Flatten the Curve. #18. The current cold war between China and America explained. And how China was behind the 2008 Wall Street financial Crash. World War 3 is coming.
China, the USA, and the Afghanistan war are linked. And in order to get here, we will start there. 9-11 happened. Most of the planet mistakenly understood terrorists had struck a blow against Freedom and Capitalism and Democracy. It was time to invade Afghanistan. Yet all of the terrorists were linked to Saudi Arabia and not Afghanistan, that didn't make sense either. Yet they invaded to find Bin Laden, an ex CIA asset against the Soviet Union and it's subjugation of Afghanistan. The land in the middle of nowhere in relation to North America and the West. It was barren. A backwater without any strategic importance or natural resources. Or was there? The survey for rare earth elements was only made possible by the 2001 U.S. invasion, with work beginning in 2004. Mirzad says the Russians had already done significant surveying work during their military occupation of the country in the 1980s. Mirzad also toes the line for U.S. corporations, arguing, “The Afghan government should not touch the mining business. We have to give enough information to potential investors.” Rare Earth Elements. The elements that make the information age possible. People could understand the First Gulf War and the Geopolitical importance of oil. That was easy, but it still didn't sound morally just to have a war for oil. It was too imperialist and so they fell in line and supported a war for Kuwaiti freedom instead, despite the obvious and public manipulation at the UN by Nayirah. This is some of her testimony to the Human Rights Council. While I was there, I saw the Iraqi soldiers come into the hospital with guns. They took the babies out of the incubators, took the incubators and left the children to die on the cold floor. It was horrifying. I could not help but think of my nephew who was born premature and might have died that day as well. After I left the hospital, some of my friends and I distributed flyers condemning the Iraqi invasion until we were warned we might be killed if the Iraqis saw us. The Iraqis have destroyed everything in Kuwait. They stripped the supermarkets of food, the pharmacies of medicine, the factories of medical supplies, ransacked their houses and tortured neighbors and friends. There was only one problem. She was the daughter of Saud Al-Sabah, the Kuwaiti ambassador to the United States. Furthermore, it was revealed that her testimony was organized as part of the Citizens for a Free Kuwait public relations campaign, which was run by the American public relations firm Hill & Knowlton for the Kuwaiti government (fun fact, Hill & Knowlton also have extensive ties with Bill Gates). So the public was aghast at her testimony and supported the war against the mainly Soviet backed, but also American supported and Soviet backed Saddam Hussein, in his war against Iran, after the Iranians refused to Ally with American interests after the Islamic Revolution. But that was oil, this was Rare Earth Elements. There was a reason the war was called, Operation Enduring Freedom. This natural resource was far more important in the long run. You couldn't have a security surveillance apparatus without it. And what was supposed to be a war on terror was in actuality a territorial occupation for resources. Sleeping Dragon China is next, and where there's smoke, there's fire. Let's go point form for clarity. • China entered the rare earth market in the mid-1980s, at a time when the US was the major producer. But China soon caught up and became the production leader for rare earths. Its heavily state-supported strategy was aimed at dominating the global rare earth industry. • 1989 Beijing’s Tiananmen Square spring. The U.S. government suspends military sales to Beijing and freezes relations. • 1997. Clinton secures the release of Wei and Tiananmen Square protester Wang Dan. Beijing deports both dissidents to the United States. (If you don't understand these two were CIA assets working in China, you need to accept that not everything will be published. America wouldn't care about two political activists, but why would care about two intelligence operatives). • March 1996. Taiwan’s First Free Presidential Vote. • May 1999. America "accidently" bombs the Belgrade Chinese Embassy. • 2002 Price competitiveness was hard for the USA to achieve due to low to non-existent Chinese environmental standards; as a result, the US finally stopped its rare earth production. • October 2000. U.S. President Bill Clinton signs the U.S.-China Relations Act. China's take over of the market share in rare earth elements starts to increase. • October 2001. Afghanistan war Enduring Freedom started to secure rare earth elements (Haven't you ever wondered how they could mobilize and invade so quickly? The military was already prepared). • 2005. China establishes a monopoly on global production by keeping mineral prices low and then panics markets by introducing export quotas to raise prices by limiting supply. • Rare Earth Elements. Prices go into the stratosphere (for example, dysprosium prices do a bitcoin, rocketing from $118/kg to $2,262/kg between 2008 and 2011). • In a September 2005. Deputy Secretary of State Robert B. Zoellick initiates a strategic dialogue with China. This was presented as dialog to acknowledge China's emergence as a Superpower (which China probably insisted on), but it was about rare earth elements market price. • October 2006. China allows North Korea to conduct its first nuclear test, China serves as a mediator to bring Pyongyang back to the negotiating table with the USA. • September 2006. American housing prices start to fall. (At some point after this, secret negotiations must have become increasingly hostile). • March 2007. China Increases Military Spending. U.S. Vice President Dick Cheney says China’s military buildup is “not consistent” with the country’s stated goal of a “peaceful rise.” • Mid-2005 and mid-2006. China bought between $100b and $250 billion of US housing debt between mid-2005 and mid-2006. This debt was bought using the same financial instruments that caused the financial collapse. • 2006. Housing prices started to fall for the first time in decades. • Mid-2006 and mid-2007. China likely added another $390b to its reserves. "At the same time, if China stopped buying -- especially now, when the private market is clogged up -- US financial markets would really seize up." Council on Foreign Relations-2007 August • February 27, 2007. Stock markets in China and the U.S. fell by the most since 2003. Investors leave the money market and flock to Government backed Treasury Bills. I've never seen it like this before,'' said Jim Galluzzo, who began trading short-maturity Treasuries 20 years ago and now trades bills at RBS Greenwich Capital in Greenwich, Connecticut.Bills right now are trading like dot-coms.'' We had clients asking to be pulled out of money market funds and wanting to get into Treasuries,'' said Henley Smith, fixed-income manager in New York at Castleton Partners, which oversees about $150 million in bonds.People are buying T-bills because you know exactly what's in it.'' • February 13, 2008. The Economic Stimulus Act of 2008 was enacted, which included a tax rebate. The total cost of this bill was projected at $152 billion for 2008. A December 2009 study found that only about one-third of the tax rebate was spent, providing only a modest amount of stimulus. • September 2008. China Becomes Largest U.S. Foreign Creditor at 600 billion dollars. • 2010. China’s market power peaked in when it reached a market share of around 97% of all rare earth mineral production. Outside of China, there were almost no other producers left. Outside of China, the US is the second largest consumer of rare earths in the world behind Japan. About 60% of US rare earth imports are used as catalysts for petroleum refining, making it the country’s major consumer of rare earths. The US military also depends on rare earths. Many of the most advanced US weapon systems, including smart bombs, unmanned drones, cruise missiles, laser targeting, radar systems and the Joint Strike Fighter programme rely on rare earths. Against this background, the US Department of Defense (DoD) stated that “reliable access to the necessary material is a bedrock requirement for DOD” • 2010. A trade dispute arose when the Chinese government reduced its export quotas by 40% in 2010, sending the rare earths prices in the markets outside China soaring. The government argued that the quotas were necessary to protect the environment. • August 2010. China Becomes World’s Second-Largest Economy. • November 2011. U.S. Secretary of State Hillary Clinton outlines a U.S. “pivot” to Asia. Clinton’s call for “increased investment—diplomatic, economic, strategic, and otherwise—in the Asia-Pacific region” is seen as a move to counter China’s growing clout. • December 2011. U.S. President Barack Obama announces the United States and eight other nations have reached an agreement on the Trans-Pacific Partnership later announces plans to deploy 2,500 marines in Australia, prompting criticism from Beijing. • November 2012. China’s New Leadership. Xi Jinping replaces Hu Jintao as president, Communist Party general secretary, and chairman of the Central Military Commission. Xi delivers a series of speeches on the “rejuvenation” of China. • June 2013. U.S. President Barack Obama hosts Chinese President Xi Jinping for a “shirt-sleeves summit” • May 19, 2014. A U.S. court indicts five Chinese hackers, allegedly with ties to China’s People’s Liberation Army, on charges of stealing trade technology from U.S. companies. • November 12, 2014. Joint Climate Announcement. Barack Obama and Chinese President Xi Jinping issue a joint statement on climate change, pledging to reduce carbon emissions. (which very conveniently allows the quotas to fall and save pride for Xi). • 2015. China drops the export quotas because in 2014, the WTO ruled against China. • May 30, 2015 U.S. Warns China Over South China Sea. (China is trying to expand it's buffer zone to build a defense for the coming war). • January 2016. The government to abolish the one-child policy, now allowing all families to have two children. • February 9, 2017. Trump Affirms One China Policy After Raising Doubts. • April 6 – 7, 2017. Trump Hosts Xi at Mar-a-Lago. Beijing and Washington to expand trade of products and services like beef, poultry, and electronic payments, though the countries do not address more contentious trade issues including aluminum, car parts, and steel. • November 2017. President Xi meets with President Trump in another high profile summit. • March 22, 2018. Trump Tariffs Target China. The White House alleges Chinese theft of U.S. technology and intellectual property. Coming on the heels of tariffs on steel and aluminum imports, the measures target goods including clothing, shoes, and electronics and restrict some Chinese investment in the United States. • July 6, 2018 U.S.-China Trade War Escalates. • September 2018. Modifications led to the exclusion of rare earths from the final list of products and they consequently were not subject to import tariffs imposed by the US government in September 2018. • October 4, 2018. Pence Speech Signals Hard-Line Approach. He condemns what he calls growing Chinese military aggression, especially in the South China Sea, criticizes increased censorship and religious persecution by the Chinese government, and accuses China of stealing American intellectual property and interfering in U.S. elections. • December 1, 2018. Canada Arrests Huawei Executive. • March 6, 2019. Huawei Sues the United States. • March 27 2019. India and the US signed an agreement to "strengthen bilateral security and civil nuclear cooperation" including the construction of six American nuclear reactors in India • May 10, 2019. Trade War Intensifies. • August 5, 2019. U.S. Labels China a Currency Manipulator. • November 27, 2019. Trump Signs Bill Supporting Hong Kong Protesters. Chinese officials condemn the move, impose sanctions on several U.S.-based organizations, and suspend U.S. warship visits to Hong Kong. • January 15, 2020. ‘Phase One’ Trade Deal Signed. But the agreement maintains most tariffs and does not mention the Chinese government’s extensive subsidies. Days before the signing, the United States dropped its designation of China as a currency manipulator. • January 31, 2020. Tensions Soar Amid Coronavirus Pandemic. • March 18, 2020. China Expels American Journalists. The Chinese government announces it will expel at least thirteen journalists from three U.S. newspapers—the New York Times, Wall Street Journal, and Washington Post—whose press credentials are set to expire in 2020. Beijing also demands that those outlets, as well as TIME and Voice of America, share information with the government about their operations in China. The Chinese Foreign Ministry says the moves are in response to the U.S. government’s decision earlier in the year to limit the number of Chinese journalists from five state-run media outlets in the United States to 100, down from 160, and designate those outlets as foreign missions. And here we are. You may have noticed the Rare Earth Elements and the inclusion of Environmental Standards. Yes these are key to understanding the Geopolitical reality and importance of these events. There's a reason the one child policy stopped. Troop additions. I believe our current political reality started at Tiananmen square. The protests were an American sponsored attempt at regime change after the failure to convince them to leave totalitarian communism and join a greater political framework. Do I have proof? Yes. China, as far as I'm concerned, was responsible for the 2008 economic crisis. The Rare Earth Elements were an attempt to weaken the States and strengthen themselves simultaneously. This stranglehold either forced America to trade with China, or the trade was an American Trojan horse to eventually collapse their economy and cause a revolution after Tiananmen Square failed. Does my second proposal sound far fetched? Didn't the economy just shut down in response to the epidemic? Aren't both sides blaming the other? At this POINT, the epidemic seems to be overstated doesn’t it? Don't the casualties tend to the elder demographic and those already weakened by a primary disease? Exactly the kinds who wouldn't fight in a war. Does this change some of my views on the possibility of upcoming catastrophes and reasons for certain events? No. This is Chess, and there are obvious moves in chess, hidden moves in chess, but the best moves involve peices which can be utilized in different ways if the board calls for it. Is all what it seems? No. I definitely changed a few previously held beliefs prior to today, and I would caution you in advance that you will find some previously held convictions challenged. After uncovering what I did today, I would also strongly suggest reading information cautiously. This is all merely a culmination of ending the cold war, and once I have events laid out, you will see it as well. At this moment, the end analysis is a war will start in the near future. This will be mainly for a few reasons, preemptive resource control for water and crops, population reduction can be achieved since we have too many people, not enough jobs, and upcoming resource scarcity. Did you notice my omission of rare earth elements? This is because of Afghanistan. I would wager China or Russia is somehow supporting the continued resistance through Iran. But events are now accelerating with China because the western collation has already begun to build up their mines and start production. Do you remember when Trump made a "joke" about buying Greenland? Yeah. It turns out that Greenland has one of the largest rare earth mineral deposits on the planet. Take care. Be safe. Stay aware and be prepared. This message not brought to you by the Bill and Melinda Gates Foundation, Microsoft, Google, Facebook, Elon Musk, Blackrock, Vangaurd, the Rockefeller Foundation, Rand Corporation, DARPA, Rothschilds, Agenda 21, Agenda 30, and ID 2020.
Updated list of Global Beermoney opportunities (+180!) - June 2020
Updated list of Global Beermoney opportunities (+180!) - June 2020
The current, and now previous, Beermoney Global list started nearly 5 years ago. It’s been updated and has grown over all that time, but it also became a hassle to keep current. It was time to build a new list from scratch based on my experience in the Beermoney world over all these years and all the contributions all of you have been making in this sub. The lists consist of opportunities that are available in at least one country that is not the US. This means there are sites which only work in Canada or the UK. There’s sites which are open to the whole world, but this does not mean everyone can really earn something on it. It’s all still very demographic and therefore location dependent. This list should give you a starting point to try out and find what works for you. I’m not using everything myself as I prefer to focus on a few, so not all are tested by me. They are found in this sub, other subreddits and other resources where people claim to have success. I’ve chosen the format of a simple table with the bare minimum of information to keep things clean. It includes a link, how you earn, personal payment proof if available and sign-up bonus codes if applicable. Some of these bonuses are also one-time use codes specifically made for this sub! For the ones I don’t have payment proof (yet) feel free to provide some as a comment or via modmail so others know it’s legit. I am working on detailed instructions for each method that I personally use which will include things like cashout minimum, cashout options, tips & tricks,... For now I’ve split things up based on the type of earning like passive or mobile. Because of this there’s sometimes an overlap as some are both passive and on mobile or both earning crypto and a GPT (Get Paid To) website. The lists are obviously not complete so I invite you to keep posting new ones in the sub, as a comment to this post, or in modmail. Especially if you have sites or apps which work for one single specific country I can start building a list, just like I did for The Netherlands and Belgium. If you recognize things which are in fact scams or not worth it let me know as well.
Get Paid To (Surveys, tasks, offers, videos, clicking links, play games, searching)
For The Netherlands there are a few very good options next to a bunch of ‘spaarprogramma’s. There ‘spaarprogramma’s are all the same where you receive and click a bunch of e-mails, advertisements, banners,... I advise you to create a separate e-mail address or use a good filter in your inbox as you will be spammed to death. I believe they can be a nice piece of beermoney but they take quite the effort.
Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.
Flatten the Curve. Part 48. Source Here It's getting crazier day by day now, so are you following the Boy Scout motto? On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.” Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island. But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply. Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it. But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right? Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court. 'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act. Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies. The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you. Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more. Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered. PACOM? Why isn't that command group responsible for the South China Sea? Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India. Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here Nah. I'm just fear mongering and Doomscrolling again. Heads up and eyes open. Talk soon.
Hello folks, I am from India. I have decent savings. I don't know anything about the trading. When I was trying to learn something about the Stocks one of my friend's suggested me to invest in Bitcoins. I am from agricultural background. Honestly, I don't know anything much but trust me I am fast learner. Can you guys guide me through this? Bitcoins are better than the Stocks? If yes, when should I start learning? Can you suggest me any books? How to start trading? I wanted to know everything before trading. Will definitely appreciate your help!
Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!
If you know of a scam that is not covered here, write a comment and it will be added to the next edition.
Caller ID spoofing It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you. Email spoofing The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created. SMS spoofing SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.
The most common scams
The fake check scam (Credit to nimble2 for this part) The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
The scammer sends you a very real looking, but fake, check. Sometimes they'll call it a "cashier's check", a "certified check", or a "verified check".
You deposit the check into your bank account, and within a couple of days your bank makes some or all of the funds available to you. This makes you think that the check is real and the funds have cleared. However, the money appearing in your account is not the same as the check actually clearing. The bank must make the funds available to you before they have cleared the check because that is the law.
For various and often complicated reasons, depending on the specific story line of the scam, the scammer will ask you to send someone some of the money, using services like MoneyGram, Western Union, and Walmart-2-Walmart. Sometimes the scammer will ask for you to purchase gift cards (iTunes, Amazon, Steam, etc) and give them the codes to redeem the gift cards. Some scammers may also give you instructions on how to buy and send them bitcoins.
Within a couple of weeks, though it can take as long as a month, your bank will realize that the check you deposited was fake, and your bank will remove the funds that you deposited into your account and charge you a bounced check fee. If you withdrew any of the money from the fake check, that money will be gone and you will owe that money to the bank. Some posters have even had their bank accounts closed and have been blocked from having another account for 5 years using ChexSystems.
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent. Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it. Bitcoin job scams Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins. Email flooding If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere. Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse. Employment certification scams You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist. Craigslist fake payment scams Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule. General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter. Credit card debt scam Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement. The parcel mule scam A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods. The Skype sex scam You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious. What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account. The underage girl scam You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer. What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money. Phishing Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious. The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam. The blackmail mail scam This is very similar to the blackmail email scam, but you will receive a letter in the mail. Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse. Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on. Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum. Man in the middle scams Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to. Cam girl voting/viewer scam You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories. Amateur porn recruitment scam You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer. Hot girl SMS spam You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card. Identity verification scam You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to. This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website. Multi Level Marketing or Affiliate Marketing You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.
You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls. Tax Call You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world. Warrant Call Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards. [Legal Documents/Process Server Calls] Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number. Student Loan Forgiveness Scam Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program. Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam. Chinese government scam This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats. Chinese shipping scam This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators. Social security suspension scam You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information. Utilities cutoff You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin. Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same. Mexican family scam This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help. General family scams Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money. One ring scam Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.
Online shopping scams
THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is. Dropshipping An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer. Influencer scams A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products. Triangulation fraud Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer. Instagram influencer scams Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time. Cheap Items Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off. Cheap Amazon 3rd Party Items You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam. Scams on eBay There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month. Scams on Amazon There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items. Scams on Reddit Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online. Computer scams Virus scam A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.
Chinese Brushing / direct shipping If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings. Money flipping Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.
Door to door scams
As a general rule, you should not engage with door to door salesmen. If you are interested in the product they are selling, check online first. Selling Magazines Someone or a group will come to your door and offer to sell a magazine subscription. Often the subscriptions are not for the duration or price you were told, and the magazines will often have tough or impossible cancellation policies. Energy sales Somebody will come to your door claiming to be from an energy company. They will ask to see your current energy bill so that they can see how much you pay. They will then offer you a discount if you sign up with them, and promise to handle everything with your old provider. Some of these scammers will "slam" you, by using your account number that they saw on your bill to switch you to their service without authorization, and some will scam you by charging higher prices than the ones you agreed on. Security system scams Scammers will come to your door and ask about your security system, and offer to sell you a new one. These scammers are either selling you overpriced low quality products, or are casing your home for a future burglary. They ask to enter your home While trying to sell you whatever, they suddenly need to use your bathroom, or they've been writing against the wall and ask to use your table instead. Or maybe they just moved into the neighborhood and want to see how you decorate for ideas. They're scoping out you and your place. They want to see what valuables you have, how gullible you are, if you have a security system or dogs, etc.
Begging With a Purpose "I just need a few more dollars for the bus," at the bus station, or "I just need $5 to get some gas," at a gas station. There's also a variation where you will be presented with a reward: "I just need money for a cab to get uptown, but I'll give you sports tickets/money/a date/a priceless vase." Three Card Monte, Also Known As The Shell Game Unbeatable. The people you see winning are in on the scam. Drop and Break You bump into someone and they drop their phone/glasses/fancy bottle of wine/priceless vase and demand you pay them back. In reality, it's a $2 pair of reading glasses/bottle of three-buck-chuck/tasteful but affordable vase. CD Sales You're handed a free CD so you can check out the artist's music. They then ask for your name and immediately write it on the CD. Once they've signed your name, they ask you for money, saying they can't give it to someone else now. Often they use dry erase markers, or cheap CD sleeves. Never use any type of storage device given to you by a random person, as the device can contain malware. White Van Speaker Scam You're approached and offered speakers/leather jackets/other luxury goods at a discount. The scammer will have an excuse as to why the price is so low. After you buy them, you'll discover that they are worthless. iPhone Street Sale You're approached and shown an iPhone for sale, coming in the box, but it's open and you can see the phone. If you buy the phone, you'll get an iPhone box with no iPhone, just some stones or cheap metal in it to weigh it down. Buddhist Monk Pendant A monk in traditional garb approaches you, hands you a gold trinket, and asks for a donation. He holds either a notebook with names and amounts of donation (usually everyone else has donated $5+), or a leaflet with generic info. This is fairly common in NYC, and these guys get aggressive quickly. Friendship Bracelet Scam More common in western Europe, you're approached by someone selling bracelets. They quickly wrap a loop of fabric around your finger and pull it tight, starting to quickly weave a bracelet. The only way to (easily) get it off your hand is to pay. Leftover sales This scam involves many different items, but the idea is usually the same: you are approached by someone who claims to have a large amount of excess inventory and offers to sell it to you at a great price. The scammer actually has low quality items and will lie to you about the price/origin of the items. Dent repair scams Scammers will approach you in public about a dent in your car and offer to fix it for a low price. Often they will claim that they are mechanics. They will not fix the dent in your car, but they will apply large amounts of wax or other substances to hide the dent while they claim that the substance requires time to harden. Gold ring/jewelry/valuable item scam A scammer will "find" a gold ring or other valuable item and offers to sell it to you. The item is fake and you will never see the scammer again. Distraction theft One person will approach you and distract you, while their accomplice picks your pockets. The distraction can take many forms, but if you are a tourist and are approached in public, watch closely for people getting close to you.
https://preview.redd.it/n5pkxql0crh51.jpg?width=1280&format=pjpg&auto=webp&s=959d7b4051bd1c20b53cfc28ee1c4cbdd355382e Swipe opened the month of August with the launch of its Swipe Network Staking and its announcement to run a Decentralized Finance Lending/Earn application on Binance Smart Chain. This was also followed by the plan to release product updates, events, listings, or partnerships every week until the end of 2020. Bringing their promise and commitment true to the public, here are the activities that Swipe has released for the past two weeks: https://preview.redd.it/5ztwd3p3crh51.jpg?width=1280&format=pjpg&auto=webp&s=a5305d9e040318cfe9e3da0a3a721c88cbaf80ae Swipe Launches Staking/DeFi Swipe has recently launched its test network for Swipe Network Testnet Staking and, at the same time, announced its plans to launch a Decentralized Finance Lending/Earn application on Binance Smart Chain. With the launch of the Swipe Network testnet, users can use the Swipe Faucet to grab testnet-SXP to use on the decentralized finance application. Users will be able to bond SXP to the Swipe Network smart contract as collateral to ensure the guarantee of conversions for these exchanges. A reserve system in place to lock SXP and guarantee that the merchant and payment networks receive the exact fiat amount is in place as Swipe facilitates real-time conversions on-demand. Users will receive up 12% APY on their staked SXP within the Swipe Network off-chain and a variable rate for on-chain. Swipe plans to enable staked SXP to earn the processing fees it charges in the future as well on top of the collateral rewards from staking. Also, Swipe revealed its plans to launch a DeFi App on Binance Chain called SwipeFi, which will enable Binance Chain tokens to be used to earn interest on their supply of collateral to the protocol and borrow against their collateral directly on the Binance blockchain. Swipe (SXP) Trading Competition Last August 5 to 12, Swipe and Binance team have both committed a total of 100,000 SXP and 50,000 USDT in prizes to thank its users worldwide for their continued support and to also celebrate the Swipe acquisition and SXP/USDT listing in Futures, Margin and Spot markets. The contest was divided into three categories: a new user exclusive rewards, a trading competition, and the Lucky 99, which awarded users ranked 99th, 199th, 299th, 399th, and so forth until the 9999th place of the top 10,000 SXP traders based on their trading volume. Swipe x WBTC Swipe has partnered with WBTC Network and has officially been approved as a merchant for WBTC minting through the WBTC Network’s DAO Governance process. Swipe Wallet users will be able to benefit from instantly wrapping Bitcoin BTC to Wrapped Bitcoin (WBTC) and vice versa with just a few clicks. Swipe has also listed WBTC on the Swipe Wallet platform and Swipe Visa Card to enable users to buy, sell, exchange, and spend WBTC at over 60 million merchants worldwide. SXP on CoinDCX SXP, the native token of Swipe, is now listed and live on its second Indian Exchange CoinDCX. Trading for $SXP token is now live for CoinDCX users who wish to trade SXP/BTC and SXP/USDT. CoinDCX trading links for SXP: https://coindcx.com/trade/SXPBTC&https://coindcx.com/trade/SXPUSDT Wazirx AMA Session Swipe Chief Executive Officer (CEO) Joselito Lizarondo, held an AMA session with the Telegram community of Wazirx, a bitcoin exchange in India, last August 7. In the AMA session, Lizarondo answered questions about Swipe, Swipe Card, its new partnership with Binance, and the recent projects that the company has announced. The community also asked if Swipe is planning to bring its card services to India as it is one of the biggest crypto market countries at present. To read the whole summary of the AMA visit: https://blog.wazirx.com/ama-with-joselito-lizarondo-ceo-founder-of-swipe-summary/ New Swipe Product Manual Swipe has released a new “redefined” white paper under the title: Swipe Product Manual. The Swipe Product Manual was designed with simplicity in mind for easy and coherent descriptions of the Swipe ecosystem of products. This will describe all of Swipe’s current and future products that the team has planned. Technical descriptions and documentation will be made available, as required, per protocol, as some will have API access for developers. The Swipe Product Manual can be viewed by clicking here or by going to https://sw.pe/ProductManual or downloading https://swipe.io/ProductManual.pdf to your desktop. Swipe 0% Fees Starting Monday, August 17, Swipe Wallet and Swipe Card users will no longer have to pay any fees to buy, sell, and pay with crypto. Users can now purchase, sell, and convert cryptocurrencies to and from fiat currencies without the previous 1% fee. Swipe cardholders will also enjoy waived membership fees and free card shipping. Swipe Staking As Swipe prepares to launch the Swipe Network Staking mainnet, the Swipe Wallet application will support SXP staking. Users will enjoy staking rewards based on their SXP balances that are held on the Swipe Wallet beginning on August 23, 00:00 UTC. More details of the staking can be viewed at: https://medium.com/swipe/swipe-wallet-to-support-sxp-staking-acfab4589813 Swipe Reddit AMA In his first blog post on Medium, Swipe CEO Joselito Lizarondo answered the questions that the Reddit community asked regarding Swipe’s activities and plans for the future. He talked about the new partnership programs of Swipe, its newly released “Product Manual,” and the new roadmap, which will be kept in stealth “to focus on bringing maximum value to these announcements and products.” Read the whole transcript of Joselito Lizarondo’s AMA here: https://medium.com/swipe/swipe-reddit-ama-8-13-80690e2f6589 Swipe and Kava Partnership Swipe has formed a strategic partnership with Kava Labs to further grow the USDX DeFi Ecosystem as Swipe prepares to bring decentralized finance applications to the Binance Smart Chain. Swipe has also listed KAVA and USDX on the Swipe Wallet platform where users can buy and sell KAVA and USDX with a linked bank account or credit/debit card as well as enabled it to be converted and spent at over 60 million merchants worldwide with the Swipe Visa Card. $16M+ Ecosystem Rewards Program for BNB Holders on Binance Swipe is launching a 12-week-period $16,000,000 Ecosystem Rewards Program for BNB holders, starting August 17. This program aims to continue to promote the usage of Swipe products, including the Swipe Network Staking and Governance within a strong community. With Swipe’s partnership with Binance, a weekly distribution of 333,333.33 SXP will run to BNB holders on Binance.com. Know more about the Rewards Program here: https://medium.com/swipe/swipe-launches-16m-ecosystem-rewards-program-for-bnb-holders-on-binance-e79ffc9dc252 Swipe’s Chainlink Based Price Oracles Now Live Swipe has collaborated with Chainlink, the market-leading decentralized oracle network, to launch a live SXP-USD price oracle on the Ethereum mainnet. By switching to Chainlink, users receive stronger guarantees around trust and transparency in the payments process, as critical price feeds for the network are now completely decentralized and available to monitor on the blockchain. This decentralized infrastructure ensures that reward issuances and token burns only take place based on accurate, highly available, and tamper-proof on-chain prices that have no single point of failure or absolute truth. Users can independently verify the current price, how price updates occur, which nodes are providing data to the network, and more. This means users no longer need to rely on Swipe to produce fair conversion rates. --- Stay up-to-date with all the latest news from Swipe Website: https://swipe.io Twitter: https://twitter.com/SwipeWallet Facebook: https://facebook.com/Swipe Instagram: https://instagram.com/Swipe Medium: https://medium.com/Swipe Telegram: https://t.me/SwipeWallet & https://t.me/Swipe LinkedIn: https://www.linkedin.com/company/swipewallet YouTube: https://youtube.com/SwipeWallet
Interview With Eddie Jiang: How CoinEx Is Adapting To The Exchange Space And Growing
Written by chaintalk.tv https://preview.redd.it/v238540taz751.jpg?width=1280&format=pjpg&auto=webp&s=2a852e171a74e49da802d7c12fadba452cf4cf43 We recently had the opportunity to interview the VP of ViaBTC Group, Eddie Jiang. ViaBTC Group owns popular crypto exchange CoinEx and ViaBTC Pool. In this interview Eddie discusses being the first exchange to use BCH as the base currency, ViaBTC Pool and integrating with CoinEx, new features and ambassador program, and competing with other exchanges like Binance and Huobi. Please enjoy the interview below. How come you decided to open up CoinEx to other cryptos other than just BCH? Eddie Jiang: CoinEx is the world’s first exchange to implement Bitcoin Cash as a base currency. At that time, it was evident that there was a demand for BCH trading markets, and we are the first to explore this opportunity. It also shows our determination to support the BCH’s development. As CoinEx is developing, our goal becomes bigger and we are aiming at the global market. We need to constantly improve our product diversification to meet the different needs of more users, so we open up to other cryptos. In the past six months, we have listed more than 50 new tokens. Up to now, we have listed 129 cryptos and 313 markets. Besides, in addition to spot trading, CoinEx also supports perpetual contract and other derivatives trading. How does CoinEx integrate with the ViaBTC Pool? Eddie Jiang: ViaBTC Group announced a strategic upgrade, which included a new organizational structure, product innovations and service improvements, on 30 May. As part of the change, the Group has established three dedicated business units (BU): the financial services BU, consisting of ViaBTC mining pool and CoinEx exchange; the infrastructure services BU, including ViaWallet and Blockchain Explorer; and the ecological development BU, focusing on the research and development of public chain technology and the construction of the ecology. After halving, the combination of mining and finance will become closer and closer. Investing in mining machines is like buying a Bitcoin option. Miners need more flexible financial products to maintain and increase the value of assets, or hedging services. Based on this judgment, the operations of ViaBTC mining pool and CoinEx exchange will be integrated in the future to realize the financial empowerment of the mining pool to meet the diverse financial needs of miners. Features of this integrated product upgrade can be summarized as: “ The mining pool is the wallet, and the wallet is the transaction.” ViaBTC is the world first mining pool that has a wallet embedded in the mining pool account. Users do not need to transfer the mined coins, and can realize the function of coin exchange within the wallet. For example, they can directly convert the mined coins into USDT to pay electricity bill. What’s more, users can store, deposit and withdraw their revenue, and transfer assets to CoinEx at any time without charge, as well as complete other operations on the exchange, such as purchasing wealth management products for asset preservation and appreciation. In addition, we also provide hedging services. All of the above functions can be completed in one stop in the mining pool, without the need to transfer assets between different platforms. The exchange empowers the mining pool, and the mining pool will further bring more traffic and resources to the exchange. The two complement each other and development coordinately. CoinEx has recently added many new features. Can you talk about what new updates were made to the platform and why you made them? Eddie Jiang: We have always attached great importance to the development of overseas markets since our establishment, and one of our major goals this year is to cover at least 10 different languages speaking markets. To realize this and to meet the needs of more users worldwide, CoinEx has been continuously optimizing and upgrading its operating strategies, products and services. Our product diversifications are constantly improving. As I said before, we have launched leverage trading, perpetual contract trading, and wealth management products in addition to just spot trading. However, we don’t ignore the importance of spot trading. More mainstream, popular, and high-quality tokens have been listed, and up to now, there are 129 tokens and 313 trading pairs on CoinEx. During the epidemic, we have never slowed down our development. Lacking of the OTC service has always been a shortage for CoinEx. In March, we partner with Simplex to integrate the first fiat onramp to our platform. People now can buy crypto with their credit cards, which lowers the threshold for more people to enter the crypto world. Moreover, we announced global strategic partnership with Matrixport to provide people with large amount of fiat to crypto needs the OTC service. These newly launched services also help to attract more users. At the same time, CoinEx has been launched in Arabic, Italian, English, Japanese, Russian, Korean and other 16 languages. Earlier we also carried out product upgrades, making the UI and function sections clearer. In terms of operations, we launched an upgraded CoinEx Ambassador program in March. To best utilize each ambassador’s personal strengths, there are four categories of CoinEx Ambassador with different responsibilities, namely Referral Ambassador, Marketing Ambassador, Operation Ambassador, and Business Ambassador, which will expand our brand’s exposure and help CoinEx grow into a more international exchange platform. From March until now CoinEx has seen a 100% increase in user registrations. Why is that and are you able to see where they are coming from? Eddie Jiang: Because of the efforts mentioned above, in 2020, we’ve seen an exponential increase in activity in just the past few months alone. In this year alone, CoinEx’s daily registered users increased by 100%. These new users mainly come from markets such as the Middle East, Asia Pacific, and more. Interestingly, we saw an uptick in traffic from the Middle East in March. User growth in Southeast Asia also picked up significantly, newly registered users increased by 133.6% in April. With Binance, BitMex, Huobi, Bybit, and Deribit, controlling most of the crypto futures and options markets, where do you see CoinEx fitting in? How do you plan to capture market share from these large exchanges? Eddie Jiang: We won’t compete with others. We focus on ourselves to improve products and our goal is to be better than yesterday. Our pace is solid and steady, instead of focusing on temporary heat and flow. We have always attached great importance of spot trading, and we are committed to be responsible for users’ investment. We have set up CoinEx Institution, which is dedicated on project research. A listing committee consist of core team members review and vote on projects recommended by the CoinEx Institution. In this way, fraud projects are avoided as much as possible. Besides, we will focus on niche areas with great potential. For example, Southeast Asia and the Middle East. CoinEx can serve users in those countries well by providing a platform with rich cryptos to trade, and will pay more efforts on refined operations in different countries. Moreover, CoinEx has a very complete ecosystem. Financial services, infrastructure, and ecological development, the three business units complement each other. The infrastructure BU is our cornerstone and is positioned as a defensive product; the financial service BU is a cash cow and is positioned as an aggressive product; the ecological development BU focuses on the public chain ecology and is the future infrastructure. What is the geographical breakdown of the CoinEx userbase? Eddie Jiang: The current proportion of CoinEx’s overseas users has reached 80% of the total registered users, and mainly in Australia, Southeast Asia, North America, Middle East and South Korea. Do you have plans to focus on any certain jurisdictions? How will you do that? Eddie Jiang: When we evaluate regions, two things matter: policy and potential. Whether an exchange’s business expansion in a region is smooth or not largely depends on the region’s policies. If the region is not very friendly towards cryptocurrency or has repeated attitudes, there will be more difficulties and the cost will be much higher. For a region’s development potential, we need to think about the demand and market development status. South Korea, Southeast Asia, the Middle East and other regions are all areas with good potential for cryptocurrency development. Compared with Europe and America, policy risks in these countries are lower, and the supervision mechanism is relatively complete. The public has a high degree of awareness of cryptocurrencies. Besides, some regions or countries have inflation problems due to political and economic reasons. CoinEx will continue to focus on the Middle East and South Asia, which are relatively niche. India has just lifted ban on cryptocurrency trading this year, and there are many cryptocurrency investors in Indian. CoinEx can serve them well by providing a platform with rich cryptos to trade. More people in the Middle East are interested cryptos, especially in countries that are subject to economic sanctions or high inflation. For those people, cryptocurrencies are one of the best choices for asset preservation. Since the CoinEx Ambassador program launched in March, it has been almost three months. We are conducting the second round of ambassador recruitment. This time, we will use the power of ambassadors to expand our recruitment coverage and strive to attract more crypto enthusiasts from all over the world to grow together with CoinEx. Moreover, we will launch the National Expansion plan and leverage on the CoinEx and ViaBTC mining pool resources, to further explore the Russian market. At the market level, we will make more PR efforts in local markets, and start refined operations. What is CoinEx Chain and CoinEx DEX? Eddie Jiang: CoinEx Chain is a public chain built on the Tendermint consensus protocol and the Cosmos SDK. It consists of three dedicated public chains parallel to each other. Among these three chains, CoinEx DEX meets the most basic needs of DeFi for token issuance, transfer, and transactions. The Smart Chain is designed to meet the needs of complex financial scenarios and delivers programmable cash. The Privacy Chain facilitates privacy and security. On November 11, 2019, we took the lead in launching the Mainnet of CoinEx DEX. CoinEx DEX is the world’s first public chain dedicated to decentralized transactions. Users can easily manage their digital assets on it. CoinEx DEX can fully satisfy the following conditions: users have private keys at their own disposal; transfers and transactions are all completed on-chain, which is 200% transparent and checkable; the issuance, transfer, and transaction of tokens do not require review or permission; the community governance and operation is decentralized, similar to EOS, and validators are introduced to the community ecosystem construction and governance. There are currently 41 validators. It also has extreme performance. TPS reaches as high as 10,000 and transactions are confirmed within seconds. The transaction fee, 0.0001 US dollars for each transaction, is negligible. Third, it’s simple and easy to use. The new operation interface design helps beginners get started quickly; with the one-click token issuing module, users only need to fill in a few items to issue tokens; the built-in automated market-making module guarantees liquidity. How will CoinEx DEX improve the decentralized exchange space that has been unable to gain much adoption? Eddie Jiang: There are many challenges and difficulties facing centralized exchanges. The first difficulty is security. Security is a huge concern for CEXs. Over the last 10 years, hackers have stolen more than $1.5 billion from centralized exchanges. In fact, research groups estimate that hackers stole somewhere between $950 Million and $1 Billion from centralized exchanges in 2018 alone. There were also incidents of coin thefts in other exchanges in 2019. Many exchanges, such as Mt. Gox, Youbit, were forced to file for bankruptcy and shut down as a result of hacks. The second is high management costs. Centralized exchanges need to list a large number of cryptocurrencies and each of them have different trading pairs. That entails huge efforts in development and maintenance and, thus, high management costs. The last is global policies. Cryptocurrency is faced with different regulatory policies in different countries. Every time a centralized exchange enters a country, it needs to adapt itself to local regulatory policies for compliance. This is a holdback for the exchange’s rapid market expansion globally. Such adaptation will also bring a huge learning cost for the exchange team. Obviously, these problems can be well solved by DEX. CoinEx DEX is a true DEX with full open source and full community governance, as well as without depending on official nodes, websites, wallets, etc. On DEX, users are able to in charge of their own private keys and assets all by themselves. Their assets are more safe and secure. Transfers and transactions are all completed on-chain, which is 200% transparent and checkable; and the issuance, transfer, and transaction of tokens do not require review or permission. What’s more, CoinEx DEX provides a great and convenient user experience. How will CoinEx Chain and DEX help the crypto industry as a whole? Eddie Jiang: The public chain is the cornerstone of the blockchain industry. CoinEx Chain has the parallelism of multiple dedicated public chains, each of which performs its own functions, by cross-chaining for both high performance and flexibility. CoinEx Chain is committed to building the next generation of blockchain financial infrastructure. It is a more complete ecosystem built around the DEX public chain. The DEX public chain is a dedicated public chain developed specifically for token issuance and trading and the biggest improvement on trading speed, so it only supports the necessary functions, not smart contracts. But smart contracts are the foundation for building more complex financial applications. Outside the DEX public chain, CoinEx Chain also includes a Smart Chain that supports smart contracts. Moreover, as privacy issues on the current blockchain have been criticized, it is one of the core tasks of CoinEx Chain to safeguard users’ privacy. Similar to the Smart Chain, the Privacy Chain specifically supports transaction privacy protection. With cross-chain circulation, it can improve the privacy characteristic of the entire CoinEx Chain ecosystem. Nowadays, 1.7 million people in the world have no bank accounts; however, among them, two thirds are smartphone users with huge demands for financial services. The public chain will empower DeFi applications’ development and popularization, not only help more companies to seize the huge market opportunity, but also to bring lasting transformations and improvements in people’s lives. With so many crypto exchanges, what is the future outlook of CoinEx when it comes to the crypto exchange space? Eddie Jiang: It has been nearly 3 years since CoinEx has been launched, but it’s quite young for an entrepreneurial team. We have seen too many projects’ failures due to governance issues. CoinEx has a very elite team with high technical and management capabilities. In terms of business, CoinEx has gradually developed with diversified business and a complete ecosystem. It’s clear that the market will still grow very fast in the future, and the market size is still very large. We will continue to improve our products, put more efforts in marketing and operations, as well as look for more high-quality projects, to increase the number of users and transactions on the platform. Lay a solid foundation, and I’m sure the time will come for us to shine. What updates is the CoinEx team most excited for? Eddie Jiang: We are very excited about the National Expansion Plan which will be launched later this year. It is an important part in CoinEx’s globalization strategy. We will actively explore some new markets while consolidate the original ones. CoinEx will set aside 10 million US dollars to set up a “Pioneer Fund” to support this plan. This fund will be used to support local cryptocurrency projects and promote the development of the local cryptocurrency communities through investment or cooperation. Our goal this year is to invest in projects and communities that are conducive to expanding the CoinEx ecosystem in countries with high development potential. Original article ClickHEREto register on CoinEx
Bitcoin (BTC) trading in India is experiencing a resurgence since the Supreme Court’s decision to nullify the central bank’s 2018 crypto ban. However, insiders say the lack of regulatory clarity is still posing hurdles for virtual currency commerce in the country. India’s Booming Bitcoin Trading Scene According to Quartz India,… Best Bitcoin Trading Platforms. The first step to get started trading bitcoin is choosing a reliable platform. When starting out with bitcoin trading, we recommend that you opt for a user-friendly Some trading sites offer demo accounts for newbies to learn how to place a bitcoin trade using the system’s “demo trading” feature with the real market trends. Trading in bitcoin is similar to buying and selling shares. Trades are generally placed based on the last traded price. In case of a buy, a bid is placed at the lowest possible price. The Supreme Court of India has struck down a ban on banks dealing with cryptocurrencies in India, paving the way for users to start trading with renewed vigour in cryptocurrencies.
What is Bitcoin ? !! How to Buy Bitcoin in India ? !! Bitcoin Trading 2020 !!
===================================================== Visit our forum: https://mastersofcrypto.com/forum/ ===================================================... Here is a quick guide on how you can buy cryptocurrencies like Bitcoin, ethereum etc in India Legally and safely. Do watch the video full as I included all the steps in this video. DISCLAIMER : Bitcoin Trading is Very Risky, And 70% of Traders don't make Money. Make sure to you understand these risk if you are a beginner. I only recommend crypto trading to already ... #bitcoin price prediction how to open a bitcoin account how to start bitcoin trading I am using trading exchanges : HURRY UP TO SIGNUP worlds biggest exc... How to Start Crypto Trading in India Coinex Basic Tutorials 1. Coinex: https://bit.ly/2FSnPWV 2. Buy/sell Bitcoin From India: Giottus : https://bit.ly/2L91RSw Reffer Id: RRVJGMA125 ***** TCT ...