Listen Music during reading my blog

Sunday, November 22, 2015

[Tutorial] How & Why Mix Your Bitcoins ?

Welcome to Bitcoin Blender

We are a hidden service that mixes your Bitcoins to remove the link between you and your transactions. This adds an essential layer of anonymity to your online activity to protect you against 'Blockchain Analysis'.
For discussion about this mixer, and making sure this is the correct url please go to this this forum thread on
2015-11-21 Its now possible to delete your account from the profile page.

1. Why Mix Your Coins

2. Why Bitcoin Blender
3. Other Methods

4. Best-Practice for Top-Level Anonymity

::: 1. Why Mix Your Coins :::
Using Bitcoin does not protect your anonymity. This is because Bitcoin works on a public ledger, meaning anyone anywhere can see and follow every transaction you ever make. From the moment you buy your coins, to the moment you cash them out... they can be followed. And if anything along the way can be linked to your identity - for example if you bought or sold using your bank account, face to face with cash, or even using a voucher from a store with CCTV - then an agency with the right tools could theoretically find you without much trouble. Classic examples of people who might follow your online activity and reveal your identity, are Law Enforcement Agencies, somebody with a grudge, or hackers who have noticed you are moving large amounts of money around.
But by 'mixing' your Bitcoins, you are essentially breaking the link between your identity and your transactions - Bitcoin Blender lets you prevent Blockchain Analysis by swapping your coins for somebody else's. In other words, you deposit your coins into one 'pot', and we send you coins from another 'pot', breaking the chain.

::: 2. Why Bitcoin Blender? :::
 At Bitcoin Blender, we have implemented a range of features that we believe make us one of the best, most effective Bitcoin mixing services available:
- Low, Randomized Fees (1-3%)
When you deposit coins into your Bitcoin Blender account, we will take a low, randomized fee of between 1-3%. We make our fees low to keep coin mixing affordable, and we randomize the fee to make analysis of our service less predictable. In other words, if our fee was a standard 2%, blockchain analysis would be made more trivial - interested parties would need only look for suspected deposits and withdrawals tagged with a 2% modifier. Our randomized fee takes this tool away from those who would seek to tie your transactions to you.
- Bonus Program (0.5%)
If you deposit more than 10 BTC within 7 days, your new deposits will give a bonus of 0.5% of the deposit, effectively making the fee 0.5% lower for you. We believe in showing our high volume users appreciation. We have structured this as a bonus rather than a fee rebate in order to maintain the integrity of the 1-3% randomized fee.

- Referral Program (0.5%)
We have designed a referral program to show our appreciation to our users who see Bitcoin Blender as a streamlined, fast, and most importantly effective mixer. Once combined deposits from a user and his/her referred users reaches 10BTC in 7 days, the referring user will be credited 0.5% of all deposits. A token of appreciation for helping improve Bitcoin Blender by bringing more transactions to the pool.
- Two Factor Authentication with PGP
By setting your PGP key in your profile you will activate Two Factor Authentication, which means that you have to decrypt a message containing a randomized One Time Password on each login. This ensures that only the individual with access to your private key and password can access your account and your funds.
- Up To 5 Simultaneous Deposit Addresses
As per coin-mixing best-practice (see part 4 below), splitting chunks of money between different wallets and addresses makes your anonymity even stronger. With Bitcoin Blender you can send your un-mixed coins to 5 different addresses at once - they will all show up as a single balance in your account for ease of withdrawal. You can then delete them and get new ones.
- Auto-Withdrawal
If you prefer, you can set wallet addresses for auto-withdrawal so you do not have to log back in to withdraw your coins. Withdraws are scheduled and with random delays for best anonymity. Set and forget. We take measures to ensure you only have to pass credentials as often as truly necessary.
- Fast Processing
Although it is recommended that you let your coins 'sit' for a while (among other techniques - see part 4 below), Bitcoin Blender makes your coins instantly available for withdrawal the moment your deposits are confirmed. As is outlined below, your withdrawal comes from a totally different 'pool' of coins, so your withdrawn coins are never traceable from your deposited coins.

::: 3. Other Methods :::
There are several ways of 'mixing' your coins, however many of these do not provide the same protection against Blockchain Analysis as Bitcoin Blender (and other similar hidden services).

Perhaps the most common method aside from using a hidden service mixer like Bitcoin Blender, is the Coin Join method found on services such as Shared Coin. The way this method works is by attaching your transaction to a number of other transactions, thereby making it difficult to tell which has gone where. And although this method does help maintain a certain degree of anonymity, it still provides a level of 'taint' for somebody experienced in Blockchain Analysis. 'Taint' can be seen as the trail your transaction leaves behind, and although techniques used by services like Shared Coin certainly blur that trail, they do not remove it completely - for best results, you should find a service that sends you coins from a completely different 'pot'.

::: 4. Best-Practice for Top-Level Anonymity :::
As a standalone tool, Bitcoin Blender provides a very good level of anonymity for erasing your transaction trail. However, as with anything, you can always take extra precautions to ensure your anonymity remains top-notch and offers the greatest protection possible. As well as using Bitcoin Blender's basic features, we recommend the following:
1. Deposit to Multiple Addresses
Bitcoin Blender makes available the ability to split your deposit up between five bitcoin addresses at once. If an interested party is attempting to locate your deposit of 50BTC, their task is made exponentially more difficult because they must attempt to locate five deposits of varying amounts that may or may not add up to 50BTC.
2. Delay Your Withdrawals
If someone is watching the blockchain, and they notice a transaction for 100 BTC at 4:30, followed by another transaction of 98 BTC at 5:00, they might suspect this is a part of the same trail - even if there is no hardcore evidence. By waiting several hours, days or even weeks, you are further distancing yourself from association with the coins you wish to mix.
3. Withdraw to Multiple Addresses
By the same token, if you deposit 100btc and withdraw 98btc to a single address, this may give somebody watching the Blockchain reason to suspect it is part of the same trail. By making multiple withdrawals to different addresses generated by different wallets over a long period of time, you are further improving your anonymity. Bitcoin Blender makes this simple by allowing you to schedule your withdrawals for points in the future, so the task of mixing can be accomplished during a single session. As mentioned earlier, we take every measure possible to minimize the number of times a user must pass credentials in order to complete the task of mixing.
4. Mix Multiple Times
If you want to really make your trail as difficult to follow as possible, and there is another service you trust you could mix your coins several times.
5. Mix In, Mix Out
Your 'buy in' and 'buy out' are the most vulnerable parts of your transaction trail, as they are the most likely points that you will be identified. If you do not wish your transactions to be followed, mix all coins you buy before you spend them, then mix anything you withdraw again on their way back out.

To buy something at (for example) the DarkNet Markets you need Bitcoins, so go to any shop in your region and exchange money into Bitcoins,for example here (

Europe BTC SHOP & Exchange

↓↓↓ is highly recommended↓↓↓
Visit this link to create wallet to buy,sell or trade bitcoin:

To mix your bitcoins use Bitcoin Blender:

↓↓↓ is highly recommended↓↓↓
Visit this link to create wallet to buy,sell or trade bitcoin:
Now you can use Bitcoin express trading with FIDOR Mastercard 
No more waiting 
 Get your FIDOR Mastercard here for free:

                                 Hide your TOR usage and use IPVanish to stay anonymous !

                          ↓↓Click on the link down below to get more informations about pricing & IPVanish↓↓ 



Sunday, November 01, 2015

Some Types Of Internet Security Threats, Scam Prevention & Finalizing Early
Scamming has, and always will be, a huge issue for any Dark Net Market user. How do you know you’re going to receive the product that’s described in a listing? There are many trains of thought on this issue and many people have vocalized the simple solution “Don’t Finalize Early! Don’t give them money until you get your product!” which is a wonderful piece of advice. When placing an order on a marketplace, there will be an escrow system that holds onto your funds until you authorize the release to the seller.
It’s a classic system, one that has been used even since before Silk Road came to life – the trusted middleman holds onto the funds while the deal is taking place to avoid one person from pulling some kind of scam on the buyer/seller. However, there are still risks involved, and many ask themselves “Why do people finalize early?”
When it comes down to it, someone may be so inclined to finalize an order that hasn’t made it to them yet (or even worse, before the vendor even confirms the order) because of a foundation of trust. Putting your trust into a seller who has provided quality products and has quality feedback makes the escrow system look pointless. When a buyer is staring at 5/5 reviews, with hundreds of orders, there won’t be a single doubt in that buyers mind that anything could possibly happen.
This is where the critical judgment error occurs. Exit scamming has turned into an art – a lucrative and manipulative one, at that. Let’s look back to the original Silk Road, and take a look at one vendor in particular – Tony76.
Now, the more experienced Dark Net users may have an idea of who this is already, but in case you don’t, I’ll give a brief summary. Tony76 registered an account on Silk Road on 10/01/2012, nearly 3 years ago. He was most prominently known for his high quality Heroin, allegedly the best on the market at that time, but also sold MDMA and other products. This vendor was doing everything right, and had great prices and a great army of supporters who would never doubt a thing he said. His prices were so good, he was making a huge name for himself, and it was showing. Customer satisfaction proved to be number one, and over time all buyers had no issues whatsoever buying “finalize-early only” listings, because, hey, it’s Tony! What could go wrong?
Needless to say, Tony disappeared after a massive sale and took his customers Bitcoin with him, never to return, never to ship another package. This is quite an elaborate exit scam, in the sense that it was the “long-con”, make everyone think exactly what you want them to think over the course of a few months and run. This is relevant now more than ever, as there are many FE-only vendors popping up with excellent prices.
History tends to, and will, repeat itself. Don’t get your money stolen by somebody you only know through the internet – it’s silly and when it happens you’ll ask yourself how you could have made such an error. Granted, the escrow system does have its flaws. What if the market goes down, or gets seized, what happens to your money? It’s gone. That’s the inherent risk of Dark Net Markets, and you must always be prepared for the worst. An alternative to this is taking advantage of marketplaces which use multisig escrow , for maximum buyer/seller security, which is implemented on several markets.
Many people will still choose to finalize orders on their own terms, and as long as you know what risk you’re taking by trusting an anonymous vendor, than it’s your call. Stay safe, everyone.

Some Types Of Internet Security Threats


The world we are living in is making a fast evolution to digitize everything. Books, weight loss programs, music, even parties and classes are all now available online in digital form. Indeed, the technology for all these applications continues to innovate and grow exponentially fast.
Needless to say, with this raging growth in the online industry follows a rapidly increasing number of cyber security threats. As every aspect of our lives turns digital, we are in turn becoming more and more open to having our files compromised, our privacy violated, and our information stolen. Government and hackers alike are to blame, because Internet surveillance is now pervasive in almost every country, despite public protest over such bad measures.
There is a host of obvious threats to your Internet security and here’s what online users should watch out for.
Ransomware is a sickening form of malicious software, which infects victims’ computers, locks up all, or some documents and asks for payment in exchange for them to regain access. Cryptolocker – the most infamous example of ransomware – was earlier this year dealt as huge blow when several people were arrested by federal officials for allegedly being involved in the scam.
And, although that crackdown was a great step, Internet security experts say the software is still spreading and it is now moving to new soft targets. Intel’s McAfee Labs, has managed to track a rapidly rising number of ransomware attacks, especially on mobile devices.

Possibly scarier: Internet security experts generally recommend that people back up their data in order to avoid the pain of losing access to their documents and files, however, McAfee has warned that new ransomware strains might attempt to target securely stored login info for cloud backup service and lock up the files too.
Consider backing up your documents to external hard drives to avoid ransomware threats. Just like with many other kinds of malware, this one is also often unknowingly downloaded when consumers click on links or open email attachments.
However, if you at any one time you become a victim of ransomware attacks, please avoid the temptation of paying up. There is absolutely no guarantee the villains will actually free up your files, and funding Internet security crooks’ activities only worsens up the matter.
Malicious messages that certainly seem like the real thing
Cybercriminals mostly deliver malicious software or obtain personal information by tricking their victims with messages that really seem as legitimate. Download the attachment or click the link, and you have unintentionally infected your mobile device or computer.
Such malicious e-mails were once unsophisticatedly done: poor grammar, broken images, or other hints that the messages were not really coming from your mom or the bank. However, cybercriminals now have advanced increasingly and are now using toolkits’ at their disposal to help them build very truthful-looking malware and messages.
They can direct a tool at any website, say a school, and it scrapes the actual school site’s language, logo, language, everything. Internet security experts used to tell consumers to stay clear of things that look suspicious, but these advanced toolkits’ can trick even sensitive customers. It is all turning out to be a more professional game that is likely to hurt many Internet users globally.
It is a highly sophisticated spin on old attacks, and it’s worrying that consumers are always wrongfully assuming they shall be able to know any malicious e-mail. The best thing you can to do remain safe from this type of Internet security threat is by simply not clicking on links coming from any e-mail.
If that is really too extreme for you, then be sure to hover your mouse over hyperlinks ensure they are taking you to the site they claim to be. And, if it appears even remotely wrong or strange, do not click the link. Try to exercise extreme caution whenever you are dealing with any attachments as well.
Targeting the “one percent”
Although cybercriminals may target a particular government or company entity, they generally don’t spend much time targeting a single person because the possible financial pay-off is not worth their time. Nonetheless, wealthy consumers are the exception, according to a recent Internet security research carried out.

It is highly expected that cybercriminals will have a more active eye towards the wealthy – the one percent. If a criminal thinks he/she can get a serious amount of money from a victim, he/she can decide to spend a lot of time on a personalized attack.
Even if you are part of the 99%, Internet security experts warn that consumers must desist from giving out information like employers, birthdays, as well as other bio details on Facebook , Twitter, and other sites. Crooks can be devious about leveraging this info.
Cyberwar and Espionageware
What Internet security experts have been terming as a “Cyber Cold War” for quite some time is now ramping up very quickly. Indeed, many nations and states both strong and weak see cyber-attacks, as the best weapon to counter United States’ global influence.
Therefore expect an increase in malicious software being used by governments to spy on the activities of certain individuals. Amnesty International recently released an antispyware tool, which scans devices for surveillance software belonging to governments.
Overall, Internet security experts predict the number of cyber-attacks will go up in 2015 and beyond. It is scary stuff, but there is hope that public awareness and conversation will as well increase. Of course, that will not happen overnight, but in order to make changes a conversation will have to be started.
In the meantime, there are a handful of best practices that can protect average persons from a host of vulnerabilities likely to face them. First, ensure to keep your antivirus software always updated, never store sensitive personal info online or on e-mails, use strong passwords, never sign into accounts when using Wi-Fi networks that are public and exercise extreme caution when downloading attachments or clicking links.

Rules For Market & Vendor Shops Listing

So you own a market and want to have it market listed on DeepDotWeb? These are the rules you must follow:
  1. Deposits & withdrawals must be fully functional (will be tested regularly from various accounts).
  2. Must have several active (5 – 10) vendors on your site.
  3. Must have uptime higher than 75%
  4. Must not be down / inactive / unusable for over a week without letting us & the users know why.
  5. Must not shill and leave good reviews for yourself or bad reviews for other markets. We see those, and normally ignore & delete them, but do it to much and you will be kicked out.
  6. Upon submission, please include all the needed data to create a full market chart listing for your market – its your responsibility to keep us informed with any updates.
Vendor shops:
  1. Must be an active vendor (provable) for over a year.
  2. Must send us a PGP signed message containing your shop url + link your profile on one of the active markets OR Grams infodesk containing the same PGP key & user reviews.
  3. Must have at least 4.7 users rating average.
  4. Must have uptime higher than 75%
  5. Deposits & withdrawals must be fully functional.
  6. Should not have too many users scam reports about doing direct deals with you.
  7. Must not shill and leave good reviews for yourself or bad reviews for other markets / vendors. We see those, and normally ignore & delete them, but do it to much and you will be kicked out.
Your market / vendor shop will be marked as dead, scam or deleted without any notice if:
  1. Deposits & withdrawals will not be fully functional – without a reasonable explanation from you.
  2. Your uptime will be lower than 75%
  3. For vendors – high number of scamming reports.
These rules might change from time to time without notice, deletion will be done without notice, its your responsibility to learn and understand these rules.

Rules for Posting Market Reviews

Market reviews are very important aspect of all market’s reputation and crucial the how users & vendors decide which market to use, thats why we take them very seriously, so once and for all i decided to post a clear list of guidelines for posting market reviews.
Basically, your review MIGHT be deleted if it will contain anything but market review, that means:
  1. If It will contain blatant advertising of some products (i.e post your vendor ad on several markets).
  2. If you will post the same review more than once (even if the text is different).
  3. If you will Shill = leave good reviews for yourself and bad for others. This is a very common reason for disapproval or deletion.
  4. If you will Give a market low score because a vendor scammed you, doesn’t matter if you FE’d, stayed in escrow, or used multisig, its your problem, not the market.
  5. If you will post any kind of personal information.
  6. If you will post links to downloadable files.
  7. If you will post non-darknet related contact info (ie. Skype , ICQ , Email etc).
  8. If it will contain anything that will be suspected as scam service / site.
  9. If it will contain anything that will be suspected as phishing – If you want to let us know about url changes or alternative urls, use the contact page.
  10. If you will post referral links.
  11. If you will leave low score because you got phished (We test all markets on a regular basis from anonymous accounts to know if you can deposit / withdraw) so no point at leaving “Admins are scammers!!!11! i can’t login after deposit” or “EXIT SCAM!!!” reviews because YOU got phished, lost your password, PIN or whatever. Its getting out of control.
  12. If you will post unrelated / unknown links to other sites / services.
  13. If you will post more than one review in a row to add more info, they will be merged into one.
These rules might change from time to time without notice, deletion will be done without notice, its your responsibility to learn and understand these rules.