ISIS Host their Site on the Dark Web and goes Anonymous on ...

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethereum [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to privacycoins [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to CryptoCurrencies [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethtrader [link] [comments]

Transcript of George Webb Video Series Part 304 "Hillary's Leakers, Hackers, and Henchmen" [@Georgwebb / #HRCRatline]

  • Day 170.1 Chrystal and Flynn Recommended Gritz For Key Post in 2005, SES Knocked It Down - YouTube
    • It's day 170 for those folks who weren't following yesterday we had a chance Task Force an ID to meet Robyn Gritz last night
    • And she was a counterterrorism agent within the FBI for a number of years
    • I think about two decades
    • And she briefed a lot of presidents and--we went through her career
    • And she kind of was knocked down by a Andy McCabe unfortunately as they started competing for positions
    • And he started moving up through the ladder
    • And I've kind of used Richard the third as the Andy McCabe character
    • And this this woman here was as sort of the Margaret of Anjou--if you will
    • Lots of historical analogies that you can you can pull
    • But what was really great is meeting both love having Robin meet with with Task Force--Task Force to talk about law enforcement
    • And then kind of when you get in the way, what happens?
    • Especially kind of in a male-dominated area
    • So there's a long conversation about three and a half hours
    • But what I took away from it, I left on me post last night
    • But the last thing I said so you can see can read that
    • But the last thing I said was to get Robin over 20 thousand dollars
    • I PROMISed I would and we'd get her over that
    • I really think this should be around 500,000 of her to mount a legal challenge
    • And it's more important than just writing the wrongs of Robyn Gritz--as far as what happened to her career
    • She really was on the fast track all the way back in 2005 with General Stanley McChrystal, way before Mike Flynn
    • She was working with Mike Flynn at that time
    • But this was really it she was kind of on the fast track
    • And her appointment in 2005--and I think this is so important to go back to that date
    • To a person was put in the job where the crystal
    • And Flynn did not know who the nominee was they had both nominated her for this job
    • And she was yanked out of this in McCabe kind of SES guy was was put in the position
    • And that goes all the way back 13 years to that critical juncture, where she was kind of on the fast track to be maybe the head of a DIA or something like that
    • So I think this is really important history to share--that really
    • She briefed so many different presidents on some of the most sensitive kidnappings and bombings...in our in our nation's history
    • And I think Trump would do well to sit with her just just to review those situations if nothing else, from the perspective of the FBI
    • And then the other thing I think this is [[Director Freeh]] a Louis Freeh
    • Get back to the get back to the historical roots
    • And values of the FBI
    • I think that's the other thing that Robyn Grits could briefed the president on
    • So I really want to get away from this idea of Robyn Gritz as the victim...and get more toward the idea of Roby Gritz as the expert there's a great deal of expertise that she could lend at Trump
    • And Trump is only gonna get this insight or SES old boys club
    • It's not even old boys club is kind of a new new boys club--billionaire boys club perspective of the FBI
    • And this I believe Trump really has this opportunity in a briefing
    • It's really get the old FBI, the old ethics, the Louie Freeh ethics of the FBI the Kallstrom type ethics of the FBI
    • So anyway looking down here on the donations
    • There's always some--glad-hander grandstander that always wants to be number one, this idiot George Webb or George Sweiggert
    • So I'm thinking about doing that that dope
    • So anyway that is this morning's update
  • Day 170.2 Trump Sanctions Deripaska. Firtash and Pinchuk Next? - YouTube
    • It's Day 170
    • And this is part two
    • And the big news story obviously is the Treasury Department's sanctioning the different Russian individuals as well as entities
    • And they're seven Russians, including Oleg Deripaska you remember Oleg Deripaska the pasta that comes out of your salad with the derringer that Deripaska
    • You've also got 12 Russian companies and then 17 senior Russian officials
    • And these officials usually are just kind of fillers
    • And its really the companies and the Russians that are really interesting
    • Now, you'll notice that we've done a lot of work on a like Deripaska
    • So I created a playlist for him
    • And then also with Russian companies you'll see three or four different Russian companies like VTB Bank and others that I've focused on
    • And that I put out on Twitter as well this morning's for background on who these people actually are
    • What we're going to continue doing is continue identifying more Russians more of Hillary's Russians
    • Christopher Steele's Russians, Andy McCabe's Russians that they work with
    • And these are just organized crime figures they were FSB agents they became organized crime figures
    • And basically they've been running different types of Kompromat
    • So we'll be focusing on Russians like the VeroPharm deal with Abbott Laboratories here in Chicago with Rahm Emanuel
    • And our famous basketball-owning Russian oligarch basketball-team-owning Russian oligarch in New Jersey Mr. Pinchuk
    • We'll be looking at the pinch-Bears the famous crowdsource a crowd strike a hacking team that potentially just got exiled or expelled by Trump
    • So the are the pinch Bears associated with Pinchuk?
    • Was that associated with getting the VeroPharm deal through and other Russian drug company deals through other Russian weapons deals through we're gonna look at that we're going to look at Firtash we're gonna look at other oligarchs like Katsyv and we're gonna look at Friedman
    • So all those names will be coming
    • And our objective here is to add to the list of people on the US sanctions
    • Take out all of Hillary's and Christopher Steele's and Andy McCabe's Russians: that's the key
    • Now, the other thing that could help is bring people to the White House that can luminate Trump's knowledge of anemic Apes Andy McCabe's tactics
    • And also informed public policy on terrorism counterterrorism somebody like a Robyn Gritz being invited to the White House is what we recommend
    • We still have a hostage in Iran this
    • A lot of these dealings with the Russians were for the Iran deal we have Anthony Weiner's trusted staff negotiating these deals on Blackberries
    • We have the different Gmail accounts from the State Department negotiating these deals with Iran
    • Now, we have people shooting people from Iran at YouTube
    • And now, we still have a hostage there in Iran
    • Was Robyn Gritz shuffled off the Robert Levinson deal because she was making too close--she was getting too close to family--she's making too much progress?
    • We really don't know the answer to that
    • But we think that President Trump would do well to get an insider who's been on the case since 2007, has years of experience with negotiating with the Iranians, to the White House to get an outside the bubble perspective on the Russian Iranian situation
  • I'm not going to transcribe the live videos--they are too long and I can barely keep up with the short ones
  • Day 171.1 Why Be A DHS Expert If You Ignore the Awans? - YouTube
    • It's day 171
    • And just to be sure I checked into the plum book
    • And made sure my brother wasn't in there, and he wasn't
    • So the plum book if you don't remember is a listing of jobs available in the public sector
    • These are civil servants jobs, starting at the presidential appointees, down to Senate confirmation, to just presidential appointees without senate confirmation, and then of course the all ubiquitous SES a Senior Executive Service, which is sort of a sort of a union if you will, at the top executive levels inside the Government
    • What I'd like to do sometimes is take these names or different keywords and go through the plum book
    • And just show people the number of occurrences
    • And I realize this is kind of the hard work of research
    • And maybe not particularly interesting for all the catfights on Twitter etc catfights on YouTube
    • But it is kind of the stuff that makes or breaks hypotheses and kind of moving the ball forward
    • So anyway if you remember before I just took the occurrence of the word homeland
    • And I saw 39 occurrences over here 39 occurrences in the plum book
    • And my theory here is that the DHS or the Department of Homeland Security is sort of used as a wedge or a funnel for the DoD to kind of insert people into a kind of a national control mechanism--a U.S. control mechanism
    • So the same techniques used overseas to gain control of kind of a an undercurrent or or a party or a union like the SEIU let's say
    • And then you would take over that labor union like let's say Poland way back when when Poland was being overthrown, you would use that Union to do all your communications protect your communications until the time of overthrow
    • Is that the same thing the DoD is doing in the United States with SES? Is sort of theory
    • So if you don't remember Lisa Monaco would just go down a list here this is really the first occurrence
    • She's really kind of brought up as a--a young, hard-charging young female attorney as a DHS expert
    • And then if you remember the kind of the PR shots in the White House
    • Here's Lisa Monica of course Susan Rice and Samantha power they all sit on the couch together all day like that and go through their papers
    • So these are kind of glamour shots obviously this is not a very realistic working situation here in the White House
    • So and I understand a certain amount of this this is a this is good PR...
    • She's from the University of Chicago and then got a pedigree at at Harvard
    • So moving along in the plum book
    • She's not even Senior Executive Services you can see over here she is--just presidential appointee
    • So we'll go quickly through the different appointees in Homeland Security
    • And most of the folks are not listed there this--kind of a Ditto kind of thing career incumbent they're Korean come
    • But they're--they're ditto there and then career incumbent
    • Again, this Thomas F Atkins interesting
    • So I just what I do on these is I drill down on two or three just to get a feel for people to get a feel rather than just end the discussion, and not do any more detail detailed research on the SES books
    • So here's Thomas Atkin--was once the former acting secretary of defense
    • I don't know if that is when who who was the Secretary of Defense he was acting for
    • But he's got his own group now, he's left in 2012
    • I'm trying to think of what shake-up happened inside me Department of Defense at that time
    • Senator from Nebraska I believe was the Senator then became the Secretary of Defense
    • But anyway he's got a new company now, he's broken away from the...or else he's joined this other group
    • Here he is the assistant secretary of defense here cyber strategy...and then Homeland Security
    • And then of course the obligatory time at Raytheon--gotta know where those cruise missiles are at all times
    • Then of course a visiting fellow here at the Homeland Security Institute and here we go back to the Coast Guard
    • And this seems to be the Coast Guard seems to be that kind of a key inflection point for kind of entering people into DHS
    • Seems to be quite a bit of emphasis there
    • Border security and so forth Operations Group
    • And the my only question is--I look at all these different resumes, and I see all these add all this expertise
    • But the simplest questions that can't be answered in Washington
    • About what's going back and forth on Imran Awan's server?
    • What are the terabytes going back and forth Imran Awan's server?
    • A lot of this emphasis starts on FEMA I noticed there's a similar emphasis with the Army with FEMA on some of these resumes
    • So he kind of comes up the ranks for FEMA here
    • So I'll just quickly go back here, look at some other resumes
    • Vacant
    • Career incumbent
    • Vacant
    • Matthew Gula that's the GS position
    • So Jeh Johnson of course we all know
    • Mayorkas was kind of the guy who was kind of drummed out of the service because of dirty dealings
    • And Erin Walls she's GS so we won't talk about her
    • And again, when he gets to the ES positions
    • Again, you see there's just a lot of vacancies
    • And again, John Roth was the Inspector General of Homeland Security for another career incumbent
    • Just not a lot of data
    • The only one person really would get any data as the Coast Guard guy
    • And is that because that I don't know Americans have an affinity for the Coast Guard?
    • Here's John Roth we still don't have an Inspector General for Homeland Security
    • Again, that's another position, yet another Inspector General position, that's not filled with the Trump administration
    • I don't know if that's by design or on purpose but
    • Again, here are the whistleblower protection Ombudsman vacant vacant
    • So you've seen really there's only one here
    • Again, Ditto
    • Only one position we've seen
    • So far in the ES
    • Again, vacant of who actually runs these things and
    • Now, here this is a million homeland security
    • So those are all the occurrences of the word Homeland Security
    • And my takeaway would be we need to know these names
    • And we need much more scrutiny on if you're going to be in Homeland Security if you're gonna be an expert you're gonna be the assistant secretary of defense you're gonna have all this border security, and all this knowledge, and all these consultancies, all these groups, all this expertise, you have to apply it to the most pressing need in the country right, now, which is the Awans
    • Terabytes to Pakistan
    • Hundreds of suspicious payments
    • Thousands of suspicious logins
    • If you don't apply your expertise to the most pressing problems, what good is the expertise
  • Day 171.2. Introducing UpWhistle and Rich Seng - YouTube
    • It's day 171
    • And i'm here with the founder of giggety this is rich hello saying how you doing yeah how you doing to everyone like many of you I've been following George from--day 50 or
    • So really been impressed with how media is changing because we can
    • Now, take control of the narrative
    • And we're no longer trapped into the mainstream media
    • And riches rich is not satisfied with just having a first name of rich
    • And he has filmed people who's saying
    • And he did get rich that way as the founder
    • And CEO herein
    • And I don't know how rich you are now
    • But I'm penny not uppity giggity-giggity I figured no no diggin what we did yeah giggity is a live streaming company we would go to music venues
    • And comedy clubs how to use you this morning YouTube could have used you
    • And we installed the cameras
    • And microphones permanently
    • So that event you no longer had to like--do anything
    • But just spend one minute scheduling to start time
    • And end time on a broad kind of like a newsroom yeah
    • And then--is it going to be free or pay-per-view if it's a pay-per-view how much does each artist receive
    • So we're like buddy guys legends we're at second city in IO
    • And venues in Los Angeles
    • And in Boston
    • But still were 40 or 50 of these venues about 40 yeah and--we were allowing people who could not attend a rock show or a comedy show to just pull up the live stream
    • And then get then get money for all the artists to watch run if your patreon that's perfect yeah yeah
    • But it wasn't like a donation it was more like you had to pay five bucks for the pay-per-view ticket oh
    • So it's more than just a donation on the month
    • Now, you see the Flatiron Building behind us do they call this area of the Flatiron well this is areas Wicker Park
    • And it's mainly like an old Polish neighborhood *--they built all these old buildings just fix this Roby hotel over the Robie Hotel your startup have your meetings on the second floor of the Roby great great breakfast there too we didn't actually eat there we just look well we had some bagels yes courtesy of giggity yeah
    • So I always make offers to make myself rich
    • But I try to I try to make it look like it's a team effort because that's what I do right and
    • So what I talked to you about was up whistle
    • Now, here's my idea of up whistle is--how you upload stuff--people upload stuff right yeah yeah wouldn't it be great wouldn't it be great if whistleblowers had a way of up whistling if you had like some like oh here's Imran leaving with the Bitcoin--with the leg up like this leaving Rayburn if you're Andrew McCabe with like a change of conscience in a lumination of your conscience yeah Rahm Emanuel
    • And you're--going into the back of the cabs--getting the drop from from Podesta would it be great if you could up whistle yeah well you put up your your leak theoretically
    • And then the crowd would go
    • there's something here that the main guru you could vote it you could own it you cannot vote it
    • And vet it
    • And then--what I found out--what I found out I had this great idea of up whistle I had this out domain name
    • And guess who had the domain before me yeah I happened to scoop up the name right before George
    • So I own up whistle calm
    • But it's going to be something for like like one of the things I've watched Infowars like Alex Jones used to infuriate me because there's
    • So many good stories like yours that just never got hit upon
    • So I'm like what if there was up whistle where people could people could bet those RLC SSDs convention this weekend people could vet the idea
    • And then then Alex Jones
    • And all of these like independent alternative news wired networks they would just have the cream the cream a story this the cream idea would just be right there for
    • So it's better than up voting it's up whistling because what you're doing is you're working you're going on to a crowdsource sites you're getting a lot of data you're you're finding some kind of stuff it's kind of like our Trello board only it's up whistle for everybody
    • Now, the world cannot vote that on the Trello board base yeah yeah yeah
    • So basically--if you are an insider
    • And you have that illumination of conscience well you're like--this is hurting society civilization this needs to get out well let's just say somebody said here's the address of mis department yeah could you go by
    • And fill me in todepart yes you could you could just--hop on your bicycle you get on the bus you can yeah well maybe we'll do that see if this guy's really--how did you let me talk you out of
    • So much stock in our first meeting yes I think I think they're going for you rob we're here in Winter Park at he's just a faker
    • let's let's put you to the test let's see if we can find we're gonna give we're gonna be like a scavenger we're gonna give you its on California talent we're gonna give it a walk yeah we're gonna see if you can find the Mis Department we're all the FBI phone calls remember Hawkins member Andre Hawkins making all those phone calls that's what that that metadata I just told the story that metadata when I share it with two people from the DNC at I won't say what place in Washington DC they said no no no there's two letters there's two joint funding letters I'm like oh there's another joint funding letter thank you
    • And then Donna Brazile came out with a prequel about three days later admitting to the second joint funding agreement to sweep the NGP Van data sweep the money to Brooklyn
    • let's go let's go
  • Day 171.3 MIS Department For the DNC. - YouTube
    • It's day 171
    • And here we are at the MIS Department for the DNC and so it's a public address right?
    • So we're the public address it was I first found it once MIS was in the news and everything your news yeah it was on Facebook
    • And I'm like oh my gosh this is like it's on California Avenue I'm just six blocks away
    • So I just rode my bicycle here, and the building is right here yeah and
    • So this antenna behind us is the 14th precinct to here in Logan park?
    • Logan Square Logan Square
    • So this is kind of the new gentrified was Wrigleyville
    • And then it was Wicker Park.. all right with the park and
    • Now, yeah it's constantly like moving Northwest from from downtown area
    • But yeah yeah
    • And it's real complicated you think I mean this is the location
    • It's obviously a business address according to the DNC yeah
    • And how many times do you think Adrienne Hawkins would have called?
    • Wait history maybe six nine nine nine times
    • And the Calls came here and they didn't answer the phone! Answer the damn phone yeah!
    • So anyway there it is this is the famous location this is what I noticed the I did like OJ Simpson driving the white Bronco
    • There's a there's a guilty demeanor here
    • Like a guilty conscience that you see whatever they're just security yeah I don't think the choppers live here anymore
    • well they must get some blood buzz here if you go they have cameras
    • And they moved the camera
    • So oh it used to be in behind the window on the second floor
    • the no loitering no trespassing 14th district police call 9-1-1
    • Let's let's keep moving then we certainly don't want I just was trying to get my donations back
    • And I was wondering if I could put a slip in, like a night slip saying hey could I have my could you un-exfiltrate--is that a word?
    • Can you un-exfiltrate my terabytes from Pakistan my NGP Van data all the--all the personal information that they scraped with the Facebook profiles
    • Now, let's see Trump got what 27 thousand Facebook profiles and Cambridge analytica gave Hillary what like 4 million or 40 million?
    • yeah I know I up the AGP ban hold all that oh I don't know I don't know how many Hillary got
    • But I know Cambridge analytic I think Facebook just announced that it's like not 70 million
    • 70 million Ok we're up to 70 million profiles here yeah
    • So and then but Trump did get 20,000
    • So let's like call him on the carpet for that right
    • And get Bob Mueller Bob highly-enriched Mueller
    • So here we are in beautiful Logan Square we're gonna try to cross the street without dying
    • So I guess you think the Chopras--I don't think the choppers still live here
    • Well do you think Oprah's was just a cover like Chalupa where's Chopra's like Chalupa?
    • Yeah they're going to great lengths to conceal their identity, it seems
    • Like yeah I mean I think everybody said oh we love Chopra's I think they said
    • Willa who sounds really smart to everybody trust well that Chopra guy right yeah
    • What's his name Chopra the Chalupa how was it--it was the Alexander Chalupa for the Ukrainian girls okay
    • But I think they thought: well if we have the Chopra's running the Mis Department yeah they'll seem like a bunch of smart trustworthy people yeah
    • Not the Awans, the ones that get arrested for coming in from Montreal and PAK ISI
    • So there you have it well we'd like to upwhistle this suppose we wanted to upwhistle this right upwhistle is is not up yet--we're just
    • Now, kind of like brainstorming we're gonna race home anima
    • But what if we had all the pictures of the inspectors general yeah right listed all 73
    • And you could up whistle if you remember the house you'd have Theresa Graphenstine's pictures search house
    • So first of all you'd know who your Inspector General is right
    • You would then, so if you had if you were like you were saying for example in the Department of Energy--and suppose you were a relative or you knew something that was going on suppose you were there
    • And you knew that Imran was beating someone in the house...
    • So yeah yeah we would have to build something where you could perhaps anonymously put up a tip or a flare or something
    • So if anybody knows a good there was lithium and then a couple of other kind of like Facebook in Facebook type of things where anybody can post anything--you can post video you can post whatever yeah right
    • {{ 911: It's called 4chan 8chan. You're reinventing Q }}
    • And then you upload it you know
    • So you can upload your your hit
    • And then or your your your your allegation perhaps--suppose your lavoy finicum face Emily you could upload your family him being--shot yeah your grievance right right
    • And then and then you're just saying
    • community let's drill down on this let's let's test this idea let's see if it's true or not let's put forth the supporting evidence
    • And if it's true then we have righteous wrath--we then have a right to then demand justice or demand a wider investigation from our elected officials
    • And man I tell you what will populate the hell out of that house that house up whistle with the Theresa Grafenstine our Trello board whooo! will go right in there
    • Well thanks this has been great we'll have probably maybe one more secret up whistle meeting that you'll be a part of if you stay tuned
  • Day 171.4. Dough-Nation UpHustle On UpWhistle Stock - YouTube
    • Rahm I'll get you the bitcoins soon we're gonna try to get it in the basmati
    • The basmati barge the basmati barge hasn't come along just yet
    • But will we're gonna try to get we're gonna put it in some Lobster Thermidor ice
    • Oh wait oh we're on we're live uh hey
    • So upwhistle--already you remember donation
    • But not donation
    • But dough space nation---they should do ugh nation the guy who did the shoes that guy who did taskforces shoes
    • Dough Nation was trying to sell me upwhistle shares.
    • He said hey I got a friends and families round: tier one to your level get in on the mezzanine get in
    • << video cuts. It's probably a good thing>>>
  • Day 171.5. Leaving Clinton Station For Loop Capital With Rahm Bitcoin - YouTube
    • Day 171 here we are in the loop
    • Not Loop Capital, we're just on the regular L loop
    • They don't say loop capital, so that's not my train
    • But anyway talking about upwhistle, we're looking at 73 different inspectors general
    • One way more important than all the other ones, which is the Intelligence community Inspector General
    • But we're looking at upwhistling 73 different inspectors general
    • We're gonna start with a house of course getting that position refilled
    • We're going to start with the IC community Wayne Stone
    • He needs to go out
    • But then Department of Energy--the IC community is probably the most important
    • But having a place in where people can upwhistle all the documents
    • Hey here's an interesting thing: Imran stabbed this girl
    • That's interesting here's the police report just up whistling documents like we did on the Trello board
    • But for all three inspectors general
    • If I saw for instance a problem with the track here I would want to just take a quick picture it's at Clinton
    • You don't want this train to derail
    • But you don't want to wait forever you want to react immediately
    • You want to take advantage of the Intelligence of a crowd
  • Day 171.6. With Robyn Gritz Vs Bromwich Let's Get Robyn Over $23K - YouTube
    • It's day 171 this is part six I think something like that maybe seven
    • Task Force can you turn your head that way?
    • So here with Robyn Gritz as you can see wave hi Robyn
    • And with Task Force
    • And her are talking quite a bit with Bernie bridges--that's Bernie bridges
    • What we really would like to do is get Robin she's only a hundred
    • And forty bucks short of twenty three thousand
    • And really what we're trying to do here is to compare real grassroots fundraising, versus this Bromwich, which I call broom-which
    • Bromwich is the all Inspector General for Bill Clinton in the DOJ
    • And he's got a PR firm now
    • And he--he's been in all these high-profile cases DOE
    • And did the BP oil cleanup...and Andy McCabe
    • He's now representing any McCabe at this PR fake PR $500,000 go fund me that Andy McCabe has for his legal fund
    • So I just like to show everyone what real grassroots fundraising looks like
    • And if you could spend a little time today, give Robyn Gritz some love
    • I'm still the top contributor one thousand sixteen dollars if anybody wants to beat that I'll go higher
  • Day 171.8. Gritz Gofundme Part Two - YouTube
    • It's day 171 we're here at the Robyn Gritz fundraiser
    • You see a lot more people are here a lot more people are learning about Robyn Gritz and all the different things she did while being an FBI agent
    • She's talking to Task Force here [Music] [Applause]
    • One of the things I've learned I've learned so much
    • But there's a file there's a Gritz file
    • And I would put this out to all the internet people are being spanked here while I'm talking
    • There's a Gritz file yet that Robyn gave to Grassley--Robyn Gritz gave this file to Grassley
    • It was all the pain it was all the press clippings of all the terrorism cases that she worked--it's the Gritz file
    • And it literally reads like 20 different cases in our modern American history
    • And what I want to do over the next couple of days
    • And I would love for Jason and crowds aren't the truth Crowdsource the Truth or Emerald Robinson at One American network to do this more professionally that I can
    • But just tell the story of all the cases that Robyn Gritz has worked
    • Who knew that she worked the 20th hijacker case?
    • One she worked the 20th hijacker case
    • Two she worked the Sabina case--the Iranian journalist, the beautiful beauty queen Iranian journalist, Sabina
    • And got her extracted from Tehran, from her kidnapping
    • Who knew she saved a plane of 300 people
    • Who knew how many different mob disruptions of commercial airlines there were
    • Who knew there was a thousand people in a planned bombing in India that she subverted and disrupted
    • This is Robyn Griz story the Robyn Gritz story is
    • So much more than you know
    • It's not just the only woman to have the courage were the only agents and the courage to go against Andy McCabe
    • She's not just the Robert Levinson negotiator
    • She's not just the captain Phillips--Navy SEALs three Somalis pirates zero--that's not--that's just a very small segment of the hundreds of cases, the hundreds of cases that Robyn Gritz has done
    • It's my job to crowdsource the outline
    • I want Robyn to write a book
    • General Flynn has told her write a book
    • Tony Schafer has said, well we want to get her to touch with Tony Schafer at McCulloch who's Tony Schafer's lawyer
    • We want to crowdsource the outline we want to crowdsource the first chapter
    • We want to crowdsource the third chapter the 2nd chapter
    • We want her to get a book deal
    • We want her to get a movie deal
    • This is a true American Hero--it doesn't matter if she is a woman or a man
    • Robyn Gritz has stopped--has stopped the one one man in history and of our country to perform a Sedition--to perform a sedition in our country
    • Andy McCabe
    • She was a one agent who stopped that
  • Day 171.8 Gritz File Will Reveal A Hidden History of America - YouTube
    • OK it's day 177
    • And this is part 8
    • And it's pretty late into the evening
    • And we are here near the Rosemont mall not far from the O'Hare Airport just over here where Rahm is collecting Bitcoin on the are from Imran and friends
    • But I had a chance to spend about eight or nine...gosh it's been a long time with Robyn Gritz
    • And what I've learned is I don't know anything about the extent and the breadth and depth that Robyn Gritz had in terms of our national history
    • I mean we she she starts out in New Jersey with the Blind Sheikh
    • 9/11 happens
    • She is involved in flight 77 that goes into the Pentagon
    • We have the anthrax case with Tom Daschle, not too long after that
    • Of course we have the Robert Levinson case after that
    • There's a couple of other plane interdictions or bombing interdictions that I need to bring out
    • The Saphira journalist--the beautiful Iranian journalists I think she was like Miss North Dakota
    • And extricated her from kidnapping--that story
    • There's just so many stories that have been buried
    • And--everyone says well--just let it go no I'm not gonna let it go I'm gonna throw it up on the wall and say hey these were all things that Robyn Gritz did as a great agent--
    • Everybody says oh--Maersk--Captain Roberts was a great thing--the only agents to stand up to Andy McCabe
    • It's very cold, so I'm sorry I'm chattering a little bit 8 Everyone wants to say all these--11s...she was very close on Levinson she was doing something on Uranium One
    • John Solomon was talking to her, Sarah Carter was talking to her
    • She was very close on something with Uranium One I don't know if Robert Levinson or someone
    • But there were agents agents on her team as a Supervisory Special Agent that were abducted or not abducted, but they were withheld or held in UAE
    • And I believe as I've said before the UAE is the conduit to Iran
    • Were their reactors sold from Lawrence Livermore labs to the Iran?
    • Where their secret centrifuge farms with Jeffrey Sterling, selling the big washing machine type centrifuges, and then the smaller microwave type centrifuges
    • We really don't know, but a lot of pieces could come together if Robyn would get out there on a like a crowdsource of truth or a one American network
    • And do the long-form interview
    • And really put out--the pieces
    • And what I really want her to do is kind of crowdsource the outline crowdsource the outline of all these--
    • She she really has just been involved in all these different cases in our American history it's just amazing
    • And she presented a file which I call the "Gritz file" to Senator Grassley which just case after case after case after case of--newspaper clippings of things that she'd been involved in
    • And I think it's really up to people like Crowdsource the Truth or I can do it--whoever to really--cover the whole panoply of the full flight of the arrow as I like this to call it of Robyn Gritz's impact on American history
    • I mean it's it's it's quite amazing--named a case--xx xx hijacker case one in case to just being one Sapphira being another case
    • All these cases are just like been sublimated, and they they need to be brought to the fore
    • And the other piece is Andy McCabe's co-opting of the credit before these cases also needs to be brought out
    • And I think when the American people see this the this hidden history the rewrite is going to occur very quickly of what actually happened in the last 20 years
    • And this cabal this self-congratulatory, self self-rewarding, self-dealing cabal will be exposed at the FBI
submitted by 911bodysnatchers322 to TruthLeaks [link] [comments]

Transcript of George Webb Video Series Part 302 "Hillary's Leakers, Hackers, and Henchmen" [@Georgwebb / #HRCRatline]

  • Day 163.3. Old Guard vs New Guard at Tewksbury, MA - YouTube
    • Day 163 this is part 3
    • And it's too cold outside, so I have to do this inside
    • Here with Task Force, here with Deep Milwaukee
    • And we're just talking about this Frank enzyme Bradley right now
    • And we're trying to see if that's the same person that was in the global Intelligence files there WikiLeaks in 2012
    • And if people don't remember those leaks, they came out, and there are several embarrassing leaks about numerous companies around the world
    • Now, what I put forward to the group was that these were targets
    • These were Andrew McCabe type targets
    • The way infiltration works is you put your person in--kind of like Amy Dacey at Sony--you put your person in right below them, and then you come out with some thing about Amy Dacey telling--Obama jokes--that are off-color and get her fired
    • And then your person goes up, and then becomes a Sony director
    • That is Andrew McCabe's MO throughout his whole career
    • So that's why I say that's probably what he was doing with the Global Intelligence Files
    • I know it's an FBI operation because it was this guy named Sabu who was the handler, who was running around recruiting people to to hack the Global Intelligence files at Stratfor
    • Now, that's the deniability: they're not really hacking, but they say if they get caught oh it's that 20 year old guy that got--recruited by that 30 year old guy, not this team of hackers
    • So having said that the Task Force did a lot of research on this on this Bradley guy
    • And this ENSYM company that's mentioned prominently
    • Now, it's it's not enzyme with a Z it's enzyme turn the Z around to an S
    • And I think its SYMA
    • TF: YMA
    • I think it's actually [ENSYMA (ENSYMA ENGINEERING)] yeah
    • Now, give me some of the background on this guy he's he's a graduate at George Washington
    • TF: yeah master's degree George Washington in public administration
    • G: Well his business is in he worked for CERN
    • TF: a DoD gun license in Texas
    • G: He said he worked for a secret Intelligence agency
    • TF: Yes Secret Government company
    • And I'm gonna guess that's gonna be like a DynCorp or Leidos or Conceras or something like that
    • TF: And he said that he was working on viruses--admitted to that, but he will not go into the details of that
    • G: And his wife has a company called Global Logistics
    • So is she running stuff all around the world to CERN, like Californium, as well as bioweapons?
    • It's kind of although the whole ratline thing that we've been talking about through the whole series, potentially
    • TF: Right, [google redacted] AND HIS WIFE WAS A PART OF THE AIR FORCE NATIONAL GUARD AND SHE HAS A LOGISTICAL BACKGROUND, [/google redacted] she has a degree from Harvard, she does a lot of it a lot of Education behind her, a lot of different companies that she's involved in, a lot of logistics, it's kind of similar stuff that we've seen many many times
    • G: Throughout the whole seriously
    • So--this and the reason why I say Tewksbury, Massachusetts it could be that that's a wink
    • If you have this new guard an old guard--the whole War of the Roses in England was new guarda nd old guard
    • Richard the third, I always think of as Dick Cheney, you know, "Now, as winter of our discontent, made ready by the summer of York"
    • If that's the old guard, if Cheney--Bush all those guys Rumsfeld, and then on the left side Podesta and Manafort etc are the old guard,
    • The new guard could be--Pompeo, Mattis, Dunford, potentially Kelly, potentially the DIA guys like Flynn and Tony Shaffer are the new guard
    • If you wanted to really embarrass the old guard, and say, "hey we know your tricks. By the way, this guy was an expert (or not an expert)...But he was carrying around a lot of Blackberry enterprise servers as well as BlackBerries. Is he the replacement for Imran Awan, for secure encrypted communications?"
    • Again, anytime I see that it's kind of like, "well why do you have a burner phone--why do you have 18 burner phones in your backseat?", sir? --That kind of thing
    • It's kind of another signature, that says, "hey this person could be involved in illegal activity"
    • The best way for the old guard to catch the new guard to embarrass the old guard is to catch them in a city about ready to do something--
    • The Boston Marathon is coming up on the 17th in Boston: is this another repeat of the Boston Marathon?
    • Remember Graham Fuller yeah I did the Gladio plan Gladio B, now, is this Gladio C
    • Again, the Clockwork Orange thing--let's let's make a lot of terrorist incidents to get funding and keep our power--is that what's happening?
    • And the fact it's in Tewksbury was one of the key battles of that War of the Roses, where the new guard won and made our current Queen
    • So any last thoughts on?
    • TF: the only other thought was he called the police saying that he thought someone was breaking into his room at the hotel--they had guns in this hotel, which makes absolutely no sense to me if you have a--a storage full of AR-15s and weapons and gas masks and stuff like that, you call the police on yourself
    • TF: Especially if you're part of some secret Government program
    • G: Unless the new guard was trying to embarrass you
    • TF: Right, or the new guard made the call
    • G: the new guard made the call that was embarrassing you
    • {{ 911: just an observation: Maybe Agent Pettiworth et al thought YOU and Jason were part of the new guard and not just concerned citizens? }}
    • {{ 911: youtube is very incapable of transcribing TF, its annoying as f }}
    • TF: They said [that/not?] for the police to go into the house. It was coming out in the paper is that he made the phone call and that seems kind of ridiculous to me. Maybe the new guard made the phone call
    • G: Unless he had a remote camera, where he could see people going in to
    • TF: even then he would go back himself. I mean you wouldn't call the local cops
    • G: Right. So it looks like maybe that may be Andy's coming in to cover for him or something
    • But it looks like it we could have averted something happening
    • I think of Claude D'estre every time I think of the Boston Marathon
    • And [thinking] "Claude you would look at awful lot like that guy who was six feet away from the bomb, and is this another Colorado CIA School of Mines operation?"
    • So we'll see we'll see what happens
    • But I think people are going to connect the dots on this one
    • And certainly there's a very active Q, would you say Deep Milwaukee?
    • There's a an active Q discussion on this right now?
    • DM: Not Q but the anons
    • G: Ok not Q but the Anons
    • So there you have it
  • Day 164.4. SAIC’s Sam Visner Did NSA, MdA, and MITRE - YouTube
    • It's day 164 part 4
    • So here is where I met Deep Florida, this boarding officer for the Coast Guard the other night
    • He kind of confirmed the things that we had said about maritime data awareness packages
    • And how that they could call off interdiction people like The Stzroks family in Corpus Christi, or The Strokes family in San Diego can say at the Coast Guard level uh-uh from DIA can send a message down saying
    • No interdiction guide that boat to the target or I could bring a yacht into Port of Miami or port of Jacksonville or Port of Tampa or all the way up and down the coast--Charleston, South Carolina, Virginia Beach, all the Navy ports all the way up to where Joe Crowley is with his Wackenhut boat
    • So that's good
    • I want to talk to Deep Florida again, and we probably need to talk to him more, because that's real on the line, on the front lines Intelligence, where he was--seeing these same drug dealers over and over and over again at the 24 mile marker, and the nautical mile marker
    • The other thing about the first story we did today which was Bill Binney
    • It kind of dovetailed into that because SAIC, is the one who wrote the maritime data awareness package for all this
    • SAIC is also the company that wrote trailblazer, the program that took the place of thinthread--Bill Benny's thinthread
    • And the guy who bought it is a guy by the name of well there was one guy by the name of Ben Black, who was SAIC
    • And then he hired a guy named Sam VISNER who was also SAIC
    • So a lot of these NSA guys end up being SAIC guys
    • And that's the revolving door as far as the Navy's concerned
    • And you might have seen us cover that when we went up to Laurel racetrack
    • We talked to all the SAIC guys ex-Admirals who were--parlaying their horses around the Laurel Park
    • The second story we did today on Frank Bradley, Frank enzyme Bradley, was also interesting because he's in these global Intelligence files of the WikiLeaks
    • And I looked at the files there's 29 of them
    • And they're mostly spreadsheets
    • And there's it's kind of the same kind of audit coded spreadsheet
    • It goes from 2004 to 2011 there's 29 spreadsheets
    • And his emails in there
    • And it's for like 1995 a month
    • And there's all these Army guys
    • So that unlike--Bill Binney, and the Navy, and SAIC, and NSA
    • This was the second story we did today which is Frank enzyme Bradley, with the Bradley Fighting Vehicle right, turns out its Army--is that a fake name, because he's Army
    • And he's dispersing Army--gas masks and flashbang grenades and all sorts of things to JTTF units all over the country to these dog teams that that we've got?
    • Who knows--we don't know that
    • But it is interesting he is in this kind of list
    • And does that list get compromised in 2011?
    • ...And that's why the Fusion GPS is created?
    • Still, we don't know the answer to that either
    • But meeting you had another whistleblower here, so we're gonna stay in Milwaukee a little bit longer
  • Day 164.6 Meet Leah Vukmir - Next Senator From Wisconsin - YouTube
    • It's day 164 I think this is six
    • So we met the Senate candidate here that's going up against Tammy Baldwin
    • I wanted to--make a political statement, helping Paul Nealon against Paul Ryan here
    • Now, he lost by 50 points
    • So--Paul Ryan's gonna win
    • But it's probably more important that Leah Vukmir win as the candidate in the Senate seat, because the weight Wisconsin's organized is they have one Republican Senator and they have one Democratic Senator
    • Ron Johnson, as you probably know as the Republican Senator, he's in the Intelligence Committee...and been a good supporter of transparency
    • And then there of course is Johnson Wax in Milwaukee
    • And then there's Johnson Controls in Milwaukee the--the building controls
    • And then there's also Johnson & Johnson and Racine
    • So there's a lot of Johnson's going on here--I'm gonna stay away from that {{LOL}}
    • But Tammy Baldwin the Democrat is coming up for reelection
    • And the III I talked to her quite a bit
    • Leah is a very nice person, and she gave me about a half an hour of her time
    • And what I like about her she's a nurse
    • So she's got--she's just a nurse who wants to do the right thing
    • But she's very involved with manufacturing
    • And very involved with the police unions, the fire unions, the emergency services, all the people that are first responders
    • So I really wanted to give a strong statement of support
    • And again, a candidate that comes out says "hey I saw you, I want to come out, I want to meet you I want to introduce myself"
    • And I think these are the important people
    • She said I wasn't on the Trump train at first--she's a big Scott Walker person
    • She was part of that whole kind of hey you can't hold the--Government and the people, SEIU, you can't hold everybody hostage
    • But she said hey as as I got to know Trump better I got on the Trump train, and I'm a really strong Trump supporter
    • Again, I think Trump of I sat with all slew of of Trump supporters
    • Democrat and Republican tonight
    • And the key thing I keep hearing is: he's a businessman. He wants to bring jobs back to Wisconsin, and Michigan, and Ohio, I'm from Ohio--Indiana, I'm from Indiana
    • I want they want to bring jobs back I don't care if it's Mugwump or whatever, your party is, Trump wants to bring jobs back
    • So I want to support her I want to tweet her out
    • Again, it's Leah VUKMIR V U K M I R
    • And I think it's just a strong candidate
    • I think it's it's a person who it didn't necessarily doesn't have Paul Neilins background in manufacturing
    • But she know she's making an active effort--she's been in 66 of the 72 counties
    • And I just wanted to make a strong statement, because I just believe that she comes out, everyone I introduced her to tonight she's listened to and interacted with and listened
    • And as is kind of a person of the people
    • So I don't normally do political things
    • But this is a candidate I felt very strongly about, and her platform
    • And she needs to of course when the primary--it's a late primary here in Wisconsin--it's an April primary
    • So it's important that we do a lot of meet and greets
    • And a lot of fundraisers early to make sure that these kind of candidates get a chance to win in November against a kind of a very globalist
    • And I hate the word 'globalist'
    • I like the word 'carpetbagger' -- I've seen the destruction of towns in my hometown in Fort Wayne Indiana International Harvester plant left when I was in--teenager
    • And I've seen the destruction in Ohio, firsthand
    • And I've seen the destruction in Michigan
    • So I'm not as familiar with Wisconsin
    • But--you got Harley Davison
    • And we had this trade discussion--let's just take all the names
    • And brand names out of it
    • If it was Brand X over here
    • And that's your trade representative
    • And brand Y over there take China out of it take take the U.S. out of it
    • If your guy came back, and said hey I got a great deal we pay 35% tariff over there
    • And we get 1.2 percent tariff on their stuff coming--isn't that a great deal?
    • Everyone would say you're no longer our trade representative--get out
    • That's what we have right now,
    • And I think it's a hundred percent tariff on harley-davidson products in in Japan
    • And at least to 35% in China--I'd like to check those facts
    • So anyway lots of trade discussions
    • I know everybody's watching Final Four, but I just wanted to throw that out that we have a US Senate can adhere tonight that came out to me, and she wanted to tell her story, so there you have it
  • Day 165.1. The Good America - Binney, Wormwood - Olson Part 1 - YouTube
    • It's day 165
    • And this is part one Happy Easter everyone
    • Still bloody cold here somebody from Tewksbury--Gloucester, actually--about five miles from Tewksbury
    • Said they reenact the Battle of Tewkesbury every year
    • So I thought that was interesting
    • So maybe we'll reenact the old guard and the new guard with the Tony Schaefer and the Cyber Command boys
    • I expect Tony Schaefer to be getting a position with the Trump administration here pretty quickly in the Intelligence area
    • And maybe these Army guys--these Army Intel guys will push through a split with NSA and the Navy Intel guys
    • So we'll have a check on the Navy Intel boys
    • So anyway that's Tewksbury
    • So that's this battle reenactment they have in Tewksbury, where this guy was caught with these enzymes Frank enzyme Bradley
    • Riding around and his Bradley Fighting Vehicle throwing out bill swing enzymes on the population flu and flu viruses on the population it
    • Was he doing that? Who knows
    • But we can go look to Tewksbury now, every year to reenact our battle between this Navy
    • And Intel Command
    • And these new Army cyber boys that's that battle is developing one two great documentaries out
    • And it almost tells our story in terms of what a format of this story might look like
    • One is the "Good American", which tells a Bill Binney story about how he had Thinthread how this guy named a SAM Visner came in said oh my gosh this is great we're gonna do trailblazer instead collected all
    • Then when 9/11 happens, Sam Visner is the guy who says, "this is a cow we can milk for 15 years at SAIC"
    • So he leaves NSA, the Sam Visner, and goes to SAIC
    • And these are direct quotes--that this is the--opportunity of a lifetime
    • That same Sam visitor is in this Q discussion now, with this MITRE group in this this Highland Forum in this kind of public-private, pay-to-play partnerships
    • So, interesting to follow these things "full flight of the arrow" as I call that, all the way from 9/11 pre 9/11 all the way till now,
    • Sam Visner still doing--and SAIC--does the maritime data awareness program, said that ZIPZORP was talking about SAIC
    • SAIC formulates themselves with a new name called LEIDOS it's kind of a shuffle giving us a little "lead" LEIDOS shuffle--it's still SAIC, psst STILL SAIC
    • So a little Leidos shuffle there
    • So anyway the good American talks about how 9/11 could have been avoided with Bill Benny's Thinthread
    • And a lot of the folks I've talked to Diane Roark at length
    • I've talked to Curt Wiebe
    • And interacted with him on Twitter talked with Bill Binney
    • So a lot of the people in the series I recognized
    • And I've never never talked to a Thomas Drake, though, Tom Drake
    • But I would like to
    • But I think it's a great series to watch for the first part of our series, before the Awans got involved which is surveillance
    • And the misuse of surveillance
    • And maybe the Awan's are a part of that too, because you use a third-party Intelligence service like PAC ISI to have deniability on surveillance
    • But then there's a second part, which is not just surveillance, but now disruption we're actually gonna go out and try to make you--your life miserable
    • And that's really the second documentary
    • And it's a six-part 40-minute a shot documentary called Wormwood
    • But it is the dirty tricks part of the CIA, getting rid of you once you become a problem, once you start saying hey this isn't good
    • And we're using these truth serums and scopolamine to do--parties it--late at night in Montreal with--our good doctor up there, Dr. Gottlieb, where we did a series at the <
  • Day 165.2. Wormwood Part 2 - Bill Swing’s Ft Derrick - YouTube
    • This is part 2 of day 165
    • And this is following up on wormwood
    • Great movie, because it it's kind of also William Kobe versus Sy Hersh in terms of getting the story about out about Frank Frank Olson
    • This guy who was worked at MKULTRA, Sidney Gottlieb, at the McGill University in Montreal where we were in this series
    • So a lot of the places
    • And things that we've mentioned the series Fort Detrick and the bio weapons program in Maryland...are you go around to these different places and it connects all the dots in a long format, which is really nice
    • And here's Sy Hersh at the end saying, "hey this story's too big for me"
    • And we're we heard that before I feel like he was just recording our ending, and just said well let's just slap it on the end of this documentary
    • But anyway you'll see Sy Hersh say this is story's too big for me at the end, in that in that story
    • But this guy Frank Enzyme Bradley--being caught: was that just so they could double down the amount of spending on the Boston Marathon on the 17th?
    • So was that kind of an inside job the old guard kind of their little clockwork orange' Games?
    • Fear
    • Or was it the new guard was it kind of the new US Cyber Command--kids was with with Flynn and Tony Shafer who I expect to be named to position Intelligence position with Trump here pretty quick?
    • Was it this new split?
    • This new separation of powers were gonna have between the Army guys--the US Cyber Command, and the Navy guys that the NSA?
    • Who knows? We'll see what happens
    • But it was interesting tie into this guy who was at the CDC, who went disappearing
    • Is that why all these flu viruses are being disseminated in these different places?
    • Who knows
    • And also we have the NRA event coming up in March May 3rd 4th and 5th
    • Did Krylova and Bogacheva go to that before? Yes of course they did
    • That was in Dallas this year
    • But where was it before?
    • Where where was Ted Cruz? Where with all those events?
    • We still don't know--none of that's come out
    • And one of the other things I've noticed about the Q phenomenon is I much I have a much greater understanding of how unknowns with Q and being on boards
    • And talking with all these people last night that follow Q
    • And the creation of these memes
    • And I think that's something that our series needs to do is create memes from the series
    • And so I'm gonna continue to create these playlists
    • So that people can go through
    • And say here's all the Navy Intel--from beginning to end in the whole series
    • And then create a Navy Intel meme with the old ones because I think the ones are extension of Navy Intel
    • And then do the same thing for the other significant memes in the in the series
    • So even though Q took a lot of my viewers away
    • And a lot of my researchers away, in a way it's good, because they show you a more effective way of doing open sourcing, creating these memes...
    • So I look forward to a good day of reporting
    • We won't say where all the places we're going, but have a happy easter everyone
  • Day 165.3. Preview of Andre Taggart Reveal - NNSA - YouTube
    • OK It's day 165 and this is part three
    • And this is sort of a sneak peak to the solution to the whole series
    • And I've said before we're kind of going from a pay-to-play world where things were doing below the table
    • And I the three initials there are MBZ the crown prince of Abu Dhabi
    • And sort of Hillary Clinton moving into the Trump world which is MBS, which is above the board--crown prince of Saudi Arabia or just do everything aboveboard
    • And the people who are doing the below the board business are pissed
    • So this series really has been looking at how that below the board business was done
    • So collecting metadata on how that was done--David Petraeus--the create the creation of this rogue NSA which is NNSA
    • Which is Not so Nice NSA
    • Basically created a Uranium cover for the last 20 years
    • And everything basically below that was this weapons for drugs or weapons for minerals or weapons for human resources kind of business
    • And that's the story of the last 20 years in Hillary Clinton and the whole crew,
    • And Navy Intel and her kind of unholy creation of this alliance with with NCIS or or this just rotten core inside a Navy Intel
    • So I just created a list about Navy Intel if you want to review the Navy Intel list if you haven't been following this series
    • But basically you have to find the server: where are they doing this?
    • You have to physically find it
    • So we go to Washington DC we we find--we collect a lot of metadata
    • We find the Lorton address where all this business is being conducted
    • Now, I do I think that's the real address?
    • No, that's the parallel construction if they ever get caught
    • They say there's deniability--it's just a just a group of people that are doing--find a bank fraud there's a small deal--it's not a big deal
    • The real action is at the Navy Yard
    • And that building 213 an old DIA building which was called a Threat Analysis Center
    • And this we've said this in the series for almost a year
    • So this isn't any surprise to anyone
    • The part I'm gonna let out today is I knew Taggart was a fake from the beginning
    • And I knew Tane Taggart was a fake from the beginning
    • I knew that I mean they weren't--just renting the property
    • But there was a reason why I had to go with that deception, because you let people who are in the business
    • (And they're just doing their jobs, right?)
    • You let people who are doing the business let the let the charade play out let the school play play out because you get valuable data although all along the way
    • I had to make Taggart the hero in order so other people would come forward and so he would continue talking
    • That was the key part
    • Keep giving us more metadata
    • It's too bad we couldn't have had a couple of more interviews with Taggart a couple of more interviews with Laurel Everly
    • All the people that are kind of either knowingly or unknowingly involved
    • An Tane Taggart would have been a good interview
    • Jacquayla would have been a good interview
    • But that's fine we still solve a puzzle now
    • Which is basically the drives were the takeaways for going to Pakistan--that those were the real drives--the ones that went in March, not the ones that were the decoys in April, that were left in the Rayburn office building
    • And that was the server's--that's how the trade occurred
    • It was on that caucus server--the drugs for weapons trade
    • The next thing was once got the servers--and the Sprayer home could have also been a place where people were were compromised
    • But then the next piece in in the whole thing is actually how do they do it?
    • And it was with these containers and
    • So we got down to the containers
    • And then how what goes into container?
    • So we really really got to a granular level with the cars--Alpha Jalloh ring to do all that
    • And everything else since that has been proving who with in Navy Intel have been the key people to put this whole thing together?
    • So I'll just leave it right there Taggarts a good guy
    • I think in Bethesda I remember I was in Bethesda, Maryland
    • And I almost said Taggarts role
    • And I held off, because I wanted to find out more about the people that were inside Navy Intel they we're actually running this
    • But I think you may know who who those people are already
    • But I'll just leave that for a more non XSTAR general logistics pay-sized version
  • Day 165.4. Saipov’s Mt Prospect Trucking - Near Blues Brothers Auto Auction - YouTube
    • It's day 165 here we are at beautiful Bussy Road
    • Go down to the end of this road on Bussy Road here in beautiful Mount Prospect
    • And you have the Mount Prospect auto auction of Blues Brothers Fame
    • Remember that Jake said we are on a mission from God
    • So the interesting thing about this is Saipov
    • Saipov truckers
    • They have a Saipov--the guy who ran down did the run down in Chelsea--ran over those five Argentinians
    • I think one of them was a nuclear scientist
    • The other one was that woman from Belgium the Belle from Belgium
    • We also have though sighs I've had a trucking company in Cincinnati trucking company
    • And car company in Cleveland car company here in Mount Prospect, Illinois close to Rahm Emanuel, close to Schneider, we're jan Schakowsky's district now
    • And of course one in Tampa
    • So the key here is chain migration and lottery: not such a good plan
    • The Saipov truckers? Not such a good plan
    • The Uzbekis--drugs going one way, weapons going the other, Uranium cover: not such a good idea
  • Day 166.1 Naugty NSA School Play Falling Apart - YouTube
    • It's day 166 part 1
    • And yesterday I revealed Andre Taggart is sort of a player in a Shakespearean play, if you will, covering the Awans, and the state support of the Awans spy ring in Congress, as well as Awan-Contra: the trading scheme for weapons and drugs in the Congress
    • Did they also have a sex ring in Congress, with all of the Awans beatings?
    • Well that's for another day
    • But certainly Taggart would have nothing to do with that
    • But the I am dubbing NNSA or the naught NSA as the key conspirator behind this, in much the same way we can say the revolt from the West at Tewkesbury 500 years ago was led by Richard the 3rd, I'm pinning this on Andrew McCabe, Hillary Clinton, and the NNSA
    • This is going to be a kind of a as we've said before kind of a power elite move
    • Its gonna be SAIC, key contractors like Lockheed, Northrop Grumman, doing major projects like Trailblazer at NSA Bill Binney Fame versus Thinthread, as well as Maritime Data Awareness applications like the application we singled out which was the Pandas, which which lines up well with Seth Rich in the Congress
    • You don't remember yesterday or the symbol first of all for NNSA
    • Here's I dubbed this this morning about four hours ago
    • And I talked about the different contractors involved in the NNSA
    • Now, I also created a playlist
    • So if you're not familiar with all the eleven or twelve different videos I've done on NSA
    • But the key here is Uranium under color-of-law with Uranium, now, I can trade anything below
    • And it provides me kind of the same sort of drayage that it provided the British Navy
    • Don't tell me what's of below decks just tell me how much it weighs and give me my commission for transporting it
    • And I do believe that Navy Jack has kind of I'm not going to say manipulated Crowdsource the Truth
    • But I do believe it has been sort of an information operation since the beginning to put the lid on this NNSA activity
    • I think the folks there knew that this would eventually come out if the crowd dug in on it
    • And there's been all kinds of diversionary tactics
    • But I think yesterday, Navy Jack threw the towel in
    • And now, he's trying to do anonymous strikes
    • So I won't say who Navy jack is specifically, but there are a few Navy Jack's out there
    • And specifically I think what they want to bury as this Andre Taggart interview in this Laurel Everly interview
    • Because it flies directly in the face it flies directly in the face of the truth and
    • But they give away key facts that unravel this whole NNSA pay-to-play scheme
    • I think also all of the anywhere you see those routers that at the Sprayer house that Jason filmed are going to be important as well
    • So I do believe the NNSA is trying to shut it down
    • Whether that's a Navy Jack or not we don't know for sure
    • But here's another article that came out that said, "oh by the way we all signed a slip a paper that advocated our rights of checking out and vetting The Awans in this scheme"
    • It's obvious that once a spy ringin Congress and also arms for drugs trading ring in Congress has state support and
    • So after the fact these 44 different Democrats are gonna say, "oh, but there was a piece of paper that we could sign that have been abdicated all our responsibilities in terms of vetting, because Debbie Wasserman-Schultz said so"
    • And I think we're hot on the trail of all the pieces of this network
    • They brought in these Uzbeki truckers to ship this stuff around here in Chicago--where I am in Mount prospect--was just one of the many trucking companies two in Ohio, one in New Jersey, in Paterson, New Jersey; one in Tampa, Florida as you can see here
    • So eventually with research this will all come to light
    • And that's why I think they want NNSA wants to bury these buried these films of Andre Taggart
    • So that's where we are today
    • I just want to say that I think we're hot on the trail
    • The metadata leads me to believe more than ever that we will put the pieces of the puzzle together even if we don't get certain documents from the court
  • Rosemont Casino - Bring Out Your Hawala and Your Dead - YouTube
    • Beautiful day 166 this is part two here at the Rosemont casino
    • And I just want to show you if you just recently had a sniper incident where an unfortunate person died at your hands you could bring the body here
    • And I'll show you how far you have to go to turn the body in to get five thousand dollars in chips here at the Rosemont casino
    • And I'm not kidding
    • If you look up Bioresource Center
    • And this is a show we did a long time ago I think it might have been over a year ago
    • We talked about there was prisoners at Holman square down south of Chicago down by the United Center where the Bulls used to play
    • That was a key place for bringing in--just as Christopher Steele does liaison operations, Intelligence operations in the United States for the FBI, we do liaison operations for other countries here in the United States for them
    • So we torture prisoners here for other countries
    • Again, that eludes their rules about informing their oversight bodies about operations
    • So if you don't remember what a liaison operation was: it's a way of avoiding the reporting that's in our Constitution about talking to the gang of eight, which is four people from the Congress on the Senate side, four people in the Congress on the on the side of the Senate
    • Two Senators from each party, two Congressmen from each party
    • But literally right there village of Rosemont is where BioResource Recovery Center was
    • Now, I'd only have to walk a little bit further down under that bridge to actually go to the USDA facility
    • Now, the USDA facility--if you recall--is where what we had right next to our our Gülen schools
    • I can't remember--they usually give a a name like Wisdom schools or Affinity schools or--Great Clocks by Kids Schools--they give them some kind of lofty name which is fine
    • But if you remember my visit there we basically had a lot of great teachers
    • So that they can farm the money through, and launder the money through
    • It's always great it's like a union you can always farm the money through gangsters love unions lots of workers lots of paychecks
    • But then you have one guy who can sue who's an English teacher from Turkey or some country like that: usually Turkey
    • And he is the interpreter
    • And then you got one guy in the back that cannot speak a word of English
    • And I call him the Halal money changer
    • So right behind me is O'Hare Airport
    • And literally all day he does is just count out Halal
    • Now, what comes into this you a facility here?
    • Well fruits and vegetables and also meat perishables things that could carry insects etc or food borne viruses
    • So they need to be irradiated
    • They need to make a trip to Ames, Iowa
    • So if you don't remember that part of our trip, you can go back and look at that
    • USDA
    • Now, I did
    • (I hope I don't get a copyright strike on the parking lot music)
    • I did interview a USDA person, and it turns out they loan a lot of money now to women farmers and also minority farmers
    • They want to get women started in farming and minority farmers
    • This turns out to be extremely difficult to get an American a loan
    • But very simple if you're from a different country
    • I know that's gonna us I know how hard that is gonna be for people to believe
    • Again, ninety nine point five percent of the people in USDA doing a great job
    • I only need to compromise 0.5%
  • Day 166.3. Delivering Imran’s Bitcoin To Rahm From O’Hare - YouTube
    • Day 166 part 3
    • I've now, made it from the airport with all the Halal cash
    • And the hawala you can see the armored car here I'm bout ready to take it in to Rahm Emanuel here at City Hall behind me
    • But before I do that because it's all Bitcoin now, it's all on hard drives, it's all on Imran's hard drive
    • So there's literally terabytes worth of Bitcoin
    • So makes it easier than the old days where you needed a big Brinks truck I still like to ride in the Brinks truck
    • But as you remember from the movie The Blues Brothers
    • You've got the Picasso here looks like it's a different color
    • Maybe this isn't the Picasso? Maybe--the I thought the Picasso was across the street from City Hall anyway
    • Well we'll go over there and find out if it's a Picasso or not
    • Maybe they replaced the Picasso
    • This is the scene where all the police cars pile up the Chicago police cars the Chicago's finest over there as you can see I do believe this is Richard Mary Daly square if it's not that I've just made a mistake
    • But as you can see now, all I need is hard drives to take Bitcoin to Pakistan
    • And I'm saying that probably happened on the 7th of March
    • And I picked up where I found the decoy about a month later with Andre Taggart
    • And now, of course I've exposed Taggart, because I see them shutting down the channel
    • I see I think there's foul play--in the runs--rotten in the state of Denmark, something rotten in the state of Denmark as Hamlet would say
    • So if that isn't Picasso then I don't know what is
    • But I do think there's something rotten in the state of Denmark
    • And they're shutting down Jason's channel we have to get all those interviews
    • And phone calls from Taggart before they go away as--44 different Democrats, maybe up to 50 waved, doing a background check on Imran Awan
    • And all the conspirators Lisa Maria Bartiromo says it's the biggest story of the year that's not been covered
    • The biggest uncover story of the year the story is breaking now and you're live to see it here in Chicago
    • And just I want to say hi to Rahm
    • Bole di Juggies is doing great, Rahm
    • I got all the Bitcoin: we got it all!
    • We got it all baby, nobody stopped us: Andy didn't stop us at the airport: we got it all
submitted by 911bodysnatchers322 to TruthLeaks [link] [comments]

Building on Bitcoin - Decentralized anonymous routing algorithm for LN Anonymous fights IS: hacker groups release 9,200 twitter accounts linked to Islamic State terrorists Bitcoin: Beyond The Bubble - Full Documentary - YouTube Complément d'enquête. Les millionnaires du bitcoin - 12 ... Videocast AO VIVO: Sony com novo CEO, lojas bravas com Game Pass e RDR 2 com data!

Contrary to popular belief, bitcoin is confidential but not anonymous. Coinbase. Anyone can view a history of transactions made on the blockchain, even you. But while transactions are publicly ... An anonymous reader writes: Home affairs ministers from the European Union are set to gather in Brussels for crisis talks in the wake of the Paris attacks, and a crackdown on Bitcoin, pre-paid credit card and other forms of 'anonymous' online payments are on the agenda. From the article: "According to draft conclusions of the meeting, European interior and justice ministers will urge the ... Video-Tipp: Anonymous' Krieg gegen ISIS. Im nächsten Praxistipp zeigen wir Ihnen, wie Sie Ihr Handy vor Hackern schützen. Neueste Internet-Tipps. Snapchat-Flammen weg: Das können Sie tun WCGW: Bedeutung der Abkürzung einfach erklärt Corona-Warn-App: So erfahren Sie das Testergebnis am schnellsten Apple ID: Passwort vergessen - das können Sie tun Weitere neue Tipps; Beliebteste Internet ... OPISRAEL 7 APRIL ANONYMOUS ISIS. a guest Apr 6th, 2015 1,873 Never Not a member of Pastebin yet? Sign Up, it ... #anonymous #anonghost _____ hacking. hacking netflix. hacking tools. hacking games. hacking the system. hacking cough . hacking facebook. hacking news. hacking 101 ... Owners are anonymous; instead of using names, tax IDs, or social security numbers, bitcoin connects buyers and sellers through encryption keys. And it isn't issued from the top down like ...

[index] [6755] [29278] [1917] [42609] [25164] [50411] [30723] [27860] [43742] [33098]

Building on Bitcoin - Decentralized anonymous routing algorithm for LN

Keep up-to-date with the latest by subscribing. Roger Ver, alias "Bitcoin Jesus", s'est offert un loft au sommet d'un gratte-ciel à Tokyo. Cet Américain de 35 ans consacre son temps libre à évangéliser les... Three hacker groups have teamed up to release the names of 9,200 Twitter accounts linked to the Islamic State. Anonymous, CtrlSec and GhostSec released the l... Back in 2013, an anonymous figure posted on the r/Bitcoin subreddit claiming to be a time traveller from the year 2025. He made a series of predictions for the price of Bitcoin in future years ... Hey Guys, This video will explain you what is Bitcoin, How to Mine Bitcoin in India to earn free Bitcoins (BTC). Who decide Bitcoin Price, How it goes up & d...

#