Phishing dating

An email phishing campaign that uses adult dating as a lure has targeted thousands of students across several U.S. universities to install a Trojan horse virus on their devices, according to a cybersecurity research group. The campaign, which was discovered by the cybersecurity company Proofpoint, has delivered more than 150,000 messages across ... This article was co-authored by Maya Diamond, MA.Maya Diamond is a Dating and Relationship Coach in Berkeley, CA. She has 11 years of experience helping singles stuck in frustrating dating patterns find internal security, heal their past, and create healthy, loving, and lasting partnerships. Fishing Dating is part of the dating network, which includes many other general and fishing dating sites. As a member of Fishing Dating, your profile will automatically be shown on related fishing dating sites or to related users in the network at no additional charge. For more information on how this works, click here. In our online dating survey, 12 percent of people say they were conned. Always phishing your dating and account information private. Stop all contact immediately and report the matter phishing the dating site. Trust dating instincts and immediately stop communicating with anyone who makes you feel uncomfortable or apprehensive. The Internet is an addictive world due to its unlimited and lucrative opportunities for people from almost every facet of life. Some use the Internet to make money, some use it to keep in touch with their loved ones, and some to find love – and then there are those who use it for nefarious deeds such the use of this medium to carry out online dating scams against those hoping to find that ... Online dating scams are unfortunately still prevalent and impact thousands of people. In 2018, the FBI received 351,937 romance scam complaints.It’s no secret that there are deceptive people online who want to take advantage of vulnerable and lonely individuals — and they see singles on dating sites as easy targets. 1. Keep Informed About Phishing Techniques – New phishing scams are being developed all the time. Without staying on top of these new phishing techniques, you could inadvertently fall prey to one. Keep your eyes peeled for news about new phishing scams. This website earns a commission on products referred to readers. We are part of the Amazon Associates and other affiliate programs. These commissions do not affect our reviews or recommendations, but they do help us keep the site running. Dating and romance scams often take place through online dating websites, but scammers may also use social media or email to make contact. They have even been known to telephone their victims as a first introduction. These scams are also known as ‘catfishing’. The following are some of the reasons why you could be getting spam emails from dating sites: 1. You knowingly or unknowingly signed up for it; 2. Phishing attack 3. The sender purchased an email list that has your email address The following are some of the things you can try to stop such emails: 1. Use Spam Filters 2.

World of Spam: Post funny spam emails here!

2015.03.10 00:32 webbannana World of Spam: Post funny spam emails here!

World of Spam ------------ Post funny spam emails here! Be it poorly spelt phishing emails, or invitations to fake dating sites, this is the place to post them.
[link]


2020.09.18 13:16 abuki_45 [MISC] For those of you who are wondering How to prevent hackers from stealing your account? Why people cover their gems? Questions answered

Discription: Every information I got is from a former class mate account phisher who told me everything after his account got banned due to a failed phishing attempt good for me he finally got caught before stealing my account.
First of all, to be clear there is no such thing as a clash of clans hacker that bypass supercell security system and steal peoples account, Every account hacker (Lets use the word phisher) use one technique to steal peoples account and that's HELP AND SUPPORT village recovery team
If you are wondering how they do it they are two techniques
The first technique is used to phish dead base it's simple they easily report to the support team that they has lost their account and they want it back and supercell asks questions about the account(I will tell you what kind of questions are below)
The second technique is used against active people and it's done by the phisher reporting losing his phone with its account to the support team and if he answers the question right he will steal your account I will explain everything below.....
Questions supercell asks👇
  1. Name
2.Th level
  1. Xp level
  2. Player tag
This questions are to identify the account they are not the main concern here But the main determining questions are listed below from 1-6 You should avoid sharing them.
To prevent phishers from stealing your account you should avoid sharing this information to anyone ⚠️
  1. Don't tell anyone even your close friends about your current and previous device name (The one you play clash of clash on)
E.g (Current iPhone xr and previous Samsung galaxy note 7) Don't share this ❌
  1. Your previous clash of clans name
E.g (Current name Alexander previous name john) Don't share this ❌
  1. Your current gem count
E.g (1787) Don't share this ❌
  1. Account creation date
E.g (February 14 2015) Don't share this ❌
  1. Magic items in the townhall
E.g (2 training potion and 1 hammer of fighting) Don't share this ❌
  1. The country you created your account on and the one you currently live in
E.g (Created my account on Oslo,Norway currently living in California, Usa) Don't share this ❌
Avoid sharing this information for anyone because these are the questions supercell ask to verify the account owner identity
I hope supercell changes this account verification system to another more secure one 🙏
Share to any clasher you know to prevent account loss!
submitted by abuki_45 to ClashOfClans [link] [comments]


2020.09.17 09:24 removalbot 09-17 07:24 - 'What do to about suspicious car accident claim?' (self.unitedkingdom) by /u/Chocokat1 removed from /r/unitedkingdom within 429-439min

'''
The police force from another area to where I live, randomly sent me a letter wanting information about who was driving my car as they believe it was involved in a car accident on a certain date, time and place - but neither me nor my car where ever there!! Now I discover that my car insurer has also contacted me (via email) about this, saying that someone claims to have been involved in a car accident and they say its my fault! Even sent me a claims form. I had spent a couple days trying to verify the authenticity of the police letter and the officer in question, as it was totally out of the blue and a shock to the system. Was worried it was a nrw phishing scam. My work can verify where I was, and I had someone with me the entire day.
What the hell is going on, and what do I do/where to get advice? Has this happened to anyone else?
'''
What do to about suspicious car accident claim?
Go1dfish undelete link
unreddit undelete link
Author: Chocokat1
submitted by removalbot to removalbot [link] [comments]


2020.09.17 02:27 Chocokat1 What to do about suspicious car accident claim?

Hi. Sorry not sure which flair is most suitable. I live in England.
The police force from another area to where I live, randomly sent me a letter wanting information about who was driving my car as they believe it was involved in a car accident on a certain date, time and place - but neither me nor my car where ever there!! Now I discover that my car insurer has also contacted me (via email) about this, saying that someone claims to have been involved in a car accident and they say its my fault! Even sent me a claims form. I had spent a couple days trying to verify the authenticity of the police letter and the officer in question, as it was totally out of the blue and a shock to the system. Was worried it was a new phishing scam. My work can verify where I was, and I had someone with me the entire day.
Can anyone advise me please? I'm really stressed out about this.
Edit: missed this out as typed this post late last night. The cover letter is dated 16.08.2020, yet the officer didn't date and sign it off until the 07.09.2020.
submitted by Chocokat1 to LegalAdviceUK [link] [comments]


2020.09.16 06:55 HeavyArmsJin Private data gone public: Razer leaks 100,000+ gamers’ personal info

Private data gone public: Razer leaks 100,000+ gamers’ personal info
https://arstechnica.com/information-technology/2020/09/100000-razer-users-data-leaked-due-to-misconfigured-elasticsearch/
COPY AND PASTED (Full Article in link):
In August, security researcher Volodymyr Diachenko discovered a misconfigured Elasticsearch cluster, owned by gaming hardware vendor Razer, exposing customers' PII (Personal Identifiable Information).
The cluster contained records of customer orders and included information such as item purchased, customer email, customer (physical) address, phone number, and so forth—basically, everything you'd expect to see from a credit card transaction, although not the credit card numbers themselves. The Elasticseach cluster was not only exposed to the public, it was indexed by public search engines.
Diachenko reported the misconfigured cluster—which contained roughly 100,000 users' data—to Razer immediately, but the report bounced from support rep to support rep for over three weeks before being fixed.

This redacted sample record from the leaked Elasticsearch data shows someone's June 24 purchase of a $2,600 gaming laptop.
Razer offered the following public statement concerning the leak:
We were made aware by Mr. Volodymyr of a server misconfiguration that potentially exposed order details, customer and shipping information. No other sensitive data such as credit card numbers or passwords was exposed.
The server misconfiguration has been fixed on 9 Sept, prior to the lapse being made public.
We would like to thank you, sincerely apologize for the lapse and have taken all necessary steps to fix the issue as well as conduct a thorough review of our IT security and systems. We remain committed to ensure the digital safety and security of all our customers.

Why leaks like this matter:
It's easy to respond dismissively to data leaks like this. The information exposed by Razer's misconfigured Elastisearch cluster is private—but unlike similar data exposed in the Ashley Madison breach five years ago, the purchases involved are probably not going to end anyone's marriage. There are no passwords in the transaction data leaked, either.
But leaks like this do matter. Attackers can and do use data like that leaked here to heighten the effectiveness of phishing scams. Armed with accurate details of customers' recent orders and physical and email addresses, attackers have a good shot at impersonating Razer employees and social engineering those customers into giving up passwords and/or credit card details.
In addition to the usual email phishing scenario—a message that looks like official communication from Razer, along with a link to a fake login page—attackers might cherry-pick the leaked database for high-value transactions and call those customers by phone. "Hello, $your_name, I'm calling from Razer. You ordered a Razer Blade 15 Base Edition at $2,599.99 on $order_date..." is an effective lead-in to fraudulently getting the customer's actual credit card number on the same call.
submitted by HeavyArmsJin to singapore [link] [comments]


2020.09.14 14:27 rusticgorilla Lost in the Sauce: GOP source has been a Russian agent for a decade

Welcome to Lost in the Sauce, keeping you caught up on political and legal news that often gets buried in distractions and theater… or a global health crisis.
Housekeeping:

GOP source is Russian agent

The Treasury Department announced new sanctions against Andriy Derkach, a Ukrainian lawmaker, accusing him of being an "active Russian agent" who is part of Moscow's interference in the 2020 campaign. Derkach has been actively promoting discredited anti-Biden materials for many months, including meeting with Trump’s lawyer Rudy Giuliani to hand over disinformation (picture).
Between May and July 2020, Derkach released edited audio tapes and other unsupported information with the intent to discredit U.S. officials, and he levied unsubstantiated allegations against U.S. and international political figures
These tapes were laundered through Giuliani to OANN, the Senate Homeland Security Committee (via Chairman Sen. Ron Johnson), Don Jr., and the president himself.
Senate Finance Committee Ranking Member Ron Wyden (D-OR) called out Sen. Johnson and Sen. Chuck Grassley (Chair of Senate Finance Cmte.) for collaborating with Derkach:
Derkach has been central in advancing the Russian disinformation that underpins Senate Republicans’ effort to smear Vice President Biden. For example, in April, the Republican chairmen of the Homeland Security & Governmental Affairs and Finance Committees requested information about purported calls between Vice President Biden and Ukrainian officials. Then in May edited excerpts of those same calls involving Biden were leaked by Derkach and Andrii Telizhenko, the Senate Republicans’ star witness.
...Senate investigations should not parrot conspiracy theories pushed by Russian agents under U.S. sanctions, and Senate Republicans should immediately abandon this blatantly political effort.

DHS Whistleblower

Last week, the House Intelligence Committee released a whistleblower complaint made by former acting Under Secretary of Homeland Security for Intelligence and Analysis Brian Murphy. Chairman Adam Schiff released a statement saying the complaint “outlines grave and disturbing allegations that senior White House and Department of Homeland Security officials improperly sought to politicize, manipulate, and censor intelligence in order to benefit President Trump politically.”

On Russia

Page 10: Mr. Murphy made several protected disclosures between March 2018 and August 2020 regarding a repeated pattern of abuse of authority, attempted censorship of intelligence analysis and improper administration of an intelligence program related to Russian efforts to influence and undermine United States interests. The relevant officials at issue were Secretary Nielsen and Messrs. Wolf, Cuccinelli, Taylor, and Acting Deputy Director for the Office of the Director of National Intelligence, Kash Patel (“Mr. Patel”).
In May 2020, Acting Homeland Security Secretary Chad Wolf told Murphy to “cease providing intelligence assessments on the threat of Russian interference in the United States, and instead start reporting on interference activities by China and Iran.” Wolf told Murphy those instructions came directly from White House national security adviser Robert O’Brien, according to Murphy, who said he refused to comply because “doing so would put the country in substantial and specific danger.”
In July 2020, DHS chief of staff John Gountanis intervened to stop publication of an intelligence bulletin warning about a Russian disinformation plot to “denigrate” the mental health of Joe Biden. On July 8, Murphy said, he met with Wolf, who told him that the intelligence notification should be “held” because it “made the President look bad.” After Murphy protested, Wolf excluded him from meetings about the notification, a draft of which was ultimately produced that Murphy felt minimized the actions of Russia.
The complaint details dozens of instances in which Murphy told his superiors about the abuses of power and political interference. The complaints either went nowhere or resulted in perceived retaliatory actions against Murphy. Many of these complaints were given to Kash Patel, former staffer to Rep. Devin Nunes (R-CA), who played a key role in a Republican effort to discredit Mueller’s and the FBI’s Russia probes.
  • Related: NSC’s top legislative affairs official, Virginia Boney, was removed and sent to the Commerce Department earlier this year because she kept pressing the White House to prioritize election security efforts — and specifically the threat posed by Russia. To date, there have been no traditional NSC Principals Committee meetings — with senior Cabinet officials and the president — on the subject of Russian interference this year.

On white supremacy

Page 14: During multiple meetings between the end of May 2020 and July 31, 2020, Mr. Murphy made protected disclosures to Messrs. Wolf and Cuccinelli regarding abuse of authority and improper administration of an intelligence program with respect to intelligence information on ANTIFA and “anarchist” groups operating throughout the United States.
Murphy alleges that Senior Official Performing the Duties of the Deputy Secretary Ken Cuccinelli ordered him to modify intelligence assessments to make the threat of white supremacy “appear less severe” and include information on violent “left-wing” groups and Antifa. The reason given was “to ensure they matched up with the public comments by President Trump on the subject of ANTIFA and ‘anarchist’ groups.”
After Murphy refused to change a draft report warning of the threat posed by White supremacists, Wolf and Cuccinelli reportedly stopped the report from being finished.

On immigration and asylum

In Dec. 2019, Cuccinelli expressed frustration with intelligence reports detailing conditions in Guatemala, Honduras, and El Salvador, and accused "deep-state intelligence analysts" of compiling the information to undermine Trump's objectives regarding asylum.
Page 9: The intelligence reports were designed to help asylum officers render better determinations regarding their legal standards… Mr. Murphy defended the work in the reports, but Mr. Cuccinelli stated he wanted changes to the information outlining high levels of corruption, violence, and poor economic conditions in the three respective countries...
Mr. Cuccinelli ordered Messrs. Murphy and [former I&A Under Secretary David] Glawe to identify the names of the “deep state” individuals who compiled the intelligence reports and to either fire or reassign them immediately.
Murphy also alleges that DHS gave false information to Congress last year about the numbers of suspected terrorists crossing the southern border. At the time, administration officials were repeating a 4,000 figure in an effort to justify the government shutdown over Trump's border wall. The true number was actually six. A DHS spokeswoman pressured NBC to take down a story exposing the lie last year.

Response

Chairman Schiff has subpoenaed Murphy to testify before the Intelligence Cmte. on September 21. The Cmte. also seeks to interview high-level DHS officials including Matthew Hanna, chief of staff in Murphy's former post at DHS' Office of Intelligence and Analysis; the office's top official, Horace Jen; DHS chief of staff John Gountanis; and his deputy, Tyler Houlton.
The Senate Intelligence Cmte. issued a bipartisan request for all of the intelligence analyses that Murphy referenced in his complaint, as well as any notes and materials that fed into them. The House Homeland Security Cmte. issued a subpoena for testimony from Wolf at a hearing on Sept. 17, but DHS says that Wolf will not comply and offers Cuccinelli to testify instead. Also scheduled to be at the hearing: FBI Director Christopher Wray and Christopher Miller of the National Counterterrorism Center.

Russia still interfering

Facebook recently took down accounts and pages associated with a Russian influence operation posing as an independent news outlet. The operation published content described as “an attempt to build a left-wing audience and steer it away from Biden’s campaign, in the same way that the original IRA [Internet Research Agency] tried to depress progressive and minority support for Hillary Clinton in 2016.”
  • The same Russian operation tried and failed to infiltrate left-wing media outlets such as Jacobin, Truthout, and In These Times.
Bob Woodward reported that“the NSA and CIA have classified evidence the Russians had placed malware in the election registration systems of at least two Florida counties, St. Lucie and Washington. While there was no evidence the malware had been activated, Woodward writes, it was sophisticated and could erase voters in specific districts.”
  • Woodward’s book also notes that former director of national intelligence Dan Coats has "deep suspicions" that Russian President Vladimir Putin "had something" on President Trump, seeing "no other explanation" for the president's behavior.
Microsoft alerted SKDKnickerbocker, one of Biden’s main election campaign advisory firms, that suspected Russian state-backed hackers had gone after the company with a failed phishing attack.

DOJ, politicization, and resignations

A top aide to Connecticut U.S. Attorney John Durham, federal prosecutor Nora Dennehy, resigned from the Justice Department and Durham’s investigation into the origins of the Russia probe. Dannehy reportedly resigned “at least partly out of concern” that Trump and AG Barr were exerting improper political pressure on the team to release results before the November election.
Several officials said expectations had been growing in the White House and Congress that Mr. Barr would make public, ahead of the election, some kind of interim report or list of findings from Mr. Durham before he completed the investigation. Mr. Barr had wanted Mr. Durham’s team to move quickly, according to a person familiar with the matter.
Trump has publicly expressed impatience with the Durham investigation, saying there should be more prosecutions and disclosures of information that would damage his political rivals. “Bill Barr has the chance to be the greatest of all time, but if he wants to be politically correct, he’ll be just another guy, because he knows all the answers, he knows what they have, and it goes right to Obama and it goes right to Biden,” Trump said (clip).
Last month, Barr predicted “significant developments in the probe before the election” (clip) and he indicated the DOJ would not respect an informal policy against taking investigative steps 60 days before Election Day. It was for this exact reason that the Trump administration claimed it fired former FBI Director James Comey.
On Tuesday’s Fox News, White House Chief of Staff Mark Meadows appeared to claim that he has seen documents—relevant to U.S. Attorney John Durham’s probe of the origins of the Russia investigation—which implicate several Trump and Obama administration officials in potentially illegal conduct.
  • Further reading: “Dannehy Resignation Confirms Barr’s Intent to Use Durham Probe for Political Ends,” Just Security.
Two other DOJ officials resigned last week:
Prosecutor John Choi resigned from Trump's law enforcement commission after expressing "serious" concerns that the intention of the commission was not to bridge the gap between communities of color and law enforcement.
Choi, a Democrat, said in his resignation letter that "it is now patently obvious ... that this process had no intention of engaging in a thoughtful and open analysis, but was intent on providing cover for a predetermined agenda that ignores the lessons of the past, furthering failed tough-on-crime policies that led to our current mass incarceration crisis and fueling divisions between our communities and our police officers."
Deputy Assistant AG David Morrell resigned on Friday, withdrawing from cases defending the government’s position on issues including the Census and the Portland protests.

The courts

A three-judge panel blocked the Trump administration from excluding undocumented immigrants from being counted in the census for apportionment. Trump’s order violates a statue saying apportionment must be based on everyone who is a resident of the United States.
District Judge Lucy Koh ordered the Trump admin. to produce internal documents connected to its sudden decision to end the 2020 Census count a month earlier. Two weeks ago, Koh temporarily blocked the bureau from winding down the count until a hearing set for Sept. 17.
Court-appointed adviser and retired judge John Gleeson slammed the Justice Department’s decision to drop the case against Michael Flynn, calling it a "corrupt and politically motivated favor.” A hearing on the matter is scheduled for Sept. 29.
"In the United States, Presidents do not orchestrate pressure campaigns to get the Justice Department to drop charges against defendants who have pleaded guilty -- twice, before two different judges -- and whose guilt is obvious," Gleeson wrote.
"Yet that is exactly what has unfolded here," he added.
A judge denied a bid to dismiss a lawsuit alleging that Trump's inaugural committee and the Trump Organization misused nonprofit funds to enrich the president's family business. The suit, brought by Washington, D.C., Attorney General Karl Racine in January, alleges that the president's inaugural committee was aware that it was being overcharged for services at Trump's Washington hotel in 2017 and still spent over $1 million at the hotel.
The U.S. Department of the Treasury’s Office of Foreign Assets Control announced two settlements totaling $583,100 with Deutsche Bank to resolve investigations into violations of Ukraine-related sanctions. The resolution came as the bank hired “an old friend” of AG Barr to “help the bank navigate the political waters in Washington.”

Trump profiting

Federal spending records show that taxpayers have paid Trump’s businesses more than $900,000 since he took office. At least $570,000 came as a result of the president’s travel.
In addition to the rentals at Mar-a-Lago, the documents show that the Trump Organization charged daily “resort fees” to Secret Service agents guarding Vice President Pence in Las Vegas and in another instance asked agents to pay a $1,300 “furniture removal charge” during a presidential visit to a Trump resort in Scotland.
Additionally, the Trump Organization has received at least $3.8 million in fees from GOP groups for headlining a political event at one of his properties.
Last month, the Trump Organization received approval for a new trademark in Argentina, the third one in the country. Last November, Trump may have altered U.S. foreign policy to assist his company in obtaining approval for the two previous trademarks. “Shortly after the trademark opposition period ended in April 2018, the Trump administration lifted tariffs on steel and aluminum in Argentina. Once the trademarks were officially granted to his company in November of last year, Trump announced that he would reinstate the tariffs.”
Somehow, Ivanka Trump’s fashion business is still making money despite being shutdown. According to her latest financial disclosures, “All operations of the business ceased on July 31, 2018.” Also according to her latest financial disclosures, she made at least six figures from the trust holding that business in 2019.
We - American taxpayers - footed the bill for “anti-scale fencing” along the perimeter of the White House this summer. The wall, ostensibly to protect Trump from protesters, cost over $1 million. Trump has a history of charging taxpayers for barriers around his properties, including $17,000 for fencing around Mar-a-Lago and $12,000 for “privacy fencing” around Trump International golf resort.

Immigration news

About 8,800 unaccompanied children have been quickly expelled from the United States along the Mexico border under a pandemic-related measure that effectively ended asylum. In total, the Trump administration has expelled more than 159,000 people since March.
ICE officers on the West Coast wanted to suppress Black Lives Matter protests in DC. But they aren't allowed to travel on charter flights without detainees on board. So they brought some detainees with them. In the process, they fueled a massive, deadly COVID outbreak at the Virginia facility that infected over 300 detainees, killing one.
The Pentagon is restarting many domestic projects that were plundered by Trump for money to pay for his border wall. The decision to revive these domestic projects has provided cover for Republican senators who were criticized when their home states lost military construction projects to the president’s wall.

Miscellaneous

Corruption: Secretary of State Mike Pompeo is bringing back his extravagant, taxpayer-funded "Madison Dinners."
Corruption: Medicaid chief Seema Verma has charged taxpayers $6 million in less than two years for expensive consultants, organizers, and events. The Republican consultants were paid by the Centers for Medicare and Medicaid Services to work on Verma’s personal image, obtain profiles and coverage from friendly reporters, escort her during travel, write opinion articles, and even draft her Twitter posts.
Corruption: The Trump administration secretly withheld millions of dollars from a program for 9/11 first responders.
Corruption: “Ukraine gas company to add Rick Perry pick to board” and “Rick Perry’s Ukrainian Dream
Protests: Trump endorsed the extrajudicial killing of the suspect in a deadly Portland, Oregon, shooting. . “This guy was a violent criminal, and the US Marshals killed him,” Trump told Fox News host Jeanine Pirro. “And I will tell you something, that’s the way it has to be. There has to be retribution” (clip).
Protests: A witness claims that the Portland suspect, Michael Forest Reinoehl, was not armed and was shot by officers without any warning.
Rightwing: “QAnon fans spread fake claims about real fires in Oregon” and “'Do not take action yourselves': Multnomah Co. Sheriff's Office warns of illegal 'checkpoints' ”
Rightwing: Mark Zuckerberg says it's "just wrong" to consider Facebook a right-wing echo chamber driven by conservative voices. But data from his own company shows that’s exactly what Facebook is.
Environment: David Legates, a University of Delaware professor of climatology who has spent much of his career questioning basic tenets of climate science, has been hired for a top position at the National Oceanic and Atmospheric Administration.
Environment: How Big Oil Misled The Public Into Believing Plastic Would Be Recycled. Your plastic will not be recycled.
Environment: Trump’s Fire Sale of Public Lands for Oil and Gas Drillers: The Bureau of Land Management is rushing to auction off sites ahead of a potential Biden presidency.
World: The Iranian government is considering assassinating the US ambassador to South Africa in response to the killing earlier this year of Qassem Soleimani, according to highly classified intel reports. The plot against the ambassador, Lana Marks, is one of several options US officials believe Iran is considering for retaliation over Soleimani’s death.
  • Woodward reported that Sen. Lindsey Graham urged Trump not to assassinate Suleimani while on the golf course with the president. Graham warned Trump he would be raising the stakes from “playing $10 blackjack to $10,000-a-hand blackjack”. “This is over the top,” the senator said. “How about hitting someone a level below Suleimani, which would be much easier for everyone to absorb?”
World: Read some of the “love letters” Kim Jong Un sent to Trump.
World: Woodward also reported that Trump boasted that he protected Saudi Crown Prince Mohammed bin Salman after Jamal Khashoggi's brutal murder. "I saved his ass,” Trump said. “I was able to get Congress to leave him alone. I was able to get them to stop.”
submitted by rusticgorilla to Keep_Track [link] [comments]


2020.09.13 21:18 BloodyPassion Apple devices are being hacked

I'm telling right away - TL;DR - I,m facing unprecedented hacking attack on Apple family of devices and need help. I'm in San Francisco and need someone who can do forensics of my mac mini and help to protect myself from people attacking me.
I'm the owner of 2 Macbooks pro, mac mini, Ipad, Iphone and iwatch, 1 apple id and 3 gmail accounts.
Everything was fine till August 3. Well I was dumb enough to use 3 variants of the same password with all my accounts. Implementing 1password or another password manager I was delaying for quite some time out of laziness I guess. We use lastpass at work and I silently hate it so didn't want to deal with something like that at home. It was an introduction. I'lll try to be as brief and as detailed as I can now.
Some details became a blur because I'm literally on a verge of a nervous breakdown at the moment.
On August 3 all my email accounts including apple id were hacked. Taken over by someone for at least several hours. Among those only 1 account is main, others are secondary, for job search, another for facebook and ebay, and the last one - apple id - for dating sites.
I was able to restore access to my accounts using my phone number within several hours. I work in big tech and our company was attacked by some people who used texting phishing tactics. First I thought it was connected to work and even filed a ticket telling them that my phone is hacked (there was some weird behavior on the phone) but work stuff seemed unaffected and ticket was closed. Hackers also got to my NAS where I has some old movies and frankly lots of porn collected since 2007. NAS wasn't connected, I mean I didn't have access to it because my wifi point went offline and I didn't bother to go to landlords and set it up (we have internet from landlords, one ISP but 2 different networks) but they somehow were able to take the porn library out, not the files but links to them. The stuff was from torrents so I decided ti get rid of the NAS and its contents, moreover I watch porn legally online now, torrents were in the past.
For several weeks it was quiet. Meanwhile I got a membership from Lookout and Lifelock because I had pics of my documents in icloud library: ssn, driver's license, medical insurance cards, Russian passport etc. It was literally an identity theft. Meanwhile Lookout informed me that my credentials were on dark web monthly since January 2020 and my SSN is public information.
As I said, 3 week were quiet. And then it started. All my emails were taken over again. First I found hidden backups of my machines with some video files on my macbook. Tried to delete them using sudo - didn't work, not enough rights. WTF. Then I pulled all the needed info to the cloud and decided to wipe the macbook and install the OS from scratch. Laptop started acting weird fast and I wasn't able to shut it down. Force quit didn't work, fan sounded as if it's a plain and it's going to take off. I had an impression someone controls my machine and erased if from icloud. Well, that's what I thought. Next time when I turned it on, there was a password on a disk. Password that I didn't add. Attempt to log in recovery mode led to grey screen with a passcode which I didn't implement either. After next reboot I discovered firmware password which was removed by Mobile Kangaroo but as for disk they told me to change it, thank god ssd are cheap now. Machine became a brick without a new disk. Apple mac genius bar was able to remove the lost passcode and install the OS only today. Then I had an awful Saturday on September 6th - they almost induced hysteria by taking over my accounts many times during the day. I changed the passwords numerous times before it. I have 2FA, mixed, with sms and authenticator app. But still they were able bypass these steps and changed the passwords to my accounts. I was barely able to take the accounts back but then started thinking that they know what I type as new password and somehow know the 2FA code. It didn't feel right, Apple is so secure. So I switched to iphone - allegedly the most secure device and changed the passwords from it. It seemed to help.Meanwhile it turned out they downloaded the whole archive from my gmail account since 2009 - there is such functionality. And also all my icloud. I have no idea what emails they send and where and what they deleted when they controlled my account. I know nothing about hacking but I had an impression they used safari to go to some websites - such as datadog, howtogeek, appletoolbox and lookout/legal and trendmicro/legal. Btw I have 4 antivirus apps, none of them found anything. Then I installed Little snitch, saw some incoming connections, not sure what it was, and then noticed tht my chrome started having hundreds and then thousands of outgoing connections to different Ipv4 addresses. Packets were rather small though.
Nightmare just started. IT turned out they knew my gmail passwords that I set up from the phone - they just sat quietly and waited for something. My mac mini started showing strange file with extension .prefPane in recents and different system folders in history where I haven't been. Then I finally intalled Google Wifi app and discovered unknown machine with the same name as my mac mini and almost the same mac address. It was sitting on our wifi for a week and downloaded 46gb of data. I have a screenshot, not on this machine unfortunately. I shut down my mac mini and didn't turn it on since then. I started checking my devices and discovered that my work laptop laptop also had some .prefPane files in history and bunch of system folders which I didn't touch. I know almost nothing about macOS structure and can just look at hidden files, that's it. I was more than concerned, told InfoSec at work that something is happenning, had 3 hours conversation with 2 serious men who told me that according to the logs my work machine is safe but personal stuff is probably breached. Judging by the recent files showing up in dropbox, icloud and google drive. Files which I didn't touch t all and many of them have sensitive and confidential information, health-related for example. Right there I decided to implement 1password but with all the craziness and password changing everywhere I saw that it didn't help - they still were able to change the password and take account back to them. Or after I changed the password I saw 4 different devices having access to my gmail account. I changed my laster password several time and after 1password had 21 most important logins and vault with pretty valuable documents - I finally forgot my masterpassword. I remember the words but specil characters in the end are a blur - I was tired and couldn't focus and forgot to write it down. So farewell my stuff in 1 password - unless I find the right combination 1 day. I made a conclusion that they were able to see my screen. Btw they bought apowersoft from my account, I found 1 email they apparently forgot to delete but I didn't find the software on my machines.... Apple support said everything what I say happening is highly unlikely especially on ios devices since they have government level of protection. But I see that with my own eyes... Also there is an army of bluetooth beacons around me, in very residential neighborhood. Many of them are literally near according to BLE Scanner. There is also BlueZ 5.44 device which connected to my Iphone bluetooth without any permission from me. I have no idea for how long. I think that's how hacking started... Then I discovered that my calls and messages were forwarded to bunch of devices which has the same names as mine but there are several mac minis there etc. My google voice had 2 or 3 extra devices to forward to.... Btw who am I - mid level QA engineer who is just studying programming and trying to do some automation at work. My technical level is pretty low. I saved some money since I moved to America. Not a lot, San Francisco is expensive city. I was born and raised in Russia but never had access to any secret info or high ranking persons, no one can be influenced by pressure on me, I'm a regular gay guy who fled from difficult life and persecution of gays in Russia and been living here in SFBA for the last 7 years.... So I'm nobody but I had a feeling there is team with 24/7 surveillance on me - I even thought it's government but government can silently spy on you and the come with subpoena or arrest order. These guys literally torture. Later - more. I definitely notice my ios devices went rogue. Face id stopped working and I had to reset it every time. Today passcode stopped working and I couldn't unlock the phone - had to wipe it using recovery mode. Created 2 wifi networks at home, one already had 2 unknown apple devices, one of the mac addresses is again very similar to mine. The biggest torture of this weekend - untransferable authenticator app where I keep 2FA codes for work and personal stuff. I spent bunch of time on ipad, freshly wiped via roommates mac, adding the codes to new transferrable app and when was about to transfer, they used the encryption function of the app with the password which can't be reset. Authy, I hate you as much as 1password. So all my codes turned out to be locked and useless. I wiped my ipad clean and started from scratch with 2 different apps - one for work, another or personal stuff. You not gonna believe it - they suppressed internet on ipad. It's connected to wifi or mobile spot but there is no internet icon on the upper right and it's not connecting. How is it possible on ios? Then my passcode on apple watch changed by itself before that showing keyboard on my phone 3 times. Then face id stopped working and passcode on my iphone changed. I'm not kidding. It's after I finished collecting 2FA accounts again. So I can't open my phone! The work of a half day went to shit. Then I tried to turn off the passcode on ipad and it didn't work. Some items disappeared from ios menu, for example Siri and Search... I talked to Lifelock - they said they gonna monitor my ssn, name, etc, like they always do. Wrote to Lookout, they answered with phone number where I need to call. Also need to call FTC, number was given by Lifelock. No money disappeared from my accounts, my saving account is restricted, credit bureaus are frozen. I'm afraid with all that info they have about me they want to take over my apple id or just commit cyber crimes on my behalf. I'm scared and don't know what to do, how to protect myself and my devices from everything happening. I can't live normal life for the last 2 weeks. Thank god people were sympathetic at work but my friends din't really believe me saying Apple has high class protection from such shit. But I saw all that with my own eyes. It takes them about couple of days to hack a freshly wiped phone or ipad, and less than several hours - freshly wiped mac. My roomie's apple devices seem to be unaffected despite the fact he downloads tons of torrents. Btw one more thing - on August 13 Lookout informed me that sim card is taken out of my phon despite the phone was in my pocket. On August 22 Lookout sent notification that sim went online. There were couple of calls to ATT on my behalf that I didn't do. All in all I live in hell last 2 weeks and need to get out of this crazy situation. I looked for some cybersecurity firms but they all work with prevention and with corporations, not individuals. Also my facebook was taken over but I announced it hacked and it's blocked now and neither of us can regain access because I have the email and hackers added their phone where they get 2FA which I ned to log in. No one contacted me asking for ransom or anything. I don't understand what's going on. Please help.
submitted by BloodyPassion to u/BloodyPassion [link] [comments]


2020.09.13 13:53 BloodyPassion Attack on apple family of devices happening

I'm telling right away - TL;DR - I,m facing unprecedented hacking attack on Apple family of devices and need help. I'm in San Francisco and need someone who can do forensics of my mac mini and help to protect myself from people attacking me.
I'm the owner of 2 Macbooks pro, mac mini, Ipad, Iphone and iwatch, 1 apple id and 3 gmail accounts.
Everything was fine till August 3. Well I was dumb enough to use 3 variants of the same password with all my accounts. Implementing 1password or another password manager I was delaying for quite some time out of laziness I guess. We use lastpass at work and I silently hate it so didn't want to deal with something like that at home. It was an introduction. I'lll try to be as brief and as detailed as I can now.
Some details became a blur because I'm literally on a verge of a nervous breakdown at the moment.
On August 3 all my email accounts including apple id were hacked. Taken over by someone for at least several hours. Among those only 1 account is main, others are secondary, for job search, another for facebook and ebay, and the last one - apple id - for dating sites.
I was able to restore access to my accounts using my phone number within several hours. I work in big tech and our company was attacked by some people who used texting phishing tactics. First I thought it was connected to work and even filed a ticket telling them that my phone is hacked (there was some weird behavior on the phone) but work stuff seemed unaffected and ticket was closed. Hackers also got to my NAS where I has some old movies and frankly lots of porn collected since 2007. NAS wasn't connected, I mean I didn't have access to it because my wifi point went offline and I didn't bother to go to landlords and set it up (we have internet from landlords, one ISP but 2 different networks) but they somehow were able to take the porn library out, not the files but links to them. The stuff was from torrents so I decided ti get rid of the NAS and its contents, moreover I watch porn legally online now, torrents were in the past.
For several weeks it was quiet. Meanwhile I got a membership from Lookout and Lifelock because I had pics of my documents in icloud library: ssn, driver's license, medical insurance cards, Russian passport etc. It was literally an identity theft. Meanwhile Lookout informed me that my credentials were on dark web monthly since January 2020 and my SSN is public information.
As I said, 3 week were quiet. And then it started. All my emails were taken over again. First I found hidden backups of my machines with some video files on my macbook. Tried to delete them using sudo - didn't work, not enough rights. WTF. Then I pulled all the needed info to the cloud and decided to wipe the macbook and install the OS from scratch. Laptop started acting weird fast and I wasn't able to shut it down. Force quit didn't work, fan sounded as if it's a plain and it's going to take off. I had an impression someone controls my machine and erased if from icloud. Well, that's what I thought. Next time when I turned it on, there was a password on a disk. Password that I didn't add. Attempt to log in recovery mode led to grey screen with a passcode which I didn't implement either. After next reboot I discovered firmware password which was removed by Mobile Kangaroo but as for disk they told me to change it, thank god ssd are cheap now. Machine became a brick without a new disk. Apple mac genius bar was able to remove the lost passcode and install the OS only today. Then I had an awful Saturday on September 6th - they almost induced hysteria by taking over my accounts many times during the day. I changed the passwords numerous times before it. I have 2FA, mixed, with sms and authenticator app. But still they were able bypass these steps and changed the passwords to my accounts. I was barely able to take the accounts back but then started thinking that they know what I type as new password and somehow know the 2FA code. It didn't feel right, Apple is so secure. So I switched to iphone - allegedly the most secure device and changed the passwords from it. It seemed to help.Meanwhile it turned out they downloaded the whole archive from my gmail account since 2009 - there is such functionality. And also all my icloud. I have no idea what emails they send and where and what they deleted when they controlled my account. I know nothing about hacking but I had an impression they used safari to go to some websites - such as datadog, howtogeek, appletoolbox and lookout/legal and trendmicro/legal. Btw I have 4 antivirus apps, none of them found anything. Then I installed Little snitch, saw some incoming connections, not sure what it was, and then noticed tht my chrome started having hundreds and then thousands of outgoing connections to different Ipv4 addresses. Packets were rather small though.
Nightmare just started. IT turned out they knew my gmail passwords that I set up from the phone - they just sat quietly and waited for something. My mac mini started showing strange file with extension .prefPane in recents and different system folders in history where I haven't been. Then I finally intalled Google Wifi app and discovered unknown machine with the same name as my mac mini and almost the same mac address. It was sitting on our wifi for a week and downloaded 46gb of data. I have a screenshot, not on this machine unfortunately. I shut down my mac mini and didn't turn it on since then. I started checking my devices and discovered that my work laptop laptop also had some .prefPane files in history and bunch of system folders which I didn't touch. I know almost nothing about macOS structure and can just look at hidden files, that's it. I was more than concerned, told InfoSec at work that something is happenning, had 3 hours conversation with 2 serious men who told me that according to the logs my work machine is safe but personal stuff is probably breached. Judging by the recent files showing up in dropbox, icloud and google drive. Files which I didn't touch t all and many of them have sensitive and confidential information, health-related for example. Right there I decided to implement 1password but with all the craziness and password changing everywhere I saw that it didn't help - they still were able to change the password and take account back to them. Or after I changed the password I saw 4 different devices having access to my gmail account. I changed my laster password several time and after 1password had 21 most important logins and vault with pretty valuable documents - I finally forgot my masterpassword. I remember the words but specil characters in the end are a blur - I was tired and couldn't focus and forgot to write it down. So farewell my stuff in 1 password - unless I find the right combination 1 day. I made a conclusion that they were able to see my screen. Btw they bought apowersoft from my account, I found 1 email they apparently forgot to delete but I didn't find the software on my machines.... Apple support said everything what I say happening is highly unlikely especially on ios devices since they have government level of protection. But I see that with my own eyes... Also there is an army of bluetooth beacons around me, in very residential neighborhood. Many of them are literally near according to BLE Scanner. There is also BlueZ 5.44 device which connected to my Iphone bluetooth without any permission from me. I have no idea for how long. I think that's how hacking started... Then I discovered that my calls and messages were forwarded to bunch of devices which has the same names as mine but there are several mac minis there etc. My google voice had 2 or 3 extra devices to forward to.... Btw who am I - mid level QA engineer who is just studying programming and trying to do some automation at work. My technical level is pretty low. I saved some money since I moved to America. Not a lot, San Francisco is expensive city. I was born and raised in Russia but never had access to any secret info or high ranking persons, no one can be influenced by pressure on me, I'm a regular gay guy who fled from difficult life and persecution of gays in Russia and been living here in SFBA for the last 7 years.... So I'm nobody but I had a feeling there is team with 24/7 surveillance on me - I even thought it's government but government can silently spy on you and the come with subpoena or arrest order. These guys literally torture. Later - more. I definitely notice my ios devices went rogue. Face id stopped working and I had to reset it every time. Today passcode stopped working and I couldn't unlock the phone - had to wipe it using recovery mode. Created 2 wifi networks at home, one already had 2 unknown apple devices, one of the mac addresses is again very similar to mine. The biggest torture of this weekend - untransferable authenticator app where I keep 2FA codes for work and personal stuff. I spent bunch of time on ipad, freshly wiped via roommates mac, adding the codes to new transferrable app and when was about to transfer, they used the encryption function of the app with the password which can't be reset. Authy, I hate you as much as 1password. So all my codes turned out to be locked and useless. I wiped my ipad clean and started from scratch with 2 different apps - one for work, another or personal stuff. You not gonna believe it - they suppressed internet on ipad. It's connected to wifi or mobile spot but there is no internet icon on the upper right and it's not connecting. How is it possible on ios? Then my passcode on apple watch changed by itself before that showing keyboard on my phone 3 times. Then face id stopped working and passcode on my iphone changed. I'm not kidding. It's after I finished collecting 2FA accounts again. So I can't open my phone! The work of a half day went to shit. Then I tried to turn off the passcode on ipad and it didn't work. Some items disappeared from ios menu, for example Siri and Search... I talked to Lifelock - they said they gonna monitor my ssn, name, etc, like they always do. Wrote to Lookout, they answered with phone number where I need to call. Also need to call FTC, number was given by Lifelock. No money disappeared from my accounts, my saving account is restricted, credit bureaus are frozen. I'm afraid with all that info they have about me they want to take over my apple id or just commit cyber crimes on my behalf. I'm scared and don't know what to do, how to protect myself and my devices from everything happening. I can't live normal life for the last 2 weeks. Thank god people were sympathetic at work but my friends din't really believe me saying Apple has high class protection from such shit. But I saw all that with my own eyes. It takes them about couple of days to hack a freshly wiped phone or ipad, and less than several hours - freshly wiped mac. My roomie's apple devices seem to be unaffected despite the fact he downloads tons of torrents. Btw one more thing - on August 13 Lookout informed me that sim card is taken out of my phon despite the phone was in my pocket. On August 22 Lookout sent notification that sim went online. There were couple of calls to ATT on my behalf that I didn't do. All in all I live in hell last 2 weeks and need to get out of this crazy situation. I looked for some cybersecurity firms but they all work with prevention and with corporations, not individuals. Also my facebook was taken over but I announced it hacked and it's blocked now and neither of us can regain access because I have the email and hackers added their phone where they get 2FA which I ned to log in. No one contacted me asking for ransom or anything. I don't understand what's going on. Please help.
submitted by BloodyPassion to askhacking [link] [comments]


2020.09.12 20:45 100th__Monkey 44 [M4F] - Ann Arbor / Online - Looking for platonic activity or chat partner (preferably 30+). Hiking : Food : Music : Art : Film. Covid Cautious

Never married, no kids. Been out of the dating scene for a bit and not entirely interested in anything beyond an activity partner with similar interests.
I don’t know a whole slew of people in the area and these days without concerts or random street fests etc it’s kinda hard to meet new people.
Not a heavy drinker but enjoy a good mead, bourbon or microbrew. Into jazz, indie, psychedelic, classic rock (Phish, Talking Heads, old school Blue Note, Phoebe Bridgers, KEXP and NPR sessions).
submitted by 100th__Monkey to r4r [link] [comments]


2020.09.10 17:29 TechnoDazza A checklist to increasing account security.

I noticed people on this subreddit recently getting hacked/recovered and losing all their stuff. So I've summarised a list of measures you can take to ensure your account is safe. This list is **not** exhaustive, but it does cover a handful of stuff.
BASIC SECURITY
If your login is an email.
  1. Ensure your login email is different to your recovery email.
This applies to all accounts.
  1. Ensure you have a UNIQUE password to your RuneScape account. This should NOT be the same password as (2).
  2. Ensure you have a UNIQUE password to your recovery email. This should NOT be the same password as (1).
  3. Ensure you have an authenticator on your Runescape account.
  4. Ensure you have an authenticator on your recovery email.
  5. Ensure you have a recovery email that is used ONLY for RuneScape. Do NOT use it for anything else.
  6. Ensure you have a 'random like' four-digit bank bin (ie. 8163, not 1234). Do NOT use your birth year or anything correlated.
BASIC CHECKS
If your recovery email has been pwned (comes up red). Change it immediately.
If any of your passwords have been pwned (comes up red). Change it immediately.
When an email or password has been 'pwned'. It means its as good as public information, anyone at any time, can know it if they wanted to. Put it that way.
GOOD PRACTISES
WATCH OUT FOR...
I hope this list helps you verify your account security. Or perhaps even strengthened the security of your account. Stay safe out there!
EDIT: Multiple grammar corrections.
submitted by TechnoDazza to 2007scape [link] [comments]


2020.09.10 09:46 mangothrowaway8 Is Yolo a dating app?

I just got woken up by a phone beeping - thought it was mine but it was my partner’s, and it was two verification codes for Yolo. I’m not familiar with this app, half the google searches say its a dating app and the other half say it’s an anonymous question app?
Edit: thank you everyone. I tried downloading both and the one linked to Snapchat asked for my cell number to verify and send an access code (it never did), the dating one didn’t. To make things more confusing I asked about it and partner says she doesn’t know what yolo is and that she didn’t download it - showed me her phone, which she didn’t have access to until I asked, and I also didn’t have the password for. There was no Snapchat no yolo nothing in apps download history. She thinks the the verification texts were either sent to a wrong number or a phishing scam. So on the one hand....the dating one doesn’t require verification code....on the other hand, phishing seems like a weak excuse.
submitted by mangothrowaway8 to Infidelity [link] [comments]


2020.09.08 21:08 brcasey3 [Pre-Order] Phish - Billy Breathes (Repress, 180g 2LP)

https://elusivedisc.com/phish-billy-breathes-180g-2lp/
From the website: "Release Date To Be Announced pre-order your copy today!"
Save an extra 10% off with code: LP10
Free domestic shipping on in-stock item orders over $99. (You can order multiple out-of-stock items and put a note in the shipping instructions to ship together and they will refund the shipping fee)
Special thanks to u/theschwill for spotting this one.
EDIT: Code “save15” is good for 15% off (thanks u/SeeThreePeeDoh)
submitted by brcasey3 to VinylReleases [link] [comments]


2020.09.08 21:05 brcasey3 [Pre-Order] Phish - A Live One (Repress, 180g 4LP Box Set, Red & Blue Vinyl)

https://elusivedisc.com/phish-a-live-one-180g-4lp-box-set-red-blue-vinyl/
The availability of this item is listed as "Awaiting Repress". I called elusive disc to confirm what that meant and the guy on the phone said that Phish confirmed with them that they are repressing the album but with COVID they are unsure of the exact date it will be available. He did say that they were hopeful that it would ship this year.
Save an extra 10% off with code: LP10
Free domestic shipping on in-stock item orders over $99. (You can order multiple out-of-stock items and put a note in the shipping instructions to ship together and they will refund the shipping fee)
EDIT: Code “save15” is good for 15% off (thanks u/SeeThreePeeDoh)
submitted by brcasey3 to VinylReleases [link] [comments]


2020.09.07 23:57 Wforwumbo Looking to replace the void DAAM leaves tomorrow? I am releasing a remastered AUD tomorrow on .net at 8 PM EST

Hi everyone,
Some of you may be familiar with my remastered audience tapes and matrices from a while back. I now run an archival release series of audience tapes on .net’s blog, called From The Tapers’ Section (click on the image of the cassette tape at the bottom of the blog for all releases to date).
Since Dinner and a Movie is now monthly, I wanted to offer something for the ritual my Phish friends and I developed around the streams.
Tomorrow, in lieu of no Dinner and a Movie, I will be releasing Part 4 of From The Tapers’ Section with a remaster of 7/13/99. I will be posting to the blog with a short discussion of the show and the tape I chose - why I like the sound of this particular tape, what I adjusted in the remaster process, and snippet discussions on the music contained within the show. Then at 8 PM Eastern/5 PM Pacific, I will post download links to the remastered tape. I hope some of you get to hear and enjoy it.
submitted by Wforwumbo to phish [link] [comments]


2020.09.07 08:16 auxboston Pre-Order Phish Sigma Oasis on Amazon

Phish - Sigma Oasis Release Date: November 27th Assuming double-LP, black.
submitted by auxboston to VinylReleases [link] [comments]


2020.09.06 18:54 RegularMineral [IDEA] Suggestions to increase account security in-game

To understand why I’m making this post, you first need to understand a couple of things:

BUT
How can I say this is true? I know it is, because that’s what happened to me and so many others. I lost 4 of my accounts to a phisher in 2 days despite never sharing any information about my account, never breaking terms of service, and never using any suspicious websites. While recovering my accounts, seeing the process in which account recovery works made it even more evident as to how the recovery function could be abused.

Here are some possible features that friends and I produced while brainstorming that could help maintain the security of one’s account and prevent phishing:

Toggleable option within settings to enable or disable the ability to change the Supercell ID of one’s account through support
  1. What this would do: Allow players to decide whether or not their account has the ability to be recovered through support. This option would be especially useful for players who have very desired or rare accounts (old obstacles, high war stars, records, etc) that would be at a high risk of being targeted. If players are also choosing to recover their account through their email instead of supercell support, it makes less work for support in general.
  2. Why this works: If the ability to recover one’s account through support is disabled, then phishers would not be able to steal accounts using support. If the true owner of the account loses access to the supercell ID, they can instead recover the email. If a player does not like this option, they can enable the ability to use support to recover their respective account.
  3. Note: I think it is worth mentioning that such a simple option could prevent having to worry about your account being phished altogether, and phishers wouldn’t be able to get around this option because accounts utilizing this option could not be recovered through support regardless of circumstance (If instituted it is very important that this is strictly enforced so phishers can’t try to find a way around it)
Toggleable option to make your base & profile public or private
  1. What this entails: Would prevent players that aren’t on your friend’s list from viewing your base or profile for security reasons. The most important feature of this private mode would be the ability to hide your tag from people who aren’t on your friend’s list. This would be a toggleable option, so if players didn’t want to use it they wouldn’t have to.
  2. What this would do: When an account is set to private mode, it would prevent players from viewing an account’s obstacles (so that players could not use obstacles to determine approximate creation date). With the hidden tag, phishers would not be able to even attempt phishing the account because they wouldn’t have the tag to request to “recover” it. If an account is set to private and the account’s true owner needs to recover their account but has forgotten the tag, they can simply ask a friend on their friend’s list for the tag or check it if they have an alternate account also on the friend’s list.
  3. Why this works: If an individual is using private mode and is careful with their friend’s list, their account can be a lot more secure than it once was and a lot more difficult for phishers to attempt to target.
  4. But what would happen if a player were to try and view a player with a private profile within a clan?: This could work similarly to how other games have streamer modes where if toggled on the name is replaced with random words/ letters (for ex: ToasterMuffin). This option could be a separate toggle or a part of the public/private toggle. Additionally, this would be included in wars as well so the enemy clan would only be able to see your base and not your name.
  5. Note: If this change was applied, accounts made before this update would already have their tags known. To allow for these players to benefit from the security of having a hidden tag, accounts made before this possible change could be given the option of a one-time free tag change.
  6. Tldr: Private/public toggle would: hide tag (from unwanted players), hide village (from unwanted players), hide name (from unwanted players) & hide profile (from unwanted players).
Sending an email to the email address associated with the supercell ID when an attempt is made to change the supercell ID of an account through support
  1. What this would entail: If an individual tried to recover an account using supercell ID through support, an email would be sent to the email address associated with the account’s supercell ID. The email would detail how a recovery attempt was made on the account and instruct the recipient to ignore the email if they had, in fact, tried to change the supercell ID (If the individual no longer has access to the email, they would be ignoring the email regardless as they wouldn’t be able to see it, but this would also reinforce the reason for needing to attempt to recover, to begin with). Now if an individual received the email informing that a recovery attempt was made on the account even though they never made an attempt to recover their account, it becomes evident that a phishing attempt was made. In this scenario when the individual receives the email that someone else tried to “recover” their account, they can click a link contained within the email. Ideally, there would be a link that would redirect the individual to in-game support where they would then be able to cancel the attempt to change the supercell ID.
  2. How this would work: After an individual messages support attempting to recover an account and answer the security questions for that account, the email would be sent to the email address associated with that account’s respective supercell ID. If the email goes without response for 24 hours, then and only then the individual would be able to proceed with recovering the account. If support is messaged using the link within the email within these 24 hours, the remaining response time would freeze while the true owner of the account works with support. This 24 hour period would be crucial for making sure the rightful owner of the account is the individual attempting to recover said account. If the rightful owner of the account notices the email and that someone else is trying to steal their account, this 24 hour period would also make sure that the true owner could inform supercell support about the apparent phishing attempt so that support can deal with the phisher accordingly.
  3. Note: The 24 hour waiting period would make it take longer for phishers to attempt to steal accounts which may serve as somewhat of a deterrent. The security of one’s account is very important, taking 24 hours to rule out attempted phishing is well worth it to keep the account safe.
  4. Tldr: After attempting to recover an account an email would be sent to the email address associated with the account’s supercell ID before it could be changed, lack of response to email after 24 hours allows the individual to proceed with recovery OR link redirect within email utilized within the 24 hour period by the true owner brings them to support where they can cancel the “recovery” attempt and report the phishing attempt.
Make a security question a password set by the owner of the account
  1. Note: A password requirement to change supercell ID (the password can be set by the player when the account is first connected to Supercell ID) could be a very secure addition to security questions. A password would also add another layer of difficulty for phishers. Any accounts already connected to Supercell ID can be given the option to add a password within their security questions.
A text message verification code can be enabled as an additional requirement for changing the supercell ID on an account
  1. Note: It is highly unlikely that a player would lose access to both an email and a phone number associated with an account if this idea were to be introduced. This text message verification could be required in addition to the security questions if a player chooses to enable this option. Simply serves as another way of making it significantly more difficult for phishers to attempt and abuse support.
submitted by RegularMineral to ClashOfClans [link] [comments]


2020.09.06 00:52 CoolPickles PPI Management Inc Phishing Incident - Fall 2019

Does anyone know more about a phishing incident in the Fall of 2019?
I received a notice in the mail dated August 27 2020 that my information was contained in in a phishing incident in the Fall of 2019.
I am being offered free credit monitoring for 5 years but need to accept by December 31, 2020. What should I be looking into in order to find out more about this incident. I can't seem to find anything on Google. Should I be using this service or should I be waiting for some sort of class action lawsuit??
I don't know much about PPI. Don't believe I have ever used services from them but I guess maybe some insurance company I have used has in the past (Intact and Travellers is all I have ever had).
submitted by CoolPickles to PersonalFinanceCanada [link] [comments]


2020.09.02 05:31 kentexcitebot Chrome OS Stable channel got promoted to Chrome OS 85. This is what changed!


https://preview.redd.it/w6v33efodnk51.png?width=1000&format=png&auto=webp&s=64a402d6eafbe49d4660ca46a5599bfd6e3473e7

_All right crew!

The Chrome OS Stable Channel got promoted to milestone today - from 84.0.4147.136 to 85.0.4183.84. As with every new milestone update, this brings massive new changes to the table, offering several new features, bug fixes, and security enhancements to better improve your Chrome OS user experience. Due to the sheer size, I may be missing a few things here and there. Here is what changed!

Like my content and want to buy me a coffee? You can support me on ko-fi using this link or by using the link in my Reddit profile. If you want to be kept up to date with everything new to Chrome OS, feel free to give me a follow. Thanks in advance for your support!! :)

Accessibility
Party like the 90's!
Ambient lock screen

This experimental feature is still in development. To try it out, you'll need to enable a Chrome flag. Copy-paste the following URL and change the dropdown from "Default" to "Enable": chrome://flags/#enable-ambient-mode 


New subpage to allow you to customize the Ambient lockscreen

Android subsystem

Goodbye Google Play Music. Hello YouTube Music!

Ash

Mic gain allows you to quickly adjust your microphone settings


Launcher search can now find Chrome OS Settings


New animation when windowing a maximized window.


Shelf apps will scale down if there are no more room left on the shelf. This behavior only applies if your Chromebook is in tablet mode.


Launcher search can now search for apps on the Google Play Store


Wi-Fi icon is much easier to see on the lockscreen.


Shelf items will be limited to the active desk. Requires modifying Chrome flag.


Virtual desk area now uses the accent color of your wallpaper

Assistant
Camera app

You can now pause and resume your video recording, and take a snapshot

Chrome

Tab groups and tab collapsing in action.


The brand new privacy redesign

Quickly see a small thumbnail preview of your tabs.



Quickly block third-party cookies


Extensions will be tucked away in this chrome icon


New permission chips
`

Printer labels, including the status of the printer, is integrated into Print Preview.

Chrome OS Settings

Chrome OS Settings search got a lot smarter


Sync your Wi-Fi passwords so that you don't have to remember them!

Family Link
Files app

New \"Open With\" and \"More Action\" when right-clicking a file

Input

Brand new bordered virtual keyboard.

Linux (Beta)
Media App SWA

This experimental feature is still in development. To try it out, you'll need to enable a Chrome flag. Copy-paste the following URL and change the dropdown from "Default" to "Enable": chrome://flags/#media-app 

OOBE (first-boot setup)
Print jobs app

See what's printing with the new Print jobs app.

PWAs
Quick Answers
Wallpaper picker app

The nitty-gritty stuff


This advanced section is a long list of things changed that impacts web developers and enterprise users. There are a lot more nitty-gritty stuff in the full changelog linked below, but this list covers the most important Blink and Chrome changes introduced in this release cycle.

Blink
Chrome
Enterprise

Platform changes


This part covers the most significant platform changes I found in this build, from platform version 13099.110.0 to 13310.59.0. Platform updates typically include low level changes like kernel, driver updates, and other device-specific fixes.

Linux 4.4
Linux 4.14
Linux 4.19
Linux 5.4
Libapps
Overlays

Click here to see the full official list of changes by Google (no platform logs, sorry). Enjoy, and happy updating!
submitted by kentexcitebot to chromeos [link] [comments]


2020.09.01 03:11 throwawayRAUghh He’s (42M) a great guy - but my (40F) gut conflicts on if he’s MY guy or just a great guy

I got out of an abusive alcoholic marriage in 2014 and dated some very nice men that I broke up with because they didn’t feel right and I wasn’t ready. When I met him he had all the fundamentals of my life partner. He valued family, would never cheat, was a real what you see is what you get kind of guy.
By month 10 I told him that we shouldn’t be together anymore because his approach to loving me was very different than what I asked for often clearly expressing my love languages and how I needed to be loved. It came as no surprise as I constantly asked for what I needed, but he couldn’t let it happen. Two months later, he proposed.
Now unfortunately he has two failed proposals under his belt and at the time I said “yes” because I thought with a VERY long engagement, we could get there. And if I said “no”, I thought it would be over. So I had to say yes. Turns out when he called my parents for permission the day before, they also said “no” for a half hour before they were like “welp, we’ll see what she says”.
We’ve now been together 2 1/2 years and though we get along fine, we’re happy to sleep in different beds, haven’t had sex in a few weeks, seem to bicker about easy shit, and he’s just someone who is fine living very independently as was his parental role model where mine was codependency.
Underneath so much, he seems to be a bit of someone who never grew up. He needs to be told to do household work and I’ve carried the bills for a year as he works his butt off in real estate but now only is it working so he just paid off his 35k in credit card debt he’s had for 10 years. He’s been living for free. My birthday is coming up and he always does something huge and thoughtful. And this will be the first year he doesn’t go further into debt for it.
The very mention of us not being together sends him into a tailspin, and when he does something shitty it’s almost like he knows he’s in time out and waits until “moms over it”.
So like, he’s good. He does a lot. He’s argue he tries his best in everything he does. But.
My gut is something I’ve relied on for years and my gut tells me he’s the guy you can trust, the guy that will be there in a heartbeat, the guy that is trying. However... my gut also asks if he’s my guy.
Also, we have no movies, music, or lifestyle choices in common (hes Phish - I’m everything but, I ran 100 miles in August - he took some bike rides). But they say that opposite interests are good! Omg, I’m exhausted.
submitted by throwawayRAUghh to relationship_advice [link] [comments]


2020.08.31 11:16 removalbot 08-31 09:16 - 'With the level of carelessness the user showed, I suspect they would have eventually fallen for a seed phish at some future date while attempting a FW update. / 1. Google "update HW wallet Firmware" without ad blocker 2. Cli...' by /u/brianddk removed from /r/Bitcoin within 756-766min

'''
With the level of carelessness the user showed, I suspect they would have eventually fallen for a seed phish at some future date while attempting a FW update.
  1. Google "update HW wallet Firmware" without ad blocker
  2. Click on ad for stealYourCrypto.ru
  3. Enter your seed words to "validate authenticity of HW wallet" page
  4. Watch fake flashy "firmware is updating standby"
  5. Wonder where your 1400 BTC in your HW wallet without a passphrase went
"Be your own bank" is not for everyone.
'''
Context Link
Go1dfish undelete link
unreddit undelete link
Author: brianddk
submitted by removalbot to removalbot [link] [comments]


2020.08.28 20:15 azoundria2 How To End The Cryptocurrency Exchange "Wild West" Without Crippling Innovation


In case you haven't noticed the consultation paper, staff notice, and report on Quadriga, regulators are now clamping down on Canadian cryptocurrency exchanges. The OSC and other regulatory bodies are still interested in industry feedback. They have not put forward any official regulation yet. Below are some ideas/insights and a proposed framework.



Many of you have limited time to read the full proposal, so here are the highlights:

Offline Multi-Signature

Effective standards to prevent both internal and external theft. Exchange operators are trained and certified, and have a legal responsibility to users.

Regular Transparent Audits

Provides visibility to Canadians that their funds are fully backed on the exchange, while protecting privacy and sensitive platform information.

Insurance Requirements

Establishment of basic insurance standards/strategy, to expand over time. Removing risk to exchange users of any hot wallet theft.


Background and Justifications


Cold Storage Custody/Management
After reviewing close to 100 cases, all thefts tend to break down into more or less the same set of problems:
• Funds stored online or in a smart contract,
• Access controlled by one person or one system,
• 51% attacks (rare),
• Funds sent to the wrong address (also rare), or
• Some combination of the above.
For the first two cases, practical solutions exist and are widely implemented on exchanges already. Offline multi-signature solutions are already industry standard. No cases studied found an external theft or exit scam involving an offline multi-signature wallet implementation. Security can be further improved through minimum numbers of signatories, background checks, providing autonomy and legal protections to each signatory, establishing best practices, and a training/certification program.
The last two transaction risks occur more rarely, and have never resulted in a loss affecting the actual users of the exchange. In all cases to date where operators made the mistake, they've been fully covered by the exchange platforms.
• 51% attacks generally only occur on blockchains with less security. The most prominent cases have been Bitcoin Gold and Ethereum Classic. The simple solution is to enforce deposit limits and block delays such that a 51% attack is not cost-effective.
• The risk of transactions to incorrect addresses can be eliminated by a simple test transaction policy on large transactions. By sending a small amount of funds prior to any large withdrawals/transfers as a standard practice, the accuracy of the wallet address can be validated.
The proposal covers all loss cases and goes beyond, while avoiding significant additional costs, risks, and limitations which may be associated with other frameworks like SOC II.

On The Subject of Third Party Custodians
Many Canadian platforms are currently experimenting with third party custody. From the standpoint of the exchange operator, they can liberate themselves from some responsibility of custody, passing that off to someone else. For regulators, it puts crypto in similar categorization to oil, gold, and other commodities, with some common standards. Platform users would likely feel greater confidence if the custodian was a brand they recognized. If the custodian was knowledgeable and had a decent team that employed multi-sig, they could keep assets safe from internal theft. With the right protections in place, this could be a great solution for many exchanges, particularly those that lack the relevant experience or human resources for their own custody systems.
However, this system is vulnerable to anyone able to impersonate the exchange operators. You may have a situation where different employees who don't know each other that well are interacting between different companies (both the custodian and all their customers which presumably isn't just one exchange). A case study of what can go wrong in this type of environment might be Bitpay, where the CEO was tricked out of 5000 bitcoins over 3 separate payments by a series of emails sent legitimately from a breached computer of another company CEO. It's also still vulnerable to the platform being compromised, as in the really large $70M Bitfinex hack, where the third party Bitgo held one key in a multi-sig wallet. The hacker simply authorized the withdrawal using the same credentials as Bitfinex (requesting Bitgo to sign multiple withdrawal transactions). This succeeded even with the use of multi-sig and two heavily security-focused companies, due to the lack of human oversight (basically, hot wallet). Of course, you can learn from these cases and improve the security, but so can hackers improve their deception and at the end of the day, both of these would have been stopped by the much simpler solution of a qualified team who knew each other and employed multi-sig with properly protected keys. It's pretty hard to beat a human being who knows the business and the typical customer behaviour (or even knows their customers personally) at spotting fraud, and the proposed multi-sig means any hacker has to get through the scrutiny of 3 (or more) separate people, all of whom would have proper training including historical case studies.
There are strong arguments both for and against using use of third party custodians. The proposal sets mandatory minimum custody standards would apply regardless if the cold wallet signatories are exchange operators, independent custodians, or a mix of both.

On The Subject Of Insurance
ShakePay has taken the first steps into this new realm (congratulations). There is no question that crypto users could be better protected by the right insurance policies, and it certainly feels better to transact with insured platforms. The steps required to obtain insurance generally place attention in valuable security areas, and in this case included a review from CipherTrace. One of the key solutions in traditional finance comes from insurance from entities such as the CDIC.
However, historically, there wasn't found any actual insurance payout to any cryptocurrency exchange, and there are notable cases where insurance has not paid. With Bitpay, for example, the insurance agent refused because the issue happened to the third party CEO's computer instead of anything to do with Bitpay itself. With the Youbit exchange in South Korea, their insurance claim was denied, and the exchange ultimately ended up instead going bankrupt with all user's funds lost. To quote Matt Johnson in the original Lloyd's article: “You can create an insurance policy that protects no one – you know there are so many caveats to the policy that it’s not super protective.”
ShakePay's insurance was only reported to cover their cold storage, and “physical theft of the media where the private keys are held”. Physical theft has never, in the history of cryptocurrency exchange cases reviewed, been reported as the cause of loss. From the limited information of the article, ShakePay made it clear their funds are in the hands of a single US custodian, and at least part of their security strategy is to "decline[] to confirm the custodian’s name on the record". While this prevents scrutiny of the custodian, it's pretty silly to speculate that a reasonably competent hacking group couldn't determine who the custodian is. A far more common infiltration strategy historically would be social engineering, which has succeeded repeatedly. A hacker could trick their way into ShakePay's systems and request a fraudulent withdrawal, impersonate ShakePay and request the custodian to move funds, or socially engineer their way into the custodian to initiate the withdrawal of multiple accounts (a payout much larger than ShakePay) exploiting the standard procedures (for example, fraudulently initiating or override the wallet addresses of a real transfer). In each case, nothing was physically stolen and the loss is therefore not covered by insurance.
In order for any insurance to be effective, clear policies have to be established about what needs to be covered. Anything short of that gives Canadians false confidence that they are protected when they aren't in any meaningful way. At this time, the third party insurance market does not appear to provide adequate options or coverage, and effort is necessary to standardize custody standards, which is a likely first step in ultimately setting up an insurance framework.
A better solution compared to third party insurance providers might be for Canadian exchange operators to create their own collective insurance fund, or a specific federal organization similar to the CDIC. Such an organization would have a greater interest or obligation in paying out actual cases, and that would be it's purpose rather than maximizing it's own profit. This would be similar to the SAFU which Binance has launched, except it would cover multiple exchanges. There is little question whether the SAFU would pay out given a breach of Binance, and a similar argument could be made for a insurance fund managed by a collective of exchange operators or a government organization. While a third party insurance provider has the strong market incentive to provide the absolute minimum coverage and no market incentive to payout, an entity managed by exchange operators would have incentive to protect the reputation of exchange operators/the industry, and the government should have the interest of protecting Canadians.

On The Subject of Fractional Reserve
There is a long history of fractional reserve failures, from the first banks in ancient times, through the great depression (where hundreds of fractional reserve banks failed), right through to the 2008 banking collapse referenced in the first bitcoin block. The fractional reserve system allows banks to multiply the money supply far beyond the actual cash (or other assets) in existence, backed only by a system of debt obligations of others. Safely supporting a fractional reserve system is a topic of far greater complexity than can be addressed by a simple policy, and when it comes to cryptocurrency, there is presently no entity reasonably able to bail anyone out in the event of failure. Therefore, this framework is addressed around entities that aim to maintain 100% backing of funds.
There may be some firms that desire but have failed to maintain 100% backing. In this case, there are multiple solutions, including outside investment, merging with other exchanges, or enforcing a gradual restoration plan. All of these solutions are typically far better than shutting down the exchange, and there are multiple cases where they've been used successfully in the past.

Proof of Reserves/Transparency/Accountability
Canadians need to have visibility into the backing on an ongoing basis.
The best solution for crypto-assets is a Proof of Reserve. Such ideas go back all the way to 2013, before even Mt. Gox. However, no Canadian exchange has yet implemented such a system, and only a few international exchanges (CoinFloor in the UK being an example) have. Many firms like Kraken, BitBuy, and now ShakePay use the Proof of Reserve term to refer to lesser proofs which do not actually cryptographically prove the full backing of all user assets on the blockchain. In order for a Proof of Reserve to be effective, it must actually be a complete proof, and it needs to be understood by the public that is expected to use it. Many firms have expressed reservations about the level of transparency required in a complete Proof of Reserve (for example Kraken here). While a complete Proof of Reserves should be encouraged, and there are some solutions in the works (ie TxQuick), this is unlikely to be suitable universally for all exchange operators and users.
Given the limitations, and that firms also manage fiat assets, a more traditional audit process makes more sense. Some Canadian exchanges (CoinSquare, CoinBerry) have already subjected themselves to annual audits. However, these results are not presently shared publicly, and there is no guarantee over the process including all user assets or the integrity and independence of the auditor. The auditor has been typically not known, and in some cases, the identity of the auditor is protected by a NDA. Only in one case (BitBuy) was an actual report generated and publicly shared. There has been no attempt made to validate that user accounts provided during these audits have been complete or accurate. A fraudulent fractional exchange, or one which had suffered a breach they were unwilling to publicly accept (see CoinBene), could easily maintain a second set of books for auditors or simply exclude key accounts to pass an individual audit.
The proposed solution would see a reporting standard which includes at a minimum - percentage of backing for each asset relative to account balances and the nature of how those assets are stored, with ownership proven by the auditor. The auditor would also publicly provide a "hash list", which they independently generate from the accounts provided by the exchange. Every exchange user can then check their information against this public "hash list". A hash is a one-way form of encryption, which fully protects the private information, yet allows anyone who knows that information already to validate that it was included. Less experienced users can take advantage of public tools to calculate the hash from their information (provided by the exchange), and thus have certainty that the auditor received their full balance information. Easy instructions can be provided.
Auditors should be impartial, their identities and process public, and they should be rotated so that the same auditor is never used twice in a row. Balancing the cost of auditing against the needs for regular updates, a 6 month cycle likely makes the most sense.

Hot Wallet Management
The best solution for hot wallets is not to use them. CoinBerry reportedly uses multi-sig on all withdrawals, and Bitmex is an international example known for their structure devoid of hot wallets.
However, many platforms and customers desire fast withdrawal processes, and human validation has a cost of time and delay in this process.
A model of self-insurance or separate funds for hot wallets may be used in these cases. Under this model, a platform still has 100% of their client balance in cold storage and holds additional funds in hot wallets for quick withdrawal. Thus, the risk of those hot wallets is 100% on exchange operators and not affecting the exchange users. Since most platforms typically only have 1%-5% in hot wallets at any given time, it shouldn't be unreasonable to build/maintain these additional reserves over time using exchange fees or additional investment. Larger withdrawals would still be handled at regular intervals from the cold storage.
Hot wallet risks have historically posed a large risk and there is no established standard to guarantee secure hot wallets. When the government of South Korea dispatched security inspections to multiple exchanges, the results were still that 3 of them got hacked after the inspections. If standards develop such that an organization in the market is willing to insure the hot wallets, this could provide an acceptable alternative. Another option may be for multiple exchange operators to pool funds aside for a hot wallet insurance fund. Comprehensive coverage standards must be established and maintained for all hot wallet balances to make sure Canadians are adequately protected.

Current Draft Proposal

(1) Proper multi-signature cold wallet storage.
(a) Each private key is the personal and legal responsibility of one person - the “signatory”. Signatories have special rights and responsibilities to protect user assets. Signatories are trained and certified through a course covering (1) past hacking and fraud cases, (2) proper and secure key generation, and (3) proper safekeeping of private keys. All private keys must be generated and stored 100% offline by the signatory. If even one private keys is ever breached or suspected to be breached, the wallet must be regenerated and all funds relocated to a new wallet.
(b) All signatories must be separate background-checked individuals free of past criminal conviction. Canadians should have a right to know who holds their funds. All signing of transactions must take place with all signatories on Canadian soil or on the soil of a country with a solid legal system which agrees to uphold and support these rules (from an established white-list of countries which expands over time).
(c) 3-5 independent signatures are required for any withdrawal. There must be 1-3 spare signatories, and a maximum of 7 total signatories. The following are all valid combinations: 3of4, 3of5, 3of6, 4of5, 4of6, 4of7, 5of6, or 5of7.
(d) A security audit should be conducted to validate the cold wallet is set up correctly and provide any additional pertinent information. The primary purpose is to ensure that all signatories are acting independently and using best practices for private key storage. A report summarizing all steps taken and who did the audit will be made public. Canadians must be able to validate the right measures are in place to protect their funds.
(e) There is a simple approval process if signatories wish to visit any country outside Canada, with a potential whitelist of exempt countries. At most 2 signatories can be outside of aligned jurisdiction at any given time. All exchanges would be required to keep a compliant cold wallet for Canadian funds and have a Canadian office if they wish to serve Canadian customers.
(2) Regular and transparent solvency audits.
(a) An audit must be conducted at founding, after 3 months of operation, and at least once every 6 months to compare customer balances against all stored cryptocurrency and fiat balances. The auditor must be known, independent, and never the same twice in a row.
(b) An audit report will be published featuring the steps conducted in a readable format. This should be made available to all Canadians on the exchange website and on a government website. The report must include what percentage of each customer asset is backed on the exchange, and how those funds are stored.
(c) The auditor will independently produce a hash of each customer's identifying information and balance as they perform the audit. This will be made publicly available on the exchange and government website, along with simplified instructions that each customer can use to verify that their balance was included in the audit process.
(d) The audit needs to include a proof of ownership for any cryptocurrency wallets included. A satoshi test (spending a small amount) or partially signed transaction both qualify.
(e) Any platform without 100% reserves should be assessed on a regular basis by a government or industry watchdog. This entity should work to prevent any further drop, support any private investor to come in, or facilitate a merger so that 100% backing can be obtained as soon as possible.
(3) Protections for hot wallets and transactions.
(a) A standardized list of approved coins and procedures will be established to constitute valid cold storage wallets. Where a multi-sig process is not natively available, efforts will be undertaken to establish a suitable and stable smart contract standard. This list will be expanded and improved over time. Coins and procedures not on the list are considered hot wallets.
(b) Hot wallets can be backed by additional funds in cold storage or an acceptable third-party insurance provider with a comprehensive coverage policy.
(c) Exchanges are required to cover the full balance of all user funds as denominated in the same currency, or double the balance as denominated in bitcoin or CAD using an established trading rate. If the balance is ever insufficient due to market movements, the firm must rectify this within 24 hours by moving assets to cold storage or increasing insurance coverage.
(d) Any large transactions (above a set threshold) from cold storage to any new wallet addresses (not previously transacted with) must be tested with a smaller transaction first. Deposits of cryptocurrency must be limited to prevent economic 51% attacks. Any issues are to be covered by the exchange.
(e) Exchange platforms must provide suitable authentication for users, including making available approved forms of two-factor authentication. SMS-based authentication is not to be supported. Withdrawals must be blocked for 48 hours in the event of any account password change. Disputes on the negligence of exchanges should be governed by case law.

Steps Forward

Continued review of existing OSC feedback is still underway. More feedback and opinions on the framework and ideas as presented here are extremely valuable. The above is a draft and not finalized.
The process of further developing and bringing a suitable framework to protect Canadians will require the support of exchange operators, legal experts, and many others in the community. The costs of not doing such are tremendous. A large and convoluted framework, one based on flawed ideas or implementation, or one which fails to properly safeguard Canadians is not just extremely expensive and risky for all Canadians, severely limiting to the credibility and reputation of the industry, but an existential risk to many exchanges.
The responsibility falls to all of us to provide our insight and make our opinions heard on this critical matter. Please take the time to give your thoughts.
submitted by azoundria2 to QuadrigaInitiative [link] [comments]


2020.08.28 13:57 chadpinkerton21 hello you may remember me from posts under another name but i feel the end is nigh and id like to at least tell my story once again for anyone who cares to listen. ps this is gonna be really really long

I really dont know how to put this. so i guess ill start from when i was posting heavily under another name, which i wont say what but if you were ever in chats i was inhell, not my real reddit tag just something for chats. honestly if anyone reads this til the end id be impressed. im just trying to put my story on paper while im losing my life and mind right now.
since my old name has now since been banned from reddit and was forced to start a new one, i guess ill do my best to tell my story from the start up until the past few days. i am also having memory problems so ill graze over some parts and really try and focus on the last few year and a half. take your time to read this or dont, i really just need to let this out.
i live in a heavy drinking state in the US. we produce more beer and cheese than anyone else if you can guess which one. growing up i had a great family, middle child with a younger sister and a brother. i was an outgoing child and really excelled in things like gifted and talented and even was able to go to australia with an organization that sends students abroad. around 14 or so i had had only a few sips out of my dads beer on occaision and my parents enjoyed their nightly glass of wine over dinner or a movie. they are both great people, my mom and dad met in med school and both continued on in very successful practices. growing up, and i still dont know if this has something to do with this situation i am in now, but i really dont remember much of them in my early years outside of their work. i remember a lot of babysitters. me and older brother were rascals and got some of them fired or just fucked with them for no reason other than being brats. my sister was born in 95, i was around 5 or so and my mom decided to quit her job as a doc and raise the kids at home in a small town where i grew up.
fast forward to middle school, where alot of people suffer, and being one of those kids i sought help from my older brother who introduced me to pot and more importantly alcohol. i was in eighth grade and he was a senior in high school and we did, in retrospect, some really fucked up shit. stealing the family car to break into our grandparents house an hour away while they were wintering in florida, i was brought to high school parties, and i kinda just got the sense that this was the norm. i remember one time me and my brother were on a roadie smoking a bowl and sharing a beer and a friend of his drove up beside us and he was SHOCKED i was in the car next to him. at the time i thought it meant i was cool, but to be honest red flag. long story short the parents caught on to the fact that why is a high school senior spending so much time doing sketchy shit with his eighth grade brother on an almost daily basis. one night before he graduated he got so drunk he couldnt perform in the senior showcase with a girlfriend of his, had to be picked up passed out in a cornfield and proceeded to tell my parents "well if you are gonna be so mad at me? you should be pissed at *me* as well cause i did it too. he wasnt too worried since he was moving off to college soon at the state school, and this left me with four years of high school already busted.
it also just so happened at the time we were moving to the same city as his college, and i was to start my freshmen year in high school. instead of trying to start a new life, i used my skills id learned from my brother and became the instant stoner persona and thought all the kids would flock to me as the cool new kid. i knew about glass, i drank a tiny bit at the time, i wore tye-dye. and i did make a few friends, but by my sophmore year things started to peter out. i didnt notice it at the time, but this was the turning point in my life.
my friends were all part of a tight knit group and i didnt realize i was being slowly fizzled out. i started working, smoking more and started going back to my brother who lived just a couple miles down the road for advice. he had begun selling weed... i on the otherhand had a whole market of young dumb kids to sell to so again i fell into his grasp and i was buying ounces from him. later to learn only at an inflated price cause i was still dumb to the business, but i thought i was the shit that i could get weed from college kids. i even got to hang out with him a few times not about business. but again getting caught by parents started happening. side note by my senior year i literally lost track of how many times id been busted by mom and dad, but thats not even the worst of it.
i got really cocky with myself, started dating. at this point no one really talked to me except if they needed a bag, but i always thought i was still cool for doing so only to get kicked out of their car as soon as they had it in their hands. i could always find weed, it honestly is something i havent seen in many people but in the mid 2000s it felt like a gift from god to be the only person in our age group to do so.
my junior year my brother again sold me a new drug mushrooms and i tripped for the first time on my birthday on a camping trip with my best psychonaught friend. we packed up yoda the toyota with a tent some food and my dog and left for the weekend. it was the first time i had ever been able to do this. trip went fine, i learned how great mushrooms were and some blurry weeks later i went to a phish show, knowing thats where i could get acid. i gathered up some hooligans we went and wouldnt you know everyone else couldnt find anything but some dirt weed where i happened to find a ten strip for me and my buddies for the weekend. everyone was stoked and from what i can remember it was a good time. even though we were underage and had gotten kicked off our original camping site for not having proper id some dude saw us and let us camp in a sand pit in his back yard. it was gnarly. one of those summers you look back on just think that was one hell of a time to be alive. but back to the incurring issues of my life. somewhere around that time i randomly found an id of a 25 year old 350 lbs man on the street and thought wow i can do something with this. somehow someway we found one of those gas stations just outside of town that doesnt really care and within a few weeks i was supplying the incoming senior class with hundreds of dollars of alcohol at every party that was thrown. again in retrospect i was only invited because no one else got booze unless i came, but i always inevitably ended up being the too drunk asshole at the party. people put up with me.
somewhere around that time as well, i met another person who ill call patches, and he was selling large quantities of acid to the neighboring highschool. he bought alcohol from me and one night over a bottle of bourbon (such an odd choice for a senior to choose but he was willing to pay the upcharge) he mentioned that he had no business at my high school and asked me to be a partner. he was selling gatorade bottles of acid while i was struggling to find two hits for myself and my gf at the time. so again i said yes and went deeper into the drug game. made alot of money. went to more parties. began just showing up with a case of beer and felony amounts of acid at parties and just stopped caring if people thought i was a drunk idiot. i made money, they got drunk or high or tripped. just said fuck it.
mom finds bags of sour patch kids along with wads of cash in my jacket, got busted for possesion of marijuana, and somehow someway get into a great college in our neighbors to the north. and then i graduated and left, leaving all that shitty stuff behind me. or so i thought.
i arrived at the university of british columbia in vancouver in the fall of 2010. immediately had the same problems from when i started high school and tried to be the cool druggie dude to make friends. problem was everyone sold weed there, and i was nothing special but some kid from bumblefuck. so i decided to become a chef of marijuana edibles and ended up making quite a bit a cash to supplement my college needs. as well the drinking age was 19 which i had just turned prior to moving there. MY DRINKING SKYROCKETED, i was having a blast but ended up with nicknames about my drinking and have been told on numerous occaisions "ive never met anyone in my life who drinks like *name redacted*" and i basically spent the year never going to class selling edibles and drinking my ever living ass off. again i made a group of friends.
the story is gonna speed up now a bit because i really dont remember much of my twenties as im coming to the end of them now. but long story short i dropped out my sophmore year due to introducing my room mate to cocaine (never really my thing) but to him i remember it as giving gollum the ring. he would snort lines and come into my room at night only to beat me up for not putting my dishes away or attacking me at parties for not giving him his bag in time. i often asked my friends for help but was just told why dont you stand up for yourself? i was flabbergasted and lost, and one night just called my mom and said i needed to come home. she obliged and i gave up the best opportunity i ever had in my life.
again moving back is such a blur now. more on the memory problems later, but the early years are alot more clear than that past eight or so. i came home and began drinking more and more. first it was a six pack, then twelve, then for the majority of my twenties i was averaging an eighteen pack of highlife a night drinking alone. i had friends come and go. several jobs working in sandwhich places, pizza places, or as a line cook. some good some bad. as i said most of my twenties are a blur. i remember things like turning 21 or getting jumped outside of the bar i worked at, but in all honesty i really dont remember much. i did rehab around 23. ended up in the drunk tank many many times always picked up by my loving but growingly tired parents the next morning or worst case monday when i was picked up on a friday ugh. but nothing phased me. i went to meetings strung together moments in time of sobriety but i always went back.
so now onto my final chapter, or at least i hope its not. and if youve made it this far.... thanks and this is about to get really really dark.
my entire family moved across country to big sky land, leaving me here. i had no interest in moving, still hadent graduated college, i think i was about twenty six at the time. i was already told my liver was showing signs of damage and was told to slow the fuck down, better yet stop. but i decided against it and moved again to a small drinking town in the northern part of my state for school. i dont think i had ever been evicted before for drinking, but i definatly had never gotten a security deposit back lets put it that way. so after my first year i was indeed told to leave a very nice house a block from campus. grades were ok but then i decided to switch majors, kept getting fired from jobs, and overall i really didnt have any friends. i still called my hometown friends but when they didnt answer id just get drunk and just started saying fuck it to beer and switched entirely to whiskey, something i had a problem with before but somehow had sworn off for the better part of a decade. i found a one bedroom off campus, was dog sitting and found a job working at a video store. i love movies too so it was kinda perfect. then i lost control and was drinking on the job and ended up getting so drunk before work one day i just called them and told them if they wanted someone wasted to come in and work ill do it like i do every other night but to be honest id rather not. so i was fired. ended up in rehab again. had to drop out of school for the semester. and again its a blur.
just after rehab i made it about a week i think before i bought my first six pack and within a month i was just living off the money i had saved drinking on my couch waiting for next semester to start and i noticed a sharp pain in my lungs. my dad being a physician, said no one your age gets something serious like that its problem just pneumonia. i trusted him as i always do and waited three days til i couldnt take it anymore and was coughing up blood. turns out i had had a massive pulmonary embolism shoot from my legs to my lungs. i walked to the ER from my apartment and even the on call doc was shocked and told me i could have died at any point on that walk over there. so i spent my first time in extended stay at my local hospital. this was two years ago roughly. and again my memory gets worse and the story goes.
no one could figure why that happened to me... in all honesty im pretty sure it was booze. i started school again, changed majors again, kept drinking and then this last year happened. again i apologize my memory has gotten so bad im really having trouble remembering yesterday at this point. i am only 29 for chirst sake.
so by january of this year i had gone through withdrawal several times. mostly un aided but it got to a point sometime last fall where i needed librium. ive never had a seizure. but ended up taking the scripts anyway always as prescribed. i think i did two rounds of withdrawal with librium this last fall before all this started. withdrawal is horrible. so bad you just want to keep drinking to just stave it off. even with the librium its still hell in a bucket for at least five days for me. so in january i contacted my only friend i really have here. shes an older woman who teaches at my university who i met through her dogs. she and her husband agreed to let me stay there and wait out my last what i would call survivable withdrawal in their guest room for four days while i puked, didnt sleep, and spent the time entirely on reddit chat just counting the minutes. i made it through. but again started drinking soon after to be honest i really cant remember why at this point. and this is when things went from what i thought were snowballs to avalanches.
late febuary i was drinking around a 750 of old thompson a day and again knew i had to take care of it. i went to the ER one night for some reason or i was drunk off my ass and sure i was just gonna be given another script and leave to just do another 5 days of hell. id done it so many times before and yet when you think about that first drink afterwords, it doesnt seems so bad.
things quickly deterioriated and i was admitted to intensive care and began what i thought were DTs at the time but were what is called alcoholic hallucinosis. I spent seven days hospitalized there. the only two i clearly remember were the last two but aparently i almost attacked a night nurse with a needle i pulled out of my arm, was constantly screaming out my door about things that werent going on like my dad was there even though he now lives across the country, and assuming most of the staff was trying to poison me. but i walked out april first. i remember because rent was due and i didnt want anyone to know i was in the hospital for that long even though i had constantly called my family telling them about my secret assasins. i thought i could here them talking from the help desk just outside my room and spent many of those nights quietly arguing with them under my breath knowing they had micd my bed so all i had to do was listen and speak quietly and they would hear me. im still not sure exactly what happened.
i think i made it a month before i started buying beer again thinking it was ok, and then a six pack turned into a six pack with two shooters of old thompson on the side, then just the old thompson again. ive been told many times i need to stop drinking, but for some reason my brain always thought im not that old. it really hit me when a nurse told me to my face, while youre not that young either. by june things started to change again.,,
I had been noticing very erratic behavior on my part. i was doing things even the drunkest version of me wouldnt do like try to kiss a neighbor even though i knew she was living with her boyfriend of several years. things again escalated and everyone around me kept just saying oh thats *name redacted* just being a useless drunk again. and around this time my landlord gave me warning to stop bothering the people around me.... so i drank it off.
There was this one week in early june i began putting pieces together. i never had good bowel movements so the increase in diarhea never really rose any flags until one day i shat black. i went to the ER and again was just given librium to go home with. the next day, i thought one more day couldnt hurt and i picked up my whiskey and the next day was back in the ER because everytime i was drinking water i was pissing it out within minutes of consuming it. I kept telling them something was wrong. they at this point are seeing me as a frequent flyer or a GOMER if you know the term. after five or so days i had been to the ER six times and each time sent home until an on call doc diagnosed it. alcoholic ketoacidosis. it basically means i was drinking so much i wasnt eating and my body started eating itself instead of the nutrients i was giving it. so the reason i was pissing water so fast was my body just didnt know what to do with it and was like alright flush it. i told him about my past of hallucinations and how i drank to a level where i get scared to stop because i dont ever want to go back into that week long acid trip that i try to taper on my own..... that doesnt work. he decided to admit me. i spent the night again on the icu floor awaiting the inevitable start to my hallucinations. by the next morning, i hadnt had any, i was on cloud nine and stupidly asked to be dishcharged. they agreed after some consults and blood work. i didnt leave ama but there was some trepidation on their part.
within minutes of walking home and picking up a pack of smokes, my apartment was an alcoholic mess and i didnt want to risk my landlord somehow seeing it so i tried to clean it as best i could. i began to have panic attacks and was so worried i made the wrong decision to leave so i raced back to the ER to be readmitted. thats not how this works at all, my bed was already taken even though i was only gone about two hours tops with reintake to the ER included. i still had needle marks in my arms from the IVs. oh and i forgot to mention i tested positive for opiates when i was admitted, something i am still trying to figure out since i dont do pills or shoot, so the new doc on the floor was instantly suspicious and told me he could get me to detox. thinking it was the same floor i was on before i was elated, but when i got there i realized it was just the detox i had actually spent time in before a year or so prior. even their running doc was my psych eval from a few hours earlier. being worried about a skyrocketing heart rate and starting to hallucinate, and nothing against this facility but i had been there before and knew the system, and knew i had to pay out of pocket which i couldnt do, i left AMA within 15 minutes. dumb i know, but im an alcoholic addict, if i knew how to make good decisions i wouldnt be here, id be married with some kids out west somewhere by now instead of neck deep in a bottle of whiskey every night. so i left and decided ONCE AND FOR ALL i would just go buy some beer and taper on my own.
a few weeks later i turned 29, drank alone and dont really remember the rest. at some point in time between these two events i did in fact talk to one of my neighbors, i dont know when but i was sober enought to remember the details. i didnt do anything wrong (in my mind) and helped her carry some records from her car to her apartment next to mine, and even excused myself from going fully into her apartment to set them down and just left them at her door and back to my lonely one bedroom. She contacted the landlord about me contacting her and i got the best birthday present i could have asked for..... a thirty day notice.
lets just say my taper turned into a bender and over thirty days couldnt find a place other than moving back into the dorms for the second time in my life.... at almost 30 years old. i became mean, lashed out at those i loved, lost friends and some of the family left who will even still talk to me, and was still needing to move anyway.
During that period, my drinking got OUT OF CONTROL again, fuck tapering, fuck life, fuck this shit, fuck my landlord, fuck my neighbor. Idk i started realizing my sweats werent just night sweats anymore, my heartbeat was at an all time high when for a period in the spring i could get it under 80 for a resting heart rate for a short time of sobriety, my shits went from pale to dark dark brown and waivered between water and shitting rocks. Ive been stuggling with alcohol for over a decade, i am no fool, i know what this means, liver failure. with liver ltes in the 600s in june before all this i knew i must be pushing something but id just wake up. take a shot for the shakes, turn my AC to 65 to fight the sweats, and go get my daily bottle and pack of smokes.
Three days ago i began moving into the dorms from my old apartment. I havent slept since then. I cant eat. i was puking up every bit of water i was able to keep down for an hour or so. Wen i finally did move, the same woman that helped me earlier basically moved for me because i was wheezing and sweating through my shirt so hard she was alarmed. i did what i could and dipped out for a quick breather and puking in the bushes from the water i tried to down earlier that morning to fight the hangover from the night before. Yesterday was my first day here. i forgot dorms dont have AC and yes the whether was in the 90s, a record for heat and humidity, but i was dying. i spent the day in a fetal position away from the window under a barely working desk fan just hoping to stay awake long enough so i could get a good sleep tonight(?) last night(?) its almost 7 am i still havent slept.
I didnt have to research it, but did so anyway because im a paranoid freak, i show all the signs of acute liver failure all the way to end stage liver failure to a tee. I spent the night in tears, i spent the night silently sipping whiskey in my unpacked dorm room boiling from the heat unable to sleep, i spent the night googling when to go the to ER for liver complete failure. its here folks. i am not even 30 yet.
There is no point to this story that i lead. i have a doctors appointment set for next friday that i had to schedule back in july (yay american healthcare) ive metaphorically screamed at the top of my lungs to both my AODA counsellor, mental health professional, and family for help saying that since that last bought in june things have gotten worse and worse. each day now is harder and harder to do. im exhausted and absolutly hate the small bumble fuck town i am have been stuck in for the past three years. and my main thought last night was i dont want to die here. i want to see my mom and dad again. but theres little use. i am circling a drain for sure.
So at the end of my post, if you made it this far. take this as a warning. i want to go to urgent care today and get my levels checked but i cant make it more than a few hours without a sip of alcohol now. which negates the test due to BAC. i have the meeting next week but at the rate ive declined in the last week im not so sure i can even make it there. I freaked out and drank most of a bottle of whiskey even while typing this over the past few hours. im tired. i want sleep. the sun is rising, but im still sweating balls and not hungry but starving at the same time. i know i am dying. just if you read this i hope life is better for you than my journey. i had some good times, but the bad have outweighed the good and what could have been by millions. so long, if things change ill make another post.
*name redacted*
submitted by chadpinkerton21 to stopdrinking [link] [comments]


2020.08.27 21:34 Dadarian Cannot Enable DKIM signing Office 365 GCC Tenant

I'm pretty new to managing ExchangeOnline and only a couple of months past our go-live. What's different is a lot of users are getting phishing emails (very obvious low effort crap) that the Anti-Phishing filter picks up a lot of. But there is still a ton of spoofed emails getting though which really surprised me I assumed O365 was checking for spoofed emails.
Here are the instructions that I am following
I am trying to configure DKIM for custom domains in Office365. I have I think 5 domains I am trying to customize and all of them are giving the the same error code. I manually configured on the public DNS TTL for 600 seconds. It has been about 5-7 hours since I've configured the DNS Records. I am checking the CNAME record against many authoritative servers and they're confirming the CNAME record exists.
Let us all assume I didn't know a thing about DKIM before this morning. My understanding what's happening right now is, I create a CNAME record which directs the email header to point to the where Microsoft is creating the TXT record of the public Key so it's not like I can even create my own TXT record and force it to work. There is some error that I am not seeing where Microsoft either can't write to their own DNS records for some reason or it's failing to recognize the CNAME record from the public DNS of my domain. I'm not sure what I can do at this point so I was wondering if anyone has experience this problem? Should I merely be patient and wait for MS to check the CNAME at their leisure so when I run Get-DkimSigningConfig , and wait for "Status : CnameMissing" to change?
I have tried toggling SetDkimSigningConfig with -Enable $false and Enable $true to see if that would force a check.
Set-DkimSigningConfig -Identity  -Enabled $true Error publishing public key TXT record. Config was not created. Please try again. + CategoryInfo : InvalidOperation: (:) [Set-DkimSigningConfig], Exception + FullyQualifiedErrorId : [Server=SJ0PR09MB6288,RequestId=8bab9de8-3889-4b1f-9202-af9aee72cea7,TimeStamp=8/27/2020 5:40:16 PM] [FailureCategory=Cmdlet-Exception] DD07F119,Microsoft.Exchange.Management.SystemConfigurationTasks.SetDkimSigningConfig + PSComputerName : outlook.office365.com 
I can validate the CNAME record locally and I've check other websites like MXToolbox to validate the CNAME. Obviously I can't validate the DKIM until it's enabled on Exchange. (To me it's obvious I don't know what I'm doing.)
set q=cname selector1._domainkey. Server: forwarder-va-1. Address:  Non-authoritative answer: selector1._domainkey..com canonical name = selector1-._domainkey. 
RunspaceId : e14068cf-0480-41cc-bcdf-2487b5338b57 Domain :  AdminDisplayName : Selector1KeySize : 2048 Selector1CNAME : selector1-._domainkey. ; Selector2KeySize : 2048 Selector2CNAME : selector2-._domainkey. Selector2PublicKey : v=DKIM1; k=rsa; p=/yiah+ Enabled : False HeaderCanonicalization : Relaxed BodyCanonicalization : Relaxed Algorithm : RsaSHA256 NumberOfBytesToSign : All IncludeSignatureCreationTime : True IncludeKeyExpiration : False KeyCreationTime : 6/30/2020 10:08:49 AM LastChecked : 8/27/2020 5:50:30 PM RotateOnDate : 6/30/2020 10:08:49 AM SelectorBeforeRotateOnDate : selector2 SelectorAfterRotateOnDate : selector1 Status : CnameMissing Identity :  Id :  IsValid : True ExchangeVersion : 0.20 (15.0.0.0) Name :  DistinguishedName : CN=,CN=Dkim Signing config,CN=Transport Settings,CN=Configuration,CN=,CN=ConfigurationUnits,DC=NAMPR09A007,DC=PROD,DC=OUTLOOK,DC=COM ObjectCategory : NAMPR09A007.PROD.OUTLOOK.COM/Configuration/Schema/ms-Exch-Hosted-Content-Filter-Config ObjectClass : {top, msExchHostedContentFilterConfig} WhenChanged : 8/27/2020 10:50:30 AM WhenCreated : 6/30/2020 3:08:51 AM WhenChangedUTC : 8/27/2020 5:50:30 PM WhenCreatedUTC : 6/30/2020 10:08:51 AM ExchangeObjectId :  OrganizationId : NAMPR09A007.PROD.OUTLOOK.COM/Microsoft Exchange Hosted Organizations/ - NAMPR09A007.PROD.OUTLOOK.COM/ConfigurationUnits//Configuration Guid :  OriginatingServer : BN6PR09A007DC06.NAMPR09A007.PROD.OUTLOOK.COM ObjectState : Unchanged 
submitted by Dadarian to exchangeserver [link] [comments]


Farm Girl proving she's not a man! - YouTube The dangers of romance scams and how not to get caught out. Woman says she lost more than $1 million in online dating ... Warning: Here’s a typical Nigerian Romance Scam - YouTube Woman says she was swindled out of $200K by man she met on ... Phishing Attack Example - How to Spot a Scam Email San Diego woman falls for online dating scam, local FBI ... Scammed by romance fraud—one widow's story CyberGuy on Dr. Phil: How To Avoid Catfish Dating Scams ...

Why Am I Getting Spam Emails from Dating Sites? (2020 ...

  1. Farm Girl proving she's not a man! - YouTube
  2. The dangers of romance scams and how not to get caught out.
  3. Woman says she lost more than $1 million in online dating ...
  4. Warning: Here’s a typical Nigerian Romance Scam - YouTube
  5. Woman says she was swindled out of $200K by man she met on ...
  6. Phishing Attack Example - How to Spot a Scam Email
  7. San Diego woman falls for online dating scam, local FBI ...
  8. Scammed by romance fraud—one widow's story
  9. CyberGuy on Dr. Phil: How To Avoid Catfish Dating Scams ...

In his online dating profile, he claimed his name was Thomas Fischer, a 64-year-old man from La Jolla who was a widower. Learn more: https://socialcatfish.com We got in contact with yet another lady involved in a romance scam. She thought she was talking to the famous Greg S Re... Online dating fraud hits a record high in the UK - Duration: 16:07. VJclips1 178,127 views. 16:07. Full Episode: How I Was Catfished And Lost $1,000,000 The Mel Robbins Show - Duration: 42:57. CyberGuy Kurt Knutsson shares his top ten warning signs to avoid being baited by a catfish, or online dating hoaxer. Read more: http://www.drphil.com/shows/s... Big Money. Big Lies. This week, Insight brings together victims, police, dating sites and an international money transfer organisation to find out about the ... What began as a storybook romance turned into a real-life nightmare according to Cecilie Fjellhoy. It's a cautionary tale on the dangers of online dating. ht... https://ecoursereview.com/phishing-explained-protect-internet-threats/ Just about everyone has become active on the internet and in many cases, we have all l... With Valentine's Day just a day away, the FBI is warning of online dating scams. The bureau received more than 15,000 reports linked to romance scams last ye... Farm Girl proving that she's not a man! #bansheemoon #farmgirl