Minimum Requirements of ubuntu 18.04 LTS - Ask Ubuntu

How to run Bitcoin Core 0.20.0 on Ubuntu Server 20.04 LTS using a Raspberry Pi 4 (or Virtual Machine)

I was helping someone on twitter with this so I figured I'd share the information here as well so that other people would have an easier time than I did.
I'm going to explain how to do this setup on a Raspberry Pi, but note that this should work on a VM as well. You can also set up and run the node headless this way, but I will be explaining how to set up the node using a monitor that you can then later disconnect and access remotely once everything is setup.
Hardware:
-Raspberry Pi 4 (2GB RAM minimum) preferably 4GB RAM -Raspberry Pi 4 Heatsinks -Raspberry Pi 4 case -Micro HDMI cable -USB-C power cable and wall adapter -Monitor -Keyboard and mouse -Ethernet cable (Optional) -16GB or larger microSD card -500GB or larger external hard drive (SSD or portable)
Node Requirements: -50 KBps upload internet speeds (Most people should have this) -Unlimited or high data cap internet download/upload service -6 hours or longer per day dedicated run time
Okay, once you have the hardware its time to get started!
The first thing you'll need to do is install the Raspberry Pi imager, this is how we're going to install Ubuntu onto our Raspberry Pi. After your download and install finishes, open the imager.
  1. Click the "choose OS" box and from the list select Ubuntu, then select Ubuntu Server 20.04 LTS (Raspberry Pi 2/3/4).
  2. Insert your microSD card to your computer directly or via a USB converter. Click "choose SD card" and select your inserted microSD card.
  3. Click "Write" and wait for the imager to finish flashing the OS onto your card
When it is done, remove the SD card and reinsert it to access the files installed. You can choose the overclock the Raspberry Pi by editing the config file. To connect to the Raspberry Pi remotely, you'll need to create an SSH file. If you're on windows this is pretty easy. In the File Explorer, highlight the address bar at the top, erase the text and type cmd, press enter and the Command Prompt will pop up. Type the following:
echo\ssh
This will create an SSH file in your SD directory so that you can remote access the Rasberry Pi later. Now you can go ahead and eject the SD card from your computer.
Now we can set up the Raspberry Pi
Go ahead and connect all your peripherals to your Raspberry Pi, insert the microSD, and connect it to power to turn it on. Give it a moment to boot up, then when prompted enter "ubuntu" for the password. It will make you change the password. Afterward, it will print a bunch of information to the screen, write down the IPv4 address, this is the IP address you'll use to remote access the Raspberry Pi. Now, at any time you can remote access your Raspberry Pi by entering a terminal on another PC in your network and typing:
ssh [email protected](your IP address)
The next step is to install a desktop. There are plenty to choose from so feel free to use a different one than what I use, you can also choose to ignore this and to just work from in the terminal from this point forward.
You need to update all the repositories so type: (Note you'll either have to be connected by ethernet or have edited the network-config file to setup your wifi in advance)
sudo apt-get update
Once it's done updating type the following to upgrade your system:
sudo apt-get upgrade
Now that you're up-to-date, you can install the desktop using the command:
sudo apt-get install ubuntu-gnome-desktop
This will take a while to download and install so just sit back and let it do its thing. Once it's done downloading, restart your Raspberry Pi and log in with the password you changed earlier. Your first boot may take a while so just be patient, don't freak out if you see a single purple square in the center of the screen while it's loading. You should now have the Ubuntu desktop ready to go and now it's on to installing Bitcoin Core!
Installing Bitcoin Core 0.20.0
Since we're running Ubuntu Server 20.04 LTS, it should come preinstalled with the Snap Store. This makes installing apps very easy and works similar to pip install in Python. Simply open your terminal and type:
sudo snap install bitcoin-core
This will install Bitcoin Core into your Snap folder and will add the application to your system. Unfortunately, there are still a few steps left before we can begin downloading the blockchain. By default, Bitcoin Core doesn't have the removable-media Plug connected to the Socket. You can view this by typing:
snap connections bitcoin-core
This means when you try installing everything onto your external hard drive, Bitcoin Core won't be able to identify it or write to it even when passed the directory path. To fix this first locate your Snap folder, make a copy of the bitcoin-core folder inside, and paste it into your external drive.
NOTE: You must make a copy, you can't just move the snap file to the external drive.
Now, you can connect the removable-media Plug to the Socket by typing:
sudo snap connect bitcoin-core:removable-media :removable-media
This gives you the read/write permissions necessary to access the /media path. Finally, you can now launch Bitcoin Core and select "use a custom directory path" when prompted. Highlight the current directory path and replace it with the path to your external hard drive, it should look something like this:
/media/(external drive)/bitcoin-core/common/.bitcoin
This is why we had to make a copy of the bitcoin-core folder to the external drive earlier, the Bitcoin Core application will create the new data directory through ".bitcoin". Hit "Okay" and the application will begin synchronizing with the network! Once the synchronization is finished your very own node will be up and running!
EDIT: (08/01/2020) Bitcoin Core 0.20.01 has been released, I will update the tutorial soon with how to run the latest release.
submitted by Noblefire_62 to Bitcoin [link] [comments]

70 + Free & 2 Popular Discounted Courses : Business Analysis, Agile Scrum, NGINX, PHP, MySQL, SSL, IIBA - ECBA, PMI - PMP, Python, Excel, JavaScript, Practical Cisco Networking Labs and More


  1. [3h 47m total length] Learn to Trade A Fund https://www.udemy.com/course/learn-to-trade-a-fund/?couponCode=FUNDTRADINGFREE
  2. Complete CodeIgniter Course for Beginners (Step by Step) https://www.udemy.com/course/complete-codeigniter-course-for-beginners-step-by-step/?couponCode=CI3DAYOFF
  3. [9h 56m total length] The Complete Business Analysis Fundamentals Course + CERT https://www.udemy.com/course/business-analysis-certification/?couponCode=C0FEE8AB9D626D56DC18
  4. Podcasting Crash Course: Start a Podcast in less than 5 mins https://www.udemy.com/course/how-to-start-a-podcast-udemy-course/?couponCode=998B6D03842B67CEE1D5
  5. Curso de Ingles Conversacional Basico para Principiantes https://www.udemy.com/course/ingles-conversacional/?couponCode=5A28A6E9EA38FED1265F
  6. [13h 21m total length] The Complete Agile Scrum Fundamentals Course + Certification https://www.udemy.com/course/scrum-course-udemy/?couponCode=CF02D43F2EA47C416949
  7. Goal Setting Skills https://www.udemy.com/course/goal-setting-goals/?couponCode=72B3CC10F7F11E325093
  8. [16h 39m total length] Business Analysis Certification Program – The Concepts https://www.udemy.com/course/business-analysis-certification-program-the-concepts/?couponCode=AE235D4AA333A42CFED8
  9. [38 questions] Test your Knowledge in Banking Credit Analysis Process https://www.udemy.com/course/test-your-knowledge-in-banking-credit-analysis-process/?couponCode=AUGFRC
  10. [4h 45m total length] Grant Writing Full Course: Nonprofits, Artists & Freelancers https://www.udemy.com/course/grant-writing-course/?couponCode=GRANT33
  11. [6h 59m total length] Instructional Design Course: All Levels Beginner to Advanced https://www.udemy.com/course/instructional-design-course/?couponCode=DESIGN44
  12. [1h 43m total length] Requirements Architecture and Design Options (IIBA - ECBA) https://www.udemy.com/course/requirements-architecture-and-design-options-iiba-ecba/?couponCode=89F37014079096D18A9F
  13. [2h 17m total length] Business Analysis and Solution Evaluation (IIBA - ECBA) https://www.udemy.com/course/business-analysis-and-solution-evaluation-iiba-ecba/?couponCode=2010EEEF15D4A4696416
  14. [1h 25m total length] Managing Stakeholder Engagement (PMI - PMP) https://www.udemy.com/course/managing-stakeholder-engagement-pmi-pmp/?couponCode=236A78BCD94CB2DDF9BA
  15. [1h 41m total length] Planning Stakeholder Engagement (PMI - PMP) https://www.udemy.com/course/planning-stakeholder-engagement-pmi-pmp/?couponCode=5761AFC9D619AF3D9DCB
  16. jQuery for Absolute Beginners : From Beginning to Advanced https://www.udemy.com/course/learn-jquery-from-beginning-to-advanced/?couponCode=JQUERYAUG2020
  17. Quick Guide: Setup a Local Testing Server using WAMP or MAMP https://www.udemy.com/course/quick-guide-setup-a-local-testing-server-using-wamp-or-mamp/?couponCode=YOUACCELAUGOGO
  18. Entrepreneurship - Ft. Matthew Rolnick of Yaymaker, Groupon https://www.udemy.com/course/how-to-succeed-as-an-entrepreneur-a-beginners-guide/?couponCode=YOUACCELAUGOGO
  19. How to Install a Free SSL Certificate using Let's Encrypt https://www.udemy.com/course/fix-googles-new-not-secure-warning-with-lets-encrypt/?couponCode=YOUACCELAUGOGO
  20. Learn to Host Multiple Domains on one Virtual Server https://www.udemy.com/course/learn-to-host-multiple-domains-on-one-virtual-serve?couponCode=YOUACCELAUGOGO
  21. Install NGINX, PHP, MySQL, SSL & WordPress on Ubuntu 18.04 https://www.udemy.com/course/install-nginx-php-mysql-ssl-wordpress-on-ubuntu/?couponCode=YOUACCELAUGOGO
  22. Introduction to Domain Names and Web Hosting - Quick Guide https://www.udemy.com/course/introduction-to-domain-names-and-web-hosting-quick-guide/?couponCode=YOUACCELAUGOGO
  23. Create a Members Only Blog using PHP, MySQL, & AJAX https://www.udemy.com/course/create-a-members-only-blog-using-php-mysql-ajax/?couponCode=YOUACCELAUGOGO
  24. Learn PHP - For Beginners https://www.udemy.com/course/learn-php-for-beginners-n/?couponCode=YOUACCELAUGOGO
  25. [4h 0m total length] Bootstrap & jQuery - Certification Course for Beginners https://www.udemy.com/course/bootstrap-jquery-certification-course-for-beginners/?couponCode=YOUACCELAUGOGO
  26. Practical Mindfulness https://www.udemy.com/course/practical-mindfulness-z/?couponCode=FREEDOM14
  27. Advanced Microsoft Excel Formulas & Functions Course 2020 https://www.udemy.com/course/advanced-microsoft-excel-formulas-functions/?couponCode=AUGUST10
  28. Angular Interview Practice Guide https://www.eduonix.com/angular-interview-practice-guide/UHJvZHVjdC01OTE4NjA=
  29. Python Basics Training Course https://www.udemy.com/course/python-basics-training-course-v/
  30. Ninja Apps- Build an short video app in less than 2 hours https://www.udemy.com/course/ninja-apps-build-an-short-video-app-in-less-than-2-hours/
  31. [5h 14m total length] Microsoft Excel Mastery + Complete Formulas & Functions https://www.udemy.com/course/micrososft-excel-mastery-complete-formulas-functions/?couponCode=COUPON100
  32. Basics of Beer - in half an hour or so https://www.udemy.com/course/basics-of-beer-in-half-an-hour-or-so/?couponCode=FREEBEER
  33. [3h 00m total length] A Complete Guide For Effective Business Communication https://www.eduonix.com/courses/Office-Productivity/a-complete-guide-for-effective-business-communication/UHJvZHVjdC01OTE4NjA=
  34. [2h 19m total length] Primavera P6 Complete Course of Project Planning 2020 https://www.udemy.com/course/primavera-p6-complete-course-of-project-planning-2020/?couponCode=FREECOURSE
  35. [6h 51m total length] Complete Google Classroom Course: Teaching Google Classroom https://www.udemy.com/course/complete-google-classroom-course-teaching-google-classroom/?couponCode=FEDF3FE1323046807C63
  36. [2h 7m total length] On-Camera Charisma for YouTube Stars - YouTube Marketing https://www.udemy.com/course/the-ultimate-90-minute-on-camera-media-training-course/?couponCode=E89CDC2C77E38BA2857B
  37. [30h 41m total length] The Complete Punctuation Course: English Writing - Grammar https://www.udemy.com/course/the-complete-punctuation-course-english-writing-gramma?couponCode=4FEC0DCE383CC63FF688
  38. [1h 59m total length] Complete Google Slides Course - Create Stunning Slides https://www.udemy.com/course/complete-google-slides-course-create-stunning-slides/?couponCode=333A6EBE9015B4E2B48B
  39. [49 Hours Videos] The Complete 2020 PHP Full Stack Web Developer Bootcamp $9.99 https://www.udemy.com/course/the-complete-php-full-stack-web-developer-bootcamp/?couponCode=GLOBALAUG
  40. Microsoft Word Professional Training https://www.udemy.com/course/microsoft-word-professional-training/?couponCode=E66764691E7D1616C749
  41. [2h 15m total length] Outsource Mastery: How To Earn More Money By Doing Less Work https://www.udemy.com/course/outsource-mastery/?couponCode=AUGFREEOUTSOURCE
  42. [2h 55m total length] Aprende Multicointegración en Forex con R studio https://www.udemy.com/course/aprende-a-invertir-en-forex-mediante-multicointegracion/?couponCode=AGOSTO_2_2020
  43. The complete forex course from scratch to professional https://www.udemy.com/course/the-complete-forex-course-from-scratch-to-professional/?couponCode=44D2ADBB8E6556F81A4A
  44. [4h 44m total length] PowerPoint Masterclass For Training Professionals https://www.udemy.com/course/powerpoint-for-training-professionals-masterclass/?couponCode=C51D5887DE5B6883D710
  45. [2h 41m total length] Projects Cost Management, Estimating, Budgeting and Control. https://www.udemy.com/course/cost-management/?couponCode=20200810
  46. Portrait Photography for Absolute Beginners https://www.udemy.com/course/mastering-portrait-photography/?couponCode=AUGDISCOUNT2020
  47. [3h 13m total length] Affinity Publisher Guide - Affinity Publisher for Beginners https://www.udemy.com/course/affinity-publisher-guide/?couponCode=34D23563BB8E4175D485
  48. [4h 48m total length] Microsoft Excel - Learn MS EXCEL For DATA Analysis https://www.udemy.com/course/microsoft-excel-learn-ms-excel-for-data-analysis/?couponCode=AAB623DB7B0ED5B368A8
  49. [3h 26m total length] Complete PHP & MySQLi Course for Beginners (Step by Step) https://www.udemy.com/course/complete-php-mysql-course-beginner-to-advanced-level/?couponCode=PM3DAYOFF
  50. Get Started With NodeJS : For Beginners 2020 https://www.udemy.com/course/get-started-with-nodejs-for-beginners-2020/?couponCode=FREEFREE2020
  51. How to Make Passive Income With Bitcoin Lending https://www.udemy.com/course/how-to-make-passive-income-with-bitcoin-lending/?couponCode=AUGSW2020
  52. [9h 23m total length] Curso de Pfsense Firewall completo, desde 0 a experto https://www.udemy.com/course/curso-de-pfsense-firewall-completo-desde-0-a-experto/?couponCode=2BE0301B2BB95532B1BA
  53. [12h 6m total length] Practical Cisco Networking Labs https://www.udemy.com/course/practical-cisco-networking-labs/?couponCode=08543C823FA0B421B26B
  54. [400 questions] PMP® PRACTICE EXAMS/PMP EXAM PREP Based on PMBOK 6th Edition https://www.udemy.com/course/pmp-practice-examspmp-exam-prep-based-on-pmbok-6th-edition/?couponCode=28E9BF3E7BED3251784B
  55. [6h 36m total length] Adobe Illustrator CC 2020 MasterClass https://www.udemy.com/course/adobe-illustrator-cc-2020/?couponCode=A4EF2F0A4502593065AF
  56. [3h 54m total length] Inversión Total: Bolsa, Opciones, Forex, CriptoMonedas y Más https://www.udemy.com/course/inversion-total-inversiones-para-principiantes/?couponCode=307218202F5152005A38
  57. Design Awesome Infographics to Grab Customer Attention (A-Z) https://www.udemy.com/course/use-infographics-to-grab-customers-attention/?couponCode=67213CC3
  58. Vegan Diet - Healthy Lifestyle https://www.udemy.com/course/vegan-vegetarian-diet-healthy-training/?couponCode=1D86551CB175568B0F1B
  59. [6h 52m total length] Learn to Trade The Technicals https://www.udemy.com/course/learn-to-trade-the-technicals/?couponCode=TECHTRADINGFREE
  60. [3h 25m total length] An introduction to trading the news! https://www.udemy.com/course/an-introduction-to-trading-the-news/?couponCode=NEWSTRADINGFREE
  61. Effective Feedback to Shine at Work and in Life https://www.udemy.com/course/effective-feedback-to-shine-at-work-and-in-life/?couponCode=56C261AFA3F99414F253
  62. Learn Graphic Design Quick using Free Canva software (2020). https://www.udemy.com/course/learn-graphic-design-quick-using-free-canva-software-2020/?couponCode=LEARN-GRAPHIC-DESIGN
  63. [4h 7m total length] The Beginner's Illustration Masterclass https://www.udemy.com/course/the-illustration-masterclass/?couponCode=A2E3BD053D03CA34A527
  64. [3h 15m total length] Programa Gestor de carteras de inversión en R Studio https://www.udemy.com/course/programa-gestor-de-carteras-de-inversion-en-r-studio/?couponCode=2020_AGOST_MULTI
  65. [9h 28m total length] The Complete List Building Course: All Levels https://www.udemy.com/course/list-building-secrets-copy-paste/?couponCode=833A3DBE58B6D936E8EF
  66. Ketogenic Diet – Look & Feel Amazing The Keto Diet Way! https://www.udemy.com/course/ketogenic-diet-keto-diet-tips-training-nutrition-ketones/?couponCode=1A84FF206E467459FA77
  67. Eczema Solution https://www.udemy.com/course/eczema-solution-treatment-tips-solution-training/?couponCode=19F1FAE43B9AE0C18DA0
  68. Healthy Heart - Strengthen, Heal & Protect Your Heart https://www.udemy.com/course/healthy-heart-strengthen-heal-protect-tips-treatment/?couponCode=310180CE5295409882A6
  69. [5h 31m total length] Supply Chain Analytics https://www.udemy.com/course/supply-chain-analytics/?couponCode=SUPPLY88
  70. [6h 57m total length] Content Marketing Strategy & Techniques: Beginner to Expert https://www.udemy.com/course/content-marketing-strategy-u/?couponCode=CONTENT98
  71. [5h 14m total length] Microsoft Excel Mastery + Complete Formulas & Functions https://www.udemy.com/course/micrososft-excel-mastery-complete-formulas-functions/?couponCode=COUPON100
  72. [187 questions] Redes CISCO | Simulador | Certificación CCNA 200-301 https://www.udemy.com/course/redes-cisco-simulador-certificacion-ccna-200-301/?couponCode=SIMULADOR-CCNA
  73. Sleep faster - how to sleep better in less time. https://www.udemy.com/course/sleep-faste?couponCode=9CF1549E797CF2628FA9
  74. Python for Beginners: Easily Learn Python Programming https://www.udemy.com/course/python-for-beginners-easily-learn-python-programming/
2 Popular Courses for Discounted price
  1. [399 lectures • 82h 6m total length] Ultimate PHP, Laravel, CSS & Sass! Learn PHP, Laravel & Sass for $9.99 https://www.udemy.com/course/ultimate-php-css-and-sass-enhance-your-javascript-skills/?couponCode=MANYTHANKS
  2. [37h 7m total length] Risk Management for Business Analysts (PMI-RMP/IIBA-ECBA) for $10.99 https://www.udemy.com/course/risk-management-for-business-analysts-pmi-rmpiiba-ecba/?couponCode=RMBA10
submitted by ViralMedia007 to FREECoursesEveryday [link] [comments]

Make your own stakebox. Ultimate beginners guide how to compile any wallet on AARCH64 (Raspbery pi and other SBC)

I contemplated to wrote this for a long time, so it's finally time.
As you know a lot of altcoins uses PoS (Proof-of-stake) way of "mining" coins. Which basically means, that you hold coins on your unlocked wallet and you are receiving stakes as a reward. This requires very little power and it can bring you a lot of rewards, at just 10W from the wall.
So first I am using latest Raspbian on RPI4B 4GB in this example.Setting up Raspbian is not part of this process since it's very well documented. I recommend to change user from pi to something else due to security concerns and you can also do other stuff just search "security Raspberry PI" and you find a lot of articles, but this is not the focus of this guide.
I know there are a lot of guides on the internet, but I am using like 5 sources, so it's compiled what other people wrote and some of my research.
I am using AnyDesk insted of SSH or VNC server, because it works it's ligthweit and it just works.
So after you see the gui of Raspbian, just launch terminal (CTRL + ALT + T) and do basic thing:
sudo apt-get update && sudo apt-get upgrade
Than press Y and let it run, after is finished, we need to prepare so dependency packages. Since most of the wallets using Berkeley DB 4.8 we need to obtain it.
So in terminal wrote:
cd cd Downloads wget http://download.oracle.com/berkeley-db/db-4.8.30.NC.tar.gz tar -xzvf db-4.8.30.NC.tar.gz cd db-4.8.30.NC/build_unix ../dist/configure --enable-cxx make sudo make install 
So wait unti it's finished and than you can delete files in Downloads folder in gui or use:
sudo rm -r [folder] 
So next thing we need to install some libraries.
sudo apt-get install git build-essential libtool autotools-dev autoconf pkg-config libssl-dev libcrypto++-dev libevent-dev libminiupnpc-dev libgmp-dev libboost-all-dev devscripts libdb++-dev libsodium-dev 
And pres y and let it run. After that another set of libraries:
sudo apt-get install libqt5gui5 libqt5core5a libqt5dbus5 qttools5-dev qttools5-dev-tools libprotobuf-dev protobuf-compiler libcrypto++- dev libminiupnpc-dev qt5-default 
And then again pres y and let it run. Some wallets need older version of libssl1.0-dev, so for for safe compiling we install that as well:
sudo apt-get install libssl1.0-dev 
Pres y and let it run. Warning don't use sudo-apt get autoremove, since it would wipe this package, since it's old.
Next thing we are going to obtain Bitcoin PPA filest, which can be done like this.
cd /etc/apt/sources.list.d/ sudo nano bitcoin.list 
Paste this in there:
deb-src http://ppa.launchpad.net/bitcoin/bitcoin/ubuntu artful main 
And CTRL+X and than y, then do this:
sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv C70EF1F0305A1ADB9986DBD8D46F45428842CE5E sudo apt-get update 
So now we are ready for compiling. So we are going create folders. CD yourself where this folder should be situated, if you for example have plugged in some external drive. Then:
mkdir Crypto cd Crypto 
And then we have to choose wallet which you want to compile. I am choosing Streamies (STRMS) as an example, since it's pretty good coin for staking. So:
mkdir Streamies cd Streamies 
Then go to the github page and click on the green button on the left and click copy to clipboard, which gives you git link.
git clone https://github.com/Streamies/Streamies.git 
Watch the output folder which it creates, it's stated in the first two lines and copy then by highliting the text and CTRL+SHIFT+C copy it to your clipboard.
cd Streamies (this is that git created folder) ./autogen.sh ./configure CPPFLAGS="-I/uslocal/BerkeleyDB.4.8/include -O2" LDFLAGS="-L/uslocal/BerkeleyDB.4.8/lib" sudo make (this could take hours) sudo make install 
And you are done, files is going to be in folder /uslocal/bin (DO NOT delete git created folder, because you are going to need it for faster compiling, when wallet get's and update.)
cd /uslocal/bin 
Now you can list files by:
ls 
And then you can copy/move them where ever you want by using:
sudo mv * [destination full path] 
Let it run and go back to folder where you move those files.
sudo chmod +x streamies-qt (since we want to run wallet) 
In most cases compiled files are going to in format of "shared library" so we need to create script to run it. Open up a text editor from gui or through nano. And paste this to that file:
#!/bin/bash ./streamies-qt 
And save it as a sh file, for example run.sh. Then we need to make it runnable so:
sudo chmod +x run.sh 
Now to run it, it's just:
./run.sh 
And here we are glorious GUI wallet appears and you are done, you can paste blockchain, wallet.dat from other sources, so this migration is pretty easy and you, if you have it on for exaple flash disk.
So this is basic how to compile QT wallets on AARCH64. I am running 7 wallets, 2 of those are Masternodes and RPI 4B 4GB would handle way more, I am at best on half of my RAM.
Some wallets need more package, but it's not much of and issue, since compiling stops and you just copy paste nape which is missing put it in the google and add "apt-get" after the name of package and you are going to see, what is the name of the packages so it can be retreived from package assinstant aka apt-get. So basically:
sudo apt-get install [package name] 
Then press y and again wrote:
sudo make 
This process is going to continue where it was left off, so nothing is going to run from beginning.
Updating wallets is basically exactly same, just repeat steps from "git clone" and after that proceed as it was written above.
So I hope this helps some of you, to use this at home and not on some VPS, if you are anxious as me, to host my wallets on remote server.
submitted by M1chlCZ to CryptoCurrency [link] [comments]

Best Dedicated Server in McLean

https://hostingultraso.com/dedicated-serveMcLean

What is a Dedicated Server?

It is a server kind of matchless and one of the leading servers worldwide being an excellent hosting service provider. This server complements the performance of any website giving it the required speed and power to run more convincingly. It comes with huge resources that are fully dedicated and with a dedicated IP address too. Nothing shared and thus making it so reliable.

Business and Technology around McLean

This is a place in Fairfax country in Northern Virginia. There are some reputed companies built and doing good business and the other industries, organizations providing a necessary lead to the economy. The businesses are in progress along with modern technology around McLean.
Hosting Ultraso looking to be the trusted and best-dedicated server hosting provider in McLean. Our dedicated server collection is huge and the servers are located in more than 119 countries across the globe. The data centers are performing brilliantly worldwide.

Why do you need a Dedicated Server in McLean?

The research says businesses that are in progress and facing increased traffic to the business website regularly need a strongly dedicated hosting that can meet the business requirement nicely and help the website sustain the performance and provide more boost.
Our dedicated server in McLean is well built to suit all business specifications and ideas. The bountiful resources making it awesome to provide more impactful service and the CPanel loaded with advanced software applications and tools are fully customizable.
Our dedicated server in McLean is maintaining a higher standard in security management. The continuous monitoring of the resources making it fully threats-free and the latest IPMI or Intelligent Platform Monitoring Interface is also monitoring the server's physical health frequently. The dedicated IP keeps the website free from SEO issues also.
Our dedicated server in Mclean provides the lowest latency rate and the data center is managing the balancing load quite an impressive way, producing the proper server uptime.
We have an expert technical team for 24 * 7 support and the team is trained in such a professional way that capable of handling your every issue in just no time.

Different Operating systems that we provide in McLean

Different types of Dedicated Server in Mclean, we provide

We are primarily providing the unmanaged dedicated server that needs to be managed by yourself and there are also some dedicated servers at low cost available with us. We avail you the best and a cheap dedicated server meeting all your business needs.
We have the option of a managed server hosting plan through which we are providing a managed dedicated server to the businesses with crucial needs. We also have a higher demand for our Windows dedicated server and Linux dedicated server.

Configurations of our Dedicated Servers

Our dedicated server in McLean is designed with sharp and super-fast processors like Intel Core and Xeon. The bandwidth is 100 Mbps 6 TB to 100 Mbps 10 TB Fair Usage. There are 8 to 24 GB DDR3 RAMs available producing a quality speed. The hard drives are HDD SATA based on different storage capacities.
We are providing an extra free IP address with no installation charging at all. ( If you require more IP addresses then please let us know). There is an option for the clustering of servers. We support both the IP address formats IPV4 and IPV6. we are here to help you all 24 hours a day.

What are the benefits that you get from Hosting Ultraso by using our Dedicated server in McLean?

If you decided to buy a dedicated server from Hosting Ultraso then we are pleased to share with you that you will be going to the user of some amazing benefits with our dedicated web hosting plans.
submitted by Hosting_Ultraso1 to u/Hosting_Ultraso1 [link] [comments]

Groestlcoin 6th Anniversary Release

Introduction

Dear Groestlers, it goes without saying that 2020 has been a difficult time for millions of people worldwide. The groestlcoin team would like to take this opportunity to wish everyone our best to everyone coping with the direct and indirect effects of COVID-19. Let it bring out the best in us all and show that collectively, we can conquer anything.
The centralised banks and our national governments are facing unprecedented times with interest rates worldwide dropping to record lows in places. Rest assured that this can only strengthen the fundamentals of all decentralised cryptocurrencies and the vision that was seeded with Satoshi's Bitcoin whitepaper over 10 years ago. Despite everything that has been thrown at us this year, the show must go on and the team will still progress and advance to continue the momentum that we have developed over the past 6 years.
In addition to this, we'd like to remind you all that this is Groestlcoin's 6th Birthday release! In terms of price there have been some crazy highs and lows over the years (with highs of around $2.60 and lows of $0.000077!), but in terms of value– Groestlcoin just keeps getting more valuable! In these uncertain times, one thing remains clear – Groestlcoin will keep going and keep innovating regardless. On with what has been worked on and completed over the past few months.

UPDATED - Groestlcoin Core 2.18.2

This is a major release of Groestlcoin Core with many protocol level improvements and code optimizations, featuring the technical equivalent of Bitcoin v0.18.2 but with Groestlcoin-specific patches. On a general level, most of what is new is a new 'Groestlcoin-wallet' tool which is now distributed alongside Groestlcoin Core's other executables.
NOTE: The 'Account' API has been removed from this version which was typically used in some tip bots. Please ensure you check the release notes from 2.17.2 for details on replacing this functionality.

How to Upgrade?

Windows
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer.
OSX
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications.
Ubuntu
http://groestlcoin.org/forum/index.php?topic=441.0

Other Linux

http://groestlcoin.org/forum/index.php?topic=97.0

Download

Download the Windows Installer (64 bit) here
Download the Windows Installer (32 bit) here
Download the Windows binaries (64 bit) here
Download the Windows binaries (32 bit) here
Download the OSX Installer here
Download the OSX binaries here
Download the Linux binaries (64 bit) here
Download the Linux binaries (32 bit) here
Download the ARM Linux binaries (64 bit) here
Download the ARM Linux binaries (32 bit) here

Source

ALL NEW - Groestlcoin Moonshine iOS/Android Wallet

Built with React Native, Moonshine utilizes Electrum-GRS's JSON-RPC methods to interact with the Groestlcoin network.
GRS Moonshine's intended use is as a hot wallet. Meaning, your keys are only as safe as the device you install this wallet on. As with any hot wallet, please ensure that you keep only a small, responsible amount of Groestlcoin on it at any given time.

Features

Download

iOS
Android

Source

ALL NEW! – HODL GRS Android Wallet

HODL GRS connects directly to the Groestlcoin network using SPV mode and doesn't rely on servers that can be hacked or disabled.
HODL GRS utilizes AES hardware encryption, app sandboxing, and the latest security features to protect users from malware, browser security holes, and even physical theft. Private keys are stored only in the secure enclave of the user's phone, inaccessible to anyone other than the user.
Simplicity and ease-of-use is the core design principle of HODL GRS. A simple recovery phrase (which we call a Backup Recovery Key) is all that is needed to restore the user's wallet if they ever lose or replace their device. HODL GRS is deterministic, which means the user's balance and transaction history can be recovered just from the backup recovery key.

Features

Download

Main Release (Main Net)
Testnet Release

Source

ALL NEW! – GroestlcoinSeed Savior

Groestlcoin Seed Savior is a tool for recovering BIP39 seed phrases.
This tool is meant to help users with recovering a slightly incorrect Groestlcoin mnemonic phrase (AKA backup or seed). You can enter an existing BIP39 mnemonic and get derived addresses in various formats.
To find out if one of the suggested addresses is the right one, you can click on the suggested address to check the address' transaction history on a block explorer.

Features

Live Version (Not Recommended)

https://www.groestlcoin.org/recovery/

Download

https://github.com/Groestlcoin/mnemonic-recovery/archive/master.zip

Source

ALL NEW! – Vanity Search Vanity Address Generator

NOTE: NVidia GPU or any CPU only. AMD graphics cards will not work with this address generator.
VanitySearch is a command-line Segwit-capable vanity Groestlcoin address generator. Add unique flair when you tell people to send Groestlcoin. Alternatively, VanitySearch can be used to generate random addresses offline.
If you're tired of the random, cryptic addresses generated by regular groestlcoin clients, then VanitySearch is the right choice for you to create a more personalized address.
VanitySearch is a groestlcoin address prefix finder. If you want to generate safe private keys, use the -s option to enter your passphrase which will be used for generating a base key as for BIP38 standard (VanitySearch.exe -s "My PassPhrase" FXPref). You can also use VanitySearch.exe -ps "My PassPhrase" which will add a crypto secure seed to your passphrase.
VanitySearch may not compute a good grid size for your GPU, so try different values using -g option in order to get the best performances. If you want to use GPUs and CPUs together, you may have best performances by keeping one CPU core for handling GPU(s)/CPU exchanges (use -t option to set the number of CPU threads).

Features

Usage

https://github.com/Groestlcoin/VanitySearch#usage

Download

Source

ALL NEW! – Groestlcoin EasyVanity 2020

Groestlcoin EasyVanity 2020 is a windows app built from the ground-up and makes it easier than ever before to create your very own bespoke bech32 address(es) when whilst not connected to the internet.
If you're tired of the random, cryptic bech32 addresses generated by regular Groestlcoin clients, then Groestlcoin EasyVanity2020 is the right choice for you to create a more personalised bech32 address. This 2020 version uses the new VanitySearch to generate not only legacy addresses (F prefix) but also Bech32 addresses (grs1 prefix).

Features

Download

Source

Remastered! – Groestlcoin WPF Desktop Wallet (v2.19.0.18)

Groestlcoin WPF is an alternative full node client with optional lightweight 'thin-client' mode based on WPF. Windows Presentation Foundation (WPF) is one of Microsoft's latest approaches to a GUI framework, used with the .NET framework. Its main advantages over the original Groestlcoin client include support for exporting blockchain.dat and including a lite wallet mode.
This wallet was previously deprecated but has been brought back to life with modern standards.

Features

Remastered Improvements

Download

Source

ALL NEW! – BIP39 Key Tool

Groestlcoin BIP39 Key Tool is a GUI interface for generating Groestlcoin public and private keys. It is a standalone tool which can be used offline.

Features

Download

Windows
Linux :
 pip3 install -r requirements.txt python3 bip39\_gui.py 

Source

ALL NEW! – Electrum Personal Server

Groestlcoin Electrum Personal Server aims to make using Electrum Groestlcoin wallet more secure and more private. It makes it easy to connect your Electrum-GRS wallet to your own full node.
It is an implementation of the Electrum-grs server protocol which fulfils the specific need of using the Electrum-grs wallet backed by a full node, but without the heavyweight server backend, for a single user. It allows the user to benefit from all Groestlcoin Core's resource-saving features like pruning, blocks only and disabled txindex. All Electrum-GRS's feature-richness like hardware wallet integration, multi-signature wallets, offline signing, seed recovery phrases, coin control and so on can still be used, but connected only to the user's own full node.
Full node wallets are important in Groestlcoin because they are a big part of what makes the system be trust-less. No longer do people have to trust a financial institution like a bank or PayPal, they can run software on their own computers. If Groestlcoin is digital gold, then a full node wallet is your own personal goldsmith who checks for you that received payments are genuine.
Full node wallets are also important for privacy. Using Electrum-GRS under default configuration requires it to send (hashes of) all your Groestlcoin addresses to some server. That server can then easily spy on your transactions. Full node wallets like Groestlcoin Electrum Personal Server would download the entire blockchain and scan it for the user's own addresses, and therefore don't reveal to anyone else which Groestlcoin addresses they are interested in.
Groestlcoin Electrum Personal Server can also broadcast transactions through Tor which improves privacy by resisting traffic analysis for broadcasted transactions which can link the IP address of the user to the transaction. If enabled this would happen transparently whenever the user simply clicks "Send" on a transaction in Electrum-grs wallet.
Note: Currently Groestlcoin Electrum Personal Server can only accept one connection at a time.

Features

Download

Windows
Linux / OSX (Instructions)

Source

UPDATED – Android Wallet 7.38.1 - Main Net + Test Net

The app allows you to send and receive Groestlcoin on your device using QR codes and URI links.
When using this app, please back up your wallet and email them to yourself! This will save your wallet in a password protected file. Then your coins can be retrieved even if you lose your phone.

Changes

Download

Main Net
Main Net (FDroid)
Test Net

Source

UPDATED – Groestlcoin Sentinel 3.5.06 (Android)

Groestlcoin Sentinel is a great solution for anyone who wants the convenience and utility of a hot wallet for receiving payments directly into their cold storage (or hardware wallets).
Sentinel accepts XPUB's, YPUB'S, ZPUB's and individual Groestlcoin address. Once added you will be able to view balances, view transactions, and (in the case of XPUB's, YPUB's and ZPUB's) deterministically generate addresses for that wallet.
Groestlcoin Sentinel is a fork of Groestlcoin Samourai Wallet with all spending and transaction building code removed.

Changes

Download

Source

UPDATED – P2Pool Test Net

Changes

Download

Pre-Hosted Testnet P2Pool is available via http://testp2pool.groestlcoin.org:21330/static/

Source

submitted by Yokomoko_Saleen to groestlcoin [link] [comments]

cold storage compatibility issues

Hello, I have been a fan of electrum because of its offline capability. I like that I can use Bitcoin while storing my private keys on a computer that has the wifi card removed and hot glue stuffed in the Ethernet port. However it looks like maybe the electrum developers have over-promised and under-delivered in this regard. Or, maybe they simply do not have the time, energy, resources to make this work in real life.
Let me explain. I have an old-ass computer that is running Ubuntu 12 (precise), this computer has electrum 2.5.4 installed with a cold-storage wallet that has my private key.
I want to send some bitcoin from that address to a new wallet on my desktop so I can spend the bitcoin. So I installed electrum (newest version 3.3.8) on my desktop, imported the bitcoin address, and created a transaction. Then I sent the transaction to the offline computer out of band, and verified that the out-of-band transmission worked by comparing the hash of the txn file on both the offline and online machines. Then I tried to open the txn file on the offline machine with Electrum 2.5.4. Well, guess what, it didn't work. Electrum 2.5.4 printed to the console:
Traceback (most recent call last):
File "/uslocal/lib/python2.7/dist-packages/Electrum-2.5.4-py2.7.egg/electrum_gui/qt/main_window.py", line 2261, in do_process_from_file
self.show_transaction(tx)
File "/uslocal/lib/python2.7/dist-packages/Electrum-2.5.4-py2.7.egg/electrum_gui/qt/main_window.py", line 577, in show_transaction
show_transaction(tx, self, tx_desc)
File "/uslocal/lib/python2.7/dist-packages/Electrum-2.5.4-py2.7.egg/electrum_gui/qt/transaction_dialog.py", line 37, in show_transaction
d = TxDialog(tx, parent, desc, prompt_if_unsaved)
File "/uslocal/lib/python2.7/dist-packages/Electrum-2.5.4-py2.7.egg/electrum_gui/qt/transaction_dialog.py", line 48, in __init__
self.tx.deserialize()
File "/uslocal/lib/python2.7/dist-packages/Electrum-2.5.4-py2.7.egg/electrum/transaction.py", line 523, in deserialize
d = deserialize(self.raw)
File "/uslocal/lib/python2.7/dist-packages/Electrum-2.5.4-py2.7.egg/electrum/transaction.py", line 454, in deserialize
d[inputs] = list(parse_input(vds) for i in xrange(n_vin))
OverflowError: Python int too large to convert to C long
That's pretty frustrating, the first thing I tried was to install Electrum 2.5.4 on my Desktop and try to create a new unsigned transaction with Electrum 2.5.4. However, this is a no-go because old versions of Electrum cannot connect to Electrum servers any more. So I have to try to update the Electrum on the Offline computer. But I'm not even sure if this is possible considering how ubuntu 12 it's definitely out of support at this point and the offline computer does not even have python3 installed, let alone the GTK stuff or whatever is probably required to run Electrum.
I'm starting to regret choosing a GUI-based wallet for my offline storage considering how hard it is to actually use this and how it simply melts over time... even just 5 years is is enough time to completely melt and destroy this software and make it un-usable. Time Catches All. So now I have to go out and buy a new computer that can run the updated OS, so I can install the new version of Electrum, so I can access my bitcoin.
Do you have any other ideas? Has anyone else experienced anything like this?
submitted by throwaway_23f32f to Electrum [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to C_S_T [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to conspiracy [link] [comments]

Vertnode - An automated solution for installing Vertcoin node(s) on Single Board Computers

Hello Vertcoin Community,
Eager to contribute to the Vertcoin Community I began creating step by step walkthrough guides on how to get a Vertcoin node up and running on a Raspberry Pi, Raspberry Pi Zero and Intel NUC. Along with information to get a Vertcoin node up and running was also optional steps to install p2pool-vtc.
I decided that while this step by step guide might be helpful to a few, a setup script may prove to be useful to a wider range of people. I have this script to a point where I think it may be productive to share with a bigger audience, for those who are brave and have this hardware sitting around or like to tinker with projects; I invite you to test this setup script if you are interested, if you run into errors any sort of verbose console output of the error proves to be extremely helpful in troubleshooting.
The script was designed to produce a “headless” server... meaning we will not be using a GUI to configure Vertcoin or check to see how things are running. In fact, once the server is set up, you will only interact with it using command line calls over SSH. The idea is to have this full node be simple, low-power, with optimized memory usage and something that “just runs” in your basement, closet, etc.
Why run a headless node on a Single Board Computer?
The idea is to have this full node be simple, low-power, with optimized memory usage and something that “just runs” in your basement, closet, etc.
Required: USB Flash Drive 6GB - 32GB
Please note that the script was designed for Single Board Computers first and looks for an accessible USB Flash Drive to use for storing the blockchain and swap file, as constant writing to a microSD can degrade the health of the microSD.
Supports

Hardware

All of the hardware listed above is hardware that I have personally tested / am testing on myself. The plan is to continue expanding my arsenal of single board computers and continue to add support for more hardware to ensure as much compatibility as possible.
Functionality
It is worth noting that LIT can be ran with multiple configurations, the ones displayed in the Post Installation Report reflect values that run LIT with the Vertcoin Mainnet. Please be aware that the Vertcoin Testnet chain has not been mined 100% of the time in the past, if you make transactions on the Vertcoin testnet that do not go through it is likely because the chain has stopped being mined.
BE CAREFUL WITH YOUR COINS, ONLY TEST WITH WHAT YOU ARE OKAY WITH LOSING IF YOU USE THE MAINNET.

Vertcoin Testnet Coins

https://tvtc.blkidx.org/faucet/
I've included some documentation on LIT I created which includes information I found to be useful: https://github.com/e-corp-sam-sepiol/vertnode/blob/mastedocs/lit.md
Please visit the mit-dci/lit github repository for the most up to date information on lit: https://github.com/mit-dci/lit

Vertnode | Automated Vertcoin Node Installation Script

https://github.com/e-corp-sam-sepiol/vertnode

Recommended: Use Etcher to install the chosen OS to your microSD card / USB flash drive.

If you intend on installing Ubuntu Server 16.04 to your Intel NUC please use Etcher to install the .iso to your USB flash drive.
https://etcher.io/
PLEASE NOTE THIS SCRIPT MAY GIVE AN ERROR. THIS IS THE NATURE OF TESTING. PLEASE REPORT YOUR ERRORS IF YOU WANT THEM TO BE FIXED/RESOLVED. THANK YOU FOR BETTERING THE DEVELOPMENT OF THIS SCRIPT.

Ubuntu Server 16.04 Setup Details

You can use different clients to ssh into your node. One option is using PuTTY or Git Bash on Windows which is included in the desktop version of Git. If you are using Linux you can simply open a new terminal window and ssh to the IP address of your node (hardware you intend installing the Vertcoin node on).
You will need to know the IP address of your node, this can be found on your router page.
ssh 192.168.1.5 -l pi For example, this command uses ssh to login to 192.168.1.5 using the -l login name of pi. The IP address of your node will likely be different for you, in this example I am logging into a Raspberry Pi which has a default login name of pi.
A brief list of commands that can be used to check on the Vertcoin node status:
vertcoin-cli getblockchaininfo | Grab information about your blockchain
vertcoin-cli getblockcount | Grab the current count of blocks on your node
vertcoin-cli getconnectioncount | Grab the current count of connections to your node. A number of connections larger than 8 means that you have incoming connections to your node. The default settings are to make 8 outgoing connections. If you want incoming connections please port forward your Raspberry Pi in your Router settings page.
vertcoin-cli getpeerinfo | Grab the information about the peers you have connected to / are connected to
vertcoin-cli getnettotals | Grab network data, how much downloaded/upload displayed in bytes
tail -f ~/.vertcoin/debug.log | Output the latest lines in the Vertcoin debug.log to see verbose information about the Vertcoin daemon (ctrl+c to stop)
Thank you to all who have helped me and inspired me thus far, @b17z, @jamesl22, @vertcoinmarketingteam, @canen, @flakfired, @etang600, @BDF, @tucker178, @Xer0
This work is dedicated to the users of Vertcoin, thank you for making this possible.
7/20/2018 Thank you @CommodoreAmiga for the incredibly generous tip <3
You can reach me @Sam Sepiol#3396 on the Vertcoin Discord, here on reddit or @ [email protected]
submitted by ecorp-sam-sepiol to vertcoin [link] [comments]

How to Mine BiblePay on Linux

This guide is outdated, please refer to:
https://wiki.biblepay.org/POBH_Setup
https://wiki.biblepay.org/PODC_Setup
 
 
 
 
 
 
 
 
IMPORTANT - Evolution Upgrade:
Quick Start https://wiki.biblepay.org/Quick_Start
Evolution Upgrade Information https://wiki.biblepay.org/Evolution_Upgrade
Getting Started with Evolution https://wiki.biblepay.org/Getting_Started_with_Evolution
Generic Smart Contracts https://wiki.biblepay.org/Generic_Smart_Contracts
What is BiblePay Evolution? https://www.reddit.com/BiblePay/comments/bifvpk/biblepay_evolution_what_is_it/
Recommend 2GB RAM or can get stuck compiling (if 1GB RAM can use Swap File) Use Ubuntu 16.04
INFO
https://github.com/biblepay/biblepay-evolution/blob/masteBuildBiblePay.txt
INSTALL COMMANDS
apt-get install build-essential libtool autotools-dev automake pkg-config libssl-dev libevent-dev bsdmainutils apt-get install libboost-system-dev libboost-filesystem-dev libboost-chrono-dev libboost-program-options-dev libboost-test-dev libboost-thread-dev apt-get install libqt5gui5 libqt5core5a libqt5dbus5 qttools5-dev qttools5-dev-tools libprotobuf-dev protobuf-compiler apt-get install git apt-get install curl build-essential libtool autotools-dev automake pkg-config python3 bsdmainutils cmake sudo add-apt-repository ppa:bitcoin/bitcoin sudo apt-get update sudo apt-get install libdb4.8-dev libdb4.8++-dev git clone http://github.com/biblepay/biblepay-evolution prefix=x86_64-pc-linux-gnu cd biblepay-evolution/depends make -j4 # Choose a good -j value, depending on the number of CPU cores available cd .. ./autogen.sh #Note: if echo `pwd` does not return your working directory, replace it with your working directory such as /biblepay-evolution/ ./configure --prefix `pwd`/depends/x86_64-pc-linux-gnu make # See more here: #https://github.com/biblepay/biblepay-evolution/blob/mastedoc/build-unix.md 

SWAP FILE
NOTE: if server is 1GB RAM, before running last command "sudo make", set up a swap file
free #check if swap is 0 dd if=/dev/zero of=/vaswap.img bs=1024k count=1000 mkswap /vaswap.img swapon /vaswap.img free #check if swap is 1024 sudo make 

RUN COMMAND LINE
cd src ./biblepayd -daemon 
OR
RUN GUI
Your GUI program will be located in: /biblepay-evolution/src/qt
./biblepay-qt 
You can also run it in the background (to free up your terminal) if you call it with:
./biblepay-qt & 
To start mining, instructions are the same as for Windows: Go to Tools -> Debug Console
Execute this command (to start mining with 8 threads)
setgenerate true 8 
From there you can use all other commands such as getmininginfo, getwalletinfo, etc. Execute help command to get the list of all available commands.
Note: GUI will be built automatically only if you meet the requirements for qt library, i.e. make sure you ran this line before compiling:
sudo apt-get install libqt5gui5 libqt5core5a libqt5dbus5 qttools5-dev qttools5-dev-tools libprotobuf-dev protobuf-compiler 
BIBLEPAY is now Running!

SETUP CONFIG
Stop BiblePay and set up the config file to get starting nodes to sync with and enable mining:
./biblepay-cli stop cd ~/.biblepayevolution/ vi biblepay.conf addnode=node.biblepay.org gen=1 genproclimit=1 
Escape Key + : (Colon Key) + w + q + Enter (saves file and quits)

addnode --- adds a node to the list of nodes to connect to gen=1 --- turns on mining genproclimit --- sets number of threads to use when mining

Run BiblePay again and fully sync with network
cd ../biblepay-evolution/src ./biblepayd -daemon ./biblepay-cli getinfo 

USEFUL COMMANDS
./biblepay-cli help ./biblepay-cli getaccountaddress "" ./biblepay-cli getinfo ./biblepay-cli getmininginfo ./biblepay-cli setgenerate true 8 ./biblepay-cli sendtoaddress "insertAddressHere" 777 "" "" true ./biblepay-cli stop ./biblepayd -daemon top #CPU usage q to quit 

MINING THREADS: To change number of threads to use up for mining
a. Edit home/yourusername/.biblepayevolution/biblepay.conf file:
genproclimit=X 
and restart BiblePay -or- b. Menu >> Tools >> Debug Console >> Type command:
setgenerate true X 
(Replace X with number of threads Use top command to view CPU usage)

POOL
NOTE: To use the pool you must now use the external miner, not the wallet miner https://whitewalr.us/2019/biblepay-nomp-pool-mining.html
  1. Set up an account on pool website: https://pool.biblepay.org/
  2. Create Worker Username(s) - Workers tab >>> Add
  3. Enable pool and add Worker Username in ~/.biblepayevolution/biblepay.conf file, add these lines and save:
    pool=https://pool.biblepay.org workerid=insertWorkerUsernameHere
4. Restart BiblePay
./biblepay-cli stop ./biblepayd -daemon 
Setup Auto-Withdraw Navigate to Account >>> Account Settings >>> Verify your BBP Receiving Address >>> Click Authorize-Auto-Withdraws

UPDATE:

### Turn off/stop BiblePay
cd /home/yourname/biblepay-evolution/src ./biblepay-cli stop 

### Pull down latest Biblepay code and build it
cd /home/yourname/biblepay-evolution git pull origin master sudo make 

### Turn BiblePay back on and check version number
cd src ./biblepayd -daemon ./biblepay-cli getinfo ./biblepay-cli setgenerate true 8 

UPDATE IN ONE COMMAND:
./biblepay-evolution/src/biblepay-cli stop ; cd && cd biblepay-evolution/ && git pull origin master && sudo make && cd src && ./biblepayd -daemon && sleep 90 && ./biblepay-cli getmininginfo 
Note: the ";" says do this after, regardless of the outcome Note: && says do this after only if previous command finished with no errors

SPEED UP COMPILE:
To speed up the compile time, add -j4 or -j8 after make. This way it compiles using 4 or 8 threads instead of just 1.
./configure LDFLAGS="-L${BDB_PREFIX}/lib/" CPPFLAGS="-I${BDB_PREFIX}/include/" sudo make -j8 
Reference: http://www.linux-databook.info/?page_id=2319

RSYNC stop biblepay from your nodes compile on your fastest machine then rsync with your machines only src folder is required
rsync -avuz /root/biblepay-evolution/src/ [email protected]:/root/biblepay-evolution/src/ 
https://stackoverflow.com/questions/3299951/how-to-pass-password-for-rsync-ssh-command https://www.thegeekstuff.com/2008/11/3-steps-to-perform-ssh-login-without-password-using-ssh-keygen-ssh-copy-id/
people make cron jobs and rsync automatically

OUTDATED

Unofficial Bash Script
https://gist.github.com/anonymous/d1c1d35e3c8f67f5fb2e204479fa5c6b

Official Ubuntu Package
https://launchpad.net/~biblepay-official

Unofficial Ubuntu Package
https://www.reddit.com/BiblePay/comments/7rwqqs/unofficial_ubuntu_packages_available/

Unofficial Mine in One Line
https://www.reddit.com/BiblePay/comments/7ryuk1/mine_in_one_line/
NOTE: DONT RUN ON A COMPUTER WITH COINS -- THIS IS A CLEAN INSTALL SCRIPT

COMPILE WITHOUT GUI: https://bitcointalk.org/index.php?topic=2042657.msg21878317#msg21878317 https://bitcointalk.org/index.php?topic=2042657.msg21878389#msg21878389
ADVANCED:

DOCKER IMAGES (NOTE: I havent tested these, use at your own risk) https://hub.docker.com/gagaha/biblepay/ https://hub.docker.com/cryptozero/biblepay-opt/
submitted by togoshige to BiblePay [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to conspiracyundone [link] [comments]

Install Ubuntu Server 18.04 on VMware vSphere Hypervisor ... How to install ZoneMinder on Ubuntu 18.04 - YouTube Bitcoin Mining on Ubuntu 18.10 - Bitcoin Mining Software ... How to install cPanel/WHM on a fresh installation of Linux - WHM Setup Tutorials How to Bitcoin Miner with Ubuntu VPS - Setup Nicehash Miner via Ubuntu VPS

How to install Litecoin wallet on Ubuntu 18.04 Bionic Beaver Linux ... Requirements Privileged access to your Ubuntu System as root or via sudo command is required. Difficulty EASY Conventions # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command $ - requires given linux commands to be executed as a regular non-privileged ... I want to install ubuntu 18.04 LTS on my computer. But I am a little worried about system requirements. I can find 'Recommended' System Requirements on ubuntu website. But I am unaware of 'Minimum ... Bitcoin is a form of decentralized cryptocurrency that was created in 2009. Because it is decentralized, it doesn't use a bank or a single administrator. Each transaction occurs without a middleman being involved. bitcoin can be used with a number of organizations (such as booking hotels and purchasing goods and services). However, the use of bitcoin does require a network to work upon. In this how to tutorial, Let’s see how to install Bitcoin daemon wallet on a Ubuntu server. Basic Requirements: Minimum OS required – Ubuntu 16.04 OS The lnd install guide refers to golang-1.10-go, but Ubuntu 16.04 LTS currently has golang-1.9-go. To install the latest go using snap instead: sudo snap install --classic go

[index] [50498] [28594] [47131] [49361] [39078] [43248] [48453] [26758] [40299] [33254]

Install Ubuntu Server 18.04 on VMware vSphere Hypervisor ...

Ubuntu Web Server from scratch, free web hosting (LAMP, FTP, Webmin, PHPMyAdmin, SSH) [HD] - Duration: 35:05. John DeVries 454,759 views Bitcoin 101 - Getting Your BTCs out of Your Paper Wallets & Cold Storage - Fun with Sloppy Wallets - Duration: 10:54. CRI 82,619 views How to mining Bitcoin with your Ubuntu VPS? Earn 0.0001 BTC per VPS, if you have 10 VPS, you will earn 0.001 BTC per day (~2.5 USD), if you have a lot of VPS, you will earn more BTC per day. Setup ... In this video I will show you how to install Ubuntu 18.04 LTS Desktop and VMware tools in VMware or How to Install VMware and Use VMware to Install Ubuntu . ... In this video, I'm going to show you how to start mining Bitcoin on Linux/Debian based operating systems. https://bitcoinminingsoftware2019.com/bitcoin-minin...

#