Bitcoin’s Buying Opportunity - MSN

The Blackmail Email Scam (part 4)

THIS THREAD IS NOW ARCHIVED, THE LATEST THREAD CAN BE FOUND HERE: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

TEXT, PHONE CALL, AND PHYSICAL MAIL VARIANTS ARE COVERED IN THE LATEST THREAD.

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

FIRST THREAD: https://www.reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://www.reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/###

THIRD THREAD: https://old.reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. In al cases, the threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it
Good day,
If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you.
I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work.
Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it.
I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF)
So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts.
P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
I Have YOUR code. I rule phone xxxx
I SENT this newsletter from YOUR ACCOUNT.
I look your device.
I am in daze of your sex act fantasies!
I made backup your contacts and files. I made screenshots from your digital camera of yours device.
I want 888 $ to my (Bitcoin
My )Bitcoin currency
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts!
If you do not know how to do this - enter into Google/
=how to transfer money to a Bitcoin& wallet-
Time 30 hours.
This excellent post as Subway & Dairy Queen.
Hello!
I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it.
Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time.
Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account.
Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you.
You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit.
I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting!
So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site.
Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ...
I will not do this if you pay me a little amount. I think $877 is a nice price for it!
I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system.
My Trojan have auto alert, after this email is looked, I will be know it!
You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours)
Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data).
Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites!
I hope you will be prudent. Bye.
Same as before but they increased the amount
I got an order from someone to kill you and your family
but I am far from your house
if you still love your family, I ask you to transfer 0.1 BTC to me.
If you report this email, I will immediately kill your family.
FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION!
We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account.
After analyzing documents. We found Illegal activity - HIDING TAXES.
That we want?
I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
That we do if you don't pay bitcoin?
We send these Documents and Proofs to your Tax Department.
And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack
We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack
This is our guarantee, that you don't clean evidence and building a protection policy.
If you don't pay by in 7 days, attack will start.
Attack including.
1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament
Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack.
This is not a joke.
Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help.
Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
AND YOU WILL NEVER AGAIN HEAR FROM US!
If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom.
All mistakes in text we do specily.
Bitcoin is anonymous, nobody will ever know you cooperated.
Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link
Hello!
I am a hacker who has access to your operating system.
I also have full access to your account.
I've been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.
If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.
I also have access to all your contacts and all your correspondence.
Why your antivirus did not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.
I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks.
I can also post access to all your e-mail correspondence and messengers that you use.
If you want to prevent this,
transfer the amount of $500 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin").
My bitcoin address (BTC Wallet) is: x
After receiving the payment, I will delete the video and you will never hear me again.
I give you 50 hours (more than 2 days) to pay.
I have a notice reading this letter, and the timer will work when you see this letter.
Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.
If I find that you have shared this message with someone else, the video will be immediately distributed.
Best regards.
Hey, I know your password is:
Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit".
My malware gave me full access and control over your computer, meaning, I got access to all your accounts (see password above) and I can see everything on your screen, turn on your camera or microphone and you won't even notice about it.
I collected all your private data and I was spying on you, I RECORDED (through your webcam) embarrassing moments of you, you know what I mean!
After that I removed my malware to not leave any traces.
I can publish all your private data everywhere and I can send the videos to all your contacts, post it on social network, publish it on the whole web, including the darknet, where the sick people are!
Only you can prevent me from doing this and only I can help you out in this situation.
Transfer exactly 1200$ with the current bitcoin (BTC) price to my bitcoin address.
It's a very good offer, compared to all that horrible shit that will happen if I publish everything!
You can easily buy bitcoin here: www.paxful.com , www.coingate.com , www.coinbase.com , or check for bitcoin ATM near you, or Google for other exchanger. You can send the bitcoin directly to my address, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine.
My bitcoin address is:
Copy and paste my address, it's (cAsE-sEnSEtiVE)
I give you 3 days time to transfer the bitcoin!
As I got access to this email account, I will know if this email has already been read. If you get this email multiple times, it's to make sure you read it and after payment you can ignore it. After receiving the payment, I will remove everything and you can life your live in peace like before.
Next time update your browser before browsing the web!
НЕLLО!
I’m going to cut to thе chӓsе.I know ӓbout thе sеcrеt you ӓrе kееping from your wifе.Morе importӓntly,I hӓvе еvidеncе of whӓt you hӓvе bееn hiding.I won’t go into thе spеcifics hеrе in cӓsе your wifе intеrcеpts this,but you know whӓt I ӓm tӓlking ӓbout.
You don’t know mе pеrsonӓlly ӓnd nobody hirеd mе to look into you.Nor did I go out looking to burn you.It’s just your bӓd luck thӓt I stumblеd ӓcross your misӓdvеnturеs whilе.I thеn put in morе timе thӓn I probӓbly should hӓvе looking into your lifе.Frӓnkly,I ӓm rеӓdy to forgеt ӓll ӓbout you ӓnd lеt you gеt on with your lifе.And I ӓm going to givе you two options thӓt will ӓccomplish thӓt vеry thing.Thosе two options ӓrе to еithеr ignorе this lеttеr,or simply pӓy mе $822.Lеt’s еxӓminе thosе two options in morе dеtӓil.
Option 1 is to ignorе this lеttеr.Lеt mе tеll you whӓt will hӓppеn if you chosе this pӓth.I will tӓkе this еvidеncе ӓnd sеnd it to your wifе. And ӓs insurӓncе ӓgӓinst you intеrcеpting it bеforе your wifе gеts it,I will ӓlso sеnd copiеs to hеr friеnds ӓnd fӓmily.So,Evеn if you dеcidе to comе clеӓn with your wifе,it won’t protеct hеr from thе humiliӓtion shе will fееl whеn hеr friеnds ӓnd fӓmily find out your sordid dеtӓils from mе.
Option 2 is to pӓy mе $822.Wе’ll cӓll this my ‘confidеntiӓlity fее.’Now lеt mе tеll you whӓt hӓppеns if you choosе this pӓth.Your sеcrеt rеmӓins your sеcrеt.You go on with your lifе ӓs though nonе of this еvеr hӓppеnеd.Though you mӓy wӓnt to do ӓ bеttеr job ӓt kееping your misdееds sеcrеt in thе futurе.
At this point you mӓy bе thinking,‘I’ll just go to thе cops.’Which is why I hӓvе tӓkеn stеps to еnsurе this lеttеr cӓnnot bе trӓcеd bӓck to mе.So thӓt won’t hеlp,ӓnd it won’t stop thе еvidеncе from dеstroying your lifе.I’m not looking to brеӓk your bӓnk.I just wӓnt to bе compеnsӓtеd for thе timе I put into invеstigӓting you. $822 will closе thе books on thӓt.
Lеt’s ӓssumе you hӓvе dеcidеd to mӓkе ӓll this go ӓwӓy ӓnd pӓy mе thе confidеntiӓlity fее.In kееping with my strӓtеgy to not go to jӓil,wе will not mееt in pеrson ӓnd thеrе will bе no physicӓl еxchӓngе of cӓsh.You will pӓy mе ӓnonymously using bitcoin.If you wӓnt to kееp your sеcrеt thеn sеnd $822 in bitcoin to thе Rеcеiving Bitcoin Addrеss listеd bеlow.Pӓymеnt must bе rеcеivеd within 1 dӓys of thе post.
You should mӓkе ӓ trӓnsӓction of using bitcoins (cryptocurrеnsy): x
[Bitcoin dеtӓils]
Tеll no onе whӓt you will bе using thе bitcoin for or thеy mӓy not givе it to you.Thе procеdurе to obtӓin bitcoin cӓn tӓkе ӓ dӓy or two so do not put it off.Agӓin pӓymеnt must bе rеcеivеd within 1 dӓys of this lеttеr’s post mӓrkеd dӓtе.If I don’t rеcеivе thе bitcoin by thе dеӓdlinе,I will go ӓhеӓd ӓnd rеlеӓsе thе еvidеncе to еvеryonе.If you go thӓt routе,thеn thе lеӓst you could do is tеll your wifе so shе cӓn comе up with ӓn еxcusе to prеpӓrе hеr friеnds ӓnd fӓmily bеforе thеy find out.Thе clock is ticking.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material"
submitted by EugeneBYMCMB to Scams [link] [comments]

New Lands, or New Eyes? | Monthly FIRE Portfolio Update - April 2020

The real voyage of discovery consists not in seeking new landscapes, but in having new eyes.
- Marcel Proust, Remembrance of Things Past
This is my forty-first portfolio update. I complete this update monthly to check my progress against my goal.
Portfolio goal
My objective is to reach a portfolio of $2 180 000 by 1 July 2021. This would produce a real annual income of about $87 000 (in 2020 dollars).
This portfolio objective is based on an expected average real return of 3.99 per cent, or a nominal return of 6.49 per cent.
Portfolio summary
Vanguard Lifestrategy High Growth Fund – $697 582
Vanguard Lifestrategy Growth Fund – $40 709
Vanguard Lifestrategy Balanced Fund – $76 583
Vanguard Diversified Bonds Fund – $110 563
Vanguard Australian Shares ETF (VAS) – $174 864
Vanguard International Shares ETF (VGS) – $31 505
Betashares Australia 200 ETF (A200) – $215 805
Telstra shares (TLS) – $1 625
Insurance Australia Group shares (IAG) – $7 323
NIB Holdings shares (NHF) – $5 904
Gold ETF (GOLD.ASX) – $119 458
Secured physical gold – $19 269
Ratesetter (P2P lending) – $12 234
Bitcoin – $158 360
Raiz app (Aggressive portfolio) – $16 144
Spaceship Voyager app (Index portfolio) – $2 435
BrickX (P2P rental real estate) – $4 471
Total portfolio value: $1 694 834 (+$127 888 or 8.2%)
Asset allocation
Australian shares – 40.9% (4.1% under)
Global shares – 21.7%
Emerging markets shares – 2.2%
International small companies – 3.0%
Total international shares – 26.9% (3.1% under)
Total shares – 67.8% (7.2% under)
Total property securities – 0.3% (0.3% over)
Australian bonds – 4.5%
International bonds – 9.9%
Total bonds – 14.4% (0.6% under)
Gold – 8.2%
Bitcoin – 9.3%
Gold and alternatives – 17.5% (7.5% over)
Presented visually, below is a high-level view of the current asset allocation of the portfolio.
Comments
This month featured a sharp recovery in the overall portfolio, reducing the size of the large losses experienced over the previous month.
The portfolio increased by over $127 000, representing a growth of 8.2 per cent, which is the largest month-on-month growth on record. This now puts the portfolio value significantly above the levels of a year ago.
[Chart]
The expansion in the value of the portfolio has occurred due to an increase in Australian and global equities markets, as well as substantial increases the price of Bitcoin. This is effectively the mirror image of the simultaneous negative movements last month.
From a nadir of initial pessimism in late March, markets have generally moved upwards as debate continues about the path of a likely economic recession and recovery from Coronavirus impacts over the coming year.
[Chart]
First quarter distributions from the Australian and Global Shares ETFs (A200, VAS and VGS) were received this month. These were too early to fully reflect the sharp economic activity impacts of the Coronavirus and lockdown period on company earnings.
Despite this, they were significantly down on a cents per unit basis on the equivalent distributions last year. Totalling around $2700, these distributions formed part of new contributions to Vanguard's Australian shares ETF (VAS).
The rapid falls in equity have many participants looking forward to a return to normalcy, or at least more open to the pleasing ideas that nerves have been held in a market fall comparable to 2000 or 2008-09, and that markets now represent clear value. As discussed last month, there should be caution and some humility about these questions, if some historical perspective is taken. As an example, the largest global equity market in the world - the United States - remains at valuation levels well above those experienced in previous market lows.
Portfolio alternatives - tracking changes under the surface
A striking feature of the past year or so has been the expansion of the non-traditional or 'alternatives' components of gold and Bitcoin as a proportion of the overall portfolio. Currently, when combined these alternative assets form a greater part of the portfolio than at any point over the past two years.
The chart below shows that since January 2019 the gold and Bitcoin component of the portfolio has lifted from around its long term target level of 10 per cent, to now make up over 17 per cent of the portfolio. In the space of the last four months alone, it has lifted from 13 per cent.
[Chart]
With no purchases of either gold or Bitcoin over the period, the growth in the chart is the result of two reinforcing factors:
A substantial fall in the value of the equity portfolio - reaching nearly $200 000 since the recent February market peak has naturally and mathematically led to a commensurate increase the proportion of other assets.
Increases in the value of gold and Bitcoin - have also played a role with a total appreciation of around $150 000 across the two assets over the past 16 months.
In fact, the value gold holdings alone have increased by over 40 per cent since January last year. Further appreciation of either gold or Bitcoin prices, particularly if any further falls in equity markets occur, could easily place the portfolio in the same position as experienced in January 2018.
At that time these alternative assets made up 1 in every 5 dollars of the portfolio, an unusual, and in that case temporary phenomenon. This represents a different portfolio and risk exposure than that envisaged in my portfolio investment plan.
Yet, equally it is critical to recall what the circumstances would likely be for this to arise. Simultaneously high gold and Bitcoin prices are more likely to occur in a situation of severe capital market dislocation, or falling confidence. On the other hand, should confidence and equity market growth be restored, both of these portfolio components could fall back to lower levels.
It is difficult to tell which state of the world will eventuate, a key reason for diversification across asset types. United States government debt is already at record levels - equivalent in real terms to levels last seen when it emerged out of the Second World War - despite no similar national effort having being undertaken.
Future inflation can potentially partly manage this burden, however, the last sustained episode of persistently high inflation rates during the decade of the 1970s spelt negative real returns. Where investors expect future inflation or financially 'repressive' policies of inflation exceeding interest rates, the economic growth required to 'grow out' of debt can be affected.
At this point, my inclination is to address this circumstance gradually through time by re-balancing of distributions and new contributions, rather than to realise capital gains by selling assets at one, or several, points in time.
Chasing down the lines - falling average spending in lockdown
Since the implementation of lockdown restrictions, average credit card expenditure has fallen by nearly 30 per cent. This has taken credit card expenditure to lower than any similar period in the past six years.
Partly as a result of this - as the chart below shows - a new development is occurring. The previously fairly steady card expenses line (red) is now starting to bend down towards, or 'chase', the rolling average distributions line (in blue).
[Chart]
The declining distributions line is a result of some previous high distributions gradually falling outside of the data 'window' for the rolling three-year comparison of distributions and expenditure.
This intriguing picture will probably change before a cross-over occurs, as lockdown restrictions ease, and as the data feeding into the three year average slowly changes over time.
Progress
Progress against the objective, and the additional measures I have reached is set out below.
Measure Portfolio All Assets
Portfolio objective – $2 180 000 (or $87 000 pa) 77.7% 104.6%
Credit card purchases – $71 000 pa 94.8% 127.6%
Total expenses – $89 000 pa 76.0% 102.3%
Summary
Last month market volatility theoretically took progress down to below most of my financial independence benchmarks on an 'All Assets' (i.e. portfolio and superannuation assets) basis. This position has reversed this month. As markets have recovered and with additional spare time in the lockdown period, I have continued to seek out and think about different perspectives on the history and future of markets.
Yet it must be recognised that there is a natural limit to the utility of these ponderings. The shape of the future is always uncertain, and in this world, confident comparisons and analogies with past events can be perilous. Comparisons with past periods of financial market crises miss the centrality of government action as a causal influence on the path of virus affected economies and markets.
A virus and recovery is not the same as a global financial crisis originating in housing finance markets addressed through monetary and fiscal stimulus. Most developed country governments have quickly applied the same, if not larger versions of responses as applied in the global financial crisis, a distinguishing step that also makes analogies with the great depression era problematic.
Similarly, a pandemic is not hitting and interacting with the shattered economic and health systems of the 1918-19 Spanish flu. Overlaying all of this is the imperfect and partially disconnected relationship between the economy today, and equity markets that discount and focus on the future.
This makes all history's lessons more than usually caveated and conditional. One avenue for managing through these times is to focus on what does not change - the psychological difficulty of accepting alterations in financial circumstances and the capacity of markets movements to cruelly surprise us in both timing and direction.
One of the best texts to read to get a sense of both of these in such times is Benjamin Roth's A Great Depression Diary. This tells of the day-by-day changes observed in everyday urban life and investment markets, from the point of view of an American small retail investor living through the times.
This month also saw the exciting news that Pat the Shuffler and Strong Money Australia are combining efforts to produce a new podcast. Speaking of which, Big ERN's reflections on the current implications of sharemarket market movements for seekers of financial independence have been filled with insight and wisdom.
This interesting piece (video) - the latest in a 'virus' market series - from New York University's Professor of Finance Aswath Damodaran on asset performances through the past few months - is a more technical and detailed discussion of how markets have re-priced businesses and profits. Finally, the recently released Hmmminar interview series provides a more heterodox set of speakers and ideas on current markets, presented by Grant Williams.
Unlike predicting the future, seeking out different perspectives on it is perhaps the easiest it has ever been in history. While it is not always possible to change the course taken, it is possible to look at the same horizon with new eyes.
The post, links and full charts can be seen here.
submitted by thefiexpl to fiaustralia [link] [comments]

The Blackmail Email Scam (part 3)

THIS THREAD IS NOW ARCHIVED, THE LATEST THREAD CAN BE FOUND HERE: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

TEXT, PHONE CALL, AND PHYSICAL MAIL VARIANTS ARE COVERED IN THE LATEST THREAD.

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE

FIRST THREAD: https://www.reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://www.reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it
Good day,
If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you.
I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work.
Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it.
I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF)
So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts.
P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
I Have YOUR code. I rule phone xxxx
I SENT this newsletter from YOUR ACCOUNT.
I look your device.
I am in daze of your sex act fantasies!
I made backup your contacts and files. I made screenshots from your digital camera of yours device.
I want 888 $ to my (Bitcoin
My )Bitcoin currency
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts!
If you do not know how to do this - enter into Google/
=how to transfer money to a Bitcoin& wallet-
Time 30 hours.
This excellent post as Subway & Dairy Queen.
Hello!
I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it.
Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time.
Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account.
Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you.
You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit.
I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting!
So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site.
Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ...
I will not do this if you pay me a little amount. I think $877 is a nice price for it!
I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system.
My Trojan have auto alert, after this email is looked, I will be know it!
You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours)
Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data).
Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites!
I hope you will be prudent. Bye.
Same as before but they increased the amount
I got an order from someone to kill you and your family
but I am far from your house
if you still love your family, I ask you to transfer 0.1 BTC to me.
If you report this email, I will immediately kill your family.
FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION!
We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account.
After analyzing documents. We found Illegal activity - HIDING TAXES.
That we want?
I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
That we do if you don't pay bitcoin?
We send these Documents and Proofs to your Tax Department.
And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack
We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack
This is our guarantee, that you don't clean evidence and building a protection policy.
If you don't pay by in 7 days, attack will start.
Attack including.
1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament
Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack.
This is not a joke.
Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help.
Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
AND YOU WILL NEVER AGAIN HEAR FROM US!
If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom.
All mistakes in text we do specily.
Bitcoin is anonymous, nobody will ever know you cooperated.
Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material"
submitted by EugeneBYMCMB to Scams [link] [comments]

The Blackmail Email Scam (part 2)

THIS THREAD IS NOW ARCHIVED, THE LATEST THREAD CAN BE FOUND HERE: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

TEXT, PHONE CALL, AND PHYSICAL MAIL VARIANTS ARE COVERED IN THE LATEST THREAD.

PREVIOUS THREAD: https://www.reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it
Good day,
If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you.
I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work.
Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it.
I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF)
So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts.
P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
I Have YOUR code. I rule phone xxxx
I SENT this newsletter from YOUR ACCOUNT.
I look your device.
I am in daze of your sex act fantasies!
I made backup your contacts and files. I made screenshots from your digital camera of yours device.
I want 888 $ to my (Bitcoin
My )Bitcoin currency
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts!
If you do not know how to do this - enter into Google/
=how to transfer money to a Bitcoin& wallet-
Time 30 hours.
This excellent post as Subway & Dairy Queen.
Hello!
I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it.
Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time.
Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account.
Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you.
You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit.
I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting!
So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site.
Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ...
I will not do this if you pay me a little amount. I think $877 is a nice price for it!
I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system.
My Trojan have auto alert, after this email is looked, I will be know it!
You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours)
Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data).
Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites!
I hope you will be prudent. Bye.
Same as before but they increased the amount
I got an order from someone to kill you and your family
but I am far from your house
if you still love your family, I ask you to transfer 0.1 BTC to me.
If you report this email, I will immediately kill your family.
FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION!
We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account.
After analyzing documents. We found Illegal activity - HIDING TAXES.
That we want?
I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
That we do if you don't pay bitcoin?
We send these Documents and Proofs to your Tax Department.
And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack
We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack
This is our guarantee, that you don't clean evidence and building a protection policy.
If you don't pay by in 7 days, attack will start.
Attack including.
1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament
Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack.
This is not a joke.
Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help.
Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
AND YOU WILL NEVER AGAIN HEAR FROM US!
If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom.
All mistakes in text we do specily.
Bitcoin is anonymous, nobody will ever know you cooperated.
Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p , software on the adult, porno sitio, one of your pass word, .br , specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching", "For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss", "Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video , with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT , if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy, , and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts
submitted by EugeneBYMCMB to Scams [link] [comments]

I just bought my first ASIC's, did I make a bad investment

I bought 2 brand New s9i's with psu's For 1600$ And I also Will build a sound Box And I need a router that supports my mobile broadband, this Will prob. Cost another 200$.
So the calculating speed is going to be avarage 28TH. How long Will it take to get my money Back when I don't have any electricity Costs.
Im just bit concerned because my friend told me that according to BitcoinWisdom site my profits Will cut half every month And that I Will only be making the amount what Bitcoin profitability calc. For the first month.
So on few months after mining im making just a fraction of the profit And never going to be able to get the ROI?
Can somebody help me and tell me a simple answer how this difficulty affects my New investment.
submitted by PaKeVapes to BITMAIN [link] [comments]

7-Habits of Highly Effective People

I have re-read this work 22 times and raised my children on the principles within. Here are my notes that have been meticulously looked over for your convenience. Thank me later. Sincerely, Bitcoin Justin
7-Habits of Highly Effective People Stephen Covey
Private Victory: CD1: Principles are natural law that governs us, values are personal and subjective. Values govern people’s behavior; principles govern the consequences of people’s behavior. Principles are independent of us and they operate regardless of us. Every culture practices universal principles in unique ways. Any airplane is off the track much of the time but it just keeps coming back to the flight plan eventually it arriving at it’s destination. This is true with all of us as individuals, families and organizations. The key is to have an end in mind and a shared commitment to constant feedback and constant course correctness. Humility is the mother of all virtues and courage is the father. We must look through the lens as we see the world as well as how the world is. Much of our perception is a product of our own motivation of how people will see us. Examine your own motivations against your highest values because they impact perception which then impacts the behavior that follows. If you want to achieve your highest aspirations and overcome your greatest challenges, identify the principle of natural law that governs the results you seek. Success in any endeavor is derived by ultimately acting in harmony with the principles in which the success is tied. Blame and victimism, whenever you find a problem you will usually find a finger pointing of blame. Blaming only provided temporary relief of the problem. Balance and piece of mind follow the person who follows his sense of clear priorities and lives with focus towards them. True greatness is achieved through the abundant mind that works selflessly for the mutual respect and mutual benefit. To learn and not to do is really not to learn. To know and not to do is really not to know. The way we see things is often the product of the things we seek or our deeper motivations. The essence to us being objective is to realize that we are subjective. Were we stand has more to do with where we are sitting. The truly subjective person is the one who thinks that he or she is objective. We see the world not as it is but as we area, or as we are conditioned to see it. When we open our mouths to describe what we see, we in effect describe ourselves, our perceptions and our paradigms. The more aware we are of our basic paradigms, maps or assumptions and the extent to which we have been influenced by our experiences the more we can take responsibility for these paradigms, examine them and test them against reality listen to others, be open to their perceptions thereby getting a larger picture and far more objective view. The fastest way to change somebody’s paradign is simply to give them a new role, a new perspective. We can only make quantum improvements in our lives when we quite hacking at the leaves of attitude and behavior and get to the root, the paradign from which our attitudes and behaviors flow.
CD2: The way we see the problem is the problem. The significant problems we face cannot be solved at the same level of thinking that we where at when they where created. TS Elliot – “We must not cease from exploration and after all of our exploring is to arrive where we began and see the place for the very first time. Aristotle – “We are what we repeatedly do, excellence is not an act, but a habit.” Our character is a composite of our habits. A habit is the intersection of knowledge, skill and desire. CD3: You cannot persuade another to change. Each of us guards the gate of change only by the inside. You cannot open the gate of another either by argument or emotional appeal. Self Awareness – Enables us to stand apart and examine even the way we see ourselves. Until we understand how we see ourselves we will be unable to understand how others see and feel about themselves and their world. Unaware, we will project our intensions onto their nature and call ourselves objective. Victor Franco had more freedom by having the internal power to exercise his options while his captures had more liberties or the option to choose from within their environment. Between stimulus and response is a space. Within that space lays our freedom to choose. With in those choices lies our growth and happiness. Within the space of choice are the 4 endowments Self Awareness Imagination Conscience (Personal Integrity) Free Will (Our ability to act based on our self awareness)
Habit # 1 – Be Proactive – Means we are responsible for our own lives. I am what I am today because of the choices I made yesterday. Courage is not the absence of fear, but the awareness that something else is more important. Love is a verb. Love the feeling can be recaptured. Circle of Concern & Circle of Influence – C or Concern – You have no control over. It is ineffective to work on your C or C or the people around you and effective to work on your C of Influence or yourself, your behavior, choices & reactions. By working on your C or I you can have an indirect influence on your C or C. C or C is filled with the Have’s – I would be happy if I just …….. C or I is filled with the Be’s – I can be wiser. I can be more understanding. It is the character focus. Anytime we think that what is out there with others or circumstances is the problem, the very thought is the problem because we empower what’s out there to control us. The change paradign is from the outside-in meaning to change others to correct the problem. The proactive paradign is from the inside-out meaning to change myself to influence what is going on in the outside. I can be different, I can be more proactive. If I have a problem with my marriage, what will I gain by confessing my wife’s sins? I immobilize myself in a negative situation and diminish myself to influence her by nagging. My criticism is worst than the conduct I want to correct, my ability to correct the situation withers and dies. If I really want to improve the situation, I can work on the one thing I have control of. That is myself. I can stop trying to shape up my wife and work on my own weaknesses. Sometimes the most productive thing you can do is just smile and be happy. We are free to choose our actions. We are not free to choose our consequences. Consequences are governed by natural law. Our behavior is fundamentally governed by principles. Living in harmony with them produces positive consequences. Violating them produces negative consequences. We are free to choose the response in any situation. In choosing them we also choose the consequences. When you pick up one end of the stick, you pick up the other. The proactive approach to any mistake is to Acknowledge it instantly Correct it and Learn from it Our response to any mistake reflects the quality of the next moment. At the very heart of our C or I is our ability to make and keep commitments. Being proactive means to be a model, not a critic. Look at the weakness of others with compassion, not accusation. It’s not what they are doing or not doing that is the issue, the issue is your chosen response. Samuel Johnson – “The fountain of contempt must spring up in the mind and he who has little knowledge of human nature has to seek happiness by changing anything but his own disposition will waste his life in fruitless efforts and will multiply the grief he proposes to remove.
Application # 1: For one full day, listen to yourself and the people around you. How often do you hear reactive phrases like “I can’t” or “If only”. Imagine a situation in the past and how you responded reactively. Replay that situation before you relive it and imagine how you can respond proactively.
Application # 2: Identify a problem in your business or personal life. Identify if it is a direct, indirect or no control problem. Identify the first steps you can take in your C of I and take the steps to solve that problem.
Habit # 2 - Begin With The End In Mind. What lays before us or what lays ahead of use are tiny matters compared to what lays within us. It is possible to be very busy without being very effective. All things are created twice. First is a mental creation, 2nd is a physical creation. Blue prints before the house. Management = Doing things right Leadership = Doing the right things Management is a bottom line thing. “How can I best accomplish.” Leadership is a top line thing “What are the things I want to accomplish.” It’s not about having things, but about having mastery or victory over self. To begin with the end in mind means to re-script myself so that the paradign to witch my attitudes and behaviors flow are in congruent with my deepest values and aligned with the correct principles.
Personal mission statement CD4 Track 11 40 seconds Many so called emotional or mental illnesses are really symptoms or an underlying feeling or meaninglessness or emptiness. A personal mission will give you direction and meaning to all that you do. Whatever is at the center of our life will be our source of guidance, security, wisdom and power. Security represents your sense of worth and identity. Guidance means your source of direction in your life. Wisdom is your perspective on life Power CD5 There is a common thread that is weaved between most spouse-centered relationships. That common thread is emotional dependence. If our sense of emotional worth comes from our marriage, then we become highly dependent on that relationship. We become dependent to the moods, treatment, feelings and behavior of our spouse or any outside influence. When responsibilities increase or stresses occur we tend to revert back to the script we were given when we grew up, but so does our spouse. Those scripts are usually different ways of handling financial, child disciplines or in-law issues that come to the surface. When those deep seeded tendencies combined with the emotional dependency on a marriage the spouse centered relationship reveals all of its vulnerability. When we are dependent on the person from whom we are in conflict both need and conflict are compounded. Love hate over reactions, fight or flight tendencies, withdraw, aggr4esiveness, bitterness, resentment and cold competition are some of the usual results. When these occur we tend to fall even further back on background tendencies and habits in an effort to justify and defend our own behavior and to attack our spouse. Inevitably, anytime we are too vulnerable we feel the need to protect ourselves from further wounds so we resort to sarcasms, cutting humor, cynicism, anything to keep from exposing the tenderness within. Each partner tends to wait on the initiative of the other for love only to be disappointed but also to confirm the rightness of the accusations made. There is only phantom security in such a relationship. When all appears to be going well guidance is based on the emotion of the moment. Wisdom and power are lost on the counter dependent negative interaction. Consider the 4-Life Supporting Factors. Security, Guidance, Wisdom, Power When my sense of personal worth comes from my net worth, I am vulnerable to any factor that affects that worth. If my sense of identity lies in my reputation or the things that I have, my life will be in a constant state of jeopardy. When writing your mission statement concentrate on your Roles & Goals. Break down your roles and think about what you want to accomplish in each area. CD4 Track 1-3 Centers Malcolm Muckerage – “When I look back on my life now a days as I sometimes do what strikes me most foreably about it is what seems at the time most significant and seductive seams now most futile and absorb. For instance, success in all of its various guises being known and being praised in all of its ostensible pleasures like acquiring money or seducing woman or traveling going to or foe in the world and up and down like Satin explaining and experiencing whatever vanity fair has to offer. In retrospect, all of these exercises in self-gratification seam pure fantasy what Pascal called licking the earth. Centers - One of the best ways to identify your center is to look at your own life supporting factors, By centering our lives on the correct principles, universal, timeless and self evident, we create a solid foundation for the 4-Life factors. CD6 Principles are bigger than people or circumstances The more we learn the more clearly we can focus the lens for witch we see the world. Principles don’t change but our understanding of them does. The wisdom that comforts principle centered living comes from the correct maps, the way things are, the way things have been and will be. We are free to choose the actions, but we are not free to choose our consequences. When writing a mission statement the involvement process is as critical as the written material.
Habit # 3 – Put First Things First Things that matter most must never be at the mercy of things that matter least. The degree in witch we have developed our independent will in everyday lives is measured by personal integrity. Integrity is fundamentally the value we place on ourselves. A successful person has a habit of doing things that failures wouldn’t do. Successful people don’t like doing them either. The best time management – organize and execute around priorities. Time Matrix
You are much more effective to focus on relationships and results then to focus on time and management The only place to get time for quad #2 is to rob from quad #3 & #4. At least from the beginning. The enemy of the best is often the good. You have to know when to say no to worthy projects when the yes inside you is burning hotter for the things you know you need to be doing to stay in quad #2 Quadrant #2 – Organize needs to meet (6) criteria Coherence – There is harmony, unity and integrity between your vision and mission. A personal mission statement should be in your planner to constantly refer to. Roles should be listed to help define short and long term goals. Balance – Your scheduling tool should keep your roles in balance so you don’t ignore important roles such as health, relationships, family, ect. You can’t compensate on one category to make up for what you lack in another. Ex. You can’t be a successful businessman but be in the middle of a divorce. Quad #2 Focus – Deals with prevention and staying out of crises. The best way to do this is by organizing your life on a weekly basis. The key is not to prioritize what is on your schedule, but to schedule your priorities. Plan by the week instead of the day. People Dimension – You need a schedule tool that deals with people and not just schedules. Why you can think in terms of efficiency when dealing with time, a principle centered person thinks in terms of effectiveness when dealing with people. Flexibility – Your planning tool should be your servant, never your master. Your schedule should be tailored towards your desires, needs and particular ways. Portable – Your scheduling tool should be taken with you and used when you need it. CD7 Quadrant #2 Organizing includes (4) key activities. Identify and write down your key roles. You can break key roles by listing specific areas within. Within work or professional, within family ect. Write down the key areas you see yourself spending time in over the next 7-days Goals – List the activities or goals you wish to accomplish in each role over the next 7-days Scheduling – Go through your organizer and schedule the time you are going to work on your goals. Plan 1 or 2 hours on Sunday to plan your week & goals. Daily adapting – Respond to priorities while adapting to unanticipated events such as relationship based or crises type scenarios. Taking a few minutes to review your schedule each morning can put you in touch with the value based decisions that you made at the beginning of the week when you prioritized your schedule. As you review your day you can see how your roles and goals provide a natural prioritization that grows out of your innate sense of balance. It provides both discipline and spontaneity. The more completely weekly goals are tied into the wider framework of correct principles and a personal mission statement, the greater the chance of effectiveness will be. Think effectiveness with people and efficiency with things. The first person you need to consider in terms of effectiveness rather than efficiency is yourself. 4th Generation Scheduling Tool Principle Centered – It allows you to see your time as what is important and effective. Conscience Directed – It gives you the ability to see your life in harmony with your deepest values. It defines your mission in terms of value and long-term goals. This gives direction and purpose to the way you spend each day. It helps balance your life by identifying your roles and goals in each key activity of your life. It gives greater context by weekly organizing. Delegation – We accomplish all that we do through delegation either through time or other people. Delegate to time = Efficiency Delegate to people = Effectiveness Delegating through people is the single most high leverage activity there is. Transferring your responsibilities to others skilled and well-trained individuals allows you to give your time to other high leverage activities. Delegation means growth for both individuals and organizations. JC Penny – “The wisest decision I ever made was to let go.” Producers – Does what is necessary to accomplish desired results. A painter is a producer; an architect that draws up plans is a producer. Manager – A person who works through people and with systems to produce golden eggs. A producer can invest (1) hour of effort to produce (1) hour of results. A manager can invest (1) hour of effort to produce 10,50 100 or more hours of results. The key to effective management is delegation. Go For Delegation = Go for this and go for that. Task directed minute by minute. One on one supervision of methods. How many people can you manage when you need to be involved in every move they make? Stewardship Delegation = Based on results. It gives a choice of methods and manages the results. It involves clear upfront and mutual understanding and commitment in (5) areas. Desired results – Spend time, be patient. Show ten what the desired results are, but not how they are going to do it. Let the person see it, taste it. “Clean and Green” Make a statement of what the desired results are going to look like and work on a commitment of when they are going to be accomplished. Guidelines – Identify the parameters for which the individual is going to operate. They should be as few as possible to avoid method delegation. They should include formable restrictions to help the individual avoid long standing traditions or getting into trouble. If you know the failure paths of the job, identify them and show where the quicksand is. You don’t want the person to reinvent the wheel. You want to tell them what not to do, but you don’t want to tell them what to do. Resources – Identify the available or technical resources the person can use to draw from to accomplish the desired results. Accountability – Set up the specific guidelines will be used to evaluate the desired results and the specific times that evaluations will take place. Consequences – Specify what will happen both good and bad as a result of the evaluation. Complete delegation Disc #7 tracks 6&7
Application # 1: Make a list of activities and the people you can delegate those activities to.
Application # 2: Identify a quadrant #2 activity you know you have been neglecting in your life. One that you know if you have done it well it would make a significant impact on your life either personally or professionally. Write it down and commit to implement it.
Application # 3: Draw a time management matrix. Log your time for 3-days in 15-minute intervals. How accurate is your estimate. Are you satisfied with the way you spend your time? What do you need to change?
Application # 4: Organize your next week. Start by writing down your roles 7 goals for the next week. Transfer the goals to a specific action plan. At the end of the week evaluate how well your plan translated your deep values and purposes into your daily life and what level of integrity you where able to maintain in those deep values and purposes.
Application # 5: Commit yourself to start organizing on a weekly basis and set up a regular time to start doing it.
Application # 6: Convert your current planning tool into a 4th generation tool.
Public Victory There can be no friendship without confidence and there can be no confidence without integrity. Private victory precedes public victory just like 1st grade precedes 2nd grade. You can’t be successful with other people if you have not paid the price of being successful with yourself. You can’t talk yourself out of problems that you behave yourself into. The principle of sequencing. You can’t have the fruits without the roots. If you don’t know yourself, control yourself and have mastery over yourself, it is very difficult to like yourself. Independence is an achievement. Inter-Dependence is a choice only independent people can make. The most important ingredient we can put into any relationship is not what we say or what we do, but who we are. A double minded person is unstable in all of his ways. The place we start when building any relationship is inside ourselves, inside our circle of influence, inside our character. Emotional bank account – metaphor – It is the amount of trust built up in a relationship. It’s the feeling of safe. You deposit into an emotional account through courteousies, kindnesses, honesty, keeping your commitment. Deposits = Built up of trust with others. Reserves of deposits will compensate for mistakes. Communication does not need to necessarily need to be clear, you will trust anyways. You wouldn’t be an offender because of a choice of particular words. When a trust account is high, communication is easy, instant and effective. If you have a habit of showing discourtesy, disrespect, cutting someone off, over reacting, ignoring, becoming arbitrary, betraying their trust, threatening or playing little tin God in their life, eventually their emotional bank account is overdrawn. The trust level gets very low. What flexibility do I have? I’m walking on mind fields. I have to be very careful of everything that I say. Measure every word, it’s tension city. Memo haven, protecting my backside, politicking. Many organizations and families are filled with it. Instead of rich spontaneous understanding and communication the situation becomes accommodating where two people attempt to live individual lifestyles. The relationship may further deteriorate to one of hostility and defensiveness, the flight or fight response creates verbal battles, slammed doors, refusal to talk, emotional withdraw and self pity. It may end up in a cold war with home life sustained only by children. Sex or social pressure or image protection. The P/PC lighthouse is there. We can either break against it or use it as our guiding light. One of the greatest deposits you can make is just by listening without preaching or suggesting or reading your own autobiography into what they have to say. Listen and let them feel your true and honest concern and acceptance of them. There is no quick fix. As genuine deposits keep coming and coming they increase the balance. Building and repairing relationships takes time. If you become impatient you could very well withdraw all of the deposits you have made and diminish yourself. It takes character to be proactive, to focus on your circle of influence to nurture growing things and not to pull up the flowers to see how the roots are coming. Building and repairing relationships are long-term investments.
CD 8 6-Major deposits that build emotional bank accounts.
Understanding the individual - Really seeking to understand the other person is one of the most important deposits you can make. It’s the key to every other deposit because you simply don’t know what constitutes a deposit to the other person. Until you understand that individual from within that individual’s frame of reference, what may be a deposit for you may not be perceived as a deposit to the other person at all. It may even be perceived as a withdraw because it does not touch the persons deep interest or needs. To make a deposit, what is important to another person needs to be as important to you as the other person is to you. Our tendency is to project out of our own autobiography what the other person wants or needs. We project our intentions on the behavior of others. We interpret what constitutes a deposit on our own needs and desires. Treat all of your children the same by treating them differently.
Attending to the little things – The little kindnesses and courtesies are so important. Small discourtesies and unkindnesses, little forms of disrespect makes huge withdraw. In relationships the little things are the big things.
Keeping Commitments – There is not more of a massive withdraw than to make a commitment to someone and not come thru. Make promises very carefully. Never make a promise you can’t keep. If you cultivate the habit of keeping the promises you make, you build bridges of trust that span the gap between you and your child. If that child has cultivated trust in your acts and your word he will act on your council.
Clarifying expectations – Clear expectations in the area of roles is important. Unclear expectation in the area of goals undermines trust. You will find that the cause of almost all relationship difficulties is rooted in conflicting or ambiguous expectations around roles and goals. Unclear expectations lead to misunderstandings and disappointment and withdraw of trust. When you come into a new situation it is important to get all expectations out on the table when it comes to roles and goals. We create many situations just by assuming that our expectations are self-evident and are clearly understood and shared by other people. The deposit is to make the expectation clear from the beginning.
Showing personal integrity – Personal integrity generates trust and is the basis for many different kinds of deposits. Lack of integrity can undermine almost any effort to generate high trust accounts. Integrity includes but goes far beyond honesty. Honesty = Telling the truth, conforming our words to reality Integrity = Conforming our reality to words. Keeping promises and fulfilling expectations. One of the best ways to manifest integrity is to be loyal to those that are not present. In doing so we build the trust of those that are present. When you defend those that are absent you build the trust of those that are present. You may get a temporary golden egg by putting someone down or sharing privileged information but your strangling the goose, weakening the relationship that supplies enduring pleasure and association. Integrity as an interdependent reality – You treat everyone by the same set of principles. You are integrated around principles. Integrity – Integrated. As you do, people will come to trust you.
Apologize sincerely when you make a withdraw. Great deposits come in sincere words. “I was wrong”. “That gave you no dignity and I’m deeply sorry.” It takes a great deal of character strength to apologize quickly. People with little internal security cannot apologize. It makes them vulnerable or appear soft and weak. They fear that others may take advantage of them. Their security is based upon the opinions of other people and they are worried what others may think. In addition they usually feel justified for what they did. They rationalize their own wrong in the name of the other persons wrong. To be a deposit the apology must be sincere. It is the weak who are cruel; gentleness can only be expected from the strong. Sincere apologies make deposits, repeated apologies are interpreted as insincere and are withdraws. It is one problem to make a mistake and quite another not to admit it. Laws of love and laws of life. When we make deposits of unconditional love, when we live the primary laws of love we encourage others to live the primary laws of life. When we truly love others without conditions and without strings we help them feel secure and safe and validated and affirmed in their essential worth, dignity and integrity. Their natural growth process is encouraged. We make it easy for them to live the laws of life, cooperation, cont5ribution, self-discipline and integrity. When we violate the primary laws of love by attaching strings and conditions we encourage others to violate the primary laws of life. We encourage them to be in a reactive and defensive position. It is more noble to give yourself completely to one individual then to labor diligently for the salvation of the masses. You spend countless hours working for what’s out there without having a deep meaningful lasting relationship with the people at home, the people you work with, the people closest to you. Creating the unity necessary to run a business, marriage or a family takes great personal strength. It is at a very essential one on one level that we live the primary laws of love and life. P-Problems are PC Opportunities Every P-Problem is a PC Opportunity. It’s a chance to build the emotional bank account that significantly affects the interdependent relationship. Many interactions change from transactional to transformational. ex.” Help a child or teenager with a problem” Strong bonds of love and trust are created as a child senses the value parents give to their problems and to them as individuals. The Habit of Interdependence This is the habit of public victory or success with other people. Effective interdependence can only be achieved by effective independent people.

BitcoinJustin

submitted by BitcoinJustin to Habits [link] [comments]

Bittruth Cryptocurrency, Bitcoin, and blockchain - YouTube Crypto Mining Difficulty 101 - Everything You Need to Know What is Crypto Mining Difficulty and How it Impacts YOUR Profits - Explained W/ BTC ZenCash ZEC The bitcoin wiki bitcoin training Why Bitcoin Mining

Furthermore, Bitcoin Wisdom also shows other statistical data such as network difficulty, and the past and present hashrate. The various exchanges displayed on Bitcoin Wisdom. Tradeblock. Another ... But the effects for miners are more concrete; by decreasing difficulty, the bitcoin protocol also decreases the amount of time, processing power, and electricity required to solve a block. That’s exactly what has been happening since mid-October, when difficulty dropped about five percent, according to Bitcoin Wisdom. Then just last week, it dropped again, by nearly 7.5 percent. Bitcoin ... The Bitcoin difficulty chart provides the current Bitcoin difficulty (BTC diff) target as well as a historical data graph visualizing Bitcoin mining difficulty chart values with BTC difficulty adjustments (both increases and decreases) defaulted to today with timeline options of 1 day, 1 week, 1 month, 3 months, 6 months, 1 year, 3 years, and all time Conventional wisdom has long asserted that Bitcoin is secure against groups of colluding miners as long as the majority of the miners are honest (by honest, we mean that they dutifully obey the protocol as prescribed by pseudonymous Nakamoto). Our work shows that this assertion is wrong. We show that, at the moment, any group of nodes employing our attack will succeed in earning an income ... This scarcity enhances value motto in the bitcoin world will have an even greater compelling tendency to be bullish going into the 2020 bitcoin halving event. We’ll leave you with one last thought and a few questions…with the honorary wisdom of Satoshi Nakamoto, lets close out this bitcoin halving guide with a poignant message he/she/they sent to the early-adopting crypo community:

[index] [18206] [10993] [50925] [39851] [21810] [652] [14142] [6966] [41918] [42365]

Bittruth Cryptocurrency, Bitcoin, and blockchain - YouTube

In this short live stream, you'll learn what Bitcoin is, how it works, and how it is changing the world economy. Free Video Reveals: How To Earn 3.24 BTC In ... To read more with regards to bitcoin paper wallet, check out internet site below: http://www.cryptocoinwalletcards.com/ Tags: asic bitcoin miner, asic bitcoi... How to make money with bitcoin. You might be already aware of this NEW digital currency known as BITCOIN, you might have heard it from the news, or even from... #bitcoin #cryptocurrency #cryptocurrencynews In April 2019 Bitcoin mining has become insane. Due to the new S17 miner from Bitmain and bitcoin mining farms buying it thus a rise in difficulty. Yet ... In this video, I attempt to describe how crypto mining difficulty works and how it affects profitability. I also crunch some numbers to show alternative methods for determining profits based on ...

#