Security much? Twitter should have had a CISO to prevent ...
Security much? Twitter should have had a CISO to prevent ...
Bitcoin Ticker - Tick by tick - Real time updates
Top 100 Bitcoin Blogs and Websites on Bitcoin Crypto ...
5 Bitcoin-Zitate, die du kennen musst - BTC-ECHO
URL: Bedeutung einfach und verständlich erklärt - CHIP
Where Nerd Culture and Politics Meet
Welcome Nerds. From comic books, and movies, to gamers and roleplayers of all kinds, we discuss liberty and society through the story within nerd-dom. This stems from our podcast, Laissez Squares, which can be found here: URL: LaissezSquares.com RSS Feed: http://feeds.feedburner.com/laissezsquarespod Twitter: @LaissezSquares Facebook: https://www.facebook.com/pages/Laissez-Squares/
Tired of spammy social signals? We’re here to help!
Social Signals, Done Right
Real diversity.Social signals are a known ranking factor, but too many of one social network can look strange to Google. That’s why we offer six social networks in every package, perfectly proportioned to mimic natural growth.
Reliable seller. We use the highest quality accounts possible so your purchased social signals never drop (disappear).
Viral or drip feed. Choose between fast delivery (viral) or slow delivery (drip feed) on select packages. Customized drip feeding is available.
Multiple payment options. Pay via PayPal or Bitcoin, whichever you prefer.
Flexible Pricing Plans
All we need is your website URL(s) and keywords (if applicable). We do not need your Facebook, Twitter, or other profile links.
1.El web scraping es ilegal Muchas personas tienen falsas impresiones sobre el web scraping. Es porque hay personas que no respetan el gran trabajo en Internet y usan web scraping herramienta robando el contenido. El web scraping no es ilegal en sí mismo, sin embargo, el problema surge cuando las personas lo usan sin el permiso del propietario del sitio y sin tener en cuenta los Términos de Servicio (Términos de Servicio). Según el informe, el 2% de los ingresos en línea se pueden perder debido al mal uso del contenido a través del raspado web. Aunque el raspado web no tiene una ley clara y términos para abordar su aplicación, está abarcado por las regulaciones legales. Por ejemplo:
2. El web scraping y el web crawling son lo mismo El web scraping implica la extracción de datos específicos en una página web específica, por ejemplo, extraer datos sobre clientes potenciales de ventas, listados de bienes inmuebles y precios de productos. Por el contrario, el web crawling es lo que hacen los motores de búsqueda. Escanea e indexa todo el sitio web junto con sus enlaces internos. "Crawler" puede navegar por la web sin un objetivo específico. 3. Puedes scrape cualquier sitio web A menudo que las personas solicitan scraping cosas como direcciones de correo electrónico, publicaciones de Facebook o información de LinkedIn. Según un artículo titulado "¿Es legal el web scraping?" Es importante tener en cuenta las reglas antes de realizar el web scraping:
Los datos privados que requieren nombre de usuario y códigos de acceso no se pueden scraped.
Cumplimiento de los ToS (Términos de Servicio) que prohíbe explícitamente la acción de web scraping.
No copie datos con derechos de autor.
Una persona puede ser procesada bajo varias leyes. Por ejemplo, uno raspó cierta información confidencial y la vendió a un tercero, ignorando la carta de prohibición enviada por el propietario del sitio. Esta persona puede ser procesada bajo la ley de Trespass a Chattel, Violación de Digital Millennium Copyright Act (DMCA), Violación de la Ley de Computer Fraud and Abuse Act (CFAA) and Misappropriation No significa que no pueda scrape canales de redes sociales como Twitter, Facebook, Instagram y YouTube. Son amigables con los servicios de scraping que siguen las disposiciones del archivo robots.txt. Para Facebook, debe obtener su permiso por escrito antes de realizar el comportamiento de la recopilación automatizada de datos. 4. Necesitas saber cómo codificar Una herramienta de web scraping (herramienta de extracción de datos) es muy útil para profesionales no tecnológicos como especialistas en marketing, estadísticos, consultores financieros, inversores de bitcoin, investigadores, periodistas, etc. Octoparse lanzó una característica única: web scraping templates que scrapers preformateados que cubren más de 14 categorías en más de 30 sitios web, incluidos Facebook, Twitter, Amazon, eBay, Instagram y más. Todo lo que tiene que hacer es ingresar las palabras clave/URL en el parámetro sin ninguna configuración de tarea compleja. El web scraping con Python lleva mucho tiempo. Por otro lado, una plantilla de web scraping es eficiente y conveniente para capturar los datos que necesita. 5. Puede usar datos scraped para cualquier cosa Es perfectamente legal si extrae datos de sitios web para consumo público y los utiliza para análisis. Sin embargo, no es legal si scrape información confidencial con fines de lucro. Por ejemplo, scraping información de contacto privada sin permiso y venderla a un tercero para obtener ganancias es ilegal. Además, reempaquetar contenido raspado como propio sin citar la fuente tampoco es ético. Debe seguir de reglas sobre no enviar spam o cualquier uso fraudulento de datos está prohibido de acuerdo con la ley. 6. Un web scraper es versátil Tal vez ha experimentado sitios web particulares que cambian su diseño o estructura de vez en cuando. No se frustre cuando se encuentre con sitios web que su scraper no puede leer por segunda vez. Hay muchas razones. No se activa necesariamente al identificarte como un bot sospechoso. También puede ser causado por diferentes ubicaciones geográficas o acceso de la máquina. En estos casos, es normal que un web scraper no pueda analizar el sitio web antes de establecer el ajuste. 7. Puedes scraping web a alta velocidad Es posible que haya visto anuncios de scraper que dicen cuán rápidos son sus scrapers. Suena bien ya que le dicen que pueden recopilar datos en segundos. Sin embargo, si causas daños a la empresa, serás un delincuente y será procesado. Esto se debe a que una solicitud de datos escalables a una velocidad rápida sobrecargará un servidor web, lo que podría provocar un bloqueo del servidor. En este caso, la persona es responsable por el daño bajo la ley de "trespass to chattels" (Dryer y Stockton 2013). Si no está seguro de si el sitio web es scrapable o no, pregúntele al proveedor de servicios de desguace web. Octoparse es un proveedor de servicios de raspado web responsable que coloca la satisfacción de los clientes en primer lugar. Para Octoparse es crucial ayudar a nuestros clientes a resolver el problema y tener éxito. 8.API y Web scraping son lo mismo API es como un canal para enviar su solicitud de datos a un servidor web y obtener los datos deseados. API devolverá los datos en formato JSON a través del protocolo HTTP. Por ejemplo, Facebook API, Twitter API, y Instagram API. Sin embargo, no significa que pueda obtener los datos que solicite. El web scraping puede visualizar el proceso ya que le permite interactuar con los sitios web. Octoparse tiene plantillas de web scraping. Es aún más conveniente para los profesionales no tecnológicos extraer datos al completar los parámetros con palabras clave/URL. 9. The scraped data only works for our business after being cleaned and analyzed Many data integration platforms can help visualize and analyze the data. In comparison, it looks like data scraping doesn’t have a direct impact on business decision making. Web scraping indeed extracts raw data of the webpage that needs to be processed to gain insights like sentiment analysis. However, some raw data can be extremely valuable in the hands of gold miners. 9. Los scraped data solo funcionan para nuestro negocio después de ser limpiados y analizados Muchas plataformas de integración de datos pueden ayudar a visualizar y analizar los datos. En comparación, parece que el scraping de datos no tiene un impacto directo en la toma de decisiones comerciales. De hecho, el web scraping extrae datos sin procesar de la página web que deben procesarse para obtener información como el análisis de sentimientos. Sin embargo, algunos datos en bruto pueden ser extremadamente valiosos en manos de los mineros de oro. Con la plantilla de web scraping de Octoparse Google Search para buscar un resultado de búsqueda orgánica, puede extraer información, incluidos los títulos y meta descripciones sobre sus competidores para determinar sus estrategias de SEO; Para las industrias minoristas, el web scraping se puede usar para controlar los precios y la distribución de los productos. Por ejemplo, Amazon puede crawl Flipkart y Walmart en el catálogo "Electrónico" para evaluar el rendimiento de los artículos electrónicos. 10. El web scraping solo puede usarse en negocios El web scraping se usa ampliamente en varios campos además de la generación de leads, el monitoreo de precios, el seguimiento de precios y el análisis de mercado para empresas. Los estudiantes también pueden aprovechar una plantilla de web scraping de Google Académico para realizar investigaciones de tesis. Los agentes inmobiliarios pueden realizar investigaciones de vivienda y predecir el mercado inmobiliario. Podrá encontrar personas influyentes de Youtube o Twitter para promocionar su marca o su propia agregación de noticias que cubra los únicos temas que desea al scraping los medios de comunicación y los RSS feeds.
Blockchains are siloed systems that can only reference their own data, established by consensus. Oracles are the solution to the problem of working with external information, which is vital for many everyday use cases. Blockchains are intentionally self-contained. They reference information only recorded within their immediate ecosystem, that has been agreed upon by a majority of miners. Since the whole point of a blockchain, based on consensus, is that there are no sources of centralisation or single points of failure, that poses a problem. What happens when you want to engage with external information? Many blockchain-based applications need to process data from the real world. That might be financial information, such as market data and prices from exchanges, for DeFi applications; it could be sporting results, for eSports predictions markets; it could even be atmospheric noise information, for random number generators. Introducing Oracles Oracles are the software that serves as a link between these real-world sources of data and the siloed world of the blockchain. They are simple in principle, since they only need to create a series of transactions with the necessary data (ideally formatted in an easily-accessible way) at regular intervals. However, while anyone can record information to an open blockchain, that is a source of centralisation. So how do you trust an oracle? The answer is: you don’t. Just like the blockchain’s consensus method itself, you need multiple oracles pulling data from multiple sources, then coming to agreement about the value to record to the blockchain. So you don’t need to trust an individual miner, and you don’t need to trust an individual oracle. Example: bitcoin price data As an example, let’s say we want to record bitcoin’s closing price every day to the Ergo blockchain, to give us a long-term and reliable source of price data. We could take a dozen – or even a hundred – different data feeds, each pulling data from a major exchange. Coinbase, Bitstamp, Kraken, and so on. We make sure that many exchanges are represented, and while it’s good to have several examples of data from the same exchange, we don’t want any exchange over-represented. Then the parties need to reach consensus about the price. Let’s say there are 100 parties and prices involved. There are different ways they could do that:
Take the mean of all the prices they provide
Discard the highest and lowest 20 prices, and take the mean of the remaining 60 prices
Select the median price
Weight the prices, with the central cluster of prices having greater weight, and take the mean
The aim is to discard or downweight any outliers, which could be due to extreme price fluctuations on a single exchange, API outages, or dishonest oracle data providers, while retaining many good data points to ensure a single reliable record of price. Oracles are a hugely important part of the blockchain ecosystem. Once you have robust oracles in place, you can create all kinds of DeFi applications – including stablecoins, which are a vital part of the blockchain economy, and one we’ll be exploring on Ergo in the coming months. Share post: Facebook Twitter Ergoplatform.org
Ergo enables new models of financial interaction, underpinned by smart contracts built on flexible and powerful Sigma protocols but easily accessible to developers. One of the most exciting things about blockchain is the possibility of making digital agreements without any trusted intermediaries. In the simplest use case, pioneered by Bitcoin, Alice can send a payment directly to Bob, wherever the two of them are located around the world, with no bank or any trusted third party needed. However, with the functionality of a modern blockchain like Ergo, it is possible to make far more complex and sophisticated financial agreements than simple payments. Take the following example. Gold-backed tokens Alice uses ERGs to purchase gold-backed tokens from Bob. Bob stores the gold in a secure vault, and uses the blockchain to issue one token for every Troy ounce of gold he has. Alice can then use these tokens freely in different contracts, transferring and trading them under whatever conditions she specifies in the smart contract code. When Alice wants to sell the tokens for physical gold, she can conduct another transaction with Bob, receiving ERG in return, at market price. The point of blockchain contracts is to eliminate the need for trust. While the purchase transaction is now trustless, in this instance Alice still needs to trust Bob about two things. Firstly, Bob may refuse to swap the gold tokens back to ERG at the correct price when Alice wants to sell. Secondly, Bob may default on his obligations – running away with the gold, or misusing the funds he receives and running a fractional reserve. Extending the contracts To address these issues, we can create an Oracle, or decentralised price feed. This uses multiple sources of external data to record the price of gold to the blockchain at regular intervals. This price feed will be the reference point for the redemption contract that manages the sale of Alice’s gold with Bob (or any other participant). Thus the system automatically enforces the right price when a swap takes place. The second situation requires a third-party insurer, Charlie, whose service is also hosted on the blockchain with a smart contract. When Alice purchases gold from Bob, she additionally buys an insurance contract from Charlie. The payment can be dependent on factors including the amount of insurance required, and Bob’s reputation – again, managed by a decentralized feedback mechanism. Now, if Bob defaults, Alice will automatically receive the value of her gold tokens, with Charlie effectively acting as a buyer of last resort. Programmable contracts There are, of course, many other example use cases like this one. We can also extend this use case, adding further economic actors. For example, Charlie may sell shares in his insurance business to Dave and other participants, providing them with a proportion of revenues in return for ensuring he has the capital he needs to cover any liabilities from the outset. However, even the most complex use case is simpler than general-purpose software that can be used to program any contract. After all, generalised logic must be both far-reaching and secure. Moreover, even a specialised contract is made up of many steps, each of which is fairly simple. Thus another requirement for a general-purpose platform is that it should simplify the process of writing contracts, making them as accessible (and safe) as possible. This can be achieved with the use of template agreements, with customisable parameters. The insurance contract above could be based on a module with flexible parameters, for example. This could be used and reused in many different circumstances. Ergo’s approach This is essentially the approach that Ergo takes, providing superior support for real-world financial agreements. It does this through:
Support for multi-stage contracts (watch details for developers)
A simple high-level language, ErgoScript, enabling clear descriptions of contractual logic
Support for formal verification of contracts for improved security guarantees (Ergo Platform deployed its first formally verified p2p crowdfunding contract just three months after the network launched)
Easy Oracle creation
Native support for complex signature schemes In short, creating financial contracts on the blockchain isn’t just about the functionality you provide. It’s about making that functionality safe and accessible, as well as powerful. Ergo achieves this and more.
Imagine if there was one desk that all stories could cross so that, at 4am, a media plan could be decided upon and disseminated where all news outlets coordinated to set the goalposts of debate and hyper focused on specific issues to drive a narrative to control how you vote and how you spend money; where Internet shills were given marching orders in tandem to what was shown on television, printed in newspapers and spread throughout articles on the World Wide Web. https://i.imgur.com/Elnci0M.png In the past, we had Operation Mockingbird, where the program was supremely confident that it could control stories around the world, even in instructions to cover up any story about a possible “Yeti” sighting, should it turn out they were real. https://i.imgur.com/121LXqy.png If, in 1959, the government was confident in its ability to control a story about a Yeti, then what is their level of confidence in controlling stories, today? https://i.imgur.com/jQFVYew.png https://i.imgur.com/ZKMYGJj.png In fact, we have a recent example of a situation similar to the Yeti. When Bill Clinton and Loretta Lynch met on the TARMAC to spike the Hillary email investigation, the FBI was so confident it wasn’t them, that their entire focus was finding the leaker, starting with searching within the local PD. We have documentation that demonstrates the state of mind of the confidence the upper levels of the FBI have when dealing with the media. https://i.imgur.com/IbjDOkI.png https://i.imgur.com/NH86ozU.png The marriage between mainstream media and government is a literal one and this arrangement is perfectly legal. https://i.imgur.com/OAd4vpf.png But, this problem extends far beyond politics; the private sector, the scientific community, even advice forums are shilled heavily. People are paid to cause anxiety, recommend people break up and otherwise sow depression and nervousness. This is due to a correlating force that employs “systems psychodynamics”, focusing on “tension centered” strategies to create “organizational paradoxes” by targeting people’s basic assumptions about the world around them to create division and provide distraction. https://i.imgur.com/6OEWYFN.png https://i.imgur.com/iG4sdD4.png https://i.imgur.com/e89Rx6B.png https://i.imgur.com/uotm9Cg.png https://i.imgur.com/74wt9tD.png In this day and age, it is even easier to manage these concepts and push a controlled narrative from a central figure than it has ever been. Allen & Co is a “boutique investment firm” that managed the merger between Disney and Fox and operates as an overseeing force for nearly all media and Internet shill armies, while having it’s fingers in sports, social media, video games, health insurance, etc. https://i.imgur.com/zlpBh3c.png https://i.imgur.com/e5ZvFFJ.png Former director of the CIA and Paul Brennan’s former superior George Tenet, holds the reigns of Allen & Co. The cast of characters involves a lot of the usual suspects. https://i.imgur.com/3OlrX7G.png
In 1973, Allen & Company bought a stake in Columbia Pictures. When the business was sold in 1982 to Coca-Cola, it netted a significant profit. Since then, Herbert Allen, Jr. has had a place on Coca-Cola's board of directors. Since its founding in 1982, the Allen & Company Sun Valley Conference has regularly drawn high-profile attendees such as Bill Gates, Warren Buffett, Rupert Murdoch, Barry Diller, Michael Eisner, Oprah Winfrey, Robert Johnson, Andy Grove, Richard Parsons, and Donald Keough. Allen & Co. was one of ten underwriters for the Google initial public offering in 2004. In 2007, Allen was sole advisor to Activision in its $18 billion merger with Vivendi Games. In 2011, the New York Mets hired Allen & Co. to sell a minority stake of the team. That deal later fell apart. In November 2013, Allen & Co. was one of seven underwriters on the initial public offering of Twitter. Allen & Co. was the adviser of Facebook in its $19 billion acquisition of WhatsApp in February 2014. In 2015, Allen & Co. was the advisor to Time Warner in its $80 billion 2015 merger with Charter Communications, AOL in its acquisition by Verizon, Centene Corporation in its $6.8 billion acquisition of Health Net, and eBay in its separation from PayPal. In 2016, Allen & Co was the lead advisor to Time Warner in its $108 billion acquisition by AT&T, LinkedIn for its merger talks with Microsoft, Walmart in its $3.3 billion purchase of Jet.com, and Verizon in its $4.8 billion acquisition of Yahoo!. In 2017, Allen & Co. was the advisor to Chewy.com in PetSmart’s $3.35 billion purchase of the online retailer.
Previous conference guests have included Bill and Melinda Gates, Warren and Susan Buffett, Tony Blair, Google founders Larry Page and Sergey Brin, Allen alumnus and former Philippine Senator Mar Roxas, Google Chairman Eric Schmidt, Quicken Loans Founder & Chairman Dan Gilbert, Yahoo! co-founder Jerry Yang, financier George Soros, Facebook founder Mark Zuckerberg, Media Mogul Rupert Murdoch, eBay CEO Meg Whitman, BET founder Robert Johnson, Time Warner Chairman Richard Parsons, Nike founder and chairman Phil Knight, Dell founder and CEO Michael Dell, NBA player LeBron James, Professor and Entrepreneur Sebastian Thrun, Governor Chris Christie, entertainer Dan Chandler, Katharine Graham of The Washington Post, Diane Sawyer, InterActiveCorp Chairman Barry Diller, Linkedin co-founder Reid Hoffman, entrepreneur Wences Casares, EXOR and FCA Chairman John Elkann, Sandro Salsano from Salsano Group, and Washington Post CEO Donald E. Graham, Ivanka Trump and Jared Kushner, and Oprah Winfrey.
https://i.imgur.com/VZ0OtFa.png George Tenet, with the reigns of Allen & Co in his hands, is able to single-handedly steer the entire Mockingbird apparatus from cable television to video games to Internet shills from a singular location determining the spectrum of allowable debate. Not only are they able to target people’s conscious psychology, they can target people’s endocrine systems with food and pornography; where people are unaware, on a conscious level, of how their moods and behavior are being manipulated. https://i.imgur.com/mA3MzTB.png
"The problem with George Tenet is that he doesn't seem to care to get his facts straight. He is not meticulous. He is willing to make up stories that suit his purposes and to suppress information that does not." "Sadly but fittingly, 'At the Center of the Storm' is likely to remind us that sometimes what lies at the center of a storm is a deafening silence."
https://i.imgur.com/YHMJnnP.png Tenet joined President-elect Bill Clinton's national security transition team in November 1992. Clinton appointed Tenet Senior Director for Intelligence Programs at the National Security Council, where he served from 1993 to 1995. Tenet was appointed Deputy Director of Central Intelligence in July 1995. Tenet held the position as the DCI from July 1997 to July 2004. Citing "personal reasons," Tenet submitted his resignation to President Bush on June 3, 2004. Tenet said his resignation "was a personal decision and had only one basis—in fact, the well-being of my wonderful family—nothing more and nothing less. In February 2008, he became a managing director at investment bank Allen & Company. https://i.imgur.com/JnGHqOS.png We have the documentation that demonstrates what these people could possibly be doing with all of these tools of manipulation at their fingertips. The term for it is “covert political action” for which all media put before your eyes is used to serve as a veneer… a reality TV show facade of a darker modus operandum. https://i.imgur.com/vZC4D29.png https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol36no3/html/v36i3a05p_0001.htm
It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever costs. There are no rules in such a game. Hitherto acceptable norms of human conduct do not apply. If the US is to survive, longstanding American concepts of "fair play" must be reconsidered. We must develop effective espionage and counterespionage services and must learn to subvert, sabotage and destroy our enemies by more clever, more sophisticated means than those used against us. It may become necessary that the American people be made acquainted with, understand and support this fundamentally repugnant philosophy.
Intelligence historian Jeffrey T. Richelson says the S.A. has covered a variety of missions. The group, which recently was reorganized, has had about 200 officers, divided among several groups: the Special Operations Group; the Foreign Training Group, which trains foreign police and intelligence officers; the Propaganda and Political Action Group, which handles disinformation; the Computer Operations Group, which handles information warfare; and the Proprietary Management Staff, which manages whatever companies the CIA sets up as covers for the S.A.
…Those operations we inaugurated in the years 1955-7 are still secret, but, for present purposes, I can say all that’s worth saying about them in a few sentences – after, that is, I offer these few words of wisdom. The ‘perfect’ political action operation is, by definition, uneventful. Nothing ‘happens’ in it. It is a continuing arrangement, neither a process nor a series of actions proceeding at a starting point and ending with a conclusion.
CIA FBI NSA Personnel Active in Scientology: https://i.imgur.com/acu2Eti.png When you consider the number of forces that can be contained within a single “political action group” in the form on a “boutique investment firm,” where all sides of political arguments are predetermined by a selected group of actors who have been planted, compromised or leveraged in some way in order to control the way they spin their message. https://i.imgur.com/tU4MD4S.png The evidence of this coordinated effort is overwhelming and the “consensus” that you see on TV, in sports, in Hollywood, in the news and on the Internet is fabricated.
Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.' Thus the uninformed reader will most likely develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'
When you find yourself feeling like common sense and common courtesy aren’t as common as they ought to be, it is because there is a massive psychological operation controlled from the top down to ensure that as many people as possible are caught in a “tension based” mental loop that is inflicted on them by people acting with purpose to achieve goals that are not in the interest of the general population, but a method of operating in secret and corrupt manner without consequences. Notice that Jeffrey Katzenberg, of Disney, who is intertwined with Allen & Co funds the Young Turks. He is the perfect example of the relationship between media and politics.
Katzenberg has also been involved in politics. With his active support of Hillary Clinton and Barack Obama, he was called "one of Hollywood's premier political kingmakers and one of the Democratic Party's top national fundraisers."
Last week, former DreamWorks Animation CEO Jeffrey Katzenberg’s new mobile entertainment company WndrCo was part of a $20 million funding round in TYT Network, which oversees 30 news and commentary shows covering politics, pop culture, sports and more. This includes the flagship “The Young Turks” program that streams live on YouTube every day. Other investors in the round included venture capital firms Greycroft Partners, E.ventures and 3L Capital, which led the round. This brings total funding for Young Turks to $24 million.
Hollywood activism long has been depicted as a club controlled by a handful of powerful white men: Katzenberg, Spielberg, Lear, David Geffen, Haim Saban and Bob Iger are the names most often mentioned. But a new generation of power brokers is ascendant, including J.J. Abrams and his wife, Katie McGrath, cited for their personal donations and bundling skills; Shonda Rhimes, who held a get-out-the-vote rally at USC's Galen Center on Sept. 28 that drew 10,000 people; CAA's Darnell Strom, who has hosted events for Nevada congresswoman Jacky Rosen and Arizona congresswoman Kyrsten Sinema; and former Spotify executive Troy Carter, who held three fundraisers for Maryland gubernatorial candidate Ben Jealous (Carter also was a fundraiser for President Obama).
Viacom, after splitting off from Les Moonves Les Moonves ' CBS , still holds Paramount Pictures, and that movie studio in December agreed to acquire DreamWorks SKG, the creative shop founded by the Hollywood triumvirate of Steven Spielberg, David Geffen and Jeffrey Katzenberg (a former exec at The Walt Disney Co.). DreamWorks Animation had been spun off into a separate company. Now it's time for Freston to make back some money--and who better to do a little business with than George Soros? The billionaire financier leads a consortium of Soros Strategic Partners LP and Dune Entertainment II LLC, which together are buying the DreamWorks library--a collection of 59 flicks, including Saving Private Ryan, Gladiator, and American Beauty.
Inspired by this discussion in /modnews, this is a fully-automated subreddit that generates random submissions and comments using markov chains (see below for more info), with each bot account creating text based on comments from a different subreddit. This subreddit is intended to be watched, not interacted with. Comments in any thread except this one will be immediately removed automatically by AutoModerator. Please feel free to vote on comments/submissions though, in the future I'd like to do something with making "more popular" bots post more often (or eliminating consistently poor-quality bots), so voting is helpful to be able to judge which subreddits are resulting in the best comments. If you'd like to discuss anything about this subreddit, suggest new subreddit bots I should add, or link to particularly hilarious comments/submissions so other people don't miss it, please use /SubredditSimMeta.
How are the comments/submissions created?
The text for titles/comments/text-posts are generated using "markov chains", a random process that's "trained" from looking at real data. If you've ever used a keyboard on your phone that tries to predict which word you'll type next, those are often built using something similar. Basically, you feed in a bunch of sentences, and even though it has no understanding of the meaning of the text, it picks up on patterns like "word A is often followed by word B". Then when you want to generate a new sentence, it "walks" its way through from the start of a sentence to the end of one, picking sequences of words that it knows are valid based on that initial analysis. So generally short sequences of words in the generated sentences will make sense, but often not the whole thing. For a more detailed explanation with a walkthrough of generating something, see reostra's explanation here.
Every 6 hours at :58, a new submission is posted by all-top-today_SS. This submission uses a random url from the top 500 posts in /all in the last 24 hours, with a title generated by a markov chain of those 500 submissions' titles.
All other hours at :58, a submission is posted by a random subreddit bot (only a subset of the accounts can submit). The submission will be based on submissions from that subreddit.
Every 3 minutes (:00, :03, :06, etc.), a randomly-selected bot account will make a comment in the newest submission.
Current list of bots:
(Note: this list is in the order that they were added, with the newest ones at the bottom. The sidebar also has all accounts listed, ranked by average comment karma)
Reasons to believe Julian Assange is in CIA custody and WikiLeaks under duress.
UPDATE (11/01/2017 - UK Date Format): Julian Assange is alive and still in the Embassy. He confirms WikiLeaks has not been compromised. Julian took questions from the Reddit AmA but answered them via live, current and interactive video. He did this very intentionally, and by so doing, was true to his word. Watch a recording of the live event here: https://www.youtube.com/watch?v=rC2EjKYMCeg On the 26th of September 2016 Secretary of State John Kerry (self admitted Skull and Bones member) visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial. For over four years, the Ecuadorian embassy has been under surveillance and Julian's human rights violated as he has been unlawfully detained termed "illegal arbitrary detention" by a recent UN ruling. During that time, it has been possible for intelligence agencies to gather critical information and build a detailed profile and plan to circumvent Julian's dead man's switch. Both John Kerry and US intelligence agencies know perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that are damaging to Hillary's campaign. It has been very clear for a long time that many US officials wanted Julian Assange dead, Hillary Clinton even has remarked, "can't we just drone the guy". The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they know that media organisations already have the entire leaked email database and a schedule for release, they also know WikiLeaks staff would continue to leak regardless of Julian's ability to communicate. Removing Assange would not be enough, they would need to circumvent his dead man's switch and then tarnish WikiLeaks reputation. Removing Assange's internet could have the effect of causing Assange to take steps that can be followed to prevent the automatic triggering of his DMS. From the day Julian's internet was cut off, a series of peculiar and uncharacteristic events started to take place. The same day that Julian's internet was cut off, CBS reported that Pamela Anderson visited Assange and had "Tortured" him with a vegan sandwich. A few days before on the 14th, John Podesta tweeted "I bet the lobster risotto is better than the food at the Ecuadorian Embassy". Then on October the 16th the SHA-256 prerelease keys were issued on WikiLeaks twitter feed, although these events are odd and seemingly inconsequential, combined with John Kerry being in the UK from the 16th to the 17th sparked concern among the community for Julian's safety. Assange supporters started to gather at the embassy to keep Assange safe and witness any foul play, some of these witnesses have claimed that a very swift police armed raid took place that lasted only 5 minutes while the crowd was kept under control and prevented from approaching, there have also been reports that they were prevented from taking photographs and that their phones were confiscated. A live periscope feed was also cut off. There have also been some reports of the presence of a mobile jamming van. If Assange has been seized, any recognition by mainstream media would be detrimental to Hillary's campaign. A covert operation with media blackout would be the only effective way of seizing him at this time. On October the 18th Fox News said that Julian Assange would be "arrested soon, maybe in a matter of hours.". The was video was then promptly removed and articles relating to it have disappeared. However, one reddit user was able to find an alternative source and now the video can be found again on YouTube. Although Julian's primary DMS (the release of insurance file encryption keys) did not activate, on October the 18th one of Julian's contingencies did activate, a script was activated that made https://file.wikileaks.org/file publicly visible and set all the file date and time stamps to 01/01/1984 (Orwell reference). This file repository contains many documents that had not been released prior. Staffers Kristinn Hrafnsson and Sarah Harrison, have gone silent while the Ecuadorian embassy is refusing to provide any updates on Assange’s fate. There is a recorded call made to the embassy by a journalist where the receptionist refused to confirm that Julian was at the embassy, she also refused to confirm that Julian was even alive. Julian has not made an appearance at the window of the embassy since being cut off. WikiLeaks suggested in a tweet that its supporters were responsible for the DDOS attacks on the 21st. Neither Assange or WikiLeaks would ever insinuate such a thing. WikiLeaks deceptively tweeted a video of Michael Moore that was actually recorded in June. The video was posted on the 24th of October giving the impression that Michael Moore had been speaking with Assange in the embassy. Why would WikiLeaks do this when they know they are already under suspicion? WikiLeaks have been using their Twitter account to give the appearance of his safety while providing no concrete evidence of his safety. They issued a poll asking what proof would satisfy the public that Julian was safe. WikiLeaks have yet to follow up on the conclusive result of a video or window appearance. Julian Assange is known for his attention to detail and his consistently good spelling and grammar. Currently the twitter feed has very poor spelling, there are numerous uncharacteristic spelling errors, for example, an accomplished cryptographer knows how to correctly spell algorithm and so do WikiLeaks staff. On the 21st of October, there was a massive widespread DDOS attack that disrupted US and EU internet. Also on the 21st of October London City Airport was evacuated. The next day (the 22nd), Gavin MacFayden is reported dead. WikiLeaks made a further blunder by stating his death as the 23rd. There has been a number of high level WikiLeaks deaths recently too. John Jones QC - WikiLeaks U.N. lawyer died on April 16th 2016. Michael Ratner - WikiLeaks chief counsel died on May 11th 2016. Seth Rich - Employee of the Democratic National Committee (DNC) was fatally shot on July 10th 2016 and Gavin MacFadyen - WikiLeaks director died October 22nd 2016. If WikiLeaks has been compromised, it is already preparing the scene for future discrepancy to seriously tarnish WikiLeaks reputation. Nothing WikiLeaks has shared since the 15th of October 2016 should be trusted until Julian has been fully verified as alive. My speculative fears are that Julian has been seized and removed from the Embassy. His internet being cut not being related to the release of the emails, but rather as a component of a plan of 4 years in the making to as secretly as possible remove Assange from the embassy, circumvent his DMS and hijack WikiLeaks with the key team members silenced or under duress. My fears would be confirmed by no future public (mass witnessing and recorded/televised) appearance of Julian Assange discussing recent topics. His death by whatever means after the US presidential election would be extremely suspect. Until proof of life, assume the following compromised: SHA-256 verification Keys posted after the 15th. WikiLeaks submission process and/or platform. WikiLeaks twitter feed. Any WikiLeaks leaks after the 15th October 2016. EDIT: (01/11/2016 - 17:18GMT) URL and spelling corrections. EDIT: Update 16/12/2016 Why demanding proof that WikiLeaks is not compromised is necessary: https://www.facebook.com/events/309760466089922/ (PoL Event @ Ecuadorian Embassy London 17th December 2016) – If you live in the UK please come and let’s get REAL PoL. Please circulate. 1) Still no PGP (GPG) signed short message from WikiLeaks. 2) RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account) 3) Julian’s internet hasn’t been restored as promised 4) The pre-commitment file hashes released in October do not match the released insurance files 5) Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning. No one actually saw Julian through the whole process. Additional points: -UK disregard for international law -Capabilities of combined intelligence agencies -WikiLeaks down on October 17th -Mass censorship -WikiLeaks reposting old stuff -See timelines below Various timelines, some with minor errors: https://www.reddit.com/WikileaksTimeline/wiki/indexhttps://www.reddit.com/WhereIsAssange/comments/5dmr57/timeline_of_events_regarding_julian_assange_and/https://regated.com/2016/11/julian-assange-missing/ [Still no PGP (GPG) signed short message from WikiLeaks] Watch this https://youtu.be/GSIDS_lvRv4 video for a simple and good explanation of public/private key cryptography. Here https://riseup.net/en/canary is an example of how a legitimate cryptographically capable organisation uses PGP to sign a message and prove authenticity. WikiLeaks has this setup too. Why do they not use it and prove they are not compromised? WikiLeaks could easily do this. They have their private key. The public has WikiLeaks public key. Even if Julian isn’t in possession of the key, WL most certainly is, no excuse for WL not to prove themselves. This has been heavily requested of WikiLeaks. I’d like to hear from the individuals who claim that their requests were removed (please leave comments). Of all the red flags, not posting a PGP signed message is by far the most damming. If we are to believe that the person in the audio recording at the FCM 2016 is Julian Assange, then what he says about the keys is missing the point. If he himself is not in possession of the key, then WikiLeaks will be. If WikiLeaks use the key to prove themselves, then we know they are not compromised. By extension, we will also be assured that Julian is safe as an uncompromised WikiLeaks would be in a position to confirm his safety and be believed. This audio file includes everything that he says regarding PGP keys: http://picosong.com/UyVw/ (I am not convinced this is Julian). [RiseUp’s warning canary may be dead (RiseUp is believed to host WL Twitter email account)] RiseUp is an activist ISP providing secure services to activists. Its mission is to support liberatory social change via fighting social control and mass surveillance through distribution of secure tools (https://en.wikipedia.org/wiki/Riseup). RiseUp use a warrant canary as a means to protect their users in case RiseUp are ever issued with a NSL or gag order etc (https://riseup.net/en/canary). This is renewed quarterly, assuming no warrant has been issued. However, this is now considerably overdue so the assumption is that the canary is dead, and just like the canaries used in coal mines, everyone should get the hell out of there when it dies. https://theintercept.com/2016/11/29/something-happened-to-activist-email-provider-riseup-but-it-hasnt-been-compromised/. I would be grateful if someone could provide a source for the WikiLeaks twitter email account being hosted by RiseUp. [Julian’s internet hasn’t been restored as promised] https://twitter.com/wikileaks/status/787889195507417088https://twitter.com/wikileaks/status/788099178832420865 On the 26th of September 2016 Secretary of State John Kerry visited Colombia. WikiLeaks reported that inside sources had confirmed that John Kerry also met with Ecuadorean President Rafael Correa in Ecuador to personally ask Ecuador to stop Assange from publishing documents about Clinton. This was initially fervently denied in the press only later to be confirmed by the Ecuadorian Embassy who admitted cutting off Julian’s internet due to pressure from the US. Ecuador wanted to appear impartial. Both John Kerry and US intelligence agencies knew perfectly well that cutting off Julian's internet would have no impact on the release of the leaked emails that were damaging to Hillary's campaign. The cutting off of Julian's internet access was not for the purpose of preventing the leaks of the Podesta and Hillary emails. Unless intelligence agencies are truly inept, they knew that media organisations already have the entire leaked email database and a schedule for release, they also knew WikiLeaks staff would continue to leak regardless of Julian's ability to communicate. Now it is long after the election and Ecuador have still not restored Julian’s internet. Ecuador have no grounds to continue to restrict Julian’s internet. It does nothing apart from increase tensions and raise suspicion. Ecuador have always been supportive of Julian. However, after John Kerry applied pressure on Ecuador, that whole dynamic changed. Ecuador cut Julian's Internet. He then essentially threatened Ecuador, the UK and John Kerry by submitting those pre-commitment file hashes on Twitter. Since then we have only seen hostility towards Julian from all three parties. Ecuador didn't restore his internet and didn't let his lawyer interview him and no one actually saw him. The U.K. Denied him access to Gavin's funeral and denied him access to medical treatment. The UK also continually disregard the UN. The dynamic now is totally different. He has no political friends. It seems that both the UK and Ecuador are now working against Julian and Wikileaks. An environment where a collaborated siege would be feasible. Finally, many have speculated about mobile signals being blocked at the Embassy. I can confirm that there is 4G signal right outside the Embassy door. I was there, with my phone, and tested it. There is no reason to think Julian cannot use a MiFi device (or similar) connected to a cellular network. [The pre-commitment file hashes released in October do not match the released insurance files] Here are the October tweets with the file hashes: https://twitter.com/wikileaks/status/787777344740163584https://twitter.com/wikileaks/status/787781046519693316https://twitter.com/wikileaks/status/787781519951720449 These 3 pre-commitment Twitter posts are SHA-256 file hashes. SHA-256 file hashes are 64 characters long. They are not encryption keys for insurance files. They simply are a mathematical formula for verifying that later released files are genuine and have not been altered. These hashes were released because Julian felt threatened and in increased danger. They specifically targeted the UK FCO, Ecuador and John Kerry. All of whom are key players in his current predicament. On November 7th, WikiLeaks released 3 new insurance files. These files names match the names given in the pre-commitment hash tweets: 2016-11-07_WL-Insurance_EC.aes256 2016-11-07_WL-Insurance_UK.aes256 2016-11-07_WL-Insurance_US.aes256 EC = Ecuador, UK = UK FCO, US = John Kerry. Soon after these files were released, the 3 files hashes were compared to the 3 hashes posted on the 16th of October. They did not match. When this was brought to WikiLeaks attention, WikiLeaks released the following statement in a tweet: https://twitter.com/wikileaks/status/798997378552299521 “NOTE: When we release pre-commitment hashes they are for decrypted files (obviously). Mr. Assange appreciates the concern.” This firstly proved that the hashes and the insurance files were related (a fact that was already clear). Secondly, it was a lie, as it implied historical use of pre-commitment hashes in this manner. Thirdly, the (obviously) comment was also a deception and an insult to supporters. It was not obvious to anyone, not even to our crypto guys in /cryptography/, on the contrary, they thought it highly suspicious. Additionally, what they suggest would be absolutely pointless. Pointless as a threat, as the UK, Ecuador and John Kerry would have no practical way of identifying the documents to confirm the threat. There's absolutely no scenario where an uncompromised WikiLeaks would either post bad file hashes or altered insurance files. [Julian’s Swedish defense lawyer Per Samuelson was denied access during case questioning] This is highly unusual and very suspicious. Also, Jennifer Robinson was not in the room with Assange. https://www.youtube.com/watch?v=MYR0Pw9LfUQ&feature=youtu.be&t=9m55s and neither was the chief prosecutor http://www.bbc.co.uk/news/world-europe-37972528 “Swedish chief prosecutor Ingrid Isgren will not speak to Mr Assange directly”. [UK disregard for international law] The UK threat is very real. Back in August 2012 the UK was poised to break international law citing the Diplomatic and Consular Premises Act of 1987 as a basis for entering the Embassy and arresting Assange (http://www.bbc.co.uk/news/world-19259623). It all became very public, very quickly and fortunately never happened (http://www.telegraph.co.uk/news/worldnews/southamerica/ecuado9488996/Ecuadors-president-raiding-embassy-to-snatch-Julian-Assange-suicidal.html). I expressed my concern at the time that the UK shouldn’t have even been contemplating such action, let alone threatening it in writing to Ecuador. More recently, the UK disregarded the UN ruling that Julian Assange was being arbitrarily detained (https://www.theguardian.com/media/2016/feb/04/julian-assange-wikileaks-arrest-friday-un-investigation). The UK appealed, and then finally lost their appeal in November (https://www.rt.com/news/368746-un-ruling-free-assange/). Julian has also been refused to leave the Embassy with a police escort for medical treatment as well as denied to attend Gavin MacFadyen’s funeral. The UK’s behaviour is appalling and clearly has no respect for international law. The reported raid on the Embassy during the latter part of October seems more plausible when taken in the context of past behavior. This is the Britain I now live in: http://www.independent.co.uk/life-style/gadgets-and-tech/news/investigatory-powers-bill-act-snoopers-charter-browsing-history-what-does-it-mean-a7436251.html. I never used to be ashamed to be British. [Combined capabilities of intelligence agencies] We know much about the combined powers of the intelligence agencies. We know what they are capable of, thanks to the leaks of Edward Snowden. The combined powers of the NSA, CIA and the UK’s GCHQ are capable of pulling off such a massive takeover of Wikileaks. We know the NSA works with other US intelligence agencies, we know that the NSA works with GCHQ. We know about Tempora, we know about JTRIG, we know about PRISM, we know about HAVOK. We know that websites can be altered on the fly, we know that real-time voice profiling is trivial for these agencies. We know that censorship is happening. https://usnewsghost.wordpress.com/2014/07/15/new-july-14-edward-snowden-nsa-leaks-gchq-attacks-and-censors-internet-nsa-leaks-recent/http://www.independent.co.uk/life-style/gadgets-and-tech/gchqs-favourite-memes-and-sexual-slang-reveals-a-shared-culture-with-trolls-and-hackers-9608065.htmlhttps://en.wikipedia.org/wiki/Temporahttps://en.wikipedia.org/wiki/PRISM_(surveillance_program) The NSA has a remit to be 10 years ahead of the curve. We have commercial products that can be purchased off the shelf today that can easily manipulate audio and video. Just imagine what the NSA and the military are capable of. Real time facial manipulation: https://www.youtube.com/watch?v=ohmajJTcpNk Signs of editing: https://www.youtube.com/watch?v=2O9t_TEE1aw. Both Julian Assange and John Pilger are not filmed together at any time during the interview. There is also no establishing shot. It is also claimed that Assange’s audio is spliced and edited. No recent events mentioned by Assange, only Pilger. Unfortunately, this interview is not sufficient proof of life. What the NSA can’t do, is that they cannot break PGP encryption. This has been expressed by Glenn Greenwald who was one of the journalists that Edward Snowden leaked to. He commented that he knows how secure PGP is because the NSA keep moaning about not being able to crack it in their documents he is reading. This is another reason why a signed PGP message can be the only true proof that WL isn’t compromised. Mathematics cannot lie, people can and do. A compromised WL can’t sign a message without the private key. Edward Snowden revealed that in 2013 the NSA were capable of 3 trillion password attempts per second. As it is now almost 2017, that number will likely be multiple times higher (anywhere between 9 to 15 trillion attempts per second would be my guess based on Moore’s law). https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Grouphttps://en.wikipedia.org/wiki/Temporahttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)https://www.schneier.com/gchq-catalog/https://en.wikipedia.org/wiki/Government_Communications_Headquarters [WikiLeaks down on October 17th] The alleged raid on the Embassy supposedly took place on the 17th just after 1am GMT. On Monday the 17th of October 2016 WikiLeaks website was reported down (http://www.isitdownrightnow.com/wikileaks.org.html expand the comments) https://postimg.org/image/6t68fe4kj/. The internet was alive with reports of mass censorship around this time. This all coincides with when the alleged WikiLeaks takeover occurred. It also coincides with John Kerry being in the UK. [Christine Assange audio only radio interview] Julian's family had their identities changed quite a few years ago after receiving death threats. It is odd that his mother has now revealed herself to a news agency. If you do a YouTube search for Christine Assange (her original name), you'll find all the videos are older than 3 years. She's in hiding, not openly talking on radio shows (https://en.wikipedia.org/wiki/Julian_Assange scroll down to the personal life section). [WikiLeaks bitcoin account was emptied on the 18th of November] Interestingly it was after the bitcoin account was emptied that the encoded message in the blockchain was left. Why would WikiLeaks go to all that trouble when they could just sign a message with their PGP key? Is it because bitcoin accounts can be cracked and the PGP keys can’t? [Mass censorship] Facebook is censoring this event (https://www.facebook.com/events/309760466089922/). It has been advertised for weeks now any only a handful of people are attending. Recently Wikileaks was live on FB. 50% of the viewers (roughly 2.5k) were commenting #PoL, #Whereisassange, RIP etc. The live event was only a prerecorded video being played in loop. Once it concluded, the whole Live event along with all the comments including the comments asking for PoL and PGP signed message were deleted. It was as if it never took place. When Julian’s DMS had supposedly been activated, I saw posts in threads being deleted within minutes. Supposedly with encryption keys, but it all happened too fast for anyone to collate. I took PDF printouts of the pages and then later noticed that posts and entire links were taken down. I have PDF's of pages that now no longer exist. I've been following this since mid-October and seen the censorship first hand. I know many people here on reddit witnessed the same (please comment with your experiences). [WikiLeaks reposting old stuff] There are many examples of this already mentioned in the timelines. One for example is the Palantir Technologies report. Palantir Technologies prepared a report on how to destroy WikiLeaks that was leaked in 2011. The proposal was submitted to Bank of America through its outside law firm, Hunton & Williams. Palantir later apologised for their involvement. But WikiLeaks has recently regurgitated it as if it was new. There are many examples of this. I have watched as WikiLeaks have increasingly destroyed their credibility.
Tipping / Giving Tuesdays first 1000 comments get Bitcoin
Barbados Food Drive
Bitt.com has gracefully assisted us in providing the deep cold storage multi signature wallet solution. We want to maintain complete openness with /bitcoin. All funds will be right there for perusal - spent funds will have scanned invoices and clear explanations. We think transparency is paramount and are taking strives to ensure the community feels that their pledges are actually going to the hungry. I have personally pledged 1.9 BTC - Bitt & Changetip have also agreed to donate towards the cause. We will be recording parts of the event so /bitcoin may share in what we have all helped to create. PLEDGE FOR THE FOOD DRIVE BY EITHER DONATING HERE: 3Jma5Nh2kLjpXmbQ2WWDVj8mMn3Kx8zaNh or via changetip - all tips will be sent across to that address. If you have another crypto currency which you wish to donate in please write it in the thread and we will PM you directly to assist you. EDIT We have raised 2.4 BTC so far and are nearly at our target 3.0 BTC - We will keep the community abreast of all that happens and look forward to feeding some hungry people with our Magical internet money.
Little Bit Back
Tails – Anonymous Operating System Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:
use the Internet anonymously and circumvent censorship
all connections to the Internet are forced to go through the Tor network
leave no trace on the computer you are using unless you ask it explicitly
use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging
The Ronald McDonald House of the Capital Region is raising money through a Lighthouse campaign to purchase a medical grade breast pump, which already reached 93% out of the needed 5.6 BTC. Make your pledge directly at Lightlist.io or download the project file to open it in your Lighthouse client. SOME TIPPING SUGGESTIONS Those of you who just want the charity of your own pockets to expand still say Hi :) 100-1000 bits for the first 1000 comments! ### PLEASE CONSIDER PASSING MY TIPS ON TO OTHERS OR CHARITIES :D ###
Tipping/Giving Tuesdays - First 1000 comments get some free bitcoin! If you are new stop in and say hi! :D
Barbados Food Drive
Bitt.com has gracefully assisted us in providing the deep cold storage multi signature wallet solution. We want to maintain complete openness with /bitcoin. All funds will be right there for perusal - spent funds will have scanned invoices and clear explanations. We think transparency is paramount and are taking strives to ensure the community feels that their pledges are actually going to the hungry. I have personally pledged 2 BTC We will be recording parts of the event so /bitcoin may share in what we have all helped to create. PLEDGE FOR THE FOOD DRIVE BY EITHER DONATING HERE: 3Jma5Nh2kLjpXmbQ2WWDVj8mMn3Kx8zaNh or via changetip - all tips will be sent across to that address. If you have another crypto currency which you wish to donate in please write it in the thread and we will PM you directly to assist you. EDIT We have raised 2.7 BTC so far and are nearly at our target 3.0 BTC - We will keep the community abreast of all that happens and look forward to feeding some hungry people with our Magical internet money.
Little Bit Back
Tails – Anonymous Operating System Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:
use the Internet anonymously and circumvent censorship
all connections to the Internet are forced to go through the Tor network
leave no trace on the computer you are using unless you ask it explicitly
use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging
Donate bitcoin directly at Little Bit Back. SOME TIPPING SUGGESTIONS Those of you who just want the charity of your own pockets to expand still say Hi :) 100 bits for the first 1000 comments! ### PLEASE CONSIDER PASSING MY TIPS ON TO OTHERS OR CHARITIES :D ###
-** #TippingTuesdays on #meerkat - first 1000 people get free Bitcoin! (stop in and say hi) #meerkat http://mrk.tv/1GYiM2q - Also feel free to ask your bitcoin related questions on Meerkat if you are new**- IF YOU WISH TO DONATE TO THE RED CROSS FOR THE NEPAL DISASTER RELIEF - PLEASE FEEL FREE TO TIP HERE WITH THE MESSAGE FOR NEPAL AND I WILL FORWARD YOUR TIPS
These "double your Bitcoin" scams have been a persistent pest on Twitter for years but this is unprecedented with the actual accounts of public figures hijacked and on a large scale. Twitter. RSS. Home RSS Feeds CryptoCurrencyNews - RSS Feeds. Main RSS Feed 3014 Articles. Cryptocurrencynews provides daily updates on all things cryptocurrency including price highs/lows, blockchain information and news, ICO information and major company integration with and adoption of blockchain and cryptocurrency technology. Cryptocurrency 101 Articles. Educational content surrounding ... Twitter should have had a CISO to prevent Bitcoin hack, says US state financial body Plus: Platform 'censors' US newspaper and triggers ordure tsunami. Thu 15 Oct 2020 // 14:15 UTC 6 Got Tips? Gareth Corfield Bio Email Twitter. Share. Copy. American financial regulators in New York have demanded Twitter be subject to harsher rules following the July hacks of prominent users' accounts – as ... There is something going on with @Bitcoin twitter account: 1/ The URL of the white paper has been changed from bitcoin.com into bitcoin.org! 2/ @Bitcoin has unfollowed all other BCH related accounts. 3/ Most of the posts that refer to "bitcoin cash" have been deleted?!! On July 15th, many Twitter users, including Apple, Barack Obama, Joe Biden, and Kanye West, fell prey to a massive Twitter attack and tweeted out a bitcoin scam. Twitter took extreme measures in ...
How to make Webhook / Bot post Twitter / YouTube feeds on ...
How to find the RSS feed for your YouTube channel or YouTube playlist? In this tutorial, I show you how to easily get the RSS feed URL for any YouTube channe... Today In this video i will so how to copy twitter link or url Many times we need our twitter url but we can find easily But after watching this video you wil... Automated Signals Available, keep reading. Overview of a few months trading... Hello fellow BTC traders! Market: OkCoin BTCUSD3M futures. I share a strategy I've been fine-tuning for months. It's ... In this tutorial, I'll walk you through the steps to add a twitter feed to your Blogger, Tumblr, & Wordpress.com powered sites. Also, apologies for the amoun... 2019/2018 twitter timeline feed insert a your website using : https://publish.twitter.com/#