What’s all the panic about?

Bitcoin dropped to 16.5 k today. 16.5 k people … everyone is running around like their fuzz “re on fire”. I’ve only been on the HODL train for a bit over a few months and this sub has convinced me to expect and not expresses concern about plunges like this. It’s only been a month for me and I’m not panicked, why is everyone else?

I was bracing for plunges down to 11 or 12 k. We’re up here levitating around 17 k and behaving like the world is going to end.

Coinbase isn’t a big deal, BCH isn’t a big deal. Bitcoin has checked worse and continues to grow, I for one will be buying this plunge, because BCH isn’t the gold guideline for Crypto Currency. Bitcoin is.

Edit: I slept on this, and recognise this morning that maybe it isn’t all hysterium, it’s just calling a spade a spade. There isn’t inevitably a ton of panic selling, but primarily announcing Coinbase on their BS. Which, is a good happen. Here i am little regulation to hold them accountable, so their patrons have to. I’ll still emphasizes not to panic and to keep on HODLing, but, we are able to do that while announcing out some shady business tactics.

Read more:

NHS seeks to recover from global cyber-attack as security concerns resurface

Cybersecurity centre says teams working round the clock to fix systems rendered inaccessible by international ransomware attack

The NHS is working to bring its systems back online after it became the highest-profile victim of a global ransomware attack and faced renewed concern about the strength of its infrastructure.

The National Cyber Security Centre (NCSC) said teams were working round the clock in response to the attack, which resulted in operations being cancelled, ambulances being diverted and documents such as patient records made unavailable in England and Scotland.

Computers at hospitals and GPs surgeries in the UK were among tens of thousands hit in almost 100 countries by malware that appeared to be using technology stolen from the National Security Agency in the US. It blocks access to any files on a PC until a ransom is paid.

The British prime minister, Theresa May, and NHS Digital said they were not aware of any evidence patient records had been compromised in Fridays attack, which is thought to have affected computers in nearly 100 countries.

May said: This is not targeted at the NHS, its an international attack and a number of countries and organisations have been affected.

Amber Rudd, the home secretary, refused to confirm on Saturday morning whether patient data had been backed up, and said the NHS would upgrade its software in the wake of the attack. She said data should be backed up, but would not say whether it actually had been.

The shadow health secretary, Jonathan Ashworth, urged the government to be clear about whats happened, describing the attack as terrible news and a real worry for patients.

The unprecedented attacks, using software called WanaCrypt0r 2.0 or WannaCry, exploits a vulnerability in Windows. Microsoft released a patch a software update that fixes the problem for the flaw in March, but computers that had not installed the security update were vulnerable.

In December it was reported that nearly all NHS trusts were using an obsolete version of Windows for which Microsoft had stopped providing security updates in April 2014. Data acquired by software firm Citrix under freedom of information laws suggested 90% of trusts were using Windows XP, then a 15-year-old system.

It is not known how many computers across the NHS today are still using Windows XP or recent variants Windows 8 and Windows 10.

About 40 NHS organisations are though to have been affected by Fridays bug, which was released the day after a doctor warned that NHS hospitals needed to be prepared for an incident precisely of the kind seen.

In an article published in the British Medical Journal, Dr Krishna Chinthapalli, a neurology registrar at the National Hospital for Neurology and Neurosurgery in London, said hospitals will almost certainly be shut down by ransomware this year.

Ross Anderson, of Cambridge University, said the critical software patch released earlier this year may not have been installed across NHS computers. If large numbers of NHS organisations failed to act on a critical notice from Microsoft two months ago, then whose fault is that? Anderson said.

Alan Woodward, a visiting professor of computing at the University of Surrey, said the attacks success was likely to be because some organisations have either not applied the patch released by Microsoft, or they are using outdated operating systems.

NHS Digital said on Friday night it was unable to comment on the suggestion.

Marco Cover, a systems security researcher, said critics should take into account the complexity of keeping systems up to date. Its easy to blame people who dont upgrade, he said. But in practice things are often more complicated: operations teams may not touch legacy systems for a number of reasons. In some cases they may even be unaware that such legacy systems are running in their infrastructure.

The same malicious software that hit NHS networks attacked some of the largest companies in Spain and Portugal, including phone company Telefnica, and has also been detected on computers in Russia, Ukraine and Taiwan among other countries. The international shipping company FedEx was also affected.

Kaspersky Lab, a cybersecurity company based in Moscow, estimated that 45,000 attacks had been carried out in 99 countries, mostly in Russia. In a blogpost, it added that the totals could be much, much higher.

In the UK, computers in hospitals and GP surgeries simultaneously received a pop-up message demanding a ransom in exchange for access to the PCs.

A warning was circulated on Friday within at least one NHS trust of a serious ransomware threat currently in circulation throughout the NHS, but the attack proved impossible to stop. Patient records, appointment schedules, internal phone lines and emails were rendered inaccessible and connections between computers and medical equipment were brought down. Staff were forced to turn to pen and paper and to use their own mobile phones.

Last year the government established the NCSC to spearhead the countrys defences. In the three months after the centre was launched, there were 188 high-level attacks as well as countless lower-level incidents. The chancellor, Philip Hammond, disclosed in February that the NCSC had blocked 34,550 potential attacks targeting UK government departments and members of the public in six months.

Play Video

Theresa May: ‘This is not targeted at the NHS, its an international attack’ video

The Patients Association condemned the criminals behind Fridays attack, and said lessons from earlier incidents had not been learned. It has long been known that the NHS struggles with IT in multiple respects and that this includes serious security problems, it said.

Infected computers show a message demanding a $300 (233) ransom per machine to be paid to a Bitcoin wallet address. It says: Many of your documents, photos, videos, databases and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service.

You only have three days to submit the payment. After that the price will be doubled. Also if you dont pay in seven days, you wont be able to recover your files forever.

NHS Digital confirmed that a number of NHS organisations had been affected and refused to confirm or deny reports that put the total as high as 40. The investigation is at an early stage but we believe the malware variant is Wanna Decryptor, it said. At this stage, we do not have any evidence that patient data has been accessed. We will continue to work with affected organisations to confirm this.

NHS Digital is working closely with the National Cyber Security Centre, the Department of Health and NHS England to support affected organisations and to recommend appropriate mitigations.

British law enforcement agencies said they believed the attack was criminal in nature, as opposed to a cyber-attack by a foreign power, and was being treated as serious but without national security implications.

One NHS worker, who asked to remain anonymous, said the attack began at about 12.30pm and appeared to have been the result of phishing. The computers were affected after someone opened an email attachment. We get a lot of spam and it looks like something was sent to all the trusts in the country. Other hospitals have now been warned not to open these emails all trusts communicate with each other.

Another NHS worker, who works at an Essex hospital and also asked to remain anonymous, said her teams computers went down at about 2pm. We were told to shut down, take out network cables and unplug the phones, she said. A message came up for just one of our team about the fact that all the files would be wiped in two hours unless we gave $300 in bitcoins.

Dr Chris Mimnagh, a GP in Liverpool, said his surgery had severed links to the wider NHS network as a precaution. He said: Unable to access our clinical system as a precaution our area has severed links to the wider NHS, which means no access to our national systems, no computers means no records, no prescriptions, no results. We are dealing with urgent problems only. Our patients are being very understanding so far.

Lorina Nash, 46, from Hertfordshire, was bringing her mother for an appointment at Lister hospital in Stevenage when systems went down. We have been here since 12.30pm and the computers were affected at about 12pm patients are still waiting around but most of the A&E patients have been sent to other hospitals. I have never seen accident and emergency so empty.

They gave my mum a blood test but have had to send her blood to Cambridge by courier for testing. They said it could take two or three hours before it comes back with a result.

Dr Asif Munaf, a gastroenterologist at Chesterfield hospital, said there was a backlog of patients in its A&E, which he said had been badly affected because it was unable to book new patients on the system.

From my wards point of view, were not able to make referrals to, for example, psychiatry because they use a different system to us, he said. Everythings getting delayed. Patients who were supposed to go home this afternoon wont go home until Monday because they now wont be seen and get a follow-up plan. Its quite unfortunate for the patients.

Dr Christopher Richardson, the head of the cybersecurity unit at Bournemouth University, said the process of recovering the NHSs IT systems would involve a painful and longwinded deep strip of affected computers.

You go down to the basic machine, you take everything off it, you reconfigure it and then you build it back up again, he said. If youre talking national health, youre talking a lot of machines on a single site and youve got to get them all because these nasty pieces of malware, they float around, so they only have to remain on one machine and when you reboot it will deliver the same thing again.

Additional reporting by Sam Jones in Madrid

Read more: www.theguardian.com

Sixty free lectures from Princeton on bitcoin and cryptocurrencies. Total season 13 hr 20 min. Links in berth.

This video series is available with their home communities and some assignments on Coursera . For extra creddit the professors wrote a book to go with the course. Free pre-release pdf ,~ ATAGEND Amazon hardcover and digital ,~ ATAGEND as well as Chinese ,~ ATAGEND and Japanese translations.

Enjoy 🙂

Intro to Crypto and Cryptocurrencies

1. 0 Welcome – 2 mins
1. 1 Cryptographic Hash Functions – 18 mins
1. 2 Hash Needle and Data Structures – 8 mins
1. 3 Digital Signatures – 9 mins
1. 4 Public Keys as Identities – 5 mins
1. 5 A Simple Cryptocurrency – 14 mins

How Bitcoin Achieves Decentralization

2. 1 Centralization vs. Decentralization – 4 mins
2. 2 Distributed Conesensus – 13 mins
2. 3 Consensus Without Identity: the Blockchain – 17 mins
2. 4 Motivations and Proof of Work – 19 mins
2. 5 Putting It All Together – 18 mins

Mechanics of Bitcoin

3. 1 Bitcoin Transactions – 11 mins
3. 2 Bitcoin Scripts – 15 mins
3. 3 Applications of Bitcoin Scripts – 14 mins
3. 4 Bitcoin Blocks – 5 mins
3. 5 The Bitcoin Network – 18 mins
3. 6 Limitations& Improvements – 11 mins

How to Store and Use Bitcoin

4. 1 How to Accumulate and Use Bitcoins – 6 mins
4. 2 Hot and Cold Storage – 13 mins
4. 3 Splitting and Sharing Keys – 11 mins
4. 4 Online Billfold and Exchanges – 19 mins
4. 5 Payment Service – 8 mins
4. 6 Transaction Fees – 5 mins
4. 7 Currency Exchange Markets – 16 mins

Bitcoin Mining

5. 1 The Task of Bitcoin Miners – 10 mins
5. 2 Mining Hardware – 23 mins
5. 3 Energy Consumption& Ecology – 14 mins
5. 4 Mining Pools – 14 mins
5. 5 Quarrying Incentives and Strategies – 23 mins

Bitcoin and Anonymity

6. 1 Anonymity Basics – 26 mins
6. 2 How to De-anonymize Bitcoin – 18 mins
6. 3 Mingling – 21 mins
6. 4 Decentralized Mixing – 14 mins
6. 5 Zerocoin and Zerocash – 19 mins
6. 6 Tor and the Silk Road – 11 mins

Community, Politics, and Regulation

7. 1 Consensus in Bitcoin – 6 mins
7. 2 Bitcoin Core Software – 10 mins
7. 3 Stakeholders: Who’s in Charge – 9 mins
7. 4 Roots of Bitcoin – 9 mins
7. 5 Governments Notice Bitcoin – 9 mins
7. 6 Anti Money-Laundering – 5 mins
7. 7 Regulation – 11 mins
7. 8 New York’s BitLicense Proposal – 10 mins

Alternative Mining Puzzles

8. 1 Essential Puzzle Requirements – 5 mins
8. 2 ASIC Resistant Puzzles – 13 mins
8. 3 Proof-of-useful-work – 9 mins
8. 4 Nonoutsourceable Puzzles – 7
8. 5 Proof-of-Stake “Virtual Mining” – 8 mins

Bitcoin as a Platform

9. 1 Bitcoin as an Append-Only Log – 16 mins
9. 2 Bitcoin as Smart Property – 16 mins
9. 3 Secure Multi-Party Lotteries in Bitcoin – 10 mins
9. 4 Bitcoin as Randomness Source – 18 mins
9. 5 Prediction Markets& Real-World Data Feeds – 23 mins

Altcoins and the Cryptocurrency Ecosystem

10. 1 Short Biography of Altcoins – 21 mins
10. 2 Interaction Between Bitcoin and Altcoins – 15 mins
10. 3 Lifecycle of an Altcoin – 15 mins
10. 4 Bitcoin-Backed Altcoins, “Side Chains” – 11 mins

The Fututre of Bitcoin?

11. 1 The Blockchain as a Vehicle for Decentralization – 14 mins
11. 2 Road to Blockchain Integration – 28 mins
11. 3 What Can We Decentralize? – 24 mins
11. 4 When is Decentralization a Good Idea? – 16 mins

Read more: www.reddit.com

What the ATF does—and doesn’t—tell us about guns in America

In the wake of the horrific mass shooting in Las Vegas on Oct. 1—the deadliest in modern American history—the country’s attention has turned to the ecosystem of firearms and accessories that permeate the United States.

Stephen Paddock, the 64-year-old who opened fire on a country music festival from the 32nd floor of the Mandalay Bay Casino, killed 59 people and wounded more than 500. To do so, he brought with him an arsenal of more than 20 firearms, and he reportedly used an accessory known as a bump-stock, which boosts the firing rate of semi-automatic weapons to 400 to 800 rounds per minute—automatic levels.

The National Rifle Association (NRA) and the Trump administration placed the blame for Paddock’s access to bump-stock devices on the Obama administration; the NRA suggested greater regulation of these devices. So, what information does the federal government make public about firearms in the United States?

The Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) is the government agency that tracks firearms-related crimes and regulates the gun industry. While firearms laws vary from state to state (and even city to city), the ATF maintains a storehouse of information on gun ownership, crimes, manufacturing, and imports in the United States.

Among this information is significant data on seized firearms. For instance, the average “time-to-crime” ratio, or the amount of time between when a firearm is purchased and when a crime is committed with that weapon, was 9.79 years in 2016. Most states’ data hovers around that mark, although the time-to-crime ratio in Guam and the Northern Mariana Islands is 20.97 years.

Illustration by Jason Reed (Fair Use)

Click image to see full-size version

You can also find out the average age of the people who purchased the firearms that have been seized. The national average is 35 years, but in Wyoming, the average age is 44. And in California, 740 firearms were traced to someone age 17 or younger.

Illustration by Jason Reed (Fair Use)

Click image to see full-size version

The ATF also maintains more general data about firearms through its Annual Firearms Manufacturing and Exportation Report (AFMER). In 2015, 3,557,199 pistols, 3,691,799 rifles, 885,259 revolvers, 777,273 shotguns, and 447,131 miscellaneous firearms (which include pistol grip firearms, starter guns, and firearm frames and receivers), were manufactured in the U.S., for a total of 9,358,661 firearms. This excludes firearms manufactured for military use and is more than triple the amount manufactured in 1986, the earliest available data. It’s almost double the amount manufactured since 1994, when Congress passed the federal assault weapons ban, which expired in 2004.

In 2015, the U.S. exported 343,456 of those firearms, a number which has remained relatively steady since 1986. (Total exports spiked at 431,204 in 1993 and bottomed out at 139,920 in 2004). The AFMER does not state where the firearms are exported to, however.

In addition to the more than 9 million firearms manufactured in 2015, the U.S. imported 3,390,211 firearms that year, and 5,137,771 in 2016. This includes imports for military use, although that appears to be a fraction of the import usage.

Imported firearms come from at least 23 countries, including the Philippines, Romania, and Brazil. The U.S. imported 1,318,204 handguns from Austria, 335,190 shotguns from Turkey, and 149,091 shotguns from China. (Sporting shotguns are excluded from the firearms import embargo levied against China in 1994.) And citizens can import firearms from countries like Sudan, North Korea and Iran, provided they were manufactured before firearms imports were enacted on those respective countries, and provided the firearms have been outside of the countries for at least five years.

Certain types of firearms, like machine guns, rifles, and shotguns, have to be registered under the National Firearms Act (NFA). As of April of this year, 630,019 machine guns have been registered in the U.S.; 52,965 of those are in Connecticut. Most of these likely belong to manufacturers and dealers since the Firearm Owners Protection Act bars civilians from owning fully automatic weapons (like machine guns) made after 1986.

But aside from some overarching federal laws, gun laws vary wildly across the country. For example, Nevada does not require a permit to purchase most firearms, nor does it require registration with the police or other entity. You don’t have to have a license to own a firearm, either. Texas and Utah don’t require registration or licensing. California has some of the strictest gun laws, according to the Law Center to Prevent Gun Violence.

The ATF’s data doesn’t show nearly the full picture of gun ownership in America; considering the fact that many states don’t even require gun owners to register their weapons, how could it? Although there seems to be some movement to legislate gun accessories like bump stocks in the wake of the Las Vegas shooting, it’s unlikely that comprehensive gun reform is on the horizon.

Read more:

I can’t stress this enough. Use an offline pocketbook to store your Bitcoins !!!

With the most recent “security breach” at NiceHash, I can’t emphasize it enough:


If you don’t ensure your keys, your coins are at risk!

For all of you newcomers to Bitcoin, I wanted to share my pour so you can understand how to protect your crypto currency.

I personally use GDAX **( https :// www.gdax.com) as my exchange of views among selection, but I do not store numerous coins with them. I have a program, that if my exchange wallet funds top $2000 USD, I transfer them to an offline hardware wallet.

My hardware wallet of pick is the Ledger Nano S( LNS)( https :// www.ledgerwallet.com/ makes/ ledger-nano-s)( https :// trezor.io / is another reputable option ). For those of you that are considering a LNS, when setting it up, I urge you to test your seed prior to any significant copper transport. When I initially acquired the LNS, I determine it up and entered my 24 text seed. I then moved a small amount (~ 5 USD) of coin to the LNS. Once it was completely received and verified, I reset the machine and rebuilt it applying the seed statements. I am glad I did this, because the first time I did it, the seed I recorded was wrong. Luckily, I merely misplaced~ 5 USD. The second era, it acted and I was able to fully restore the device.

I would also encourage you to memorize your seed or at the least storage the hand written document of it in a safe or safety deposit box as anyone with the seed can access your funds. Never enter your seed statements into a internet connected invention. Even precisely typing it into a text editor to print it off is poor because someone could be observing your devices keystrokes. I would also highly recommend mounting a pin on your LNS to protect it in the case it is stolen.

If the LNS is ever stolen or lost, your monies can be restored as long as you have a bolt setup( to keep parties out of the old-fashioned machine) and you know your seed words.

This is my approach. Some might call me a little bit over the top or paranoid, but it is news like the NiceHash “security breach” that builds me appreciate the approaching I have put in place.

** Revise: After some recent developments, I have decided that GDAX/ Coinbase is not longer a trustworthy and reputable companionship. I have changed my personal Bitcoin exchange preference to https :// Gemini.com.

Read more: