wallet#1
9)
From wallet#1, you can use the BTCs to make anonymous purchases or
also in Clearnet
Treat the mixer services exactly as the VPNs, you should not trust them
completely! Mixer services could log your transactions and compromise your
anonymity..
CoinJoin
The Bitcoin world offers another way to clean them: CoinJoins is a
compression method for Bitcoins transactions, designed to increase the parties
privacy, removing unnecessary information from them. CoinJoins was created
since the Bitcoin, often advertised as an anonymous payment method, is not
100%
secure at all, actually; instead, we may say that its less anonymous than
banks: at least, the latter won’t publicly share transactions!
The CoinJoin method simply consists of connecting to a server that acts as a
gathering point for people joining the same transaction: this way, it will be far
more difficult to analyze all the circulating currencies; furthermore, unlike
mixing services, Bitcoins cannot be stolen. Besides anonymous purchases,
crypto-currencies can also be used for other purposes:
the most credited methods
include tax evasion and money laundering. Especially for the first reason, the
Bitcoin was banned by different countries (Italy is excluded to date) and is under
review by the largest world banks that, together with governments, are deciding
about its fate.
It would make sense thinking that, in a not too distant future, this currency
may become totally illegal, since it can be used instead of official currencies –
although crypto-currencies are not real money – and this would make the entire
banking system crumble down. But this is another story...
12.2.3 Beyond Bitcoin
The concept behind the crypto-currencies is still a recent reality, and, rightly,
it will take years before we get a point of reference.
At the moment, the latter is
seemingly represented by Bitcoins, but the market tends to look elsewhere, also
expecting the strong saturation of blockchains, the BTC market de-centralization
and considering its limitations. There are some fascinating alternatives, then, like
Litecoin, Dogecoin, Quarkcoin, Primecoin, Peercoin, and so on.
The future of Bitcoins, however, seems to be less bright than expected: new
investors are focusing on Ethereum,
a new way of trading, that solves the
problems and limitations of BTCs, rightfully earning the appointment as Bitcoin
2.0. For Anonymity purposes, we don’t need to further explore alternative
crypto-currencies, since all of them share part of the functioning logic and we
are uncertain of when the Bitcoin will be replaced and by what. Only time will
tell.
13. Be Free
Now you’re ready to enjoy your full freedom on the web, outside of the
scope of any organization and company that used you as a specimen for their
experiments.
Yes, I may be exaggerating a little, but I think that
it is worst believing to be
free than being aware of the opposite, to some extent. Being free from the
shackles of statistics, markets and analysis, from your government that doesn’t
want you to like certain things, from the zombies surrounding you and looking at
you like a parasite only trying to be yourself.
I wanted to write this book so that you can be free and live without the
constant fear that, one day, this dream may come to an end. Here’s why this book
is free and it will always be.
Now it’s your turn: will you fight to protect this freedom? What will you do,
from now on, to make things change? If you want to fight this struggle with me,
please share the book with your friends, let me know
your opinion and support
the projects and the struggles we’ve been fighting for years to be free, at least on
the web.
Now go and enjoy your freedom. And don’t allow anyone to stop you.
•
deepdotweb.com
and in particular the Jolly Roger’s
Security Guide for
Beginners that I used for the stories of the featured cyber-criminals
•
torproject.org
for the wikis explaining the TOR network architecture
•
privacytools.io
for the report about mass surveillance and the summary of
the key points
•
Source Sans Pro,
Oxygen, Roboto Slab e
Ubuntu Mono are the fonts used
for this book
Special Thanks
The success of this project has also been made possible by some of the most
important IT portals, which offered their visibility across the media. Without
them, Hacklog: Volume 1 would never have reached this important goal. Thank
you again.
Donors
The Hacklog: Volume 1 was made possible by the
monetary contributions of
the hereby mentioned people, from the Hacklog Indiegogo campaign.
Do'stlaringiz bilan baham: