Getting started with Bitcoin mining

After years of using VirtualBox I moved to VMWare Player and wow

I'm not a serious VM user by any means, all I use them for is testing Windows 10 updates with my customizations, I mess around with Linux here and there and if I'm feeling nostalgic I boot up Windows 2000 or XP. VirtualBox always did the job although it was buggy with anything that required 3D acceleration.

I never really looked at other solutions because Hyper V always seemed intimidating and VMWare wasn't free besides VMWare Player which could only run existing VMs but not create new ones. Atleast that's what I always thought until people here corrected me yesterday.

So I switched over to VMWare player and wow, while I haven't tested Linux yet Windows 2000 - Windows 10 run like a dream and 3D effects are fully working, no UI glitches nothing. Sure there are a few sound cracklings going on but I can live with that, thanks everyone here who corrected me on VMWare Player!

Honestly it runs so well I wonder if there's any catch... will VMWare mine bitcoins on my system? Will it spy on me, will it declare world-domination if I use it for too long?

I'm obviously just kidding about the last part :P
submitted by Skyyblaze to virtualization [link] [comments]

Comprehensive and honest user feedback from a Golem User

Hey everyone! Last week, a reporter approached us for words on Golem, and it was the first time a journalist actually also asked us to connect with a user for feedback. I told them to chat with PSVjasper99 and he provided super great feedback. He sent it to me and I shared it with our team, that appreciated it a lot. We consider your feedback extremely important, so posting here the report he prepared, and hoping to kick off a round of further feedback from all the Golem community. Thank you in advance!
Experience Golem
Jasper V. 15-8-2018
I came across Golem around August of last year. A little background first:
I was starting my first semester at university that year and was already interested in the whole cryptocurrency world. At first, like many, I was full of scepticism. I mainly knew Bitcoin from being used on the darker side of transactions. Right as I started to learn about Golem, which was pretty much under pressure since their first major release Brass Beta was due summer 2017 and had not come out yet, I started my new study at the Technical University. One of my first major subjects required me to run tasks and complete FEM analyses on my university laptop (I study mechanical engineering and materials). These took days to complete. That was the point I bought my first Golem tokens. The use was to use these tokens if in the future, CAD renders and FEM analyses were to be implemented into Golem. Of course, the magic month December came and we all know what happened. I continued to hold on to my tokens and accumulated some more between March and now. Never sold nothing.
Of course this was at first all based around speculation. I first installed testnet in November (I think it was). What I first realised was that it was pretty spectacular the way it worked. The UI was clean and organized, instructions were clear and off rendering we went. This did not always go to plan however, because many of the tasks timed out. This was however, not a major problem since Golem allowed to use tGNT for testnet so we could attempt tasks as many times as we wanted. Updates came along every three weeks or so. The main files I rendered were demos that were also provided to test the capacity of the network. I had a success rate of about 25-35% estimated. A lot of tasks timed out or had a few ‘stripes’ not rendered correctly.
When Golem Brass Beta was launched about 4 months ago, I think the whole community was very excited. I only run Golem when I am actually using my PC. Running Golem whilst not using your PC would not only be very inefficient, but expensive too. It is not like mining. At the moment there is a clear deficit in requestors as opposed to providers. People should not expect when they launch Golem, that is computing the whole time (yet!). I have had days with tens of tasks with some good rewards, about 6 GNT per day, and days after which I had not had a single task ever since. Therefore, I often use Golems ability to change hardware allocation a lot. As I’m typing this, I offer 6 of my 8 threads to Golem. When I am gaming, I allocate 4 of my 8 threads and when I’m playing intensive games or VR, I allocate 2 of my 8 threads. My RAM and SSD space is always on full, since I have enough of that and it does not really impact performance that much.
I have now completed about 200 tasks across two nodes. Seeing how Golem actually worked was pretty cool and it has come a very long way since testnet and continues to improve. Golems UI is very smooth and I really like the vertical placement of the window. The application starts with a clear introduction, ability to protect your node with a password (access to wallets), and clearly tells you what to with port forwarding etc. This does not always go well, we see a huge surge of people on Reddit and the Golem Rocket Chat who have problems configuring their ports and connections. Thankfully, there are a lot of active team members and enthusiasts on the Rocket Chat who always find a solution. A major thing that has improved are the pop-up messages when hovering over items, and the understandeability of the whole application. Everything is well documented in the help document provided and the application works smooth without stuttering. Tips are provided as well for using the right settings when requesting a task on Golem, concerning task timeout, amount of subtasks etc. The price is basically determined via supply and demand, which is an advantage and could as well be a disadvantage. I hope Golem becomes large enough to not be influenced by big players making price agreements and who could, in theory, manipulate the market. However if this is not the case, this system ensures that the price paid for the computation is fair.
However, Golem certainly has its flaws. Not all of these were noticed by me, but I also talk to some enthusiasts and friends daily that always have Golem running. Most likely the team is working on these problems:
However, does this impact the implication of Golem in the real world? I have no idea. Golem currently only has Blender rendering POC on Mainnet and the target audience for requestors is not that huge. However, with the next release that should increase. Therefore, I don’t see an average Joe use Golem in the near future, but if more types of computation would be implemented, that could certainly change. If prices remain competitive, there is a huge (growing!) market available to Golem. Whether there is a hurdle for people to go to dApps from regular apps, probably. I think the majority of the projected users don’t quite yet see the added value of decentralization. Furthermore, I can imagine people disliking the fact to go to an exchange and exchange fiat for BTC or ETH, then to exchange for GNT, and then to transfer that GNT to Golems app. Golem is aware of this and I can see this (for many dApps) be the main factor contributing to the (not yet) mass adoption of dApps. Furthermore, the ever-changing value of these tokens is what might scare people off.
I am not a Blender artist and therefore I am not really able to use golem as a requestor. I can occasionally run some demo files. I have therefore not used any regular apps that provide the same service. Hopefully, this will change in the future, with the implementation of more use cases and the opportunity for the community to build on top of Golem.
So to conclude, will dApps ever replace regular apps? I see a few reasons as to why they might and a few reasons as to why they won’t. The main key is to improve the number of use cases, as well as the availability, keep the price competitive and the usability up. First, the issues above need to be solved for Golem specifically from my point of view. Some proper marketing could not hurt as well, trialling at universities and companies. If dApps are adopted by a few large(r) players (with the right use cases), domestic (mass) adoption could follow. However, I think it is hard to comment on this seen as the technology and development is still taking baby steps. I hope there is much more to come!
submitted by mariapaulafn to GolemProject [link] [comments]

I have 1.5 or such ETH on the Rinkeby Test Net on Metamask...nobody is giving me a straight answer on how to move that to the the main ETH network.

All the posting I've done on Minds, I tried to make them as quality articles or links to music and videos that are part of what I'm willing to put effort into.
People over there have tried to help me,although one asked for my keys saying he would do the transfer no, I'm not easily fished, I'm on the internet since 1997, before the internet became known as "social media".
Anyway, I want to move my stuff from that Rinkeby Test Network, when Minds ran on that, I had my Minds detect Metamask and my tokens went into My Onchain and Receiver address, which are the same when things are normal, iot about 20 tokens in Offchain, basically that ETH I can't move. I've been given guides, help on the Help group and the MindUsers group but what they say doesn't check out with reality, I've shown them's just not working. Have 500 USD worth of ETH and it seems like it wa practise ETH/tokens that do not count because Minds was in Beta mode afaik is what I'm starting to think. My wallet address is the same on Rinkeby and Main, which I know is normal. Metamask is supposed to main everything easier, but even trying to do it outside of Metamask doesn't work, like giving the task to the people at Minds who will do it for me, when I click transfer after inserting my wallet address, no message that it gets taken care of.

I'm rather mad, there's this issue on Minds, and Steemit says a free account takes 1-2 weeks to be given, I have an account where I gave them my phone number for their damn SMS verification to consider me for a free account, it's been 6 months, no damn email activation like they told me I would get.I even had to try other of my email addresses with friends cell phones to get the SMS and nope, those 3 other accounts I made, with different IP addresses, that I keep within my real country so they don't think it's a suspicious request and ignore it, although one might have been done with me being on my VPS which is in the USA, although even things like Maxmind can't figure out its real location, that's some great sec from them, it says I'm in Canada even when I look up the IP on THE IP address info website/API,

I'm really aggravated by the situation. With crypto too. I had mined for 800 USD worth of Dashcoin through minergate and close to 2 fantomcoin since it could mine both cryptos at the same time and since I wasn't able to have dashcoin-linux or dashcoin-windows sync (it's a local DSH wallet), the a-holes at minergate stole all of my DSH by August 31st, no warning they would stop supporting DSH and 1 month to move it elsewhere, likely knowing it's a crypto that isn't in many good local or even online wallets, I couldn't find a single place to move the DSH too. It's a shitload of power drawn from me to have 800 something DSH, since it's not worth much, but it's the coin I could mine the second fastest, through commandline while in Windows 7 (I dual boot Mint 17.3 and Win7, although I might soon just have a Win7 virtual machine in virtualbox...I don't boot in it enough to warrant it at this point pretty much and run most of my games through Steam or CrossOveWine. Anyway getting away from the subject. I can only mine Monero really efficiently through CryptoMiner for AMD GPU and my AMD Radeon HD 7870 and a Radeon HD 7850 connected to work together with CrossOver, I get real decent Monero mining, also Ethereum since I got an AMD-FX8350 overclocked to 4.2ghz for all 8 cores, not anything crazy, but I got great cooling. I would eventually move the ETH I mined on that other place (not minergate) and the real luck I had when I mined 0,0017 Bitcoin Gold, I know my graphic cards are getting old hence my interest in being paid for my efforts to be relevant online and it seems like I can't get that either.
submitted by xMrCleanx to minds [link] [comments]

Tested, step-by-step tutorial to run a 21 Bitcoin Computer as a virtual machine

Many thanks to ButtcoinEE and ecafyelims for initial pointers, but if I understood correctly, both users said they hadn't actually tried it themselves. So here comes a tutorial based on something I actually tried. Best of all: You don't even need a Raspberry Pi! We'll run it as a virtual machine.
The first step is to get a Debian 8 (Jessie) installation up and running. You might want to install that inside a VMWare/Virtualbox machine. I'll be using Vagrant here ( ) which makes it easy to manage virtual machines like that and already has a Debian 8 image in the catalog. So get Vagrant for your platform and then do something like this:
vagrant init ARTACK/debian-jessie vagrant up 
You should now be able to SSH into the machine:
vagrant ssh 
Now that we have a Debian up and running, let's first get some packages we'll need later:
sudo su # become root apt-get update apt-get upgrade apt-get install apt-transport-https git cython3 python3-setuptools 
Add the 21 Debian repository:
echo "deb stable main" > /etc/apt/sources.list.d/twentyone.list apt-get update 
It'll complain about a missing GPG key, but you can just ignore that.
We should be able to do 'apt-get install two1' now, but it complains about a missing package 'python3-sha256'. The reason for that is probably, that we are doing this on a x86 architecture, where the packages are slightly different than the Raspberry Pi's ARM architecture. So we'll just manually install the package and have it ignore the dependency errors:
aptitude download two1 dpkg -i two1_1.0.0-1_all.deb 
Now let it try to fetch as many of the dependencies as possible:
apt-get -f install 
And try to install again (had to do this again, not sure why):
dpkg -i two1_1.0.0-1_all.deb 
The 21 binary should now be available:
which 21 # => /usbin/21 
Before we can run it, we'll need that missing python-256 package. We can install it manually from :
git clone cd sha256 python3 sdist python3 install 
Now try to get a status report via the 21 tool:
21 status 
If everything worked out, you should see something like:
You do not have a Bitcoin wallet configured. Let's create one. Press any key ... 
and will also be asked to pick a username for a account.
All 21 Bitcoin computers are networked together into a VPN using the tool ZeroTier ( ). Let's also set that up:
wget dpkg -i zerotier-one_1.1.0_amd64.deb 
We'll have to extract the credentials for the specific network they use from 21's zerotier package:
mkdir credentials cd credentials wget ar x zerotier-one_1.1.0-1_armhf.deb tar xf data.tar.xz cp valib/zerotier-one/updates.d/ZeroTierOneInstaller-linux-armv6l-1_1_0 /valib/zerotier-one/updates.d/ 
Before we join the network, we need to lock down our machine. That's actually a bit tricky, as these Vagrant images aren't really designed with security in mind, but rather only to be used for local testing. I think it should be enough to do:
passwd vagrant rm /home/vagrant/.ssh/authorized_keys 
Note that you won't be able to use 'vagrant ssh' any longer afterwards, as we just deleted the standard Vagrant key-based login. You'll have to use 'ssh [email protected]' instead. Now we are ready to join the network:
wget python3 python3 # might have to try this twice as well ifconfig zt0 # will show your new IP within the VPN 
The 21 tools have a concept of both an on-chain balance and an off-chain balance - the latter being managed by 21's server. You can deposit to your on-chain balance, but currently the only way to increase the off-chain balance is by mining or by receiving payments from others. Without the mining chip it's therefore a bit tricky to increase that off-chain balance. I hear that a feature request is being considered, to allow moving funds from on-chain to off-chain.
That's all! If you want to give it a shot, you should probably move fast, as 21 has some DRM in the works, as per this comment: .
This was brought to you by - cloud torrenting for command line fans. Check us out - we are also big on micropayments! ;-)
submitted by coinadoio to Bitcoin [link] [comments]

ZFS on Linux or kFreeBSD under Debian Wheezy?

Thinking about switching from my FreeBSD 9.0 server to the ZFS on Linux kernel module with CentOS 6.x or kFreeBSD/Debian Wheezy.
Wondering if anyone has tinkered with any of these and have any suggestions?
I'd be looking at:
*1 x 80GB SATA HDD for the OS (ext4)
*4 x 1TB SATA HDD's in RAID-Z
submitted by skitzot to linux [link] [comments]

Comprehensive guide to safely browse the SilkRoad

First of all, I'm no security expert. The following guide will be nothing but technical instructions to securing your machine to make digital information storage and transmission secure.
Your security is divided in 3 parts. Also remember your security (as in lowering chances to get caught) is only as strong and your weakest link. Those 3 parts are :
a) Money
You can (and will) get caught if you aren't careful with how you move money. Banks and LE work hand-in-hand to trace money. I won't cover that aspect but you need a bulletproof way of buying (if you are a buyer) and/or selling (if you are a seller) your bitcoins.
b) Drugs
Yes, you'll get caught if you don't handle drugs in a secure fashion, ldo. It includes shipping, stealthing, receiving packages, storing. You get the idea.
c) Information
Here is the part I'll develop in this guide. How to handle information (mostly digital information) to not get caught and be as stealthy as possible.
All the following softwares are :
1) Free - you don't have (and shouldn't, as sad as it sounds for security reasons) to pay anything to fully use them
2) Open source - Anyone with knowledge can see what the programs are made of. Def a security plus.
We will need (In order of use) :
a) a good anti-virus
Before even starting the job, we need to make sure we're working in a safe environnement. If you have a keylogger installed on your computer then all futur steps will be for NOTHING. So if you don't have an updated AV installed yet, get one. I personally use AVG. Here is the link but it's recommended you search it yourself using google, after all, I could be a hacker myself.
b) a password manager
You'll need to save at least 5 complex passwords. I strongly recommend using a password manager (with passwords creation) such as KeePass. It's multi plateform (windows/linux/android).
c) TrueCrypt
Very powerful piece of software which allows you to encrypt files/folder or even full system partition using bulletproof algorythm such as AES.
d) VirtualBox
Very powerful software which allows you to run a completely autonom virtual machine inside your physical machine.
e) Ubuntu 13.04
Free OS. Very safe. Not so user friendly but you'll only use it to browse SilkRoad and use PGP (more on that later).
d) Tor Browser Bundle (TBB)
A package of pre-configured software to use TOR. Awesome.
I assume you already installed the antivirus and ran a minutious scan on your system. Your system was clean already ? Great, you can read what's next.
So first, we want to create an encrypted folder so that we can install a complete different OS in it. It'll be 100% safe and impossible (without the passphrase ldo) to know what it is you are putting in the folder.
a) Click on "Create Volume"
b) Select "Create an encrypted file container"
c) Select "Standard TrueCrypt volume"
note : Do your research on which option you want to use.
d) For Volume Location, select where you want to save the file. Type in a random name and click "save" then "Next" !! Note : You can select a USB pendrive (with at least 10GB and USB 3.0 strongly recommended) so that you have a portable, encrypted OS. Very useful since that you can physically hide it from LE in case of a search at your place) !!
e) Encryption Options
I advise to use AES. The technology is old which, in security, is a good thing since it means it has been tested by many security experts. I don't know about Hash Algorithm. I think I use RIPEMD-160 but it's up to you to do your godamn research on which option you want to use.
f) Volume Size
Pick at least 10gb, (no more than 15GB really). Note : TrueCrypt will encrypt the whole 10GB no matter what it is you put in, even empty space. So consider the number you type in (10GB here) as gone once you click "Next".
g) Volume Password
Open KeePass (!!!!!!!! with a strong masterpassword !!!!!!!!) and generate a random passphrase using at least 15 (25+ advised) characters (with lowercase, uppercase, numbers, symbols, space everything checked). Save it carefully, and copy paste it twice in TryeCrypt.
h) Large Files
Select "Yes"
i) Volume Format
Move your mouse randomly (to create randomness in the Key) a few seconds then click "Format", wait.
Congratulation, you now are the owner of an encrypted file container.
First, you need to mount the encrypted folder you just created. For this, open TrueCrypt, and click on random letter (remember it and always use the same to avoid corruption). I personally use R: (don't ask me why, I guess I used it the first time and it stuck). Then, click on "Select File" and browse to your newly created folder, click on "Open". Then, click on "Mount", it'll ask for your passphrase. Open it with KeePass and copy past it. Click "OK". If everything went well, you can know access your encrypted folder using Windows Explorer in computer. Truecrypt created a virtual partition.
Okay, so now, off to creating a Virtual Machine. You must have downloaded Ubuntu 13.04 (700MO or so). Good, save the .iso file somwhere.
a) Open VirtualBox, click on "New". In name, type in Ubuntu, it'll automatically select the type and version needed. Click "Next".
b) Memory Size. It's the amount of RAM you want to allocate to your virtual machine. I personally have 12GB of RAM and I allocated 4096MO to my VM (virtual machine). Note : Consider that the amount of RAM you give to your VM gone from your physical machine. Even if you don't run anything on your VM, the amount given (4096MO) won't be usable by your physical machine until you shutdown your VM. Click "Next".
c) Hard-Drive. Select "Create a virtual hard drive now", click "Create".
d) Type of hard drive file Select "VDI (Image disk VirtualBox)" Click "Next".
e) Select "Fixed Size", click "Next".
f) File location and size For location, click the yellow folder and go to the letter you mounted the file in TrueCrypt (for me R:\the-name-of-your-VM.vdi) In size, pick whatever the amount of GB you allocated to the crypted folder MINUS 1.5GB. !! Note : very important. For exemple, if your crypted folder is 10GB, you must pick 8,50 Gio. !! Click "Create" and wait a minute or two for VBox to create your VM.
Here are the settings I use for my SilkRoad Machine.
To access settings, in VirtualBox, select your newly created VM and click "Configuration". Go to the onglet "System" => "Proc", select a reasonnable Value (where the green and red meets is generally ok). Type in 90% in allocated ressources. Go to the onglet "Display" => "Video", select a reasonnable Value (where the green and red meets is generally ok). Number of screen, 1 by default. You can use more screens if you have more than one. Vbox supports it beautifully. Click "OK".
a) Open VBox, select your virtual machine in the left and click "Start" at the top. You now are running your virtual machine.
Now you must install Linux on it. A window will pop up and ask you to select a booting disk. Click the yellow folder and browse to the Ubuntu.iso file you previously downloaded. Click on "Start".
You VM will now boot using Ubuntu. Install it, check "Download updated while installing", leave everything else as is.
Select "Erase disk and install Ubuntu". File in the settings needed. In name, type whatever you want (note : I usually just type in the same letter I used to mount the folder with TrueCrypt). Pick a password (a new fresh password, that one isn't necessarily important but make sure you remember it). Select "Require my password to log in", you don't mind extra lawyers of security. Click "Continue". Now, wait, the installation can take up to an hour or two.
When done, click on "Restart Now". When rebooting, you will be asked to if you want to boot using the installation, DON'T anything and wait. Now you have a beautiful orange/purple page asking you for your password. Type in the password you wrote during the installation process and press Enter. Welcome to Ubuntu.
b) You need to setup a few things.
First, you can go fullscreen pressing Right CTRL + F (the CTRL next to the arrows on the right of your keyboard). Better, right ?
You'll notice those black borders onto the sides. That's ugly and bad for your eyes. To remediate, you need to install a pack of drivers especially made for Virtual machines.
To do so, put your cursor to the very bottom center of your screen (if you are in fullscreen mode, else you have access to the options at the very top of the window). Click on "Peripheric", Click on "Install Guest Additions". An autorun window will open up, select "Run Software" and click "OK". Enter your Ubuntu password. Click "Authenticate". An ugly purple window will open with ugly white characters, it's the terminal. We'll use it later for different stuff. Wait a minute or two until you have the terminal says this "Press Return to close this window...". Press Return on your keyboard (above Enter) to close the window, ldo.
Reboot the virtual machine by going to the very top right of your screen. Now to go the options, on the left, you'll see a dock of icons, click the Gear with the Red hammer or whatever you call it in english (I know it's not a hammer). Double click on "Displays", pick your favorite resolution. Click "Apply" then "Keep that resolution". Much better, cierto ?
You will notice the OS seems slow and laggy, even more so if you installed your VM on a USB pendrive. To remediate, follow those steps.
Run the terminal (push ALT + F2 and type in "Terminal", double click to open it. Copy past that command :
/uslib/nux/unity_support_test -p
The following should appear :
Not software rendered: no
Not blacklisted: yes
GLX fbconfig: yes
GLX texture from pixmap: yes
GL npot or rect textures: yes
GL vertex program: yes
GL fragment program: yes
GL vertex buffer object: yes
GL framebuffer object: yes
GL version is 1.4+: yes
Unity 3D supported: no
As you can see, 3D acceleration isn't activated. To activate it, return to terminal and copy past that command, enter password when asked. When "asked to continue [Y/n] ?", type in Y then press enter.
sudo bash -c 'echo vboxvideo >> /etc/modules'
Shutdown the virtual machine (you can do it manually inside the VM or press Right CTRL + Q and select "Send extinction signal".
Go back to VirtualBox and go to configuration => display. Check Activate 3D acceleration.
Boot your VM, open terminal and type
/uslib/nux/unity_support_test -p
You should now see that Unity 3D is supported and your OS is fluid. Don't expect native performances tho, it's still an emulated OS.
Run your VM. Open a firefox window and go to
Select the Linux version and download it. Close Firefox. We want to use that machine on the clearweb as little as possible.
Unpack (or drag&drop) the tor-browser_en-US folder in the folder "Home" or desktop or whervere you want.
Open the folder and double click on "start-tor-browser". It will open a weird text editor with gibberish stuff in it. Close it. We need to activate an option first.
Push ALT, in that window, type "dconf-editor" and press Enter. In dconfg-editor go to: org => gnome => nautilus =>preferences Click on "executable-text-activation" and from drop down menu select: "launch: to launch scripts as programs." Close dconf-editor.
You can now launch TOR. and browse anonymously the road. I strongly advise you to install KeePass for linux by going to Ubuntu Software Center to save passwords for Silkroad as well as your PGP passphrase.
PGP is a powerful protocal that allows you to encrypt and decrypt messages and files. It has been used for over 15 years and is the standard all over the world for industry and governement communications.
So first, we must create our own set of keys.
A) Creating your own keys
To do so, open the terminal and type GPG. It will reply :
gpg: Go ahead and type your message ...
Ok, you've got GPG installed already, perfect.
To create your key, type :
gpg --gen-key
Type 1 then hit Enter
You'll be asked to chose between 1024 and 4096 bits. Chose 4096 (the most secure), hit Enter.
Next window, type 0, press Enter, then type Y, press Enter.
You are now asked to enter your name, it's important you don't type in your Real Name obviously but it's also important to chose something that identifies you. I chose my Silkroad name so that my contacts know the key is mine.
Email adress : [email protected] or whatever you want, shouldn't be real.
Comment : none, press Enter
Type in "O" to confirm, press Enter
Enter passphrase, very important to chose something very secure. As usual, open up KeePass and generate a strong passphrase, there is no limitation AFAIK.
Then you'll be asked to do random stuff on your computer to generate bytes to ensure randomness in your key pool. Do stuff, open a random file and type in stuff for exemple. Once it's done (it can take a few minutes), you now have your own set of keys.
What we want to do know is to export the public key so that you can share it with your sellers/buyers.
Type :
gpg --armor --export your-email-adress-used-before
Copy paste the public key in a .txt file on your desktop and share it whenever you buy/sell.
B) Importing a public key
To send a message to someone, you must important its key. To do so, create a document and copy paste the key there, close & save it.
Now, open seahorse (hit ALT and type in Seahorse, open the program called "Passwords and keys".
Put your cursor in the very top left of your screen and click file => import, select the file you saved the key in. Done.
C) Encrypting a message
Open the terminal and type :
gpg -ear name-or-email-of-your-contact < Press Enter Type your message
Press Enter, finish by typing "end" and press Enter again.
You'll have your encrypted message. Something that looks like that :
-----BEGIN PGP MESSAGE----- Version: GnuPG v1.4.12 (GNU/Linux)
hQIMA7eD31/5BBRZAQ/9Hq1r1gpOIf2r06zSIL8Ww0tUCC9PlNiMpemPwhpZsccB vO4MOMrnV41BHToTQNfh0xiZdXFxO/T6ow4oatP2Ap/BvZtipcAAjJKowP6aaTOJ Wgd7nC4FTJvRUjgkW/p3imlQsdTVb3+2dNzCPp0yrr8NocW77+4Ka/+4aoql0UmI 3mKLjo0+eof8qAnQd5jOaAcWTszhIwBd99rXVbRCjNa/jMsSQ9Vnn7L+WqYGHuAI MMdOCU3peifV/7zA6A0bMKzStWc1JIa84wus91/mmErkRcNZHqThCje8eulinzRm RthaH0yi7ty65F3IuSqbq/qdpdE9UXvwjySbFE7ANCPpnkP4jv+oL95UezyjbO2x ra1Il7XKbYvaf0oXJAz5xKsLfeHKB3kCR+Kxzt9NmdRZ4rPZ4ZjSN5WI9YeOL0t/ W7oaCyBcFD/6/m/63VNYZTrwrqBGqsWhXVFpoHalvd+09CffsdQjwDIMy9u3TtRk j+FDSGuukKrS/7exWSoajSDhTK+koSS8CIFvyocZ81EkGhnUjd4kxlIAu4UCXmG6 LiJXXo7X5PK7knGtlzZXstrtrrttr8FFeAbSHsZ0+ihdxtNSvx1EPewl TtLSKoUT9ickUrxFoPm2z1vqBwN/087EaCU6BSX8uwZ8GrxMwSKgVmQKfVyfgMDS RAGGtmuRwgfyhthrertwF0KV8nTajDnSqoGiMAgK7y+e320OEFnYXOKIXlue l7FvOHwi9jZbBAR4HHAfhgJIj78P =OT60 -----END PGP MESSAGE-----
You can now send the encrypted message to your contact.
D) Decrypting messages
Open the terminal and type :
gpg -da < Press enter, then copy paste the message you received. Press Enter, finish by tiping end then press Enter again.
You will be asked to enter the passphrase to decrypt it. Open KeePass and copy paste it. The result will be like this :
You need a passphrase to unlock the secret key for user: "abcd [email protected]" 4096-bit RSA key, ID xx, created 2013-05-08 (main key ID xxx)
gpg: encrypted with 4096-bit RSA key, ID xxx, created 2013-05-08 "abcd [email protected]" ENCRYPTED MESSAGE TO THE SILK ROAD HERE
You can now safely converse with your vendors.
I hope everything worked well. Finally, the most important security advice someone can give is to use your brain. Don't do anything stupid and you should be fine.
Feel free to discuss issues you may have encontered here or by PM, I'll gladly help you getting setup.
Remember also that your security is only as good as your contacts security. For exemple, if your seller is stupid and keeps detailed informations of his buyers on file, then there isn't much you can do in case he gets caught.
I could have sold this tutorial but I chose not to because my personnal security is guaranteed only if yours is aswell. You get my point.
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.12 (GNU/Linux)
mQENBFGIAIUBCAC75V2SJ50dU6+gUY7jdrHxJKmdjXjlOxWjE+CTuti+Pq8NveTK aPXWHmFZpsEtW+v7tHmPPT/cjEKlmo/B9Wxl9daFis+6gFQHnaKNRCFVmOSt9GL8 7qBxrxC/HZTeBgdE8dWf4RPSc911PRb2+iCCrdgj+5ILwp3fcM5EHoRqKiFDpb3A fybrw3prvpPx8dyt1H/p73S6Gfk+Iuwcq2+iIAMJUJQUc+CwMFFCplQ1BUeiD+nn 5o24FXF9Krcbw8w5lZCfPVPSh0GYTvNMaj1VWjEQFU4j0rCOiJ+UVckpgJ4MRrxI MbKJ8srGLSJRnCHM2syQC0Zq/2iwRuZY7zWXABEBAAG0EVdoYXRzdXA1NiA8YUBi LmM+iQE4BBMBAgAiBQJRiACFAhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAK CRBioWhoc3JRsCrhB/9M2AptCTjyitpQR1ZnqwFop/NDdOIY1DtERkyQKfbHftzK 5I/LI3wxP5rhts2NY/EMVl8ziJVZ7h0J9japkoia8uOYX9Un6aMasHM0PH7Mln2K 936BeoZDQbPQV8NOCyNT4lMNt7Ajd+6GJcmAIduPmUi6xjgge716MhQlTBg5HG 94ZJT3Xm7W9tuIiJh8H9Dkr60F9UuwtIPfKPEeXyxUI25fZAQ+nyVz39ap2fjyeW EYMB6y90zxWjFPiFfpx+BfcWOmzHaXkps/bG6kSbOcVn9UJS32C0JyIFmfa96N6H +tSmk+WW98u5dSBzhIoYYiXxWPihJDOjTCUYkFC9uQENBFGIAIUBCADrkKs31LOL 4MQ6fdzhw2MvTI8zDad2bJZCd/+Gf8yGTNKhagJIHo8KEuCDINydQXHCt+aNKZZ7 d/QG09nABaybZJfqf1ffOiD5L1PivcKJMdJNozNuIhWxc4E35A7c/wCPJdDOBV0v eqf57illUo+yz7CKfyO088BYMGTrBRi/ifqmPyMuYzzC4SZcx1MJFU1mzONYU1r0 ZYj0eeKdRrbHPfJUAWQUr6MteMvJp5g8JfyYC+Th+zASEYRRfs3I52rsLb1hpxoi 87xUK89xoXdg4uLysz1Iy/PhGjmtbi61sZCv1oh+o9biNsy9zIjqwhCW7oMPwmJ6 Szh2nNTMCuNFABEBAAGJAR8EGAECAAkFAlGIAIUCGwwACgkQYqFoaHNyUbBKWAf5 AbYVbQVRNYVw5pR6+NDLw1qxlafGz/7j6YnApif0vuVzBEE9aFOUdxfKyIy+Ka8l NYjoAItym2mDTsRZqJwEm1FPbmVFu7WPAnnmn1ECyHBSV0vnJjCL5qkoMx9d/EHs WBW7htnRVtbuJEzVZzzSfddjWEYXGqYcqocebBwQpNgdfuQrHadAbkSmDwLfz+KD r17m1i9sUej8hiFLr64XGau7nl2l+iRMR2vTcVpNZDTJa/t4JlrwMINR95ORo3ze bRVKbedZIn3ifeSzyWDTsScvkNVAe4dovATaHWU/+tkNgL4ECI1UNS8XYsGqWe+r pbfj19eRRPAc4lbNfLlUKQ== =aq6t -----END PGP PUBLIC KEY BLOCK-----
edit : Fixed a few typos.Reorganized chapters using roman letters.
submitted by MUST-BE-ANONYMOUS to SilkRoad [link] [comments]

Virtual Bitcoin Mining! Cryptomining 15 Years Mining Contracts +Free 50 GHS VIRTUAL MINING FARM BITCOIN MINING COMO HACER UNA RECOMPRA ... How to mining btc with kali linux - YouTube Best crypto currency to mine on laptop or PC - YouTube Mining Bitcoin In A Virtual Machine Windows RDP H/s Fast ...

Bitcoin Cloud Mining Review: Currently all Bitcoin Cloud Mining contracts are sold out. NiceHash Review: NiceHash is unique in that it uses an orderbook to match mining contract buyers and sellers. Check its website for up-to-date prices. Eobot Review: Start cloud mining Bitcoin with as little as $10. Eobot claims customers can break even in 14 months. MineOnCloud Review: MineOnCloud currently ... Mining crypto can be fun, frustrating, rewarding and risky however a little planning can reduce the risk and frustration significantly. Unless you have the time and skill to write your own mining software, the majority of people will download third party software to mine using their CPU, GPU, ASICs and a myriad of variations. Experienced miners usually segregate their mining hardware and ... I dealt with Bitcoins before, but I was late in jumping into the mining scene of Bitcoin and was never able to effectively mine the crypto. I see Ethereum's mining scene is still at a pretty early but mature enough stage. I don't have the money to buy hardwares, hence this post. In this case, I will be using VMware Workstation. So can you set up and start mining Ethereum from a virtual machine ... If you happen to be thinking in terms of more computers equals more hashing power then you are absolutely right. Essentially all a miner is, is a device built to hash away at the block at unfathomable speeds. Unfortunately a Virtual Machine can on... Bitcoin, Blockchain and Cryptocurrencies. Secondary Navigation Menu. Menu. CCM HOME Crypto Core Media; CCM News Latest News Feed; CPR Press Press Releases; CCM Podcasts Crypto Radio Shows; CCM Magazine Our Previous Editions; Crypto 100 Top 100 Marketcap; CCM Services Promo/Marketing Services; Cryptocurrencies: 5,971. Markets: 542. Marketcap: $ 395.39 B. 24h Vol: $ 63.29 B. BTC Dominance: 60.32 ...

[index] [35761] [21829] [42494] [6544] [3072] [18092] [8072] [40826] [46841] [16949]

Virtual Bitcoin Mining! Cryptomining 15 Years Mining Contracts +Free 50 GHS

Mining Bitcoin In A Virtual Machine Windows RDP H/s Fast - Duration: 3:21. L30N 12,671 views. 3:21. How I make money mining bitcoins - Duration: 1:55. CNN Business 494,640 views. 1:55 . Cara ... Bitcoin Miner Malware Incredibly Stealthy! - Duration: 3:58. ... R9 280x Build Vlog - GPU Mining on a Virtual Machine - Duration: 47:30. Goose-Tech 7,889 views. 47:30. Steve Jobs introduces ... Virtual Mining Farm Review! A BTC MINING SITE PAYING SINCE 2017! - Duration: 20:06. ... Free Bitcoin Mining Website 2020 Mine 0.0779BTC Daily live proof, How to Earn 2020. - Duration: 2:35 ... Wormminer , bitcoin mining get free 1 machine for start mining Visit Link : WormMiner offers you a smart and easy way to invest your money bitcoin mining system is suitable ... Proof of Stake Virtual Mining - Bitcoin and Cryptocurrency Technologies Part 8 - Alternative Mining Puzzles Not everyone is happy about how Bitcoin mining wo...