Wikipedia Co-Founder Jimmy Wales Accidentally Starts A ...

Butter is always willing to donate to Wikipedia but hasn't done so yet because the Bitcoin option is not mentioned in the donation campaign. He also doesn't want to click through to Paypal or deal with a credit card. But he really wants to donate guyz!

Butter is always willing to donate to Wikipedia but hasn't done so yet because the Bitcoin option is not mentioned in the donation campaign. He also doesn't want to click through to Paypal or deal with a credit card. But he really wants to donate guyz! submitted by 77moody77 to Buttcoin [link] [comments]

Wikipedia Co-Founder Starts Bitcoin Donation Campaign

Wikipedia Co-Founder Starts Bitcoin Donation Campaign submitted by josicmedia to Bitcoin [link] [comments]

Wikipedia Co-Founder Jimmy Wales Starts Bitcoin Donation Campaign

Wikipedia Co-Founder Jimmy Wales Starts Bitcoin Donation Campaign submitted by BTCillionaire to reddCoin [link] [comments]

The Blackmail Email Scam (part 6)

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

BLACKMAIL EMAIL SCAMS ARE ALSO SENT VIA SMS (TEXT) AND PHYSICAL MAIL. REGARDLESS OF THE METHOD, THEY ARE SPAM AND THE POST BELOW GIVES YOU INFORMATION AND ADVICE ABOUT WHAT TO DO.

FIRST THREAD: https://reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/

THIRD THREAD: https://reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

FOURTH THREAD: https://reddit.com/Scams/comments/dohaea/the_blackmail_email_scam_part_4/

FIFTH THREAD: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

Hey, some time ago your computer was infected with my private malware, RAT (Remote Administration Tool).
I know at the time of infection your passwords was: xxxxxxxxxxx
My malware gave me full access to all your accounts, contacts and it also was possible to spy on you over your webcam.
Sometimes when I was bored I was spying on you, then once you started to SATISFYING YOURSELF!
At first I didn't knew how to react as I was shocked, then I decided to record you, I checked on google and found the software: Bandicam and it did the job.
After that I removed my malware to not leave any traces and this email was sent from some hacked account.
I can send the video of you to all your friends, contacts and publish it on social networks and the whole web.
You can stop me and only I can help you out in this situation.
Pay exactly 740$ in Bitcoin (BTC).
It's easy to buy Bitcoin (BTC), for example here: https://paxful.com/buy-bitcoin , https://www.buybitcoinworldwide.com/ , https://www.kraken.com/ , or google another exchanger.
My Bitcoin (BTC) wallet is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Yes that's how the wallet looks like, copy and paste it, it's (cAsE-sEnSEtiVE)
I give you 3 days time to pay.
As I got access to this email account, I will know if this email has already been read, so the time is running.
After receiving the payment, I will remove the video and you can life your live in peace like before.
Learn from the mistake and update your browser before browsing the web next time!
I know XXXX is one of your password on day of hack..
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1004.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1GohL1jDz8BapZhohN2Xry6AKPq6PiJrjw [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too.
I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on.
Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
I know xxxxxxxxxxxx is one of your password on day of hack.. Lets get directly to the point.
Not one person has paid me to check about you.
You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you.
Best solution would be to pay me $1013.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1KzA7GYSyvXCmPpojZ4qTbZGmjjbbSfwBg
[case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1002.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1JXvEapcRCvywymcrYZ1rcCfLfNZKri4LP [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends.
it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Hello!
I'm the software engineer who hacked into your device's OS.
I've been observing you for months now. The thing is, you've been infected with malware through the adult website you visited.
In case you're not familiar with it, I'll explain. The Trojan infection gives me full access and control over your computer or any other device on your local. It means that I can see everything on your screen, turn on my camera and microphone, but you do not know about it.
I also have access to all your contacts, social networking data and all your correspondence.
Why didn't your antivirus detect any malware? A: My malware uses a driver, I update its signatures every 4 hours to keep your antivirus silent.
I have made a video showing how you satisfy yourself on the left side of the screen, and on the right side you see the video you have been watching. With one click, I can send this video to all your contacts in the email and social networks. I can also publish access to all your emails and messaging apps that you use.
If you want to prevent this, at that point: Transfer $400(USD) to my bitcoin wallet (if you do not know how to do it, then type in to Google: "Purchase a bitcoin").
My Bitcoin Wallet:1EGBGBptS9yKNPYYU9qUEoPNLptee8CEq9
After getting the payment, I will destroy the video and you won't hear from me again. I will provide you 50 hours (more than two days) to pay. I have a notice that you read this email and the timer started you opened it.
Don't attempt to answer me. It doesn't make any sense (the sender's address is generated by random). Filing a complaint somewhere doesn't make sense, because this email cannot be tracked, and neither can my bitcoin address. I don't make mistakes.
If I find that you shared this message with someone else, the video will be distributed immediately. Good luck with that.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

Your Choice To Make

TL;DR: Wakey wakey, give a crap about freedom, or accept the consequences.
Another Sunday afternoon, another news item about Monero being delisted from a centralized exchange, this time in Australia.
Last year it was OKEx and others.
Just a few days ago it was Coinspot.
It is sort of an open secret that Coinbase is not listing Monero due to external pressures. Today we're hit with news that Kraken will be ceasing Monero trading for AU residents.
And you will also recall that Japan and South Korea have made similar moves.
It's a near impossibility with me, especially when powered by caffeine, which is most definitely the case today, but I will try to make this brief, sweet and to the point.
These are not isolated incidents. There is an International Organization™ in particular orchestrating, behind the scenes, the policies and requirements that financial institutions (crypto exchanges have since joined that category for this purpose) must follow, or else.
Here is what bothers me about this.
Have you been consulted about this? Anyone you know?
Heard of it in the news?
Yeah, me neither.
You have to know where to look to find some information on what they would like to see happening (we'll get to that in a moment), and often you have to read PDFs with dozens of pages to find the good stuff too.
I will leave that as an exercise to the reader. Suffice to say, I have been digging a bit deeper myself, and what I found shocked me.
FATF wants nothing less than the complete elimination of anonymity and privacy in financial affairs, even going so far as to consider BANNING peer to peer transactions so that people are forced to interact with each other through exchanges, where data collection is more reliable and certain, effectively obliterating one of the major selling points of cryptocurrency (p2p-ness) with complete disregard for the millions of people who are already onboard with the vision.
No privacy and no anonymity, imagine that.
Many of you probably already use plastic cards for everything, day in day out, and don't think too much about this stuff.
But the fact that an international organization that you have little to zero democratic control over is planning to get rid of class of financial tools that 99.99999% of people don't even realize exists yet should give you pause for concern.
The tools I speak of are, of course, digital cash-like cryptocurrencies like Monero.
I would like you to PAUSE, daydream a bit, visualize and imagine, what a world without zero financial privacy/anonymity would look like.
Consider, this has certainly not been the case in human history, ever -- yes, even today.
Today most of you still have cash as a choice. But what happens when that goes out of the window, and the only options are CBDCs, CorporateCoins, and transparent cryptocurrency ?
Needless to say, both in the case of CorporateCoins and CBDCs, there will be little to none privacy/anonymity, and even if there was (in the case of CorporateCoin), the state would obviously bully its way into it and force them to do otherwise (without being asked to do so, of course).
So, imagine that world.
Every donation you make. Every $50 transfer to a friend or family member. Every item you buy. Every service you purchase. Every money you send to help a friend you.
All of it stored, forever, to be accessed later at will for whatever reasons.
Would you make the same choices, knowing that your entire financial life is entirely exposed to powerful organizations of which you likely know very little about and almost certainly can hardly ever influence at all?
Does that seem like a good recipe for a free society?

Consequences

The people at the top either don't care about the consequences of what they're imposing worldwide, or they don't understand.
Sounds highly concerning to me either way - It comes down to either bullying or ignorance.
Would you ever have truly heart-to-heart conversations if you knew your worst enemy was potentially watching and recording everything?
Could you make passionate love knowing hundreds of strangers are analyzing your every move?
Can you be spontaneous knowing you are being recorded?
What if you did not have a choice in those matters ?!
What if someone has already decided for you, your friends, your family, your neighbors, your country, that you are all potential criminals and the thing to do is to keep records on everyone, just in case ?
Newsflash: It already happened.
It's been happening for awhile, and it seems to be picking up pace; the technology that was going to liberate us, slowly enslaving us instead -- because the general public largely does not understand the issues at hand, while the elite certainly does, and boy oh boy, are they thrilled with the technological advancements that help them cement their power.
What do I mean by cement?
Imagine trying to kick-start civil rights in a place where every social map is known, everything a person is interested in is known, every transaction they make is known, every website they have visited is known, every time they step on the street, an AI-powered camera automatically identifies them and tracks their movement.
You would be unable to organize. To exchange value. To discuss behind curtains, so to speak.
You would not have any privacy, and you would not have any anonymity.
Could you be free under these circumstances?

Conclusion

It's been a long road towards more freedom, but nowdays it is disappearing fast. Stopping to consider the implications is a most pressing issue.
They want Monero(-like tools) GONE because Monero ACTUALLY would change the paradigm.
By the time they are done with their "recommendations" (which really mean: comply, or else...), mark my words, there will be a name behind every Bitcoin address in some centralized database, query-able by partners in deciding who can and cannot use the system.
Merchants will be forced to perform chain analysis and by law they will be compelled to reject/refund/report transactions coming from "anonymous clusters" (addresses that are not known to have an identity tied to them).
This is what the normalization of the lack of privacy has brought us.
The possibility was there, and they took it. Of course they did.
I repeat, it is no accident that it's not Dogecoin and Nano, Bitcoin or Litecoin being delisted.
The star of the show (for better or for worse) is Monero, and that is because it works.
It lets you transact anonymously and privately, like cash - why the hell should FATF know that you sent $500 to your mother last week? in fact, why the hell should they know your entire financial history?!
When cash goes (and we can be fairly certain that it will be gone; would already be gone if this sort of authoritarian mindset had its way), Monero or tools like Monero, will become the only way to make any transaction outside the eyes of the state.
It's not because you have anything (nefarious) to hide. It's not because you're a criminal.
Rather, it's because to accept anything else is to bow to tyranny.
It's your choice to make - are you meekly going to accept that in perhaps less than a decade there will be zero privacy and anonymity in financial matters, or are you going to fight back?
Will you organize, campaign, email, discuss, spread awareness?
Will you spend precious summer Sunday afternoons writing for strangers on the Internet trying to help a few more see the major shit-show we're headed into?
Or will you be a good boy and do what you're told?
Tomorrow, by the way - if left unchallenged - it won't just be financial privacy that disappears.
One of the most prominent examples in the introductory part of this post (Australia) has already made quite clear that they don't like the fact that people can hide things from them (encryption).
In other words, either they know about it (and archive it forever), or you better let them know. After all, a threat - any threat! - could be lurking somewhere in that encrypted data. And you have nothing to hide anyway, yes?
This is a cryptocurrency sub though so let's not steer too far from that. It is important to remember that ultimately the issue is the same though - totalitarian control over everyone's life; mass-surveillance, and the ability to rewind and see someone's entire life exposed for the benefit of the state.
Their actions are letting you know what really works and what really threatens the status quo. That is useful information.
If you care at all about the freedom and privacy of your future self, your friends and family, children present or future, I think you would do well to think long and hard about these issues.
Because the direction assumed by the most prominent regulators seems to be headed in a uniform direction - that is no surprise, seeing as how they meet with each other.
You have to ask yourself though, is this for your benefit, your safety?
Or is it to keep the statuo quo?
How would the world be different if human beings - regardless of color, nationality, age, sexual orientation, political beliefs- with an Internet connection could freely exchange value privately and anonymously (the way we can still communicate private and anonymously in most places today - though not so in authoritarian places like China, AND THAT IS NOT A COINCIDENCE)?
It would be instant, like an instant message. It would cost very little.
Well, I have news for you: It's already possible, and a growing number of people are realizing this.
This tool is called Monero. It exists today, and the cat is out of the bag. The technology will only get better, and more interesting tools may even come along later.
In fact, barring mass persecution of open-source developers, that is very likely what is going to happen, as ultrasmart people everywhere congregate in virtual spaces to discuss better ways to do stuff.
If we keep losing our right to be left alone until suspected of a crime, life will increasingly come to resemble what the regulator types are - consciously or unconsciously - creating: a Panopticon society.
If you don't speak up, then the decision has already been made - and you're probably going to live to regret being complicit in it.
Freedom or Tyranny. It's your choice to make.
p.s: Yes, totally failed at making this short. I guess it's just not my thing.
submitted by xmr_kayront to CryptoCurrency [link] [comments]

Google Alternatives huge list restore your privacy

This guide aims to be the most exhaustive resource available for documenting alternatives to Google products.
With growing concerns over online privacy and securing personal data, more people than ever are considering alternatives to Google products.
After all, Google’s business model essentially revolves around data collection and advertisements, both of which infringe on your privacy. More data means better (targeted) ads and more revenue. The company pulled in over $116 billion in ad revenue last year alone – and that number continues to grow.
But the word is getting out. A growing number of people are seeking alternatives to Google products that respect their privacy and data.
So let’s get started.
Note: The lists below are not necessarily in rank order. Choose the best products and services based on your own unique needs.

Google search alternatives

When it comes to privacy, using Google search is not a good idea. When you use their search engine, Google is recording your IP address, search terms, user agent, and often a unique identifier, which is stored in cookies.
Here are ten alternatives to Google search:
  1. Searx – A privacy-friendly and versatile metasearch engine that’s also open source.
  2. MetaGer – An open source metasearch engine with good features, based in Germany.
  3. SwissCows – A zero-tracking private search engine based in Switzerland, hosted on secure Swiss infrastructure.
  4. Qwant – A private search engine based in France.
  5. DuckDuckGo – A private search engine based in the US.
  6. Mojeek – The only true search engine (rather than metasearch engine) that has its own crawler and index (based in the UK).
  7. YaCy – A decentralized, open source, peer-to-peer search engine.
  8. Givero – Based in Denmark, Givero offers more privacy than Google and combines search with charitable donations.
  9. Ecosia – Ecosia is based in Germany and donates a part of revenues to planting trees.
*Note: With the exception of Mojeek, all of the private search engines above are technically metasearch engines, since they source their results from other search engines, such as Bing and Google.
(Startpage is no longer recommended.)

Gmail alternatives

Gmail may be convenient and popular, but there are three major problems:
  1. Your inbox is used as a data collection tool. (Did you know Google is tracking your purchasing history from the receipts in your inbox?)
  2. Rather than seeing just emails, your email inbox is also used for ads and marketing.
  3. The contents of your inbox are being shared with Google and other random third parties.
When you remain logged in to your Gmail account, Google can easily track your activities online as you browse different websites, which may be hosting Google Analytics or Google ads (Adsense).
Here are ten alternatives to Gmail that do well in terms of privacy:
  1. Tutanota – based in Germany; very secure and private; free accounts up to 1 GB
  2. Mailfence – based in Belgium; lots of features; free accounts up to 500 MB
  3. Posteo – based in Germany; €1/mo with 14 day refund window
  4. StartMail – based in Netherlands; $5.00/mo with 7 day free trial
  5. Runbox – based in Norway; lots of storage and features; $1.66/mo with 30 day free trial
  6. Mailbox.org – based in Germany; €1/mo with 30 day free trial
  7. CounterMail – based in Sweden; $4.00/mo with 7 day free trial
  8. Kolab Now – based in Switzerland; €4.41/mo with 30 day money-back guarantee
  9. ProtonMail – based in Switzerland; free accounts up to 500 MB
  10. Thexyz – based in Canada; $1.95/mo with 30 day refund window

Chrome alternatives

Google Chrome is a popular browser, but it’s also a data collection tool – and many people are taking notice. Just a few days ago, the Washington Post asserted that “Google’s web browser has become spy software,” with 11,000 tracker cookies observed in a single week.
Here are seven alternatives for more privacy:
  1. Firefox browser – Firefox is a very customizable, open-source browser that is popular in privacy circles. There are also many different Firefox modifications and tweaks that will give you more privacy and security. (Also check out Firefox Focus, a privacy-focused version for mobile users.)
  2. Iridium – Based on open source Chromium, Iridium offers numerous privacy and security enhancements over Chrome, source code here.
  3. GNU IceCat – A fork of Firefox from the Free Software Foundation.
  4. Tor browser – A hardened and secured version of Firefox that runs on the Tor network by default. (It also does a good job against browser fingerprinting.)
  5. Ungoogled Chromium – Just as the name says, this is an open source version of Chromium that has been “ungoogled” and modified for more privacy.
  6. Brave – Brave is another Chromium-based browser that is rather popular. It blocks trackers and ads by default (except for “approved” ads that are part of the “Brave Ads” network).
  7. Waterfox – This is a fork of Firefox that is configured for more privacy by default, with Mozilla telemetry stripped out of the code.
Of course, there are other alternatives to Chrome, such as Safari (from Apple), Microsoft Internet ExploreEdge, Opera, and Vivaldi – but these also come with some privacy drawbacks.

Google Drive alternatives

If you’re looking for a secure cloud storage option, you can check out these Google Drive alternatives:
  1. Tresorit – A user-friendly cloud storage option based in Switzerland.
  2. ownCloud – An open source and self-hosted cloud platform developed in Germany.
  3. Nextcloud – Nextcloud is also an open source, self-hosted file sharing and collaboration platform, based in Germany.
  4. Sync – Based in Canada, Sync offers a secure, encrypted cloud storage solution for businesses and individuals.
  5. Syncthing – Here we have a decentralized, open source, peer-to-peer cloud storage platform.
Of course, Dropbox is another popular Google drive alternative, but it’s not the best in terms of privacy.

Google Calendar alternative

Here are some Google Calendar alternatives:
  1. Lightning Calendar is an open source calendar option developed by Mozilla, and it’s compatible with Thunderbird and Seamonkey.
  2. Etar, an open source, basic calendar option.
  3. Fruux, an open source calendar with good features and support for many operating systems.
For those wanting a combined solution for both email and calendar functionality, these providers offer that:

Google Docs / Sheets / Slides alternative

There are many solid Google Docs alternatives available. The largest offline document editing suite is, of course, Microsoft Office. As most people know, however, Microsoft is not the best company for privacy. Nonetheless, there are a few other good Google Docs alternatives:
  1. CryptPad – CryptPad is a privacy-focused alternative with strong encryption, and it’s free.
  2. Etherpad – A self-hosted collaborative online editor that’s also open source.
  3. Mailfence Documents – From the Mailfence team, this is a secure file sharing, storage, and collaboration tool.
  4. Zoho Docs – This is another good Google Docs alternative with a clean interface and good functionality, although it may not be the best for privacy.
  5. OnlyOffice – OnlyOffice feels a bit more restricted than some of the other options in terms of features.
  6. Cryptee – This is a privacy-focused platform for photo and document storage and editing. It’s open source and based in Estonia.
  7. LibreOffice (offline) – You can use LibreOffice which is free and open source.
  8. Apache OpenOffice (offline) – Another good open source office suite.

Google Photos alternative

Here are a few good Google Photos alternatives:
Shoebox was another alternative, but it closed operations in June 2019.

YouTube alternatives

Unfortunately, YouTube alternatives can really be hit or miss, with most struggling to gain popularity.
  1. Peertube
  2. DTube
  3. Bitchute
  4. invidio.us
  5. Vimeo
  6. Bit.tube
  7. Dailymotion
  8. Hooktube
Tip: Invidio.us is a great Youtube proxy that allows you to watch any Youtube video without logging in, even if the video is somehow restricted. To do this, simply replace [www.youtube.com] with [invidio.us] in the URL you want to view.

Google translate alternative

Here are a few Google translate alternatives I have come across:
  1. DeepL – DeepL is a solid Google Translate alternative that seems to give great results. Like Google Translate, DeepL allows you to post up to 5,000 characters at a time (but the pro version is unlimited). The user interface is good and there is also a built-in dictionary feature.
  2. Linguee – Linguee does not allow you to post large blocks of text like DeepL. However, Linguee will give you very accurate translations for single words or phrases, along with context examples.
  3. dict.cc – This Google Translate alternative seems to do a decent job on single-world lookups, but it also feels a bit outdated.
  4. Swisscows Translate – A good translation service supporting many languages.
If you want to translate blocks of text, check out DeepL. If you want in-depth translations for single words or phrases, then Linguee is a good choice.

Google analytics alternative

For website admins, there are many reasons to use an alternative to Google analytics. Aside from privacy concerns, there are also faster and more user-friendly alternatives that also respect your visitors’ privacy.
  1. Clicky is a great alternative to Google Analytics that truncates and anonymizes visitor IP addresses by default. It is lightweight, user-friendly, and fully compliant with GDPR regulations, while also being certified by Privacy Shield.
  2. Matomo (formerly Piwik) is an open-source analytics platform that respects the privacy of visitors by anonymizing and truncating visitor IP addresses (if enabled by the website admin). It is also certified to respect user privacy.
  3. Fathom Analytics is an open source alternative to Google Analytics that’s available on Github here. It’s minimal, fast, and lightweight.
  4. Get Insights – Another privacy-focused analytics platform, with a full analytics suite. The front-end client is open source and available here.
  5. AT Internet is a France-based analytics provider that is fully GDPR compliant, with all data stored on French servers, and a good track record going back to 1996.
Many websites host Google Analytics because they run Google Adsense campaigns. Without Google Analytics, tracking performance of these campaigns would be difficult. Nonetheless, there are still better options for privacy.

Google Maps alternative

A map alternative for PCs is OpenStreetMap.
A few Google Maps alternatives for mobile devices include:
  1. OsmAnd is a free and open-source mobile maps app for both Android and iOS (based on OpenStreetMap data).
  2. Maps (F Droid) uses OpenStreetMap data (offline).
  3. Maps.Me is another option that is free on both Android and iOS, but there is a fair amount of data collection with this alternative, as explained in their privacy policy.
  4. MapHub is also based on OpenStreeMap data and it does not collect locations or user IP addresses.
Note: Waze is not an “alternative” as it is now owned by Google.

Google Play Store alternative

Currently the best Google Play Store alternative is to use F-Droid and then go through the Yalp store. As explained on the official site, F-Droid is an installable catalog of FOSS (Free and Open Source Software) applications for the Android platform.
After you have installed F-Droid, you can then download the Yalp store APK, which allows you to download apps from the Google Play Store directly as APK files.
📷The Yalp Store is a good alternative to the Google Play Store.
See the F-Droid website or the official GitHub page for more info. Other alternatives to the Google Play Store include:

Google Chrome OS alternative

Want to ditch the Chromebook and Chrome OS? Here are a few alternatives:
  1. Linux – Of course, Linux is arguably the best alternative, being a free, open-source operating system with lots of different flavors. With some adjustments, Linux Ubuntu can be run on Chromebooks.
  2. Tails – Tails is a free, privacy-focused operating system based on Linux that routes all traffic through the Tor network.
  3. QubesOS – Recommended by Snowden, free, and also open source.
Of course, the other two big operating system alternatives are Windows and Apple’s operating system for MacBooks – Mac OS. Windows, particularly Windows 10, is a very bad option for privacy. While slightly better, Apple also collects user data and has partnered with the NSA) for surveillance.

Android alternatives

The biggest alternative to Android is iOS from Apple. But we’ll skip over that for reasons already mentioned. Here are a few Android OS alternatives:
  1. LineageOS – A free and open-source operating system for phones and tablets based on Android.
  2. Ubuntu Touch – A mobile version of the Ubuntu operating system.
  3. Plasma Mobile – An open source, Linux-based operating system with active development.
  4. Sailfish OS – Another open source, Linux-based mobile OS.
  5. Replicant – A fully free Android distribution with an emphasis on freedom, privacy, and security.
  6. /e/ – This is another open source project with a focus on privacy and security.
Purism is also working on a privacy-focused mobile phone called the Librem 5. It is in production, but not yet available (estimated Q3 2019).

Google Hangouts alternatives

Here are some alternatives to Google Hangouts:
  1. Wire – A great all-around secure messenger, video, and chat app, but somewhat limited on the number of people who can chat together in a group conversation via voice or video.
  2. Signal – A good secure messenger platform from Open Whisper Systems.
  3. Telegram – A longtime secure messenger app, formerly based in Russia, now in Dubai.
  4. Riot – A privacy-focused encrypted chat service that is also open source.

Google Domains alternative

Google Domains is a domain registration service. Here are a few alternatives:
  1. Namecheap – I like Namecheap because all domain purchases now come with free WhoisGuard protection for life, which protects your contact information from third parties. Namecheap also accepts Bitcoin and offers domain registration, hosting, email, SSL certs, and a variety of other products.
  2. Njalla – Njalla is a privacy-focused domain registration service based in Nevis. They offer hosting options, too, and also accept cryptocurrency payments.
  3. OrangeWebsite – OrangeWebsite offers anonymous domain registration services and also accepts cryptocurrency payments, based in Iceland.

Other Google alternatives

Here more alternatives for various Google products:
Google forms alternativeJotForm is a free online form builder.
Google Keep alternative – Below are a few different Google Keep alternatives:
Google Fonts alternative – Many websites load Google fonts through Google APIs, but that’s not necessary. One alternative to this is to use Font Squirrel, which has a large selection of both Google and non-Google fonts which are free to download and use.
Google Voice alternativeJMP.chat (both free and paid)
G Suite alternativeZoho is probably the best option
Google Firebase alternativeKuzzle (free and open source)
Google Blogger alternativesWordPress, Medium, and Ghost are all good options.
submitted by giganticcobra to degoogle [link] [comments]

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads: https://old.reddit.com/Scams/search?q=common+scams+master+post&restrict_sr=on
Blackmail email scam thread: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5//
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.

Spoofing

Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
Dropshipping
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

Door to door scams

As a general rule, you should not engage with door to door salesmen. If you are interested in the product they are selling, check online first.
Selling Magazines
Someone or a group will come to your door and offer to sell a magazine subscription. Often the subscriptions are not for the duration or price you were told, and the magazines will often have tough or impossible cancellation policies.
Energy sales
Somebody will come to your door claiming to be from an energy company. They will ask to see your current energy bill so that they can see how much you pay. They will then offer you a discount if you sign up with them, and promise to handle everything with your old provider. Some of these scammers will "slam" you, by using your account number that they saw on your bill to switch you to their service without authorization, and some will scam you by charging higher prices than the ones you agreed on.
Security system scams
Scammers will come to your door and ask about your security system, and offer to sell you a new one. These scammers are either selling you overpriced low quality products, or are casing your home for a future burglary.
They ask to enter your home
While trying to sell you whatever, they suddenly need to use your bathroom, or they've been writing against the wall and ask to use your table instead. Or maybe they just moved into the neighborhood and want to see how you decorate for ideas.
They're scoping out you and your place. They want to see what valuables you have, how gullible you are, if you have a security system or dogs, etc.

Street scams

Begging With a Purpose
"I just need a few more dollars for the bus," at the bus station, or "I just need $5 to get some gas," at a gas station. There's also a variation where you will be presented with a reward: "I just need money for a cab to get uptown, but I'll give you sports tickets/money/a date/a priceless vase."
Three Card Monte, Also Known As The Shell Game
Unbeatable. The people you see winning are in on the scam.
Drop and Break
You bump into someone and they drop their phone/glasses/fancy bottle of wine/priceless vase and demand you pay them back. In reality, it's a $2 pair of reading glasses/bottle of three-buck-chuck/tasteful but affordable vase.
CD Sales
You're handed a free CD so you can check out the artist's music. They then ask for your name and immediately write it on the CD. Once they've signed your name, they ask you for money, saying they can't give it to someone else now. Often they use dry erase markers, or cheap CD sleeves. Never use any type of storage device given to you by a random person, as the device can contain malware.
White Van Speaker Scam
You're approached and offered speakers/leather jackets/other luxury goods at a discount. The scammer will have an excuse as to why the price is so low. After you buy them, you'll discover that they are worthless.
iPhone Street Sale
You're approached and shown an iPhone for sale, coming in the box, but it's open and you can see the phone. If you buy the phone, you'll get an iPhone box with no iPhone, just some stones or cheap metal in it to weigh it down.
Buddhist Monk Pendant
A monk in traditional garb approaches you, hands you a gold trinket, and asks for a donation. He holds either a notebook with names and amounts of donation (usually everyone else has donated $5+), or a leaflet with generic info. This is fairly common in NYC, and these guys get aggressive quickly.
Friendship Bracelet Scam More common in western Europe, you're approached by someone selling bracelets. They quickly wrap a loop of fabric around your finger and pull it tight, starting to quickly weave a bracelet. The only way to (easily) get it off your hand is to pay. Leftover sales
This scam involves many different items, but the idea is usually the same: you are approached by someone who claims to have a large amount of excess inventory and offers to sell it to you at a great price. The scammer actually has low quality items and will lie to you about the price/origin of the items.
Dent repair scams
Scammers will approach you in public about a dent in your car and offer to fix it for a low price. Often they will claim that they are mechanics. They will not fix the dent in your car, but they will apply large amounts of wax or other substances to hide the dent while they claim that the substance requires time to harden.
Gold ring/jewelry/valuable item scam
A scammer will "find" a gold ring or other valuable item and offers to sell it to you. The item is fake and you will never see the scammer again.
Distraction theft
One person will approach you and distract you, while their accomplice picks your pockets. The distraction can take many forms, but if you are a tourist and are approached in public, watch closely for people getting close to you.

General resources

Site to report scams in the United Kingdom: http://www.actionfraud.police.uk/
Site to report scams in the United States: https://www.ic3.gov/default.aspx
Site to report scams in Canada: www.antifraudcentre-centreantifraude.ca/reportincident-signalerincident/index-eng.htm
Site to report scams in Europe: https://www.europol.europa.eu/report-a-crime/report-cybercrime-online
FTC scam alerts: https://www.consumer.ftc.gov/scam-alerts
Microsoft's anti-scam guide: https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx
https://www.usa.gov/common-scams-frauds
https://www.usa.gov/scams-and-frauds
https://www.consumer.ftc.gov/features/scam-alerts
https://www.fbi.gov/scams-and-safety/common-fraud-schemes
submitted by EugeneBYMCMB to Scams [link] [comments]

guide to how to restore your privacy huge list

This guide aims to be the most exhaustive resource available for documenting alternatives to Google products.
With growing concerns over online privacy and securing personal data, more people than ever are considering alternatives to Google products.
After all, Google’s business model essentially revolves around data collection and advertisements, both of which infringe on your privacy. More data means better (targeted) ads and more revenue. The company pulled in over $116 billion in ad revenue last year alone – and that number continues to grow.
But the word is getting out. A growing number of people are seeking alternatives to Google products that respect their privacy and data.
So let’s get started.
Note: The lists below are not necessarily in rank order. Choose the best products and services based on your own unique needs.

Google search alternatives

When it comes to privacy, using Google search is not a good idea. When you use their search engine, Google is recording your IP address, search terms, user agent, and often a unique identifier, which is stored in cookies.
Here are ten alternatives to Google search:
  1. Searx – A privacy-friendly and versatile metasearch engine that’s also open source.
  2. MetaGer – An open source metasearch engine with good features, based in Germany.
  3. SwissCows – A zero-tracking private search engine based in Switzerland, hosted on secure Swiss infrastructure.
  4. Qwant – A private search engine based in France.
  5. DuckDuckGo – A private search engine based in the US.
  6. Mojeek – The only true search engine (rather than metasearch engine) that has its own crawler and index (based in the UK).
  7. YaCy – A decentralized, open source, peer-to-peer search engine.
  8. Givero – Based in Denmark, Givero offers more privacy than Google and combines search with charitable donations.
  9. Ecosia – Ecosia is based in Germany and donates a part of revenues to planting trees.
*Note: With the exception of Mojeek, all of the private search engines above are technically metasearch engines, since they source their results from other search engines, such as Bing and Google.
(Startpage is no longer recommended.)

Gmail alternatives

Gmail may be convenient and popular, but there are three major problems:
  1. Your inbox is used as a data collection tool. (Did you know Google is tracking your purchasing history from the receipts in your inbox?)
  2. Rather than seeing just emails, your email inbox is also used for ads and marketing.
  3. The contents of your inbox are being shared with Google and other random third parties.
When you remain logged in to your Gmail account, Google can easily track your activities online as you browse different websites, which may be hosting Google Analytics or Google ads (Adsense).
Here are ten alternatives to Gmail that do well in terms of privacy:
  1. Tutanota – based in Germany; very secure and private; free accounts up to 1 GB
  2. Mailfence – based in Belgium; lots of features; free accounts up to 500 MB
  3. Posteo – based in Germany; €1/mo with 14 day refund window
  4. StartMail – based in Netherlands; $5.00/mo with 7 day free trial
  5. Runbox – based in Norway; lots of storage and features; $1.66/mo with 30 day free trial
  6. Mailbox.org – based in Germany; €1/mo with 30 day free trial
  7. CounterMail – based in Sweden; $4.00/mo with 7 day free trial
  8. Kolab Now – based in Switzerland; €4.41/mo with 30 day money-back guarantee
  9. ProtonMail – based in Switzerland; free accounts up to 500 MB
  10. Thexyz – based in Canada; $1.95/mo with 30 day refund window

Chrome alternatives

Google Chrome is a popular browser, but it’s also a data collection tool – and many people are taking notice. Just a few days ago, the Washington Post asserted that “Google’s web browser has become spy software,” with 11,000 tracker cookies observed in a single week.
Here are seven alternatives for more privacy:
  1. Firefox browser – Firefox is a very customizable, open-source browser that is popular in privacy circles. There are also many different Firefox modifications and tweaks that will give you more privacy and security. (Also check out Firefox Focus, a privacy-focused version for mobile users.)
  2. Iridium – Based on open source Chromium, Iridium offers numerous privacy and security enhancements over Chrome, source code here.
  3. GNU IceCat – A fork of Firefox from the Free Software Foundation.
  4. Tor browser – A hardened and secured version of Firefox that runs on the Tor network by default. (It also does a good job against browser fingerprinting.)
  5. Ungoogled Chromium – Just as the name says, this is an open source version of Chromium that has been “ungoogled” and modified for more privacy.
  6. Brave – Brave is another Chromium-based browser that is rather popular. It blocks trackers and ads by default (except for “approved” ads that are part of the “Brave Ads” network).
  7. Waterfox – This is a fork of Firefox that is configured for more privacy by default, with Mozilla telemetry stripped out of the code.
Of course, there are other alternatives to Chrome, such as Safari (from Apple), Microsoft Internet ExploreEdge, Opera, and Vivaldi – but these also come with some privacy drawbacks.

Google Drive alternatives

If you’re looking for a secure cloud storage option, you can check out these Google Drive alternatives:
  1. Tresorit – A user-friendly cloud storage option based in Switzerland.
  2. ownCloud – An open source and self-hosted cloud platform developed in Germany.
  3. Nextcloud – Nextcloud is also an open source, self-hosted file sharing and collaboration platform, based in Germany.
  4. Sync – Based in Canada, Sync offers a secure, encrypted cloud storage solution for businesses and individuals.
  5. Syncthing – Here we have a decentralized, open source, peer-to-peer cloud storage platform.
Of course, Dropbox is another popular Google drive alternative, but it’s not the best in terms of privacy.

Google Calendar alternative

Here are some Google Calendar alternatives:
  1. Lightning Calendar is an open source calendar option developed by Mozilla, and it’s compatible with Thunderbird and Seamonkey.
  2. Etar, an open source, basic calendar option.
  3. Fruux, an open source calendar with good features and support for many operating systems.
For those wanting a combined solution for both email and calendar functionality, these providers offer that:

Google Docs / Sheets / Slides alternative

There are many solid Google Docs alternatives available. The largest offline document editing suite is, of course, Microsoft Office. As most people know, however, Microsoft is not the best company for privacy. Nonetheless, there are a few other good Google Docs alternatives:
  1. CryptPad – CryptPad is a privacy-focused alternative with strong encryption, and it’s free.
  2. Etherpad – A self-hosted collaborative online editor that’s also open source.
  3. Mailfence Documents – From the Mailfence team, this is a secure file sharing, storage, and collaboration tool.
  4. Zoho Docs – This is another good Google Docs alternative with a clean interface and good functionality, although it may not be the best for privacy.
  5. OnlyOffice – OnlyOffice feels a bit more restricted than some of the other options in terms of features.
  6. Cryptee – This is a privacy-focused platform for photo and document storage and editing. It’s open source and based in Estonia.
  7. LibreOffice (offline) – You can use LibreOffice which is free and open source.
  8. Apache OpenOffice (offline) – Another good open source office suite.

Google Photos alternative

Here are a few good Google Photos alternatives:
Shoebox was another alternative, but it closed operations in June 2019.

YouTube alternatives

Unfortunately, YouTube alternatives can really be hit or miss, with most struggling to gain popularity.
  1. Peertube
  2. DTube
  3. Bitchute
  4. invidio.us
  5. Vimeo
  6. Bit.tube
  7. Dailymotion
  8. Hooktube
Tip: Invidio.us is a great Youtube proxy that allows you to watch any Youtube video without logging in, even if the video is somehow restricted. To do this, simply replace [www.youtube.com] with [invidio.us] in the URL you want to view.

Google translate alternative

Here are a few Google translate alternatives I have come across:
  1. DeepL – DeepL is a solid Google Translate alternative that seems to give great results. Like Google Translate, DeepL allows you to post up to 5,000 characters at a time (but the pro version is unlimited). The user interface is good and there is also a built-in dictionary feature.
  2. Linguee – Linguee does not allow you to post large blocks of text like DeepL. However, Linguee will give you very accurate translations for single words or phrases, along with context examples.
  3. dict.cc – This Google Translate alternative seems to do a decent job on single-world lookups, but it also feels a bit outdated.
  4. Swisscows Translate – A good translation service supporting many languages.
If you want to translate blocks of text, check out DeepL. If you want in-depth translations for single words or phrases, then Linguee is a good choice.

Google analytics alternative

For website admins, there are many reasons to use an alternative to Google analytics. Aside from privacy concerns, there are also faster and more user-friendly alternatives that also respect your visitors’ privacy.
  1. Clicky is a great alternative to Google Analytics that truncates and anonymizes visitor IP addresses by default. It is lightweight, user-friendly, and fully compliant with GDPR regulations, while also being certified by Privacy Shield.
  2. Matomo (formerly Piwik) is an open-source analytics platform that respects the privacy of visitors by anonymizing and truncating visitor IP addresses (if enabled by the website admin). It is also certified to respect user privacy.
  3. Fathom Analytics is an open source alternative to Google Analytics that’s available on Github here. It’s minimal, fast, and lightweight.
  4. Get Insights – Another privacy-focused analytics platform, with a full analytics suite. The front-end client is open source and available here.
  5. AT Internet is a France-based analytics provider that is fully GDPR compliant, with all data stored on French servers, and a good track record going back to 1996.
Many websites host Google Analytics because they run Google Adsense campaigns. Without Google Analytics, tracking performance of these campaigns would be difficult. Nonetheless, there are still better options for privacy.

Google Maps alternative

A map alternative for PCs is OpenStreetMap.
A few Google Maps alternatives for mobile devices include:
  1. OsmAnd is a free and open-source mobile maps app for both Android and iOS (based on OpenStreetMap data).
  2. Maps (F Droid) uses OpenStreetMap data (offline).
  3. Maps.Me is another option that is free on both Android and iOS, but there is a fair amount of data collection with this alternative, as explained in their privacy policy.
  4. MapHub is also based on OpenStreeMap data and it does not collect locations or user IP addresses.
Note: Waze is not an “alternative” as it is now owned by Google.

Google Play Store alternative

Currently the best Google Play Store alternative is to use F-Droid and then go through the Yalp store. As explained on the official site, F-Droid is an installable catalog of FOSS (Free and Open Source Software) applications for the Android platform.
After you have installed F-Droid, you can then download the Yalp store APK, which allows you to download apps from the Google Play Store directly as APK files.
📷The Yalp Store is a good alternative to the Google Play Store.
See the F-Droid website or the official GitHub page for more info. Other alternatives to the Google Play Store include:

Google Chrome OS alternative

Want to ditch the Chromebook and Chrome OS? Here are a few alternatives:
  1. Linux – Of course, Linux is arguably the best alternative, being a free, open-source operating system with lots of different flavors. With some adjustments, Linux Ubuntu can be run on Chromebooks.
  2. Tails – Tails is a free, privacy-focused operating system based on Linux that routes all traffic through the Tor network.
  3. QubesOS – Recommended by Snowden, free, and also open source.
Of course, the other two big operating system alternatives are Windows and Apple’s operating system for MacBooks – Mac OS. Windows, particularly Windows 10, is a very bad option for privacy. While slightly better, Apple also collects user data and has partnered with the NSA) for surveillance.

Android alternatives

The biggest alternative to Android is iOS from Apple. But we’ll skip over that for reasons already mentioned. Here are a few Android OS alternatives:
  1. LineageOS – A free and open-source operating system for phones and tablets based on Android.
  2. Ubuntu Touch – A mobile version of the Ubuntu operating system.
  3. Plasma Mobile – An open source, Linux-based operating system with active development.
  4. Sailfish OS – Another open source, Linux-based mobile OS.
  5. Replicant – A fully free Android distribution with an emphasis on freedom, privacy, and security.
  6. /e/ – This is another open source project with a focus on privacy and security.
Purism is also working on a privacy-focused mobile phone called the Librem 5. It is in production, but not yet available (estimated Q3 2019).

Google Hangouts alternatives

Here are some alternatives to Google Hangouts:
  1. Wire – A great all-around secure messenger, video, and chat app, but somewhat limited on the number of people who can chat together in a group conversation via voice or video.
  2. Signal – A good secure messenger platform from Open Whisper Systems.
  3. Telegram – A longtime secure messenger app, formerly based in Russia, now in Dubai.
  4. Riot – A privacy-focused encrypted chat service that is also open source.

Google Domains alternative

Google Domains is a domain registration service. Here are a few alternatives:
  1. Namecheap – I like Namecheap because all domain purchases now come with free WhoisGuard protection for life, which protects your contact information from third parties. Namecheap also accepts Bitcoin and offers domain registration, hosting, email, SSL certs, and a variety of other products.
  2. Njalla – Njalla is a privacy-focused domain registration service based in Nevis. They offer hosting options, too, and also accept cryptocurrency payments.
  3. OrangeWebsite – OrangeWebsite offers anonymous domain registration services and also accepts cryptocurrency payments, based in Iceland.

Other Google alternatives

Here more alternatives for various Google products:
Google forms alternativeJotForm is a free online form builder.
Google Keep alternative – Below are a few different Google Keep alternatives:
Google Fonts alternative – Many websites load Google fonts through Google APIs, but that’s not necessary. One alternative to this is to use Font Squirrel, which has a large selection of both Google and non-Google fonts which are free to download and use.
Google Voice alternativeJMP.chat (both free and paid)
G Suite alternativeZoho is probably the best option
Google Firebase alternativeKuzzle (free and open source)
Google Blogger alternativesWordPress, Medium, and Ghost are all good options.
submitted by giganticcobra to privacytoolsIO [link] [comments]

Bitcoin is part of the peaceful solution.


The US and other countries have been silently overthrown by criminal bankers who have the sole ability to legally create all the fiat currency they want, then use the newly created money to enrich and empower themselves and their cronies. (money printer go B-R-R-R-R-R-R-R-R-R-R)
Those bankers and their cronies now own and operate most of the important politicians, certainly both political parties in the US. (https://en.wikipedia.org/wiki/Citizens_United_v._FEC)
Those bankers are accountable to nobody. The politicians/parties are only accountable to those bankers, that is, the politicians and judges and regulators are no longer accountable to the people. Your vote no longer matters, as the same bankers own and operate both "sides". ( https://www.huffpost.com/entry/both-parties-are-owned-by_b_7561400 | https://www.opensecrets.org/news/2017/03/richest-billionaires-are-top-political-spenders/ | https://www.npr.org/2011/12/14/143730288/top-donors-make-up-one-quarter-of-campaign-donations?t=1591367576600 | etc)
The police are not accountable to the people. They have all kinds of authority without the accountability to go with it. They now rule over you, and me. The police are only accountable to the corrupted politicians, who, in turn, are only accountable to criminal bankers who are accountable to nobody. The criminal bankers now run the world.
How do you win a wabattle? You cut off the enemy's supply lines.
The only supply line the criminal bankers have is their ability to create infinite amounts of their fiat currency "play money," then use it to buy actual wealth, and to empower themselves and selected cronies. Take that away and find out that they are just weakling cowards and old men... sociopaths.
To weaken their supply line, start using gold, silver coins, Bitcoins, and barter as much as possible. This makes Bitcoin part of the peaceful solution.
submitted by Mark_Bear to Bitcoin [link] [comments]

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads: https://old.reddit.com/Scams/search?q=common+scams+master+post&restrict_sr=on
Blackmail email scam thread: https://reddit.com/Scams/comments/dohaea/the_blackmail_email_scam_part_4/
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.

Spoofing

Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
Dropshipping
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

Door to door scams

As a general rule, you should not engage with door to door salesmen. If you are interested in the product they are selling, check online first.
Selling Magazines
Someone or a group will come to your door and offer to sell a magazine subscription. Often the subscriptions are not for the duration or price you were told, and the magazines will often have tough or impossible cancellation policies.
Energy sales
Somebody will come to your door claiming to be from an energy company. They will ask to see your current energy bill so that they can see how much you pay. They will then offer you a discount if you sign up with them, and promise to handle everything with your old provider. Some of these scammers will "slam" you, by using your account number that they saw on your bill to switch you to their service without authorization, and some will scam you by charging higher prices than the ones you agreed on.
Security system scams
Scammers will come to your door and ask about your security system, and offer to sell you a new one. These scammers are either selling you overpriced low quality products, or are casing your home for a future burglary.
They ask to enter your home
While trying to sell you whatever, they suddenly need to use your bathroom, or they've been writing against the wall and ask to use your table instead. Or maybe they just moved into the neighborhood and want to see how you decorate for ideas.
They're scoping out you and your place. They want to see what valuables you have, how gullible you are, if you have a security system or dogs, etc.

Street scams

Begging With a Purpose
"I just need a few more dollars for the bus," at the bus station, or "I just need $5 to get some gas," at a gas station. There's also a variation where you will be presented with a reward: "I just need money for a cab to get uptown, but I'll give you sports tickets/money/a date/a priceless vase."
Three Card Monte, Also Known As The Shell Game
Unbeatable. The people you see winning are in on the scam.
Drop and Break
You bump into someone and they drop their phone/glasses/fancy bottle of wine/priceless vase and demand you pay them back. In reality, it's a $2 pair of reading glasses/bottle of three-buck-chuck/tasteful but affordable vase.
CD Sales
You're handed a free CD so you can check out the artist's music. They then ask for your name and immediately write it on the CD. Once they've signed your name, they ask you for money, saying they can't give it to someone else now. Often they use dry erase markers, or cheap CD sleeves. Never use any type of storage device given to you by a random person, as the device can contain malware.
White Van Speaker Scam
You're approached and offered speakers/leather jackets/other luxury goods at a discount. The scammer will have an excuse as to why the price is so low. After you buy them, you'll discover that they are worthless.
iPhone Street Sale
You're approached and shown an iPhone for sale, coming in the box, but it's open and you can see the phone. If you buy the phone, you'll get an iPhone box with no iPhone, just some stones or cheap metal in it to weigh it down.
Buddhist Monk Pendant
A monk in traditional garb approaches you, hands you a gold trinket, and asks for a donation. He holds either a notebook with names and amounts of donation (usually everyone else has donated $5+), or a leaflet with generic info. This is fairly common in NYC, and these guys get aggressive quickly.
Friendship Bracelet Scam More common in western Europe, you're approached by someone selling bracelets. They quickly wrap a loop of fabric around your finger and pull it tight, starting to quickly weave a bracelet. The only way to (easily) get it off your hand is to pay. Leftover sales
This scam involves many different items, but the idea is usually the same: you are approached by someone who claims to have a large amount of excess inventory and offers to sell it to you at a great price. The scammer actually has low quality items and will lie to you about the price/origin of the items.
Dent repair scams
Scammers will approach you in public about a dent in your car and offer to fix it for a low price. Often they will claim that they are mechanics. They will not fix the dent in your car, but they will apply large amounts of wax or other substances to hide the dent while they claim that the substance requires time to harden.
Gold ring/jewelry/valuable item scam
A scammer will "find" a gold ring or other valuable item and offers to sell it to you. The item is fake and you will never see the scammer again.
Distraction theft
One person will approach you and distract you, while their accomplice picks your pockets. The distraction can take many forms, but if you are a tourist and are approached in public, watch closely for people getting close to you.

General resources

Site to report scams in the United Kingdom: http://www.actionfraud.police.uk/
Site to report scams in the United States: https://www.ic3.gov/default.aspx
Site to report scams in Canada: www.antifraudcentre-centreantifraude.ca/reportincident-signalerincident/index-eng.htm
Site to report scams in Europe: https://www.europol.europa.eu/report-a-crime/report-cybercrime-online
FTC scam alerts: https://www.consumer.ftc.gov/scam-alerts
Microsoft's anti-scam guide: https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx
https://www.usa.gov/common-scams-frauds
https://www.usa.gov/scams-and-frauds
https://www.consumer.ftc.gov/features/scam-alerts
https://www.fbi.gov/scams-and-safety/common-fraud-schemes
submitted by EugeneBYMCMB to Scams [link] [comments]

Accepting Bitcoin Donations at Your Web Site The First 10 Altcoins - A Wikipedia Adventure! Why Wikipedia is asking for donations? Wikipedia asking donations explained why? Wikipedia donation Donate To Wikipedia.org Now! The Bitcoin Group #41 -- Nas Accepts Bitcoin -- Bitpay Zero Fees -- Wikipedia Bitcoin -- Overstock

Back in March, Wikipedia co-founder Jimmy Wales accidentally started a bitcoin donation campaign. After opening a Coinbase wallet, he shared his wallet address on Twitter and said that he would ... Bitcoin Bitte beachte, dass die Wikimedia Foundation nur Bitcoinspenden nur in Bitcoin erstatten kann. Da wir keine Bitcoins sammeln, werden die Erstattungen basierend auf dem US-Dollar-Betrag berechnet, den wir durch Tausch zum jeweiligen Rückerstattungszeitpunkt bei unserem Bitcoin-Zahlungsanbieter erhalten hätten. One important way you can help Wikipedia prosper in the long term is by including the Wikimedia Endowment in your will or making a donation and joining us in ensuring the future of free and open knowledge. The Wikimedia Endowment provides dedicated funding to realize the power and promise of Wikipedia and its sister projects — ensuring access to knowledge for everyone, everywhere. For more ... Wikipedia Co-Founder Jimmy Wales Accidentally Starts A Bitcoin Donation Campaign For Wikipedia. Romain Dillet @romaindillet / 6 years Is Jimmy Wales testing out Bitcoin donations for Wikipedia? Wikipedia is now accepting Bitcoin Cash donations The non-profit foundation behind Wikipedia has now joined forces with BitPay to accept Bitcoin and Bitcoin Cash donations . Nawaz Sulemanji. January 31, 2019. Share: The non-profit foundation that operates Wikipedia has partnered with BitPay to accept Bitcoin and Bitcoin Cash donations. All of the Wikimedia Foundation’s work is driven by its ...

[index] [36451] [32376] [30158] [46085] [36489] [37757] [19552] [40379] [48603] [6603]

Accepting Bitcoin Donations at Your Web Site

In this video, we show you how to create a self-hosted Crowdfunding campaign and accept payments or donations from your backers. Accept Bitcoin and Lightning Network and take your idea from dream ... * Diese Bitcoin-Skeptiker wollen die Lightning-Seite von Wikipedia Löschen * Wir Berichten zu Aktuellen Kurs-bewegungen und Nachichten auf dem Kryptowährungsmarkt, bei weiteren fragen steht Ihn ... a wild wacky adventure down the yellow brick road and through wikipedia forest to discover the first 10 altcoins! https://bitcoinmagazine.com/articles/genesi... MadBitcoins reenacts a scene from the 1996 Roland Emmerich classic Independence Day. "Good morning. Less than a few hours ago, bitcoin prices were crashing a... #LIVE - CALL IN - Bitcoin Breaks $9000 - Warren, Bloomberg Out - No Crowds, No Concerts - THS #003 World Crypto Network 36 watching Live now Live CEO of Tesla Elon Musk about Company News and ...

#