage of Silicon Valley before he passed. This book is a how-to guide for how to be an effective professional in an organization (hint: you're now a professional in an organization) and if you’ve enjoyed this post at all, you’ll love this book. You may think that this book applies to ‘managers’ and ‘business’ and not medicine but you couldn’t be more wrong. Although it was probably written around the time you were born, nearly everything in this book is a lesson that directly applies to your professional life in medicine and when you start seeing it, you’ll feel like you’re in The Matrix. Congratulations! You've worked hard to get here. Be proud of yourself, your degree, your long white coat and be the best doctor you can be.
Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.
Flatten the Curve. Part 48. Source Here It's getting crazier day by day now, so are you following the Boy Scout motto? On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.” Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island. But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply. Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it. But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right? Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court. 'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act. Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies. The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you. Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more. Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered. PACOM? Why isn't that command group responsible for the South China Sea? Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India. Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here Nah. I'm just fear mongering and Doomscrolling again. Heads up and eyes open. Talk soon.
Before we begin, something must be made very clear. I overheard someone speak of bringing offline street drugs into our offices. I will not stand for this and I will not allow this, anyone considering something so foolish is obviously sober from cut, street quality drugs and in no sound state of mind to conduct his or her official Darkmarket duties. Not to mention I would like to formally introduce our newest staff members, AnonyZDon Ludolf and MrMandrake. They have completed our hazing rituals. As you well know we have a long standing tradition of forcing our newest staff members to smoke copious amounts of purple haze while listening to purple haze in a very small room while wearing a small purple suit. Due to budget concerns we apologize for it being the wrong size and rather filthy. Thank you. The rest of this newsletter will now commence. In order to have a greater focus on our security at Darkmarket these are the measures we are implementing: We will no longer be offering public tours. Private celebrations only. We will feed the office tiger less, or possibly more cocaine. We will remove the large illuminated Darkmarket sign from above our offices. There are other matters at Darkmarket of great importance, equal to that of security and safety and one such matter is restoring the fraud community on the darknet. We will be opening applications for the Guide Review Board (GRB) which will have selected fraud vendors review guides on various hacking and fraud methods. A position for PR will also be available soon feel free to apply by opening a ticket on the market but experience is required. In closing For new users: Our market works a little differently. We don't have individual wallets for each buyer, instead we create and generate a unique bitcoin or monero address for each new order that you make. So all you need to do is find a product you would like to purchase, click on add to cart, then click on your cart. If the product is a physical product you will see a white box to add your address details, please enter your address details and click on Next this part is quite important because it will save your address details and encrypt them with the vendors PGP! Then click on checkout and purchase and you will be able to go back to your account, click on your purchases tab on the left hand menu bar, then the ID of the purchase which will bring up all the order details including an amount to pay in bitcoin or monero depending on what you selected at checkout, then you will see a unique bitcoin or monero address just for that order. You simply pay the exact funds specified in BTC or XMR to the address provided and remember to include the amount for fees because if you don't pay enough it will show the balance of the address but the vendor won't be able to ship your product! Once paid it will show enough in green, will notify the vendor and they will be able to ship your product. You will also have an order conversation where you can communicate with the vendor about your order and ask any questions you need to as well as a button to mark as delivered when you receive the product or to Extend Finalize Time if you haven't received the order in time which resets it back to the 12 day auto-finalize time!. You can also dispute an order in a sent state at the bottom of the page, simply fill in a reason and click on submit. Depositing and Canceling orders: 2 confirmations are needed until funds will show on an order and that if you cancel an order before this occurs and it shows in the order, a manual refund may not be done because our policy is we do not do manual refunds, if we do, there is a fee that is charged because it does take quite some time to do this on a personal request basis. Search update: We know there were some bugs that were reported which have now been fixed and we will be working to add back the category option in search and will also be adding keywords to products which will assist in listing products with certain search terms as well. Updates will be announced over the coming few weeks.
Cash App Customer Service ✔️✆▶𝟏⥂𝟑𝟏𝟎-𝟗𝟐𝟗-𝟏𝟐𝟏𝟑℗☜ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴CUST⌚OME⌚R ⌛
Cash App Customer Service ✔️✆▶𝟏⥂𝟑𝟏𝟎-𝟗𝟐𝟗-𝟏𝟐𝟏𝟑℗☜ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴CUST⌚OME⌚R ⌛ Cash App Customer Service ✔️✆▶𝟏⥂𝟑𝟏𝟎-𝟗𝟐𝟗-𝟏𝟐𝟏𝟑℗☜ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴CUST⌚OME⌚R ⌛ Cash App Customer Service ✔️✆▶𝟏⥂𝟑𝟏𝟎-𝟗𝟐𝟗-𝟏𝟐𝟏𝟑℗☜ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴CUST⌚OME⌚R ⌛ Cash App Customer Service ✔️✆▶𝟏⥂𝟑𝟏𝟎-𝟗𝟐𝟗-𝟏𝟐𝟏𝟑℗☜ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴CUST⌚OME⌚R ⌛ Cash App Customer Service ✔️✆▶𝟏⥂𝟑𝟏𝟎-𝟗𝟐𝟗-𝟏𝟐𝟏𝟑℗☜ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴CUST⌚OME⌚R ⌛ Cash App Customer Service ✔️✆▶𝟏⥂𝟑𝟏𝟎-𝟗𝟐𝟗-𝟏𝟐𝟏𝟑℗☜ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴CUST⌚OME⌚R ⌛ In the last decade, digital payments have become very popular for facilitating quick and fast online money transfer. Cash App is one such app that has been offering the peer to peer money transfer services with features such as Cash app cards, direct deposits, and free money to users. But it is also infamous for so many common Cash App issues that users often come across. Is there Any Cash App Support Number Present? Unfortunately, the Cash App Support is very tepid and unresponsive and they do not provide a good experience to a lot of users. There are many customers who often complain about the unprofessional response from the Cash App Support. Although there is no official Cash App Support number +1-310-929-1191 and it is causing a lot of troubles to users when they face issues such as transfer failed, Cash App login errors, direct deposit failed, cash card declined, account blocked or closed, Apart from this users sometimes want to connect with the Cash App support phone number for general queries regarding cash app accounts. The cash card is one of such features which is very much in use; it works like any other debit card and used to make purchases or pay bills. Once customers receive this they seek help from the Cash App Support telephone number for activating the Cash App card, tracking an order, and sometimes to apply for payment dispute.In recent years there has been a spike of complaints about the Cash App account blocked, hacked, and even scammed by the fake Cash App Support. They pretend as the executive from the Cash App and try to resolve the cash app issues. With this much disenchantment customers often become victims of the sham Cash App technical support number. So you should stay away from such mishappening and know that the only way to contact Cash App Support is through the app itself. There is no official number that connects you with a Cash App representative. You should follow these easy-going steps for authentic Cash App customer support: Cash App login: Login in for you Cash App account and select your Profile icon In the Settings select Support: Scroll down and click on the Setting button to get the option “Cash App Support” Choose Cash App issue: After this, you will see some options and prominent Cash App issues Account closed, refund failed, forget the password, etc. You can choose any issue that you are having and if this list does not consist of your concern then select the Something else button. Request a Call from Cash App Support number: Once you are done with selecting the issues that you have then click on the “Contact Support” to request a call on your phone number. Thereafter enter a short description explaining why you want to contact the Cash App support number and what is your Cash App issue, after entering these you can click on Continue. You can expect to get a response from the support team within 24 hours and if there is no reply then you should repeat the same process on the app unless there is any response Cash App: Cash App is a mobile payment service that allows users to transfer money to one another, as well as invest in stocks and Bitcoin. The app icon is green with a white dollar sign in the center. Square Point of Sale: Square Point of Sale is a mobile point of sale app that allows sellers to process payments, refunds, track inventory, send invoices, and much more. The app icon is white and gray with a square symbol in the center. Looking to contact Cash App Support? You can reach out to Cash App Support directly from the Cash App: From the app, tap on your profile image and scroll to the bottom of the page. Tap Support and review answers to common questions. If you’re not able to find your answer, tap Something Else. Select your reason > Contact Support. Contacting Cash App Support Without an Account If you’re unable to sign in or don’t have a Cash App account, we still want to hear from you! You can request contact through cash.app/help. If you select the instant transfer option, you will be charged a 1.5% of the total deposit amount to have the funds deposited to your bank account instantly. Deposits will arrive on your bank statement either with the prefix SQC* or with the name of the person who assigned you money. Receiving Limit: none You will be required to verify your name, your date of birth, and the last four digits of your SSN before you can receive over $1,000 in a time span of 30 days. After you confirm your account, there is no limit on the total amount of money you can receive on Cash app. Cash App Customer service contacts With some of the details covered above, you may still want to reach the customer care desk of square cash app. So, here are the phone number, email address and other important contact details of the company. How to contact cash app from the app Tap the visible profile icon on your Cash App home screen Scroll down and then tap Cash Support Tap Something Else o this screen Scroll down to your issue Tap Contact Support How to request cash app customer service to contact you Scroll down and then click Contact Support button Login to your account Navigate to your issue Click on Contact Support Cash app phone number You can call cash app customer service via phone on 855-351-2274 How to merge account details Tap on the profile icon on your Cash App home screen Now Scroll down and then select Personal Add any missing phone numbers or your email addresses Can I cancel a payment process The money transfer process is instantaneous and can’t be canceled. To get a reversal, you can use the contact details above or request the recipient to reverse using this process. Tap the clock icon on their Cash App home screen Select the wrong payment in question Tap … icon Select Refund Press OK to confirm
Cash App Customer Support ℠☎𝟏 𝟑𝟏𝟎⥂𝟗𝟐𝟗《𝟏𝟏𝟗𝟏 》™♞ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴TE
Cash App Customer Support ℠☎𝟏 𝟑𝟏𝟎⥂𝟗𝟐𝟗《𝟏𝟏𝟗𝟏 》™♞ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴TE Cash App Customer Support ℠☎𝟏 𝟑𝟏𝟎⥂𝟗𝟐𝟗《𝟏𝟏𝟗𝟏 》™♞ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴TE Cash App Customer Support ℠☎𝟏 𝟑𝟏𝟎⥂𝟗𝟐𝟗《𝟏𝟏𝟗𝟏 》™♞ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴TE Cash App Customer Support ℠☎𝟏 𝟑𝟏𝟎⥂𝟗𝟐𝟗《𝟏𝟏𝟗𝟏 》™♞ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴TE Cash App Customer Support ℠☎𝟏 𝟑𝟏𝟎⥂𝟗𝟐𝟗《𝟏𝟏𝟗𝟏 》™♞ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴TE Cash App Customer Support ℠☎𝟏 𝟑𝟏𝟎⥂𝟗𝟐𝟗《𝟏𝟏𝟗𝟏 》™♞ cash app customer support number ✴USA CANADA $#[email protected]#@",>>✴TE In the last decade, digital payments have become very popular for facilitating quick and fast online money transfer. Cash App is one such app that has been offering the peer to peer money transfer services with features such as Cash app cards, direct deposits, and free money to users. But it is also infamous for so many common Cash App issues that users often come across. Is there Any Cash App Support Number Present? Unfortunately, the Cash App Support is very tepid and unresponsive and they do not provide a good experience to a lot of users. There are many customers who often complain about the unprofessional response from the Cash App Support. Although there is no official Cash App Support number +1-310-929-1191 and it is causing a lot of troubles to users when they face issues such as transfer failed, Cash App login errors, direct deposit failed, cash card declined, account blocked or closed, Apart from this users sometimes want to connect with the Cash App support phone number for general queries regarding cash app accounts. The cash card is one of such features which is very much in use; it works like any other debit card and used to make purchases or pay bills. Once customers receive this they seek help from the Cash App Support telephone number for activating the Cash App card, tracking an order, and sometimes to apply for payment dispute.In recent years there has been a spike of complaints about the Cash App account blocked, hacked, and even scammed by the fake Cash App Support. They pretend as the executive from the Cash App and try to resolve the cash app issues. With this much disenchantment customers often become victims of the sham Cash App technical support number. So you should stay away from such mishappening and know that the only way to contact Cash App Support is through the app itself. There is no official number that connects you with a Cash App representative. You should follow these easy-going steps for authentic Cash App customer support: Cash App login: Login in for you Cash App account and select your Profile icon In the Settings select Support: Scroll down and click on the Setting button to get the option “Cash App Support” Choose Cash App issue: After this, you will see some options and prominent Cash App issues Account closed, refund failed, forget the password, etc. You can choose any issue that you are having and if this list does not consist of your concern then select the Something else button. Request a Call from Cash App Support number: Once you are done with selecting the issues that you have then click on the “Contact Support” to request a call on your phone number. Thereafter enter a short description explaining why you want to contact the Cash App support number and what is your Cash App issue, after entering these you can click on Continue. You can expect to get a response from the support team within 24 hours and if there is no reply then you should repeat the same process on the app unless there is any response Cash App: Cash App is a mobile payment service that allows users to transfer money to one another, as well as invest in stocks and Bitcoin. The app icon is green with a white dollar sign in the center. Square Point of Sale: Square Point of Sale is a mobile point of sale app that allows sellers to process payments, refunds, track inventory, send invoices, and much more. The app icon is white and gray with a square symbol in the center. Looking to contact Cash App Support? You can reach out to Cash App Support directly from the Cash App: From the app, tap on your profile image and scroll to the bottom of the page. Tap Support and review answers to common questions. If you’re not able to find your answer, tap Something Else. Select your reason > Contact Support. Contacting Cash App Support Without an Account If you’re unable to sign in or don’t have a Cash App account, we still want to hear from you! You can request contact through cash.app/help. If you select the instant transfer option, you will be charged a 1.5% of the total deposit amount to have the funds deposited to your bank account instantly. Deposits will arrive on your bank statement either with the prefix SQC* or with the name of the person who assigned you money. Receiving Limit: none You will be required to verify your name, your date of birth, and the last four digits of your SSN before you can receive over $1,000 in a time span of 30 days. After you confirm your account, there is no limit on the total amount of money you can receive on Cash app. Cash App Customer service contacts With some of the details covered above, you may still want to reach the customer care desk of square cash app. So, here are the phone number, email address and other important contact details of the company. How to contact cash app from the app Tap the visible profile icon on your Cash App home screen Scroll down and then tap Cash Support Tap Something Else o this screen Scroll down to your issue Tap Contact Support How to request cash app customer service to contact you Scroll down and then click Contact Support button Login to your account Navigate to your issue Click on Contact Support Cash app phone number You can call cash app customer service via phone on 855-351-2274 How to merge account details Tap on the profile icon on your Cash App home screen Now Scroll down and then select Personal Add any missing phone numbers or your email addresses Can I cancel a payment process The money transfer process is instantaneous and can’t be canceled. To get a reversal, you can use the contact details above or request the recipient to reverse using this process. Tap the clock icon on their Cash App home screen Select the wrong payment in question Tap … icon Select Refund Press OK to confirm
Fedora uses Security-Enhanced Linux by default, which implements a variety of security policies, including mandatory access controls, which Fedora adopted early on. Fedora provides a hardening wrapper, and does hardening for all of its packages by using compiler features such as position-independent executable (PIE). Wikipedia
Pop!_OS provides full out-of-the-box support for both AMD and Nvidia GPUs. It is regarded as an easy distribution to set-up for gaming, mainly due to its built-in GPU support. Pop!_OS provides default disk encryption, streamlined window and workspace management, keyboard shortcuts for navigation as well as built in power management profiles. The latest releases also have packages that allow for easy setup for TensorFlow and CUDA. Wikipedia
Debian is one of the oldest operating systems based on the Linux kernel. The project is coordinated over the Internet by a team of volunteers guided by the Debian Project Leader and three foundational documents: the Debian Social Contract, the Debian Constitution, and the Debian Free Software Guidelines. New distributions are updated continually, and the next candidate is released after a time-based freeze. Wikipedia
Any user who wishes to have the newest packages that include, but are not limited to, the Linux Kernel, SAMBA, git, desktops, office applications and many other packages, will want Tumbleweed. openSUSE
Qubes OS is a security-focused desktop operating system that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on Fedora, Debian, Whonix, and Microsoft Windows, among other operating systems. Wikipedia
Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. All its incoming and outgoing connections are forced to go through Tor, and any non-anonymous connections are blocked. Wikipedia).*
Whonix is a Debian GNU/Linux–based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux. All communications are forced through the Tor network to accomplish this. Wikipedia
Tor is free and open-source software for enabling anonymous communication. The name derived from the acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user. Wikipedia
Without signing in to a Google Account, Chromium does pretty well in terms of security and privacy. However, Chromium still has some dependency on Google web services and binaries. In addition, Google designed Chromium to be easy and intuitive for users, which means they compromise on transparency and control of internal operations. ungoogled-chromium addresses these issues in the following ways:
Remove all remaining background requests to any web services while building and running the browser
Remove all code specific to Google web services
Remove all uses of pre-made binaries from the source code, and replace them with user-provided alternatives when possible. Disable features that inhibit control and transparency, and add or modify features that promote them (these changes will almost always require manual activation or enabling). GitHub Recommended addons: uBlock Origin | HTTPS Everywhere | Privacy Badger | Decentraleyes | NoScript
Tor protects your privacy on the internet by hiding the connection between your Internet address and the services you use. We believe Tor is reasonably secure, but please ensure you read the instructions and configure it properly. GitHub
There are many ears listening on the Internet, which is why all our services require mandatory SSL/TLS-encrypted data transmission. For additional security, we also use enhanced (green) security certificates ("EV") by the independent SwissSign trust service provider from Switzerland (Check the padlock symbol in your web browser's URL field). But this is just the beginning – there is so much more that we do. Mailbox
Disroot is a decentralized cloud-based service that allows you to store your files and communicate with one another. Established by a privacy-focused organization of volunteers, if we look at Disroot as an email provider specifically, it stands out thanks to its emphasis on security with a completly free open-source approach. ProPrivacy
ProtonMail is an end-to-end encrypted email service founded in 2013 in Geneva, Switzerland by scientists who met at the CERN research facility. ProtonMail uses client-side encryption to protect email content and user data before they are sent to ProtonMail servers, unlike other common email providers such as Gmail and Outlook.com. The service can be accessed through a webmail client, the Tor network, or dedicated iOS and Android apps. Wikipedia
searx is a free metasearch engine, available under the GNU Affero General Public License version 3, with the aim of protecting the privacy of its users. To this end, searx does not share users' IP addresses or search history with the search engines from which it gathers results. Tracking cookies served by the search engines are blocked, preventing user-profiling-based results modification. By default, searx queries are submitted via HTTP POST, to prevent users' query keywords from appearing in webserver logs. Wikipedia - Find public instances of searx here searx.space
Startpage is a web search engine that highlights privacy as its distinguishing feature. Previously, it was known as the metasearch engine Ixquick, At that time, Startpage was a variant service. Both sites were merged in 2016. Wikipedia
YaCy is a free distributed search engine, built on principles of peer-to-peer (P2P) networks. Its core is a computer program written in Java distributed on several hundred computers, as of September 2006, so-called YaCy-peers. Each YaCy-peer independently crawls through the Internet, analyzes and indexes found web pages, and stores indexing results in a common database (so called index) which is shared with other YaCy-peers using principles of P2P networks. It is a free search engine that everyone can use to build a search portal for their intranet and to help search the public internet clearly. Wikipedia
Mullvad is an open-source commercial virtual private network (VPN) service based in Sweden. Launched in March 2009, Mullvad operates using the WireGuard and OpenVPN protocols. Mullvad accepts Bitcoin and Bitcoin Cash for subscriptions in addition to conventional payment methods. No email address or other identifying information is requested during Mullvad's registration process. Rather, a unique 16-digit account number is anonymously generated for each new user. This account number is henceforth used to log in to the Mullvad service. The TechRadar review notes that "The end result of all this is you don't have to worry about how Mullvad handles court requests to access your usage data, because, well, there isn't any." Wikipedia
ProtonVPN utilizes OpenVPN (UDP/TCP) and the IKEv2 protocol, with AES-256 encryption. The company has a strict no-logging policy for user connection data, and also prevents DNS and Web-RTC leaks from exposing users' true IP addresses. ProtonVPN also includes Tor access support and a kill switch to shut off Internet access in the event of a lost VPN connection. In January 2020, ProtonVPN became the first VPN provider to release its source code on all platforms and conduct an independent security audit. ProtonVPN is the only VPN to do so, even though experts say this is a crucial factor in deciding whether to trust a VPN service. Wikipedia
For information about alternatives to software and services.
If you are looking for alternatives to proprietary services like Discord and Facebook, or an open-source alternative to Photoshop, check out our list about Awesome-Alternatives
Mirrors are kept up to date, this post may lag behind as we add stuff in.
Cash app support number * 𝟏⥂𝟔𝟏𝟗-𝟑𝟗𝟑-𝟐𝟗𝟑𝟗 Customer support Number | Cash App Customer Service Number USA CA$#[email protected]#@",>>
Cash app support number * 𝟏⥂𝟔𝟏𝟗-𝟑𝟗𝟑-𝟐𝟗𝟑𝟗 Customer support Number | Cash App Customer Service Number USA CA$#[email protected]#@",>> Cash app support number * 𝟏⥂𝟔𝟏𝟗-𝟑𝟗𝟑-𝟐𝟗𝟑𝟗 Customer support Number | Cash App Customer Service Number USA CA$#[email protected]#@",>> Cash App: Cash App is a mobile payment service that allows users to transfer money to one another, as well as invest in stocks and Bitcoin. The app icon is green with a white dollar sign in the center. Square Point of Sale: Square Point of Sale is a mobile point of sale app that allows sellers to process payments, refunds, track inventory, send invoices, and much more. The app icon is white and gray with a square symbol in the center. Looking to contact Cash App Support? You can reach out to Cash App Support directly from the Cash App: From the app, tap on your profile image and scroll to the bottom of the page. Tap Support and review answers to common questions. If you’re not able to find your answer, tap Something Else. Select your reason > Contact Support. Contacting Cash App Support Without an Account If you’re unable to sign in or don’t have a Cash App account, we still want to hear from you! You can request contact through cash.app/help. If you select the instant transfer option, you will be charged a 1.5% of the total deposit amount to have the funds deposited to your bank account instantly. Deposits will arrive on your bank statement either with the prefix SQC* or with the name of the person who assigned you money. Receiving Limit: none You will be required to verify your name, your date of birth, and the last four digits of your SSN before you can receive over $1,000 in a time span of 30 days. After you confirm your account, there is no limit on the total amount of money you can receive on Cash app. Cash App Customer service contacts With some of the details covered above, you may still want to reach the customer care desk of square cash app. So, here are the phone number, email address and other important contact details of the company. How to contact cash app from the app Tap the visible profile icon on your Cash App home screen Scroll down and then tap Cash Support Tap Something Else o this screen Scroll down to your issue Tap Contact Support How to request cash app customer service to contact you Scroll down and then click Contact Support button Login to your account Navigate to your issue Click on Contact Support Cash app phone number You can call cash app customer service via phone on 855-351-2274 How to merge account details Tap on the profile icon on your Cash App home screen Now Scroll down and then select Personal Add any missing phone numbers or your email addresses Can I cancel a payment process The money transfer process is instantaneous and can’t be canceled. To get a reversal, you can use the contact details above or request the recipient to reverse using this process. Tap the clock icon on their Cash App home screen Select the wrong payment in question Tap … icon Select Refund Press OK to confirm
The fee schedule below provides the applicable rate based on the account's 30-Day Volume and if the order is a maker or taker. Bittrex Global Fee30 Day Volume (USD)MakerTaker$0k - $50k0.2%0.2%$50k - $1M0.12%0.18%$1M - $10M0.05%0.15%$10M - $60M0.02%0.1%$60M+0%0.08%>$100MContact TAM representative Trading expenses are incurred when an order is prepared by means of the Bittrex worldwide matching engine. While an order is being executed, the purchaser and the vendor are charged a rate primarily based on the order’s amount. The fee charged by Bittrex exchange is calculated by the formula amount * buy rate * fee. There aren't any charges for placing an order which is not being executed so far. Any portion of an unfinished order will be refunded completely upon order cancelation. Prices vary depending on the currency pair, monthly trade volume, and whether the order is a maker or taker. Bittrex reserves the right to alternate fee quotes at any time, including offering various discounts and incentive packages.
Your buying and selling volume affects the fee you pay for every order. Our expenses are built to encourage customers who ensure liquidity in the Bittrex crypto exchange markets. Your buying and selling charges are reduced according to your trade volume for the last 30 years in dollars. Bittrex calculates the 30-day value every day, updating every account's volume calculation and buying and selling charge between of 12:30 AM UTC and 01:30 AM UTC every day. You can check your monthly trade volume by logging in and opening Account > My Activity. https://preview.redd.it/n1djh2ob4zh51.jpg?width=974&format=pjpg&auto=webp&s=2eebb9c9ac63de207c4dd2e49bc45aeb53a8dec8
6. Withdrawing Funds
Withdrawing any type of funds is likewise simple. You can profit by buying and selling Bitcoin, Ether, or any other cryptocurrency. You determine the crypto address—to which the amount will be credited—and the transaction amount. The withdrawal fee will be automatically calculated and shown right away. After confirming the transaction, the finances will be sent to the specified addresses and all that you need to do is to wait for the community to confirm the transaction. If the 2FA is enabled, then the user receives a special code (via SMS or application) to confirm the withdrawal.
7. How to Trade on Bittrex Global
Currency selling and buying transactions are performed using the Sell and Buy buttons, accordingly. To begin with, the dealer selects a currency pair and sees a graph of the rate dynamics and different values for the pair. Below the chart, there is a section with orders where the user can buy or sell a virtual asset. To create an order, you just need to specify the order type, price, and quantity. And do not forget about the 0.25% trade fee whatever the quantity. For optimum profit, stay with liquid assets as they can be quickly sold at a near-market rate effective at the time of the transaction. Bittrex offers no referral program; so buying and selling crypto is the easiest way to earn. https://preview.redd.it/hopm6fih4zh51.jpg?width=1302&format=pjpg&auto=webp&s=68c0aaae86f64c3e6b9d351c3df2a9c331f94038
Bittrex helps you alternate Limit and Stop-Limit orders. A limit order or a simple limit order is performed when the asset fee reaches—or even exceeds—the price the trader seeks. To execute such an order, it is required that there's a counter market order on the platform that has the identical fee as the limit order.
Differences between Limit Order and Stop Limit Order
A stop limit order is a mixture of a stop limit order and a limit order. In such an application, charges are indicated—a stop charge and the limit.
Let’s discuss how you could trade conveniently with our service. The key features include a user-friendly interface and precise currency pair statistics (timeframe graphs, network data, trade volumes, and so forth). The platform’s top-notch advantage is handy, easy-to-analyze, customizable charts. There is also a column for quick switching between currency pairs and an order panel beneath the fee chart. Such an all-encompassing visual solution helps compare orders efficiently and in one place. You can use the terminal in a day or night mode; when in the night mode, the icon in the upper-right corner changes and notice the Bittrex trading terminal in night mode is displayed. The main menu consists of 4 sections: Markets, Orders, Wallets, Settings. Markets are the trade section. Bittrex allows handling over 270 currency pairs. Orders. To see all open orders, go to Orders → Open. To see completed orders, go to Orders → Completed. Wallets. The Wallets tab displays many wallets for all cryptocurrencies supported by the exchange and the current balance of each of them. After refilling the balance or creating a buy or sale order, you will see all actions in the section. Bittrex allows creating a separate wallet for every coin. Additionally, you can see how the coin price has changed, in terms of percentage, throughout the day. Here’s what you can also do with your wallets:
Hide zero balances: hide currencies with zero balance
Green and red arrows: replenish balance/withdraw funds
Find: search for a cryptocurrency
The Settings section helps manage your account, verification, 2FA, password modification, API connection, and many more.
How to Sell
The process of selling crypto assets follows the same algorithm. The only difference is that after choosing the exchange direction, you need to initiate a Sell order. All the rest is similar: you select the order type, specify the quantity and price, and click Sell *Currency Name* (Sell Bitcoin in our case). If you scroll the screen, the entire history of trades and orders will be displayed below.
LONG and SHORT
You can make a long deal or a short deal. Your choice depends on whether you expect an asset to fall or rise in price. Long positions are a classic trading method. It concerns purchasing an asset to profit when its value increases. Long positions are carried out through any brokers and do not require a margin account. In this case, the trader’s account must have enough funds to cover the transaction. Losses in a long position are considered to be limited; no matter when the trade starts, the price will not fall below zero with all possible errors. Short positions, in contrast, are used to profit from a falling market. A trader buys a financial instrument from a broker and sells it. After the price reaches the target level, the trader buys back the assets or buys them to pay off the initial debt to the broker. A short position yields profit if the price falls, and it is considered unprofitable the price matches the asset value. Performing a short order requires a margin account as a trader borrows valuable assets from a broker to complete a transaction. Long transactions help gain from market growth; short from a market decline.
Trade via API
Bittrex also supports algorithmic trading through extensive APIs (application programming interface), which allows you to automate the trading process using third-party services. To create an API key, the user must enable the two-factor authentication 2FA, verify their account, and log in to the site within 3 minutes. If all the requirements of the system are fulfilled, you can proceed to generate the API key. Log in to your Bittrex account, click Settings. Find API Keys. Click Add new key (Create a new key). Toggle on / off settings for READ INFO, TRADE, or WITHDRAW, depending on what functionality you want to use for our API key. Click Save and enter the 2FA code from the authenticator → Confirm. The secret key will be displayed only once and will disappear after the page is refreshed. Make sure you saved it! To delete an API key, click X in the right corner for the key that you want to delete, then click Save, enter the 2FA code from the authenticator and click Confirm.
Bittrex Bot, a Trader’s Assistant
Robotized programs that appeared sometimes after the appearance of cryptocurrency exchanges save users from monotonous work and allow automating the trading process. Bots for trading digital money work like all the other bots: they perform mechanical trading according to the preset parameters. Currently, one of Bittrex’s most popular trading bots is Bittrex Flash Crash Buyer Bot that helps traders profit from altcoin volatility without missing the right moment. The program monitors all the market changes in the market every second; also, it even can place an order in advance. The Bittrex bot can handle a stop loss—to sell a certain amount of currency when the rate changes in a favorable direction and reaches a certain level.
8. Secure Platform
Bittrex Global employs the most reliable and effective security technologies available. There are many cases of theft, fraud. It is no coincidence that the currency is compared to the Wild West, especially if we compare the 1800s when cowboys rushed to the West Coast of America to earn and start something new in a place that had no rules. Cryptocurrency is still wild. One can earn and lose money fast. But Bittrex has a substantial security policy thanks to the team’s huge experience in security and development for companies such as Microsoft, Amazon, Qualys, and Blackberry. The system employs an elastic, multi-stage holding strategy to ensure that the majority of funds are kept in cold storage for extra safety. Bittrex Global also enables the two-factor authentication for all users and provides a host of additional security features to provide multiple layers of protection. Bittrex cold wallet: https://bitinfocharts.com/en/bitcoin/address/385cR5DM96n1HvBDMzLHPYcw89fZAXULJP
Bittrex Global is a reliable and advanced platform for trading digital assets with a respected reputation, long history, and active market presence and development nowadays. The exchange is eligible to be used globally, including the US and its territories. The legal component of Bittrex Global is one of the most legitimate among numerous crypto-asset exchanges. The Bittrex team has had great ambitions and managed to deliver promises and more. The exchange staff comprises forward-thinking and exceptional individuals whose success is recognized in the traditional business and blockchain sector. Bittrex's purpose is to be the driving force in the blockchain revolution, expanding the application, importance, and accessibility of this game-changing technology worldwide. The exchange fosters new and innovative blockchain and related projects that could potentially change the way money and assets are managed globally. Alongside innovation, safety will always be the main priority of the company. The platform utilizes the most reliable and effective practices and available technologies to protect user accounts. Bittrex customers have always primarily been those who appreciate the highest degree of security. Because of the way the Bittrex trading platform is designed, it can easily scale to always provide instant order execution for any number of new customers. Bittrex supports algorithmic trading and empowers its customers with extensive APIs for more automated and profitable trading. One of the common features which is not available on the exchange is margin trading. No leverage used however adds up to the exchange's stability and prevents fast money seekers and risky traders from entering the exchange. Bittrex is a force of the blockchain revolution and an important entity of the emerging sector. The full version First part Second part
Urgent Advice Needed - Issues Refunding Money to a Client, Possible Money Laundering?
Hey everyone, so buckle up, this is a story. I'm a freelance translator with my name and contact info out on several sites to connect translators to clients. So, when I got an email from my customer, L, I didn't think anything of it when she asked me to translate a research paper from German to English. Prior to even opening the document she sent me, I told her I wanted a contract signed - nothing major, just run of the mill stuff. You know, to make sure both of us were protected. It entailed a 50% deposit for me (this paper was 46 pages and I have a policy that past X amount of words, I need a deposit for any time spent on a project. It's non-refundable, so I get paid even if the project gets canceled). She refused both of those things. Like most people, I'm in a pretty tough spot right now. I knew I shouldn't have even continued speaking with her, but with my fee agreed upon, I was looking at almost $10,000 for the entire projected when all three phases were complete. After refusing to sign a contract and agree to a deposit, she told me, and this is a direct quote "the money will be our contract". I was willing to operate on good faith, so I told her I'd get to work when the payment processed. The amount we agreed on for Phase One was 1150.00, but she sent me - via her "sponsor", some random account in Arizona, even though she claims to be overseas - 7,176.00. There was no warning, no notice telling me that they were sending me more than we agreed, or that the payment would be coming from Arizona. I contacted L and asked for clarification. She told me it was for payment for the next 2 phases due to start in the fall. I accepted that and kept working. I finished the project 2 weeks before it was due and sent her the final document. Two days later, she sends at email telling me that the final 2 phases have been postponed and she needs the extra 6 grand or so back, asap. Well, things happen, whatever. So I asked her how she wanted it returned to her. This is where shit gets weird. First, she tells me she wants it done via Zelle, which is connected directly to my bank. She sends me a contact and asks for all of the money to be sent at once. I tell her that since it's a new recipient, I can only send $500 and there's monthly limits on my account as to how much I can send in a 30 day period. Now, her name is Lara, that's the only person I've been talking to directly. But the name on the Zelle account was Caldon H. I thought that was the name of her sponsor. She proceeds to ignore my telling her about sending limits and demands a refund. I explain to her again, with screenshots from my banking app backing me up, that I'm limited by sending limits. I tell her that I'll repay her in $500 installments until all the surplus funds are returned. Not fast enough. She then demands I use Cashapp. Oiy. This was a mess. I did reading and research on the app, since I'd never heard of it before and was alarmed to say the least. But she was sending text after text, email after email demanding a status update. She sends me another account to transfer the money to: Linda. So, so far we have Lara, Caldon, Linda. Keep count of those names. I ask who Linda is, no answer, just more demands. Cashapp, true to fashion, fails. I'm unable to add so much as a dollar to my account to send "Linda" and while I wrestle with this and try and find support to contact - HAH - I get payment requests via Cashapp and yet more emails and texts from Lara. I explain to Lara, once again with screenshots showing that the app isn't working despite my linking both my debit card and checking account to it. She ignores that. Linda sends more payment requests. I tell her, hey this isn't working. What about Venmo? Paypal? She ignores that and demands wire transfer. She sends account info for someone named Mark. I ask who Mark is, no response. I attempt to send the wire transfer via my banking website and the bank legit tells me that that account does not accept wire transfers. What... So, more screenshots and then I ask her to double check account and routing numbers. She gets back to me with "the information is correct. Be patient when entering numbers." As if it's my fault. So I try it again and it fails, again. After that I contact my bank directly and speak with their support line. We do the whole song and dance and they tell me that everything is kosher on my end, but the issue lies with the information I was given, confirming my suspicions. I send her another email explaining everything, that I'd spoken directly with bank support. She tells me, once again, that the fault is mine and to just go to the post office and get money orders in $1000.00 amounts, leaving the recipient blank... Yeah you read that right. Leave it blank. Overnight it via Fedex to some guy named James, in Georgia. Arizona, Georgia, Germany. James, Caldon, Linda, Matthew, Lara. I tell her point blank, I can't go to the post office. I'm in Idaho and COVID cases are skyrocketing. I'm high risk, so is my partner and one of my two roommates. Like, die for sure, high risk. I try a wire transfer via Western Union instead. At this point, this has been going on for a week. I've been getting 4am texts and 6am phone calls for a week. She's on me for about 10-12 hours a day. I'm a full-time student on top of this, with one more semester of undergrad. But classes have taken a back seat so I can deal with this. Western Union holds the transfer under review and tells me that it will take 6 business days to show up in James' account. I tell Lara and assume that we're on the final leg of this mess. Surprise, WU cancels the wire transfer. I call support and they tell me it's issues with the account I'm sending money to. I tell Lara and she starts getting snappy. We try wire transfers for the last time, this time to someone named Matthew Green, different Matthew than the first, in Dallas. It fails. I spend $60 trying to send them. My bank calls ME and says they're concerned about fraud. I tell them I'm trying to send money and confirm info I was given. Once again, everything is fine with me, but it's issues with the account Lara wants me to send money to. I tell her and once again she changes her track. She demands, again, money orders, same rules as last time and I tell her no, again and explain why. She ignores that and tells me to do Cashapp, again. We spend an entire day with me telling that I'm not comfortable with Cashapp. It's not dependabe, it doesn't work. There's no support for me to contact if things go wrong - which of course it will - and she insists. She ignores my concerns and insists. I tell her, fine, but I want a written and signed statement from you that you are demanding this and that I'm not responsible if things get messed up and you never get the money. She signs a statement and the I try again. Same issues. I tell that, in another long email. By this point, it's been 2 weeks. I'm stressed, drained and tired of her weird behavior. I tell her that I've been understanding and patient with her. I've tried to help her fix her mistake of sending too much money too soon. That we never agreed on that much money and reminding her that SHE refused to sign a contact that would have protected us both. I tell her, Paypal or Venmo. No cashapp, no wire transfers (which I'm out $60 trying to send fyi). Paypal or venmo. If she doesn't have an account, find someone that does. She sends me a Paypal account url for someone named Micheal. A new name. I ask who Micheal is, who are these people? Why are they all over the US? She ignores that, demands the money. I try to send payments, but I can't send more than $5 to MIcheal at a time. I tell Lara and she blames me. Says I'm not doing it right. I'm supposed to send payments in multiple transactions of varying amounts, small to large. "No Tracking info", whatever that means. I tell her, look, I can't send you anything. Check your account info, I'm tired of this BS. She sends the same info again, nothing about her contacting support for once. I try again. It fails, same issues. I contact support myself and they tell me - - you guessed it, my account is solid. Hers is not. She is why the money isn't going through. I tell her that and suggest Venmo. At this point, I can't think of anything else and I'm planning on contacting my bank to ask advice, but my last request for Venmo was made at 11:30pm MST. I'd been dealing with this since 8am MST. I was tired, done. I sent that email and screencaps and turned my phone off for the night. I get up this morning, make my coffee and check my work email. I get an email form Lara saying that I'm the reason the payments are failing "once again" and "following my instructions, now. Send it via Venmo, no tracking info. Do it now." I decide to be a sport one last time. I try Venmo. It fails. I'm writing this post to ask for what other steps, legally, I need to take to protect myself. Once again, she didn't sign a contract. I've saved all emails and texts, and all of them show they we agreed on 1150.00 as payment for this job. They show that I've tried to return the money to her over the course of 2 weeks. She refuses to let me speak to Coldon, Linda, Matthew Green, Matthew M, James (who she claims died yesterday), or Micheal Brown. She answers none of my questions. She sends aggressive emails and so many texts that I had to block her number on my phone. I'm completely at a loss. The longer this goes on, the less legit it seems and I need some advice. I plan to speak to my bank today and ask if they can refund the money to the account that paid me. I can't get info on that account from Lara, no routing or account numbers. So my hopes are slim. I have no idea if Lara has any legal recourse or ground to stand on, since she refused to sign a contract and all attempts to return the money to her have failed. As I said, I've saved all emails and texts showing that I tried to work with her. Any ideas? Anything would help. I want this to be over and done with. UPDATE: I contacted the fraud department at my bank, explained everything and they said that we see that you've attempted to return the money multiple times and none of it has worked. They said I have 2 more options: "If they really want that money, offer to send a personal check. We'll start a research claim in the meantime and that will take up to 10 business days to either be resolved, or you will be contacted by a member of the Research Claims department." I asked what my options are if they refuse a personal check and the banker said "Then you've done everything you can. Wait for the research claim to be resolved or to be contacted. You've done everything you can up to this point and we can see that clearly." Lara has refused a personal check, demanding a cashier's check instead. I told her "My bank advised me to only send personal checks, not cashier's check. There must be a name and a legit address. I will not leave it blank." She asked me to send it via bitcoin. My reply: No. I have filed a research claim with the fraud department of my bank to get to the bottom of this. They will resolve it as they see fit. That will be my last communication with her.
As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic. If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties, and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? ,, Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?
FIRST THERE WAS BITCOIN
Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash.  Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis. This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster. This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain. This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:
CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES
Used in: Monero and Particl as its successor RING-CT, Bytecoin In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy. An updated CryptoNote version 2 came in October 2013 (though there is some dispute over this timeline ), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed ), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014. RING SIGNATURES and STEALTH ADDRESSES
– Provides sender and receiver privacy – Privacy can be default – Mature technology – Greater scalability with bulletproofs – Does not require any third-party
– Privacy not very effective without high volume -Does not hide transaction information if not combined with another protocol.
Used in: Dash Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013)., CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular ,. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party. COINJOIN
– Provides sender and receiver privacy – Easy to implement on any cryptocurrency – Lightweight – Greater scalability with bulletproofs – Mature technology
– Least anonymous privacy solution. Transaction amounts can be calculated – Even without third-party mixer, depends on wealth centralization of masternodes
Used in: Zcoin, PIVX In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman. In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016.  ZEROCOIN
– Provides sender and receiver privacy – Supply can be audited – Relatively mature technology – Does not require a third-party
– Requires trusted setup (May not be required with Sigma protocol) – Large proof sizes (not lightweight) – Does not provide full privacy for transaction amounts
Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza). It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016.  ZEROCASH
– Provides full anonymity. Sender, receiver and amount hidden. – Privacy can be default? – Fast due to small proof sizes. – Payment amount can be optionally disclosed for auditing – Does not require any third-party
– Requires trusted setup. (May be improved with zt-starks technology) – Supply cannot be audited. And coins can potentially be forged without proper implementation. – Private transactions computationally intensive (improved with Sapling upgrade)
Used in: Monero and Particl with Ring Signatures as RING-CT The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer., It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable. CONFIDENTIAL TRANSACTIONS
– Hides transaction amounts – Privacy can be default – Mature technology – Does not require any third-party
– Only provides transaction amount privacy when used alone
Used in: Monero, Particl Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015. RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”. RingCT was implemented in Monero in January 2017 and made mandatory after September 2017. RING -CONFIDENTIAL TRANSACTIONS
– Provides full anonymity. Hides transaction amounts and receiver privacy – Privacy can be default – Mature technology – Greater scalability with bulletproofs – Does not require any third-party
– Privacy not very effective without high volume
Used in: Grin Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra., Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”. The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here . MIMBLEWIMBLE
– Hides transaction amounts and receiver privacy – Privacy is on by default – Lightweight – No public addresses?
– Privacy not very effective without high volume – Sender and receiver must both be online – Relatively new technology
Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation. It allows users of a decentralized ledger to “execute offline computations that result in transactions”, but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.
Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other. Its history dates back to 2003. Kovri is a Monero created implementation of I2P. The Onion Router (Tor) is another anonymity layer ) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.,,
Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero). Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required. There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.
PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS
Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared. There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
You are at: Home » Reviews & Comparisons » Wallets » GreenAddress.it Review (2015) GreenAddress.it Review (2015) By Ariel Horwitz Last updated on January 2, 2018 at 00:00 3 Comments. When I started out with Bitcoin, there was very little choice in the wallet department, but these days there are so many it can get quite confusing. Normally I simply recommend a wallet for beginners but these ... Today, we will review GreenAddress, one of the age old and remarkable bitcoin wallets. Security of funds is one of the primary concerns of bitcoin users as there is no bank or authority to answer if you mistakenly send funds to the wrong destination. By security, we also mean prevention from thefts, cyber attacks, malwares and cloning. Here is a strong and reliable bitcoin wallet which was ... Bitcoin is the currency of the future. We don't make you choose between security and convenience. And we don't compromise your privacy.. Our per-transaction two factor authentication, multi-signature and deterministic wallet allow you unprecedented control over your transactions.. And, we never store your private keys, not even encrypted. At the same time we make it trivial to view and ... Denn während Bitcoin-Fans und Technik-Liebhaber voll auf ihre Kosten kommen, mangelt es anderen GreenAddress Wallet Coins. Altcoins, wie Ripple, Dash oder Ethereum können bei GreenAddress nicht gelagert werden. Gerade deshalb wechseln viele Menschen auf Wallets, um so alle Optionen auf einer Plattform verfügbar zu haben. Hier gibt es nicht nur Greenaddress Wallet Währungen (Bitcoin ... Sending bitcoin can be done by specifying the wallet from which to pull funds and either pasting the recipient address or scanning the QR code. All very par for the course. What is more interesting in the “instant confirmation” check box. When Green Address received two-factor confirmation on a transaction, they sign it as well, which provides a guarantee as to the legitimacy of the ...
jfGi.cc Bitcoin Address Shortener Demo with GreenAddress ...
In de winkel betalen met een laptop is wat ongemakkelijk. Hier toon ik hoe je de wallet van je PC ook kan gebruiken op je Smartphone. GreenAddress.com Commercial Ep. 01 "A safer wallet for Your Bitcoins!" Videotutorial acerca de cómo funciona el Wallet digital de GrrenAddress. Bitcoin is the currency of the future! And to secure your Wallet we use innovative an innovative multisignature and presigned transaction to offer a true ope... Green Address Bitcoin Wallet - Segwit, RBF, 2FA, Multisig and More - Duration: 23 ... Ledger Nano HW.1 Bitcoin Wallet Review & Setup - Duration: 12:30. DIYtutz 5,281 views. 12:30. Blockchain info ...