Prometei botnet exploits Windows SMB to mine for

A few stories about Brian Krebs: The independent cybercrime journalist who exposes criminals on the internet

First, a bit of introduction before we get into the living drama that is Brian Krebs.
Brian Krebs has been a journalist for decades, starting in the late 90s. He got his start at The Washington Post, but what he's most famous for are his exposes on criminal businesses and individuals who perpetuate cyber crime worldwide. In 2001, he got his interest in cybercrime piqued when a computer worm locked him out of his own computer. In 2005, he shifted from working as a staff writer at The Washington Post's tech newswire to writing for their security blog, "Security Wire". During his tenure there, he started by focusing on the victims of cybercrime, but later also started to focus on the perpetrators of it as well. His reporting helped lead to the shutdown of McColo, a hosting provider who provided service to some of the world's biggest spammers and hackers. Reports analyzing the shutdown of McColo estimated that global spam volume dropped by between 40 and 70 percent. Further analysis revealed it also played host to child pornography sites, and the Russian Business Network, a major Russian cybercrime ring.
In 2009, Krebs left to start his own site, KrebsOnSecurity. Since then, he's been credited with being the first to report on major events such as Stuxnet and when Target was breached, resulting in the leakage of 40 million cards. He also regularly investigates and reveals criminals' identities on his site. The latter has made him the bane of the world of cybercrime, as well as basically a meme, where criminals will include references like Made by Brian Krebs in their code, or name their shops full of stolen credit cards after him.
One of his first posts on his new site was a selection of his best work. While not particularly dramatic, they serve as an excellent example of dogged investigative work, and his series reveal the trail of takedowns his work has documented, or even contributed to.
And now, a selection of drama involving Krebs. Note, all posts are sarcastically-tinged retellings of the source material which I will link throughout. I also didn't use the real names in my retellings, but they are in the source material. This took way too long to write, and it still does massively condense the events described in the series. Krebs has been involved with feuds with other figures, but I'd argue these tales are the "main" bits of drama that are most suited for here.

Fly on the Wall

By 2013, Krebs was no stranger to cybercriminals taking the fight to the real world. He was swatted previously to the point where the police actually know to give him a ring and see if there'd actually been a murder, or if it was just those wacky hackers at it again. In addition, his identity was basically common knowledge to cybercriminals, who would open lines of credit in his name, or find ways to send him money using stolen credit cards.
However, one particular campaign against him caught his eye. A hacker known as "Fly" aka "Flycracker" aka "MUXACC1" posted on a Russian-language fraud forum he administered about a "Krebs fund". His plan was simple. Raise Bitcoin to buy Heroin off of a darknet marketplace, address it to Krebs, and alert his local police via a spoofed phone call. Now, because Krebs is an investigative journalist, he develops undercover presences on cybercrime forums, and it just so happened he'd built up a presence on this one already.
Guys, it became known recently that Brian Krebs is a heroin addict and he desperately needs the smack, so we have started the "Helping Brian Fund", and shortly we will create a bitcoin wallet called "Drugs for Krebs" which we will use to buy him the purest heroin on the Silk Road. My friends, his withdrawal is very bad, let’s join forces to help the guy! We will save Brian from the acute heroin withdrawal and the world will get slightly better!
Fly had first caught Krebs' attention by taunting him on Twitter, sending him Tweets including insults and abuse, and totally-legit looking links. Probably either laced with malware, or designed to get Krebs' IP. He also took to posting personal details such as Krebs' credit report, directions to his house, and pictures of his front door on LiveJournal, of all places.
So, after spotting the scheme, he alerted his local police that he'd probably have someone sending him some China White. Sure enough, the ne'er-do-wells managed to raise 2 BTC, which at the time was a cool $200 or so. They created an account on the premiere darknet site at the time, The Silk Road under the foolproof name "briankrebs7". They found one seller who had consistently high reviews, but the deal fell through for unknown reasons. My personal theory is the seller decided to Google where it was going, and realized sending a gram of dope into the waiting arms of local law enforcement probably wasn't the best use of his time. Still, the forum members persevered, and found another seller who was running a buy 10 get 2 free promotion. $165 of Bitcoin later, the drugs were on their way to a new home. The seller apparently informed Fly that the shipment should arrive by Tuesday, a fact which he gleefully shared with the forum.
While our intrepid hero had no doubt that the forum members were determined to help him grab the tail of the dragon, he's not one to assume without confirmation, and enlisted the help of a graduate student at UCSD who was researching Bitcoin and anonymity on The Silk Road, and confirmed the address shared by Fly was used to deposit 2 BTC into an account known to be used for money management on the site.
By Monday, an envelope from Chicago had arrived, containing a copy of Chicago confidential. Taped inside were tiny baggies filled with the purported heroin. Either dedicated to satisfied customers, or mathematically challenged, the seller had included thirteen baggies instead of the twelve advertised. A police officer arrived to take a report and whisked the baggies away.
Now, Fly was upset that Krebs wasn't in handcuffs for drug possession, and decided to follow up his stunt by sending Krebs a floral arrangement shaped like a cross, and an accompanying threatening message addressed to his wife, the dire tone slightly undercut by the fact that it was signed "Velvet Crabs". Krebs' curiosity was already piqued from the shenanigans with the heroin, but with the arrival of the flowers decided to dive deeper into the сука behind things.
He began digging into databases from carding sites that had been hacked, but got his first major breakthrough to his identity from a Russian computer forensics firm. Fly had maintained an account on a now-defunct hacking forum, whose database was breached under "Flycracker". It turns out, the email Flycracker had used was also hacked at some point, and a source told Krebs that the email was full of reports from a keylogger Fly had installed on his wife's computer. Now, because presumably his wife wasn't part of, or perhaps even privy to her husband's illicit dealings, her email account happened to be her full legal name, which Krebs was able to trace to her husband. Now, around this time, the site Fly maintained disappeared from the web, and administrators on another major fraud forum started purging his account. This is a step they typically take when they suspect a member has been apprehended by authorities. Nobody knew for sure, but they didn't want to take any chances.
More research by Krebs revealed that the criminals' intuition had been correct, and Fly was arrested in Italy, carrying documents under an assumed name. He was sitting in an Italian jail, awaiting potential extradition to the United States, as well as potentially facing charges in Italy. This was relayed to Krebs by a law enforcement official who simply said "The Fly has been swatted". (Presumably while slowly removing a pair of aviator sunglasses)
While Fly may have been put away, the story between Krebs and Fly wasn't quite over. He did end up being extradited to the US for prosecution, but while imprisoned in Italy, Fly actually started sending Krebs letters. Understandably distrustful after the whole "heroin" thing, his contacts in federal law enforcement tested the letter, and found it to be clean. Inside, there was a heartfelt and personal letter, apologizing for fucking with Krebs in so many ways. He also forgave Krebs for posting his identity online, leading him to muse that perhaps Fly was working through a twelve-step program. In December, he received another letter, this time a simple postcard with a cheerful message wishing him a Merry Christmas and a Happy New Year. Krebs concluded his post thusly:
Cybercrooks have done some pretty crazy stuff to me in response to my reporting about them. But I don’t normally get this kind of closure. I look forward to meeting with Fly in person one day soon now that he will be just a short train ride away. And he may be here for some time: If convicted on all charges, Fly faces up to 30 years in U.S. federal prison.
Fly ultimately was extradited. He plead guilty and was sentenced to 41 months in jail

vDOS and Mirai Break The Internet

Criminals are none too happy when they find their businesses and identities on the front page of KrebsOnSecurity. It usually means law enforcement isn't far behind. One such business was known as vDOS. A DDOS-for-hire (also known as a "booter" or a "stresser") site that found itself hacked, with all their customer records still in their databases leaked. Analysis of the records found that in a four-month time span, the service had been responsible for about 8.81 years worth of attack time, meaning on average at any given second, there were 26 simultaneous attacks running. Interestingly, the hack of vDOS came about from another DDOS-for-hire site, who as it turns out was simply reselling services provided by vDOS. They were far from the only one. vDOS appeared to provide firepower to a large number of different resellers.
In addition to the attack logs, support messages were also among the data stolen. This contained some complaints from various clients who complained they were unable to launch attacks against Israeli IPs. This is a common tactic by hackers to try and avoid unwanted attention from authorities in their country of residence. This was confirmed when two men from Israel were arrested for their involvement in owning and running vDOS. However, this was just the beginning for this bit of drama.
The two men arrested went by the handles "applej4ck" and "Raziel". They had recently published a paper on DDOS attack methods in an online Israeli security magazine. Interestingly, on the same day the men were arrested, questioned, and released on bail, vDOS went offline. Not because it had been taken down by Israeli authorities, not because they had shut it down themselves, but because a DDOS protection firm, BackConnect Security, had hijacked the IP addresses belonging to the company. To spare a lot of technical detail, it's called a BGP hijack, and it basically works by a company saying "Yeah, those are our addresses." It's kind of amazing how much of the internet is basically just secured by the digital equivalent of pinky swears. You can read some more technical detail on Wikipedia. Anyway, we'll get back to BackConnect.
Following the publication of the story uncovering the inner workings of vDOS, KrebsOnSecurity was hit with a record breaking DDOS attack, that peaked at 620/Gbps, nearly double the most powerful DDOS attack previously on record. To put that in perspective, that's enough bandwidth to download 5 simultaneous copies of Interstellar in 4K resolution every single second, and still have room to spare. The attack was so devastating, Akamai, one of the largest providers of DDOS protection in the world had to drop Krebs as a pro bono client. Luckily, Google was willing to step in and place his site under the protection of Google's Project Shield, a free service designed to protect the news sites and journalists from being knocked offline by DDOS attacks.
This attack was apparently in retaliation for the vDOS story, since some of the data sent in the attack included the string "freeapplej4ck". The attack was executed by a botnet of Internet of Things (or IoT) devices. These are those "smart" devices like camera systems, routers, DVRs. Basically things that connect to the cloud. An astounding amount of those are secured with default passwords that can be easily looked up from various sites or even the manufacturers' websites. This was the start of a discovery of a massive botnet that had been growing for years.
Now time for a couple quick side stories:
Dyn, a company who provides DNS to many major companies including Twitter, Reddit, and others came under attack, leaving many sites (including Twitter and Reddit) faltering in the wake of it. Potentially due to one of their engineers' collaboration with Krebs on another story. It turned out that the same botnet that attacked Krebs' site was at least part of the attack on Dyn
And back to BackConnect, that DDOS protection firm that hijacked the IP addresses from vDOS. Well it turns out BGP Hijacks are old hat for the company. They had done it at least 17 times before. Including at least once (purportedly with permission) for the address 1.3.3.7. Aka, "leet". It turns out one of the co-founders of BackConnect actually posted screenshots of him visiting sites that tell you your public IP address in a DDOS mitigation industry chat, showing it as 1.3.3.7. They also used a BGP Hijack against a hosting company and tried to frame a rival DDOS mitigation provider.
Finally, another provider, Datawagon was interestingly implicated in hosting DDOS-for-hire sites while offering DDOS protection. In a Skype conversation where the founder of Datawagon wanted to talk about that time he registered dominos.pizza and got sued for it, he brings up scanning the internet for vulnerable routers completely unprompted. Following the publication of the story about BackConnect, in which he was included in, he was incensed about his portrayal, and argued with Krebs over Skype before Krebs ultimately ended up blocking him. He was subsequently flooded with fake contact requests from bogus or hacked Skype accounts. Shortly thereafter, the record-breaking DDOS attack rained down upon his site.
Back to the main tale!
So, it turns out the botnet of IoT devices was puppeteered by a malware called Mirai. How did it get its name? Well, that's the name its creator gave it, after an anime called Mirai Nikki. How did this name come to light? The creator posted the source code online. (The name part, not the origin. The origin didn't come 'til later.) The post purported that they'd picked it up from somewhere in their travels as a DDOS industry professional. It turns out this is a semi-common tactic when miscreants fear that law enforcement might come looking for them, and having the only copy of the source code of a malware in existence is a pretty strong indicator that you have something to do with it. So, releasing the source to the world gives a veneer of plausible deniability should that eventuality come to pass. So who was this mysterious benefactor of malware source? They went by the name "Anna-senpai".
As research on the Mirai botnet grew, and more malware authors incorporated parts of Mirai's source code into their own attacks, attention on the botnet increased, and on the people behind it. The attention was presumably the reason why Hackforums, the forum where the source code was posted, later disallowed ostensible "Server Stress Tester" services from being sold on it. By December, "Operation Tarpit" had wrought 34 arrests and over a hundred "knock and talk" interviews questioning people about their involvement.
By January, things started to come crashing down. Krebs published an extensive exposé on Anna-senpai detailing all the evidence linking them to the creation of Mirai. The post was so big, he included a damn glossary. What sparked the largest botnet the internet had ever seen? Minecraft. Minecraft servers are big business. A popular one can earn tens of thousands of dollars per month from people buying powers, building space, or other things. It's also a fiercely competitive business, with hundreds of servers vying for players. It turns out that things may have started, as with another set of companies, two rival DDOS mitigation providers competing for customers. ProTraf was a provider of such mitigation technology, and a company whose owner later worked for ProTraf had on at least one occasion hijacked addresses belonging to another company, ProxyPipe. ProxyPipe had also been hit with DDOS attacks they suspected to be launched by ProTraf.
While looking into the President of ProTraf, Krebs realized he'd seen the relatively uncommon combination of programming languages and skills posted by the President somewhere else. They were shared by Anna-senpai on Hackforums. As Krebs dug deeper and deeper into Anna-senpai's online presence, he uncovered other usernames, including one he traced to some Minecraft forums where a photoshopped picture of a still from Pulp Fiction contained the faces of BackConnect, which was a rival to ProTraf's DDOS mitigation business, and another face. A hacker by the name of Vyp0r, who another employee of ProTraf claimed betrayed his trust and blackmailed him into posting the source of another piece of malware called Bashlite. There was also a third character photoshopped into the image. An anime character named "Yamada" from a movie called B Gata H Hei.
Interestingly, under the same username, Krebs found a "MyAnimeList" profile which, out of 9 titles it had marked as watched, were B Gata H Hei, as well as Mirai Nikki, the show from which Mirai derived its name. It continues on with other evidence, including DDOS attacks against Rutgers University, but in short, there was little doubt in the identity of "Anna-senpai", but the person behind the identity did contact Krebs to comment. He denied any involvement in Mirai or DDOS attacks.
"I don’t think there are enough facts to definitively point the finger at me," [Anna-senpai] said. "Besides this article, I was pretty much a nobody. No history of doing this kind of stuff, nothing that points to any kind of sociopathic behavior. Which is what the author is, a sociopath."
He did, however, correct Krebs on the name of B Gata H Kei.
Epilogue
Needless to say, the Mirai botnet crew was caught, but managed to avoid jailtime thanks to their cooperation with the government. That's not to say they went unpunished. Anna-senpai was sentenced to 6 months confinement, 2500 hours of community service, and they may have to pay up to $8.6 million in restitution for their attacks on Rutgers university.

Other Stories

I don't have the time or energy to write another effortpost, and as is I'm over 20,000 characters, so here's a few other tidbits of Krebs' clashes with miscreants.
submitted by HereComesMyDingDong to internetdrama [link] [comments]

I wished my best friend had been more careful... [Part 1]

Part 2

Daniel has been missing for 2 weeks now, the people who have him want £23,000 in bitcoin if we want to see him again...

I'm posting here through one of my old botnets in an attempt to avoid being found by this group of people. They call themselves 'The Winning Cause'. I'm quite lost as to what to do now; the police wont help, so i'm writing to you reddit as i know people have found their solutions on here before.

Let me explain the events that have taken place over these two weeks:

Daniel and I are both the tech-savvy geeks at our school, whether it was programming or seeing if your partner is cheating by hacking their snapchat, we were the people to call. Often our head-mistress would ask for help when she'd forgotten her password!

But enough patting myself and Dan on the back, the main point is we got bored of doing the same mundane things everday, so we turned to the deep web...

Now before you dismiss this as one of the ordinary deep web stories where someone/group of people go on it and get doxxed. We knew what we were doing and had been given several warnings from people on other forums we went on. It wasn't our skill that let us down. It was Dan's tendency to gloat.

Contrary to what I described earlier about Daniel and I hacking for other people, we are usually ethical about what we do, heck we even helped companies on bugcrowd! That's why we decided we would go looking for red-rooms and other places which would make the average Joe lose faith in humanity.

And no we didn't go there to watch these things. We went around either: attempting to take the website down, tracking the people who ran them, or feeding info back to the police. Despite popular belief, the people behind these websites may be dangerous, but do not put the effort into making their websites secure. They just care about the revenue.

However Daniel made it a routine of posting about dark-net sites we'd taken down every week after we had managed to remove one, despite my warnings to him, he did however agree to keep my name out of it, which is why now he's the one who's been kidnapped and not me...

We had found a seemingly boring looking forum called 'The Winning Cause' and I quickly realised that this forum page was a front for the real thing, I let Daniel do his thing and he found a login page.

As soon as he did a messagebox showed up in the bottom right corner of the page, it asked "Are you sure you're in the right place", we both glanced at each other as we had never encountered something like this before. There were only two options. Yes. and No.

Curiosity getting the better of us we clicked and it was a directory of links to streams where people were being slaughtered, some had videos dismembered limbs with blood seeping out of various cuts whilst some had people being shocked with a jumper cable. It was sickening, we quickly realized that people were paying bitcoin to see these streams.

I had setup a crawler to find links between different bitcoin addresses and would also see if the private key was listed anywhere on the dark-net, a lot of the groups we'd come across would list them somewhere in an admin section.

Sure enough these guys were the same, we took $23,0000 from these guys in total and gave links to their websites to the police. Daniel sure enough bragged about it the next week in his blog but I wasn't even bothered, I was just glad we took these guys down.

However some time after that, Daniel called me asking whether I had changed his social media password's (we had each other's passwords as we would routinely use our accounts to practice hacking), I told him I hadn't, he then told me that he was going to get a reset email for it and I told him that I'd check my account just in case.

I put the phone down and went through all of my accounts when I heard Daniel scream down the phone "THEY FOUND US, THEY FUCKING FOUND US, OH SHIT, OH SHIT...", at this point I'd almost forgotten about 'The Winning Cause' until he told me just then.

I was right, I was fucking right, he never should've bragged about it, the reset email he'd requested never showed up in his inbox, when he went to check his email, his inbox was filled with emails saying "You shouldn't have taken our money! We will win, We will prevail!".

I told him not to stress about it too much even though I myself was panicking as well, he told me that they were going to give him one chance to pay back all the money we took within the next hour, there was only one problem...

We kept all the bitcoin private key's that we had on an encrypted flash drive and Daniel keeps that usb at his dad's house. He wasn't due to see his Dad until tomorrow. I told him that he could just get it tomorrow and send the payment straight away and that with luck they'll accept the money and fuck off. I couldn't have been more wrong...

I went to his house the next day to see whether he'd send the payment. I knocked on his door and his dad answered. He had tears sreaming down his face, "Richard... have you seen Daniel", my heart dropped, no way did they kidnap him.

"No, I thought he'd be here", "He isn't, but there's some weird writing on the wall of his room written in red. I've already called the police but you need to see this.", I went up to his room with his dad expecting the worst...

In his room, it said "Never make us wait! The Winning Cause will prevail!" and beneath it was a piece of paper with writing, it was a bitcoin address and the words "It seems your friend spent the money, you have a month to earn it and send it to us, or else!"

The police didn't find any DNA in the room apart from Daniel's family's and mine, they said they were going to open a search but I knew that this was beyond the police. Reddit, I need your help...
submitted by richardsramblings to nosleep [link] [comments]

Monero Subreddit Stats from last year.

Submissions Comments
Total 994 49530
Rate (per day) 2.73 135.74
Unique Redditors 582 8080
Combined Score 161184 231580

Top Submitters' Top Submissions

  1. 5300 points, 33 submissions: dEBRUYNE_1
    1. Monero GUI 0.12.0.0 "Lithium Luna" Megathread - Download links, instructions for upgrading, guide on how to get started, and guides to resolve common issues (missing a transaction / zero balance, freezing / buggy GUI, transaction stuck as pending, and GUI using all bandwidth) (386 points, 833 comments)
    2. [Reminder] monero is not the appropriate place to discuss the BTC/BCH debate (319 points, 73 comments)
    3. General information regarding the upcoming scheduled network upgrade and a call for community action (305 points, 223 comments)
    4. GUI v0.12.2.0 released! (299 points, 243 comments)
    5. Announcement - Proof-of-Work tweak and a note on key reuse (295 points, 250 comments)
    6. GUI v0.12.3.0 (with direct Ledger support) released! (280 points, 386 comments)
    7. Bitfinex reduces Monero withdrawal fees from 0.04 to 0.0001 XMR! (272 points, 9 comments)
    8. Poloniex also reduces Monero withdrawal fees to 0.0001 XMR! (220 points, 17 comments)
    9. Preliminary information thread regarding the scheduled protocol upgrade of October 18 (214 points, 208 comments)
    10. CLI v0.12.3.0 released! (195 points, 78 comments)
  2. 4228 points, 24 submissions: OsrsNeedsF2P
    1. Saying you don't need privacy because you have nothing to hide is like saying you don't need free speech because you have nothing to say. It's a right to everyone - It's a right to you, me, and even Mark Zuckerberg. (581 points, 138 comments)
    2. The official Fortnite Merch Store is accepting exclusively Monero as a cryptocurrency payment option... (445 points, 80 comments)
    3. Can we stop being assholes to newbies? (359 points, 94 comments)
    4. With all this Monero "is less untraceable than previously thought" FUD, let's all remember that huge fucking bounty of $$$ for anyone who can trace the origin of one of the devs transactions.. (343 points, 131 comments)
    5. Ever wanted to know how Monero is still around today? Well now you don't have to! This post has it all =D (297 points, 66 comments)
    6. Coinmarketcap shows Freewallet as a Monero wallet. Guys, whatever you do.. Don't use Freewallet. It's a scam. (286 points, 93 comments)
    7. SEC wants decentralized exchange creators to register as exchanges. Lol (182 points, 111 comments)
    8. "Please do your part in demanding exchanges to lower their XMR withdraw fee. I am submitting a complaint to Coinex who currently charge 0.04 XMR" - [x-post from /xmrtrader] (169 points, 43 comments)
    9. Can we get some appreciation for the people who maintain the Monero packages on Arch Linux? There are so many available, and every single one I've checked either make the package from source or validate the checksum. Amazing work <3 (156 points, 19 comments)
    10. [WARNING] DROPIL recently made a post announcing support for Monero. MOVE YOUR FUNDS if you used them!!! (119 points, 5 comments)
  3. 3954 points, 13 submissions: KnifeOfPi2
    1. Did John McAfee just sell all of his Monero?? (1277 points, 107 comments)
    2. We need to stop thinking about Monero as a “privacy coin.” (511 points, 200 comments)
    3. Selsta and I just completed the first Ledger-to-Ledger mainnet transactions ever. He sent me 0.1 XMR and I sent 0.4 XMR back. (482 points, 103 comments)
    4. Monero network hashrate just hit 1GH/s! (463 points, 166 comments)
    5. An upcoming Monero project: Render the entire blockchain. Here's a selection of blocks that we've done so far, in an early stage. (224 points, 31 comments)
    6. In Stunning Move, Bitmain Announces It's Launching A Doorstopper Business (193 points, 48 comments)
    7. Another red flag for X Wallet: The source code is incomplete. (190 points, 63 comments)
    8. MONERO IS DEAD! LONG LIVE MONERO! (155 points, 25 comments)
    9. Lithium Luna GUI released! (118 points, 66 comments)
    10. Cake Wallet - introducing Zendesk support! (100 points, 13 comments)
  4. 2421 points, 22 submissions: SamsungGalaxyPlayer
    1. Kasisto POS in 22 seconds (366 points, 76 comments)
    2. "Kudelski Security completed their [bulletproof] report. They found only a few minor issues that are trivial to correct, and no major issues." Overall, a huge win for Monero, bulletproofs, and privacy. Full report will be published soon. (338 points, 100 comments)
    3. Network upgrade scheduled for block 1544555 on 28 March (210 points, 56 comments)
    4. Fungibility is determined by the LOWEST common denominator of privacy, NOT the highest. Monero absolutely excels here. (103 points, 37 comments)
    5. [Discussion] Move to a Fixed Ringsize (102 points, 85 comments)
    6. The Monero Malware Response workgroup website is up! Direct people whose machines have been compromised here! (101 points, 22 comments)
    7. MoneroV: A Trap Laid for Monero Users? (93 points, 45 comments)
    8. Want to get the GUI point release faster? Help translate! (91 points, 18 comments)
    9. Introducing the Breaking Monero Series! (86 points, 26 comments)
    10. ShapeShift is moving to a membership model and will require personal information soon (83 points, 86 comments)
  5. 2295 points, 16 submissions: pinkphloid
    1. Cake Wallet - OPEN SOURCE - Here it is! (383 points, 167 comments)
    2. Our Monero wallet called CAKEWALLET for iOS is live! Please check the link to the Apple App Store below. (347 points, 379 comments)
    3. [MANDATORY UPDATE] Cake Wallet Version 3.0.9 - Network Upgrade Ready! (227 points, 19 comments)
    4. [UPDATE] Cake Wallet version 3.1.4, now with XMR.TO for exchanging XMR to BTC! (133 points, 15 comments)
    5. Cake Wallet - 10,000 unique downloads! (132 points, 29 comments)
    6. Thank for the positive feedback on Cake Wallet! (127 points, 62 comments)
    7. The new Cake Wallet Update version 3.0.1 is out now! (120 points, 50 comments)
    8. [UPDATE] CAKE WALLET 3.1.1 with Monero v0.13.0.4 and other stuff (118 points, 32 comments)
    9. Cake Wallet - UPDATE! (108 points, 75 comments)
    10. CAKE WALLET - new version live now with NEW FEATURES! (102 points, 97 comments)
  6. 2042 points, 16 submissions: Rehrar
    1. Core Team Announcement (344 points, 45 comments)
    2. Project FOSS (212 points, 37 comments)
    3. Write down your seed (200 points, 93 comments)
    4. Bulletproof audit needs some more funding. Details in the comments. (170 points, 55 comments)
    5. Extremely thorough introduction to Monero by cypherperro. Take a look. (122 points, 18 comments)
    6. Defcon Monero Village Update and Summary (116 points, 22 comments)
    7. MRL Bulletproof audit FFS request (115 points, 30 comments)
    8. I, rehrar,went on a YouTube show to talk about Morono (113 points, 28 comments)
    9. Fund the fundings! (107 points, 16 comments)
    10. The anonimal appreciation thread! (107 points, 21 comments)
  7. 1978 points, 15 submissions: Vespco
    1. Edward Snowden on Bitcoin Interview 2018 (at 50 minutes, he says that a traceable public ledger is a bigger problem then scalability) (362 points, 88 comments)
    2. Putting this on my invoices seems like a good way for me to promote Monero, give my customers a discount, & help me acquire more Monero. (325 points, 101 comments)
    3. It's fun to be a part of the Monero economy! (179 points, 26 comments)
    4. Honest Government Ad | Anti Encryption Law (178 points, 32 comments)
    5. Jeez, not much real conversation in here. Just junky news links. (129 points, 76 comments)
    6. The New York State Department of Financial Services just approved the trading of privacy-protecting cryptocurrency. | Coin Center (124 points, 11 comments)
    7. A good way to explain the importance of fungibility to the laymen: Bitcoin Roulette (99 points, 45 comments)
    8. Why I love Botnet & Browser Mining. (86 points, 39 comments)
    9. This needs more praise & attention: An Open Source, Client Side JS implementation that makes monero multisig fairly easy. Github link in comments. (82 points, 14 comments)
    10. Could we get even more cryptographers researching for Monero? (77 points, 31 comments)
  8. 1846 points, 14 submissions: SarangNoether
    1. Bulletproofs: let's raise some funds! (295 points, 94 comments)
    2. January monthly report from Sarang Noether (237 points, 39 comments)
    3. Bulletproofs: The Paper Strikes Back (153 points, 32 comments)
    4. July monthly report from Sarang Noether (142 points, 20 comments)
    5. March monthly report from Sarang Noether (129 points, 22 comments)
    6. August monthly report from Sarang Noether (122 points, 33 comments)
    7. February monthly report from Sarang Noether (119 points, 27 comments)
    8. Sarang is up for three more months! (107 points, 30 comments)
    9. October monthly report from Sarang Noether (102 points, 26 comments)
    10. September monthly report from Sarang Noether (99 points, 25 comments)
  9. 1470 points, 4 submissions: TheFuzzStone
    1. "I do not have any Bitcoin" (1182 points, 96 comments)
    2. Fluffypony at Consensus 2018 (134 points, 33 comments)
    3. Time for Monero "killers"! :-) (91 points, 34 comments)
    4. XMR.RU-report (March) (63 points, 14 comments)
  10. 1468 points, 5 submissions: philkode
    1. Overstock.com accepting Monero (and ETH, BCH, LTC, DASH) (499 points, 36 comments)
    2. Happy 4th Birthday Monero! 🎂🎉🎁 (455 points, 62 comments)
    3. Monero has been added to Debian unstable repo as of yesterday. (321 points, 52 comments)
    4. “Unhackable” BitFi wallet just got hacked (xpost /cryptocurrency) (130 points, 41 comments)
    5. X Wallet to App Store (Soon™) (63 points, 67 comments)

Top Commenters

  1. dEBRUYNE_1 (3762 points, 1243 comments)
  2. KnifeOfPi2 (3311 points, 347 comments)
  3. OsrsNeedsF2P (3189 points, 505 comments)
  4. fluffyponyza (3027 points, 272 comments)
  5. gingeropolous (2554 points, 320 comments)
  6. cryptochangements34 (2522 points, 261 comments)
  7. SarangNoether (2269 points, 185 comments)
  8. SamsungGalaxyPlayer (2108 points, 221 comments)
  9. john_alan (1993 points, 218 comments)
  10. smooth_xmr (1944 points, 279 comments)

Top Submissions

  1. Did John McAfee just sell all of his Monero?? by KnifeOfPi2 (1277 points, 107 comments)
  2. Paypal shares your personal data with over 600 companies! That's why we need Monero! by 0xf3e (1184 points, 146 comments)
  3. "I do not have any Bitcoin" by TheFuzzStone (1182 points, 96 comments)
  4. Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government by SecretApe (1114 points, 110 comments)
  5. Monero transactions are about to get 80% cheaper and faster. by WillMTB (1056 points, 120 comments)
  6. Bye bye ASICs by Swericor (874 points, 380 comments)
  7. Upvote if you would like to see @fluffyponyza as a guest on Joe Rogan Podcast by xmr_karnal (840 points, 44 comments)
  8. All right, my cat had kittens and I just realised one of them has Monero-like logo on its head 😂😂 by JNKO266 (817 points, 79 comments)
  9. Credit, where credit is due! by Experts-say (796 points, 53 comments)
  10. Yesterday I thought it might be fun to create some vintage crypto posters for a handful of coins. This was the first one I came up with. Bonus points if you spot similarities from an old movie by Beemoe4 (722 points, 67 comments)

Top Comments

  1. 495 points: mr670wl's comment in Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government
  2. 474 points: kieranc001's comment in Monero Zero looks like a scam, can you please confirm?
  3. 380 points: deleted's comment in Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government
  4. 356 points: deleted's comment in Ledger Hardware Wallet - Monero integration : some news #6
  5. 331 points: last_of_the_romans's comment in Monero transactions are about to get 80% cheaper and faster.
  6. 323 points: svenroy777's comment in "I do not have any Bitcoin"
  7. 311 points: deleted's comment in Did John McAfee just sell all of his Monero??
  8. 255 points: KnifeOfPi2's comment in Monero transactions are about to get 80% cheaper and faster.
  9. 237 points: live9free1or1die's comment in Banning privacy coins because of terrorism/drugs/laundering is like banning people from being allowed to have sex in privacy because pedophiles also like privacy.
  10. 203 points: fluffyponyza's comment in Botnets are Ruining the Integrity of the Monero Network
Generated with BBoe's Subreddit Stats (Donate)
Inspired by a post I found on /Pivx by turtleflax.
submitted by OsrsNeedsF2P to Monero [link] [comments]

Archives for https://www.reddit.com/r/internetdrama/comments/akzpg0/a_few_stories_about_brian_krebs_the_independent/

Snapshots:
  1. This Post - archive.org, megalodon.jp, removeddit.com, archive.is
  2. name their shops full of stolen cre... - archive.org, megalodon.jp, archive.is
  3. selection of his best work - archive.org, megalodon.jp, archive.is
  4. swatted previously - archive.org, megalodon.jp, archive.is
  5. one particular campaign against him... - archive.org, megalodon.jp, archive.is
  6. it was signed "Velvet Crabs" - archive.org, megalodon.jp, archive.is
  7. decided to dive deeper - archive.org, megalodon.jp, archive.is
  8. He did end up being extradited to t... - archive.org, megalodon.jp, archive.is
  9. plead guilty - archive.org, megalodon.jp, archive.is
  10. 41 months in jail - archive.org, megalodon.jp, archive.is*
  11. One such business was known as vDOS... - archive.org, megalodon.jp, archive.is
  12. two men from Israel - archive.org, megalodon.jp, archive.is
  13. Wikipedia - archive.org, megalodon.jp, archive.is*
  14. a record breaking DDOS attack - archive.org, megalodon.jp, archive.is
  15. came under attack - archive.org, megalodon.jp, archive.is
  16. was at least part of the attack on ... - archive.org, megalodon.jp, archive.is
  17. BGP Hijacks are old hat - archive.org, megalodon.jp, archive.is
  18. hosting DDOS-for-hire sites while o... - archive.org, megalodon.jp, archive.is
  19. The creator posted the source code ... - archive.org, megalodon.jp, archive.is
  20. later disallowed ostensible "Server... - archive.org, megalodon.jp, archive.is
  21. "Operation Tarpit" - archive.org, megalodon.jp, archive.is
  22. 34 arrests and over a hundred "knoc... - archive.org, megalodon.jp, archive.is
  23. extensive exposé on Anna-senpai - archive.org, megalodon.jp, archive.is
  24. managed to avoid jailtime - archive.org, megalodon.jp, archive.is
  25. 6 months confinement, 2500 hours of... - archive.org, megalodon.jp, archive.is
  26. was selling data to hackers on the ... - archive.org, megalodon.jp, archive.is
  27. previously ran a hacking forum and ... - archive.org, megalodon.jp, archive.is
  28. baited by hacking forum admins - archive.org, megalodon.jp, archive.is
  29. Pissed off a hacking group - archive.org, megalodon.jp, archive.is
  30. exposing the source they used to pu... - archive.org, megalodon.jp, archive.is
  31. a doxxer / swatter - archive.org, megalodon.jp, archive.is
  32. for helping his buddy dump the budd... - archive.org, megalodon.jp, archive.is
  33. butted heads with Apophis Squad - archive.org, megalodon.jp, archive.is
  34. might not have been so ethical afte... - archive.org, megalodon.jp, archive.is
  35. shitting up the internet with insec... - archive.org, megalodon.jp, archive.is
  36. with public shaming should they not... - archive.org, megalodon.jp, archive.is
  37. was tied to a Russian security firm - archive.org, megalodon.jp, archive.is
  38. weird obsession with AC/DC - archive.org, megalodon.jp, archive.is
  39. how not to DDOS your former employe... - archive.org, megalodon.jp, archive.is
I am a bot. (Info / Contact)
submitted by SnapshillBot to SnapshillBotEx [link] [comments]

Subreddit Stats: Monero top posts from 2018-01-03 to 2019-01-02 13:47 PDT

Period: 364.01 days
Submissions Comments
Total 994 49530
Rate (per day) 2.73 135.74
Unique Redditors 582 8080
Combined Score 161184 231580

Top Submitters' Top Submissions

  1. 5300 points, 33 submissions: dEBRUYNE_1
    1. Monero GUI 0.12.0.0 "Lithium Luna" Megathread - Download links, instructions for upgrading, guide on how to get started, and guides to resolve common issues (missing a transaction / zero balance, freezing / buggy GUI, transaction stuck as pending, and GUI using all bandwidth) (386 points, 833 comments)
    2. [Reminder] monero is not the appropriate place to discuss the BTC/BCH debate (319 points, 73 comments)
    3. General information regarding the upcoming scheduled network upgrade and a call for community action (305 points, 223 comments)
    4. GUI v0.12.2.0 released! (299 points, 243 comments)
    5. Announcement - Proof-of-Work tweak and a note on key reuse (295 points, 250 comments)
    6. GUI v0.12.3.0 (with direct Ledger support) released! (280 points, 386 comments)
    7. Bitfinex reduces Monero withdrawal fees from 0.04 to 0.0001 XMR! (272 points, 9 comments)
    8. Poloniex also reduces Monero withdrawal fees to 0.0001 XMR! (220 points, 17 comments)
    9. Preliminary information thread regarding the scheduled protocol upgrade of October 18 (214 points, 208 comments)
    10. CLI v0.12.3.0 released! (195 points, 78 comments)
  2. 4228 points, 24 submissions: OsrsNeedsF2P
    1. Saying you don't need privacy because you have nothing to hide is like saying you don't need free speech because you have nothing to say. It's a right to everyone - It's a right to you, me, and even Mark Zuckerberg. (581 points, 138 comments)
    2. The official Fortnite Merch Store is accepting exclusively Monero as a cryptocurrency payment option... (445 points, 80 comments)
    3. Can we stop being assholes to newbies? (359 points, 94 comments)
    4. With all this Monero "is less untraceable than previously thought" FUD, let's all remember that huge fucking bounty of $$$ for anyone who can trace the origin of one of the devs transactions.. (343 points, 131 comments)
    5. Ever wanted to know how Monero is still around today? Well now you don't have to! This post has it all =D (297 points, 66 comments)
    6. Coinmarketcap shows Freewallet as a Monero wallet. Guys, whatever you do.. Don't use Freewallet. It's a scam. (286 points, 93 comments)
    7. SEC wants decentralized exchange creators to register as exchanges. Lol (182 points, 111 comments)
    8. "Please do your part in demanding exchanges to lower their XMR withdraw fee. I am submitting a complaint to Coinex who currently charge 0.04 XMR" - [x-post from /xmrtrader] (169 points, 43 comments)
    9. Can we get some appreciation for the people who maintain the Monero packages on Arch Linux? There are so many available, and every single one I've checked either make the package from source or validate the checksum. Amazing work <3 (156 points, 19 comments)
    10. [WARNING] DROPIL recently made a post announcing support for Monero. MOVE YOUR FUNDS if you used them!!! (119 points, 5 comments)
  3. 3954 points, 13 submissions: KnifeOfPi2
    1. Did John McAfee just sell all of his Monero?? (1277 points, 107 comments)
    2. We need to stop thinking about Monero as a “privacy coin.” (511 points, 200 comments)
    3. Selsta and I just completed the first Ledger-to-Ledger mainnet transactions ever. He sent me 0.1 XMR and I sent 0.4 XMR back. (482 points, 103 comments)
    4. Monero network hashrate just hit 1GH/s! (463 points, 166 comments)
    5. An upcoming Monero project: Render the entire blockchain. Here's a selection of blocks that we've done so far, in an early stage. (224 points, 31 comments)
    6. In Stunning Move, Bitmain Announces It's Launching A Doorstopper Business (193 points, 48 comments)
    7. Another red flag for X Wallet: The source code is incomplete. (190 points, 63 comments)
    8. MONERO IS DEAD! LONG LIVE MONERO! (155 points, 25 comments)
    9. Lithium Luna GUI released! (118 points, 66 comments)
    10. Cake Wallet - introducing Zendesk support! (100 points, 13 comments)
  4. 2421 points, 22 submissions: SamsungGalaxyPlayer
    1. Kasisto POS in 22 seconds (366 points, 76 comments)
    2. "Kudelski Security completed their [bulletproof] report. They found only a few minor issues that are trivial to correct, and no major issues." Overall, a huge win for Monero, bulletproofs, and privacy. Full report will be published soon. (338 points, 100 comments)
    3. Network upgrade scheduled for block 1544555 on 28 March (210 points, 56 comments)
    4. Fungibility is determined by the LOWEST common denominator of privacy, NOT the highest. Monero absolutely excels here. (103 points, 37 comments)
    5. [Discussion] Move to a Fixed Ringsize (102 points, 85 comments)
    6. The Monero Malware Response workgroup website is up! Direct people whose machines have been compromised here! (101 points, 22 comments)
    7. MoneroV: A Trap Laid for Monero Users? (93 points, 45 comments)
    8. Want to get the GUI point release faster? Help translate! (91 points, 18 comments)
    9. Introducing the Breaking Monero Series! (86 points, 26 comments)
    10. ShapeShift is moving to a membership model and will require personal information soon (83 points, 86 comments)
  5. 2295 points, 16 submissions: pinkphloid
    1. Cake Wallet - OPEN SOURCE - Here it is! (383 points, 167 comments)
    2. Our Monero wallet called CAKEWALLET for iOS is live! Please check the link to the Apple App Store below. (347 points, 379 comments)
    3. [MANDATORY UPDATE] Cake Wallet Version 3.0.9 - Network Upgrade Ready! (227 points, 19 comments)
    4. [UPDATE] Cake Wallet version 3.1.4, now with XMR.TO for exchanging XMR to BTC! (133 points, 15 comments)
    5. Cake Wallet - 10,000 unique downloads! (132 points, 29 comments)
    6. Thank for the positive feedback on Cake Wallet! (127 points, 62 comments)
    7. The new Cake Wallet Update version 3.0.1 is out now! (120 points, 50 comments)
    8. [UPDATE] CAKE WALLET 3.1.1 with Monero v0.13.0.4 and other stuff (118 points, 32 comments)
    9. Cake Wallet - UPDATE! (108 points, 75 comments)
    10. CAKE WALLET - new version live now with NEW FEATURES! (102 points, 97 comments)
  6. 2042 points, 16 submissions: Rehrar
    1. Core Team Announcement (344 points, 45 comments)
    2. Project FOSS (212 points, 37 comments)
    3. Write down your seed (200 points, 93 comments)
    4. Bulletproof audit needs some more funding. Details in the comments. (170 points, 55 comments)
    5. Extremely thorough introduction to Monero by cypherperro. Take a look. (122 points, 18 comments)
    6. Defcon Monero Village Update and Summary (116 points, 22 comments)
    7. MRL Bulletproof audit FFS request (115 points, 30 comments)
    8. I, rehrar,went on a YouTube show to talk about Morono (113 points, 28 comments)
    9. Fund the fundings! (107 points, 16 comments)
    10. The anonimal appreciation thread! (107 points, 21 comments)
  7. 1978 points, 15 submissions: Vespco
    1. Edward Snowden on Bitcoin Interview 2018 (at 50 minutes, he says that a traceable public ledger is a bigger problem then scalability) (362 points, 88 comments)
    2. Putting this on my invoices seems like a good way for me to promote Monero, give my customers a discount, & help me acquire more Monero. (325 points, 101 comments)
    3. It's fun to be a part of the Monero economy! (179 points, 26 comments)
    4. Honest Government Ad | Anti Encryption Law (178 points, 32 comments)
    5. Jeez, not much real conversation in here. Just junky news links. (129 points, 76 comments)
    6. The New York State Department of Financial Services just approved the trading of privacy-protecting cryptocurrency. | Coin Center (124 points, 11 comments)
    7. A good way to explain the importance of fungibility to the laymen: Bitcoin Roulette (99 points, 45 comments)
    8. Why I love Botnet & Browser Mining. (86 points, 39 comments)
    9. This needs more praise & attention: An Open Source, Client Side JS implementation that makes monero multisig fairly easy. Github link in comments. (82 points, 14 comments)
    10. Could we get even more cryptographers researching for Monero? (77 points, 31 comments)
  8. 1846 points, 14 submissions: SarangNoether
    1. Bulletproofs: let's raise some funds! (295 points, 94 comments)
    2. January monthly report from Sarang Noether (237 points, 39 comments)
    3. Bulletproofs: The Paper Strikes Back (153 points, 32 comments)
    4. July monthly report from Sarang Noether (142 points, 20 comments)
    5. March monthly report from Sarang Noether (129 points, 22 comments)
    6. August monthly report from Sarang Noether (122 points, 33 comments)
    7. February monthly report from Sarang Noether (119 points, 27 comments)
    8. Sarang is up for three more months! (107 points, 30 comments)
    9. October monthly report from Sarang Noether (102 points, 26 comments)
    10. September monthly report from Sarang Noether (99 points, 25 comments)
  9. 1470 points, 4 submissions: TheFuzzStone
    1. "I do not have any Bitcoin" (1182 points, 96 comments)
    2. Fluffypony at Consensus 2018 (134 points, 33 comments)
    3. Time for Monero "killers"! :-) (91 points, 34 comments)
    4. XMR.RU-report (March) (63 points, 14 comments)
  10. 1468 points, 5 submissions: philkode
    1. Overstock.com accepting Monero (and ETH, BCH, LTC, DASH) (499 points, 36 comments)
    2. Happy 4th Birthday Monero! 🎂🎉🎁 (455 points, 62 comments)
    3. Monero has been added to Debian unstable repo as of yesterday. (321 points, 52 comments)
    4. “Unhackable” BitFi wallet just got hacked (xpost /cryptocurrency) (130 points, 41 comments)
    5. X Wallet to App Store (Soon™) (63 points, 67 comments)

Top Commenters

  1. dEBRUYNE_1 (3762 points, 1243 comments)
  2. KnifeOfPi2 (3311 points, 347 comments)
  3. OsrsNeedsF2P (3189 points, 505 comments)
  4. fluffyponyza (3027 points, 272 comments)
  5. gingeropolous (2554 points, 320 comments)
  6. cryptochangements34 (2522 points, 261 comments)
  7. SarangNoether (2269 points, 185 comments)
  8. SamsungGalaxyPlayer (2108 points, 221 comments)
  9. john_alan (1993 points, 218 comments)
  10. smooth_xmr (1944 points, 279 comments)

Top Submissions

  1. Did John McAfee just sell all of his Monero?? by KnifeOfPi2 (1277 points, 107 comments)
  2. Paypal shares your personal data with over 600 companies! That's why we need Monero! by 0xf3e (1184 points, 146 comments)
  3. "I do not have any Bitcoin" by TheFuzzStone (1182 points, 96 comments)
  4. Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government by SecretApe (1114 points, 110 comments)
  5. Monero transactions are about to get 80% cheaper and faster. by WillMTB (1056 points, 120 comments)
  6. Bye bye ASICs by Swericor (874 points, 380 comments)
  7. Upvote if you would like to see @fluffyponyza as a guest on Joe Rogan Podcast by xmr_karnal (840 points, 44 comments)
  8. All right, my cat had kittens and I just realised one of them has Monero-like logo on its head 😂😂 by JNKO266 (817 points, 79 comments)
  9. Credit, where credit is due! by Experts-say (796 points, 53 comments)
  10. Yesterday I thought it might be fun to create some vintage crypto posters for a handful of coins. This was the first one I came up with. Bonus points if you spot similarities from an old movie by Beemoe4 (722 points, 67 comments)

Top Comments

  1. 495 points: mr670wl's comment in Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government
  2. 474 points: kieranc001's comment in Monero Zero looks like a scam, can you please confirm?
  3. 380 points: deleted's comment in Found In Warsaw - Don't Buy Monero: Cryptocurrencies harm the banking system and can weaken the government
  4. 356 points: deleted's comment in Ledger Hardware Wallet - Monero integration : some news #6
  5. 331 points: last_of_the_romans's comment in Monero transactions are about to get 80% cheaper and faster.
  6. 323 points: svenroy777's comment in "I do not have any Bitcoin"
  7. 311 points: deleted's comment in Did John McAfee just sell all of his Monero??
  8. 255 points: KnifeOfPi2's comment in Monero transactions are about to get 80% cheaper and faster.
  9. 237 points: live9free1or1die's comment in Banning privacy coins because of terrorism/drugs/laundering is like banning people from being allowed to have sex in privacy because pedophiles also like privacy.
  10. 203 points: fluffyponyza's comment in Botnets are Ruining the Integrity of the Monero Network
Generated with BBoe's Subreddit Stats (Donate)
submitted by OsrsNeedsF2P to subreddit_stats [link] [comments]

Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees

arXiv:1805.11060
Date: 2018-05-28
Author(s): Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, Pramod Viswanath

Link to Paper


Abstract
Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third-party observers to link transactions to the IP addresses that originated them. This lays the groundwork for low-cost, large-scale deanonymization attacks. In this work, we present Dandelion++, a first-principles defense against large-scale deanonymization attacks with near-optimal information-theoretic guarantees. Dandelion++ builds upon a recent proposal called Dandelion that exhibited similar goals. However, in this paper, we highlight simplifying assumptions made in Dandelion, and show how they can lead to serious deanonymization attacks when violated. In contrast, Dandelion++ defends against stronger adversaries that are allowed to disobey protocol. Dandelion++ is lightweight, scalable, and completely interoperable with the existing Bitcoin network. We evaluate it through experiments on Bitcoin's mainnet (i.e., the live Bitcoin network) to demonstrate its interoperability and low broadcast latency overhead.

References
[1] [n. d.]. AWS Regions and Endpoints. ([n. d.]). http://docs.aws.amazon.com/general/latest/grande.html.
[2] [n. d.]. Bitcoin Core integration/staging tree. ([n. d.]). https://github.com/bitcoin/bitcoin.
[3] [n. d.]. Chainalysis. ([n. d.]). https://www.chainalysis.com/.
[4] [n. d.]. The Kovri I2P Router Project. ([n. d.]). https://github.com/monero-project/kovri.
[5] [n. d.]. Monero. ([n. d.]). https://getmonero.org/home.
[6] 2015. Bitcoin Core Commit 5400ef6. (2015). https://github.com/bitcoin/bitcoin/commit/5400ef6bcb9d243b2b21697775aa6491115420f3.
[7] 2016. reddit/monero. (2016). https://www.reddit.com/Monero/comments/4aki0k/what_is_the_status_of_monero_and_i2p/.
[8] Elli Androulaki, Ghassan O Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun. 2013. Evaluating user privacy in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 34–51.
[9] Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2016. Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies. arXiv preprint arXiv:1605.07524 (2016).
[10] Krishna B Athreya and Peter E Ney. 2004. Branching processes. Courier Corporation.
[11] Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. 2014. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 15–29.
[12] Alex Biryukov and Ivan Pustogarov. 2015. Bitcoin over Tor isn’t a good idea. In Symposium on Security and Privacy. IEEE, 122–134.
[13] John Bohannon. 2016. Why criminals can’t hide behind Bitcoin. Science (2016).
[14] Shaileshh Bojja Venkatakrishnan, Giulia Fanti, and Pramod Viswanath. 2017. Dandelion: Redesigning the Bitcoin Network for Anonymity. POMACS 1, 1 (2017), 22.
[15] D. Chaum. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of cryptology 1, 1 (1988).
[16] Ramnath K Chellappa and Raymond G Sin. 2005. Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information technology and management 6, 2 (2005), 181–202.
[17] H. Corrigan-Gibbs and B. Ford. 2010. Dissent: accountable anonymous group messaging. In CCS. ACM.
[18] George Danezis, Claudia Diaz, Emilia Käsper, and Carmela Troncoso. 2009. The wisdom of Crowds: attacks and optimal constructions. In European Symposium on Research in Computer Security. Springer, 406–423.
[19] George Danezis, Claudia Diaz, Carmela Troncoso, and Ben Laurie. 2010. Drac: An Architecture for Anonymous Low-Volume Communications.. In Privacy Enhancing Technologies, Vol. 6205. Springer, 202–219.
[20] R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The second-generation onion router. Technical Report. DTIC Document.
[21] G. Fanti, P. Kairouz, S. Oh, and P. Viswanath. 2015. Spy vs. Spy: Rumor Source Obfuscation. In SIGMETRICS Perform. Eval. Rev., Vol. 43. 271–284. Issue 1.
[22] Giulia Fanti and Pramod Viswanath. 2017. Anonymity Properties of the Bitcoin P2P Network. arXiv preprint arXiv:1703.08761 (2017).
[23] M.J. Freedman and R. Morris. 2002. Tarzan: A peer-to-peer anonymizing network layer. In Proc. CCS. ACM.
[24] Sam Frizell. 2015. Bitcoins Are Easier To Track Than You Think. Time (January 2015).
[25] Adam Efe Gencer and Emin Gün Sirer. 2017. State of the Bitcoin Network. Hacking Distributed, http://hackingdistributed.com/2017/02/15/state-of-the-bitcoin-network/. (February 2017).
[26] S. Goel, M. Robson, M. Polte, and E. Sirer. 2003. Herbivore: A scalable and efficient protocol for anonymous communication. Technical Report.
[27] P. Golle and A. Juels. 2004. Dining cryptographers revisited. In Advances in Cryptology-Eurocrypt 2004.
[28] Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, and Sharon Goldberg. 2016. TumbleBit: An untrusted Bitcoin-compatible anonymous payment hub. Technical Report. Cryptology ePrint Archive, Report 2016/575.
[29] TE Jedusor. 2016. Mimblewimble. (2016).
[30] Philip Koshy. 2013. CoinSeer: A Telescope Into Bitcoin. Ph.D. Dissertation. The Pennsylvania State University.
[31] Philip Koshy, Diana Koshy, and Patrick McDaniel. 2014. An analysis of anonymity in bitcoin using p2p network traffic. In International Conference on Financial Cryptography and Data Security. Springer, 469–485.
[32] Greg Maxwell. 2013. CoinJoin: Bitcoin privacy for the real world. In Post on Bitcoin Forum.
[33] Dave McMillen. 2017. Mirai IoT Botnet: Mining for Bitcoins? SecurityIntelligence (April 2017).
[34] Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M Voelker, and Stefan Savage. 2013. A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference. ACM, 127–140.
[35] Marc Mezard and Andrea Montanari. 2009. Information, physics, and computation. Oxford University Press.
[36] Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2015. Discovering Bitcoin’s public topology and influential nodes. (2015).
[37] Prateek Mittal, Matthew Wright, and Nikita Borisov. 2013. Pisces: Anonymous communication using social networks. In NDSS. ACM.
[38] Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).
[39] Micha Ober, Stefan Katzenbeisser, and Kay Hamacher. 2013. Structure and anonymity of the bitcoin transaction graph. Future internet 5, 2 (2013), 237–250.
[40] Larry L Peterson and Bruce S Davie. 2007. Computer networks: a systems approach. Elsevier.
[41] P. C. Pinto, P. Thiran, and M. Vetterli. 2012. Locating the source of diffusion in large-scale networks. Physical review letters 109, 6 (2012), 068702.
[42] Fergal Reid and Martin Harrigan. 2013. An analysis of anonymity in the bitcoin system. In Security and privacy in social networks. Springer, 197–223.
[43] Michael K Reiter and Aviel D Rubin. 1998. Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security (TISSEC) 1, 1 (1998), 66–92.
[44] Dorit Ron and Adi Shamir. 2013. Quantitative analysis of the full bitcoin transaction graph. In International Conference on Financial Cryptography and Data Security. Springer, 6–24.
[45] Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate. 2014. CoinShuffle: Practical decentralized coin mixing for Bitcoin. In European Symposium on Research in Computer Security. Springer, 345–364.
[46] Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized anonymous payments from bitcoin. In Symposium on Security and Privacy. IEEE, 459–474.
[47] Alexander Schrijver. 2002. Combinatorial optimization: polyhedra and efficiency. Vol. 24. Springer Science & Business Media.
[48] Rob Sherwood, Bobby Bhattacharjee, and Aravind Srinivasan. 2005. P5: A protocol for scalable anonymous communication. Journal of Computer Security 13, 6 (2005), 839–876.
[49] Jelle van den Hooff, David Lazar, Matei Zaharia, and Nickolai Zeldovich. [n. d.]. Scalable Private Messaging Resistant to Traffic Analysis. ([n. d.]).
[50] Zhaoxu Wang, Wenxiang Dong, Wenyi Zhang, and Chee Wei Tan. 2014. Rumor source detection with multiple observations: Fundamental limits and algorithms. In ACM SIGMETRICS Performance Evaluation Review, Vol. 42. ACM, 1–13.
[51] David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. 2012. Dissent in Numbers: Making Strong Anonymity Scale.. In OSDI. 179–182.
[52] M. Zamani, J. Saia, M. Movahedi, and J. Khoury. 2013. Towards provably-secure scalable anonymous broadcast. In USENIX FOCI.
[53] Bassam Zantout and Ramzi Haraty. 2011. I2P data communication system. In Proceedings of ICN. Citeseer, 401–409.
[54] Kai Zhu and Lei Ying. 2014. A robust information source estimator with sparse observations. Computational Social Networks 1, 1 (2014), 3.
submitted by dj-gutz to myrXiv [link] [comments]

[Table] IAMA Malware Developer. AMAA

Verified? (This bot cannot verify AMAs just yet)
Date: 2012-04-12
Link to submission (Has self-text)
Link to my post
Questions Answers
Have you ever been infected with malware, if so, how did you react? What should one do to avoid getting malware? Haha yeah I have been infected a few times, it is frusterating but most antivirus softwares do the trick unless you are infected with some undetectable malware. I always check hijack this and my outgoing connections a few times a week to make sure nothing suspicious is going on. To not get malware my best advise would be to not download cracked programs through torrents or warez sites. These are popular ways to spread malware. If you want to use pirated software run a keygen through sandboxie and use the legit installer. To avoid script exploits I recommend using a script blocking plugin such as noscripts for chrome or NoScript for firefox. Many ads are becoming ways to spread malware, you have to always be on the lookout.
How long does it take you to create the things you do? How did you learn to do it? How "good" are you at what you do and how long would it take, for instance, me (with no experience in programing whatsoever) to be at your level of goodness? It takes me about 1 month to create something from scratch that is of good quality. I learned it by teaching myself and looking at sources. It depends on how dedicated and of course how smart you are, but if you are intelligent you could probably learn in a year or two.
What's your testing process like - do you write unit tests? Do you test in various VMs and configurations to make sure it works? Do you have other developers to review your work? As far as the testing process goes, I test on 32 bit and 64 bit systems from xp to windows 7 to make sure all the functions work. Most of my programs are very different to each other, sometimes I make it hide in other running programs, sometimes it just sits in the open but is difficult to remove.
What are the most common, functional requirements that you apply to any malware (for example, must not show up in task manager)? What are the most common features that attract buyers for your products? What's the most common 'entry point' for an exploit of yours? (Examples: user downloads a crack, or user leaves firewall disabled, or user clicks on a link, or user connected to unsecure wifi)? People generally buy my product for stability and long lasting undetection so that it takes a while before most people realize they are infected. There are other features that are less important because they are found in many common malware programs.
What do you tell people you do for work in order to avoid being punched in the throat if you told them the truth? I just tell them I sell crack.
Can you, like, please stop? For you, thatgamerguy, anything.
Is it true that Macs are mostly safe from stuff like this? Macs and *nix systems are mostly safe because they aren't as widely used as windows, although they have just as many security flaws.
Can you speak to the programmers in the crowd as to what methodologies and strategies you use? As a c/c++ programmer of many years myself, I'm curious how you do what you do. How did you learn? Where might others learn? This fascinates me. For making things hard to delete my current method is to inject code into every process and hook the apis to delete and end processes. This prevents it from being deleted. If someone does manage to bypass the hook the injected code will just rewrite the malware to the disk. As far as networking, all you need to know is reverse socket connections with TCP. Check opensc.ws for more info about this stuff. That is the best site to learn at right now imo.
So, most redditors are very well informed with the internet/torrents/coding/engineering/blah blah blah/kittehs. Do you think your malware has infected anyone on this site? To expand, do you think the use of your malware is essentially easily avoidable to those who understand the internet gods? Could you explain any reasoning you could think of for why others would buy then implement your malware? And last but not least: ARE YOU MAGICALLY INFECTING MY COMPUTER RIGHT NOW?? WIZARD PROGRAMMER. Well I can't say for certain but probably it has infected people on this site purely because its so big. My job isn't to make it easy to infect people, just easy to hide on the computer. So if someone has some good exploits and can make the malware undetected then it is hard to know for certain if you are infected or not.
Mystic being of untold dark force, how might we convince you to use your powers for good? After I graduate I plan on work for a computer security company. As a college student I can't do much now.
Would you tell the security company that you used to develop malware? Lol nope.
How much money do the people make that buy your software? What prevents people from uploading your software to torrent sites or reselling it? My software generally has anti-crack protection on it so I can license it to a specific computer. People that use my software make varying amounts depending on what they use it for. I talked to someone that uses it to mine bitcoins with 50-100k bots, he makes about 20k a month.
Why do people pay so much to mess up other people's computers? I really don't know much about malware other then that it is bad... Did you get put on an FBI watch list or did they follow you around in a dark van? The people that buy my software make much more money from using it than I do selling it.
If your programs are supposed to work as part of a bigger whole, is there some sort of standard architecture your program specifically works under? Are the methods and ways of calling those methods meet some hacker standard, or do you publish an API with your script and just assume whoever uses your stuff is tech savvy enough to figure out everything they need to know? Could they easily read your code to see what you're doing or do you only send a binary/executable? Have you been surprised by any aspects of the industry you're taking part in? Does one segment seem a lot larger than you anticipated or did you come across a particular hacking technique you thought was rather interesting/inventive? I'm thinking on the level of channeling all the fractional pennies lost on rapid transactions to a bank account as being an interesting tactic... Do you individually sell/commission your programs or is there an equivalent to Amazon for such code? Where do you go to read news? I am sort of confused on this question. I am always surprised when people release good sophisticated malware which uses new methods to hide itself from the computer user. I never expected there would be such a huge supply of script kiddies who will buy software and barely know how to use it, only to hit someone offline on xbox live or something. I generally have someone else do the selling and finishing touches on my programs. I split some money with him.
Thanks for doing this AMA. Fuck all of the judgmental redditors. People don't offer to do IAMA's so that they can get bitched at by people on the internet. IAMA's are intended to give you an insight to a lifestyle that is not your own, so don't judge him for his choices. What OS do you do most of your programming on? When you're not programming, what OS do you use. What form of currency do you typically accept? Bitcoin? Do you use any recreational drugs? If so, do you obtain any of your drugs online? I use windows 7 64-bit to program on, and also use it for just regular usage. I accept bitcoins, Liberty Reserve, and Webmoney. I have done a lot of drugs but mainly I smoke bud, drop acid and do painkillers. I assume you are asking because of sites like silkroad? I have ordered off silkroad once but I get the same quality bud from my dealer so i didn't go back.
I have used the Silkroad, but I'm a member of a couple of private forums that give me access to much better stuff for cheaper. Do you use PGP encryption when communicating with your customers? My business partner actually is the one who dealers with the customers, but he does use it.
Got it. As long as you get paid, you could give a shit about the problems you cause for people. So, have you been a sociopath all your life or is this more recent? Well really I am not directly causing a problem to anyone because I don't use my own software. If I wasn't doing it someone else would just step in. Besides my programs don't steal credit card information and the like so the only real damage would be adware and posible dos attacks originating from your computer.
So you sort of make the bomb and let other people detonate it? So then its not your fault? Not trying to be accusatory, just wondering. Yeah and by that logic the people that sell others guns are just as involved as the people that use guns to kill people. I know what I am doing is technically morally wrong, and I will stop within a few months once I can find a job again.
Ever considered joining the good side? Getting a job at a anitivirus firm and using your knowledge about making malware to create software to prevent it? I would imagine that a knowledge like yours would be very useful for a antivirus software firm :) I plan on getting into computer security. As a college student coding malware is really one of the only ways I can make good money programming.
How "good" is your work? Will an anti-virus like achieve stop you? How wide spread is it. No, most of my programs are completely undetected until I stop making updates to it.
I'd ask for proof, but then I think that'd be a really silly thing to do. Have you written malware that functions on Linux? Besides the not stealing credit card information, what are your other ethical lines? I don't actually use my own software so I guess if that counts as an ethical line... I don't write malware for anything besides windows as its the most used operating system. If more people used mac and linux there would be as many viruses for those as there are for windows.
Have you ever been infected with your own malware? Yeah when I was testing without a VM (stupidly). Luckily I know how to remove programs I write myself...
, thank you for doing this AMA. Secondly, for most us out there who have loaded out with AV software and things like NoScript and Adblocker and such tell me, what behaviors or kinds of outgoing connections should we look for on our routers or scanners that might indicate infection? Its better to look at the process thats sending the outgoing connection, if its located in something like application data and has a startup entry, its probably malware.
Could you give me some examples on how to check this? I am always trying to expand my knowledge of these matters. Well the best way I know how to do it is with code, if you are interested in that I could send it to you. Otherwise use wireshark and process explorer or something.
Is the Free Anti-Virus/Spywear called AVG actually any good? Or do Malware programmers know that ALOT of people all over the world have it so create the malware so AVG etc will not discover it? Cheers. Most people create malware to make it undetected. Unless something is in the wild for a while most AVs will not detect it if its professionally coded.
As far as providing, I'm not necessarily sure how the law would work there. I can say with decent certainty that you're breaking tax laws though, I strongly doubt you're claiming your sales as income. That being said, I don't think you're scum. I was in the same place as you when I was a kid, and I did it solely because I wanted to say I could. It was less about causing harm and more about trying to learn. It just so happens that things like malware, especially that which allows remote intrusion, is very interesting. I was also heavily involved in the piracy scene, and major busts in 2001-2002 caused me to back out of it entirely. You mention the FBI, any reason why that didn't "scare you straight" so to speak? They only wanted information on an aquantince, I didn't give anything out and lawyered up. It did scare me long enough to stop for a year and pick a new nickname online to go by and also buy some vpns to gain some extra anonymity online. I don't think people that don't understand technology much truly get why it would be interesting to do stuff like this. Learning how to do it is a huge part, selling it is only secondary.
Do dark side developers these days ever just fuck around and make malware that wipes hard drives and stuff for fun? Not since the early 90's have I come across a story of anyone's hard drive getting wiped due to a virus etc. Most people are just focused on the money now. Also the new windows operatings systems have much better security so you can't easily get the rights to wipe a drive anyway.
I've made a virus in college when we were studying the Network Security topic. The professor of course didn't want to try it but asked me to explain exactly what I did. Anyway, one of the girls in my class asked for the code to duplicate it, modify it a little and claim she did the homework as well. So I gave her the source code as a help and when she "Run" it in on her machine it ruined many applications. Question to OP, do you have any similar stories like this? TL;DR: my college friend was screwed by my virus, OP do you have similar stories? Haha when I first started writing code in windows xp i fucked up my friends computer enough to force him to reformat.
How long does the process of scripting, and then finding people to sell to take? I would imagine this kind of thing takes many hours if not days, and what kind of skills do you need to have to be a malware developer such as yourself? I answered this before, but usually about a month for something of high quality. Depends on how much time I spend on it though. To develop malware you need to be an experienced coder, with knowlege of windows apis, memory manipulation, and networking.
Do you write polymorphic code ? I do not write polymorphic code because it would take much longer to develop.
What other hiding techniques do you know/apply other then encryption ? By hiding what do you mean? Injecting into memory is a popular way to hide running applications.
How many lines of code is a typical