+ Reply to Thread
Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 37

Thread: New Cryptocurrency- ShadowCash

  1. #16
    Join Date
    May 2006
    Location
    Connecticut
    Posts
    1,347

    Default

    Quote Originally Posted by zengrifter View Post
    Just think - 20k in BC in early 2013 would now be worth $3.5M.
    Very true, but $20K invested in early 2014 would now be worth $7K.

    Have you checked out any of the online cryptocurrency casinos? Some of them are live action, worthwhile to make a single pass across them and see what they are offering. Nice thing is they can never ban you, you can always log in with a different Bitcoin address.

  2. #17

    Default

    Quote Originally Posted by Automatic Monkey View Post
    Very true, but $20K invested in early 2014 would now be worth $7K.

    Have you checked out any of the online cryptocurrency casinos? Some of them are live action, worthwhile to make a single pass across them and see what they are offering. Nice thing is they can never ban you, you can always log in with a different Bitcoin address.
    That forbidden discussion is how SageFrog and I got the Norm boot.
    "The dogs bark but the caravan moves on."
    .....................The Zengrifter Interview (PDF) |
    The Zengrifter / James Grosjean Reputation Debate
    -----------------------------------------
    “Truth, like gold, is obtained not by growth, but by washing away all that is not gold.” — Leo Tolstoy........
    "Is everything a conspiracy? No, just the important stuff." — ZG

  3. #18
    Join Date
    May 2006
    Location
    Connecticut
    Posts
    1,347

    Default

    Quote Originally Posted by zengrifter View Post
    That forbidden discussion is how SageFrog and I got the Norm boot.
    Discussion of Bitcoin, or the other thing?

  4. #19
    Join Date
    Sep 2013
    Location
    In the YO
    Posts
    15,588

    Default

    Quote Originally Posted by zengrifter View Post
    That forbidden discussion is how SageFrog and I got the Norm boot.
    .
    Attached Images Attached Images  
    Last edited by zengrifter; September 12th, 2016 at 03:13 PM.

  5. #20
    Join Date
    May 2006
    Location
    Connecticut
    Posts
    1,347

    Default

    Update: my Shadowcash bought at 15 cents are now worth about $1.50.

    Next stop: $150 per coin, as Shadowcash becomes the global standard for private and untraceable funds exchange and communication.

  6. #21
    Join Date
    Nov 2013
    Location
    Jewnited States
    Posts
    1,074

    Default

    Quote Originally Posted by Automatic Monkey View Post
    Update: my Shadowcash bought at 15 cents are now worth about $1.50.

    Next stop: $150 per coin, as Shadowcash becomes the global standard for private and untraceable funds exchange and communication.


    I believe you. It's now trading at $2.68.
    Last edited by Svengarlicky; September 13th, 2016 at 01:25 PM.

  7. #22
    Join Date
    Nov 2013
    Location
    Jewnited States
    Posts
    1,074

    Default IP masking

    Before I make any ShadowCash transactions through Bittrex or Poloniex, I am waiting to receive my PNP router from a European country that transfers your IP address to any foreign country of your choice. If you're interested in this technology, send me a PM and I'll give you the source.

  8. #23
    Join Date
    May 2006
    Location
    Connecticut
    Posts
    1,347

    Default

    Quote Originally Posted by Svengarlicky View Post
    Before I make any ShadowCash transactions through Bittrex or Poloniex, I am waiting to receive my PNP router from a European country that transfers your IP address to any foreign country of your choice. If you're interested in this technology, send me a PM and I'll give you the source.
    Not worried about it. I use tor, and in fact I run a tor exit node, just for cryptocurrencies so it's low bandwidth.

    Once you get your Shadow (SDC) you can make it disappear as the invisible Shadow token (SDT), and spend it as that, or slowly convert it back to SDC in a new address at your convenience.

  9. #24
    Join Date
    Nov 2013
    Location
    Jewnited States
    Posts
    1,074

    Default

    Quote Originally Posted by Automatic Monkey View Post
    Not worried about it. I use tor, and in fact I run a tor exit node, just for cryptocurrencies so it's low bandwidth.

    Once you get your Shadow (SDC) you can make it disappear as the invisible Shadow token (SDT), and spend it as that, or slowly convert it back to SDC in a new address at your convenience.
    But even with Tor, your IP address is still exposed, right?

  10. #25

    Default

    Quote Originally Posted by Svengarlicky View Post
    But even with Tor, your IP address is still exposed, right?
    Not in theory ...

    The destination of your web requests will be able to detect only the transmitted IP address of the exit node (the last contact point of your request with Tor). Your true IP address remains untraceable because your data traveled through a number of relays before reaching the exit node. The exit node remains unaware of the source of the original request, protecting your IP address. So even if a snoop could trace the IP address arriving at the exit node before the request was forwarded to the final destination, your IP address is still protected by 2 more intermediate relays. Now you start to understand why it is called the onion router: the protection it offers is similar to the multiple layers of an onion.
    "The dogs bark but the caravan moves on."
    .....................The Zengrifter Interview (PDF) |
    The Zengrifter / James Grosjean Reputation Debate
    -----------------------------------------
    “Truth, like gold, is obtained not by growth, but by washing away all that is not gold.” — Leo Tolstoy........
    "Is everything a conspiracy? No, just the important stuff." — ZG

  11. #26
    Join Date
    Nov 2013
    Location
    Jewnited States
    Posts
    1,074

    Default

    Quote Originally Posted by zengrifter View Post
    Not in theory ...

    The destination of your web requests will be able to detect only the transmitted IP address of the exit node (the last contact point of your request with Tor). Your true IP address remains untraceable because your data traveled through a number of relays before reaching the exit node. The exit node remains unaware of the source of the original request, protecting your IP address. So even if a snoop could trace the IP address arriving at the exit node before the request was forwarded to the final destination, your IP address is still protected by 2 more intermediate relays. Now you start to understand why it is called the onion router: the protection it offers is similar to the multiple layers of an onion.
    The beta P2P routers are being shipped this weekend from Reykjavik.

    Here is a snippet from their promotion package.

    " VPN stands for “Virtual Private Network” and it’s a way to create a secure tunnel between your computer and another computer in a data center or someone’s home. Some of you might be asking "What does a VPN actually do?" Well in simple terms it makes your computer appear to be in another place with a different IP address over a secure and encrypted connection. The largest corporations and governments all use VPNs to secure their communications, why shouldn’t you have the same protection for your valuable information that you transmit on a daily basis?
    While we can get you into our high tech data center with the Unseen VPN you might also be asking "What’s going to be special is the p2p VPN?", Well Our VPN device allows you to securely and effortlessly connect directly with a friend or colleague and their computer or network. Our engineers decided to base our VPN on opensource hardware and programming of the Raspberry Pi 3, in addition to this we will also make the client side opensource.
    Raspberry Pi 3 with Clear Case, power supply, ethernet and USB power cable (EU+US) + 4GB RAM card pre-loaded with Unseen VPN software included.
    Our VPN has been fully tested establishing VPN's over different dataconnections from the US, Panama, Vietnam and Switzerland and it will come with the following features:
    *
    Ability to improve performance connecting to many sites that have degraded network connections.
    *
    Circumvent blockages and snooping imposed by your ISP. (Depending on your ISP, you could see performance improvements, but you will certainly get around their deep packet inspection.)
    *
    Secure access when using public wifi and on airplanes. (This is a significant issue for people now with the hacking. Airplanes and other networks that block UDP will require a software upgrade we are developing, but it’s in the works)
    *
    A unique p2p feature that will allow you to connect your computer directly to a network of your friends and colleagues. (You'll be able to set up a node in your office and on the road, for extra security.)
    *
    Open source hardware and software. (A hardware solution makes it even more private, just unplug and nothing remains on your computer. You launch with a web browser, so no software to install. This is the cleanest way to protect our users.)
    *
    Use your Unseen account’s roster to automatically choose the contacts with a vpn capability in addition to using p2p over vpn to connect with them directly, share files, and do direct calling.
    *
    Hotel mode to create a wifi base station you can share with other, use your phone and laptop, etc. (Multiple users can share a vpn with this mode.)
    *
    Starbucks mode to connect to a public wifi with security and privacy.
    *
    Protect your bitcoin nodes by using a vpn to make it secure and hide your IP.
    *
    Includes one year of service with at least two gateways. (We will be adding more gateways as we get closer to launch . You’ll will need a second hardware unit to connect to a second location.)"
    Last edited by Svengarlicky; September 15th, 2016 at 04:44 PM.

  12. #27
    Join Date
    May 2006
    Location
    Connecticut
    Posts
    1,347

    Default

    The weak link of Tor has always been the exit relays. Being the material is coming from your IP, officials examining it can blame you for it, kick down your doors, confiscate your computers etc. so very few people are willing to run them. Because there are so few of them they require huge bandwidth and are hosted at very large (i.e., government-compromised) facilities.

    The one I'm running has a highly restricted exit policy, limited to the ports used by the major cryptocurrency wallets so it doesn't need a lot of bandwidth, not like it will be streaming movies.

  13. #28
    Join Date
    Nov 2013
    Location
    Jewnited States
    Posts
    1,074

    Default

    Quote Originally Posted by Automatic Monkey View Post
    The weak link of Tor has always been the exit relays. Being the material is coming from your IP, officials examining it can blame you for it, kick down your doors, confiscate your computers etc. so very few people are willing to run them. Because there are so few of them they require huge bandwidth and are hosted at very large (i.e., government-compromised) facilities.

    The one I'm running has a highly restricted exit policy, limited to the ports used by the major cryptocurrency wallets so it doesn't need a lot of bandwidth, not like it will be streaming movies.


    Well, your input is appreciated. I'll try it and see how it goes.

  14. #29
    Join Date
    Nov 2013
    Location
    Jewnited States
    Posts
    1,074

    Default

    Notice! ShadowCash is taking a dive. Now trading at $1.33.

  15. #30
    Join Date
    Nov 2013
    Location
    Jewnited States
    Posts
    1,074

    Default

    Quote Originally Posted by Automatic Monkey View Post
    The weak link of Tor has always been the exit relays. Being the material is coming from your IP, officials examining it can blame you for it, kick down your doors, confiscate your computers etc. so very few people are willing to run them. Because there are so few of them they require huge bandwidth and are hosted at very large (i.e., government-compromised) facilities.

    The one I'm running has a highly restricted exit policy, limited to the ports used by the major cryptocurrency wallets so it doesn't need a lot of bandwidth, not like it will be streaming movies.
    No one is about to kick door downs or confiscate my computer. My AK-47 will prevent that.

    I talked with the hardware technician and this is is what was stated.

    "I do not see any link between a hardware being used and the bandwidth consumed at all. Using ANY VPN/Virtual Private Network means that your traffic/data is encrypted so it will consume more bandwidth than when the data is not encrypted at all. But the encryption is done in software but not hardware like Raspberry Pi 3 that we use in our VPN solution. It means there is no relation between the hardware used and the bandwidth consumed."

    I hope this answers your question

    Best,

    SD
    Last edited by Svengarlicky; September 20th, 2016 at 05:13 PM.

+ Reply to Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts