Users Of Evo Marketplace & BTC-E Are Like Two Peas In A Pod

With claims that the shut down of the Evolution marketplace may have netted the owners as much as 130,000 BTC, rumours began circulating yesterday that BTC-E ceased withdrawals so as to limit the ability of the thieves to exchange their new found riches for what some people call untainted coins.

The rumour that BTC-E had paused withdrawals as a result of stolen coins entering the exchange came from an Australian by the name of paulgr. Paulgr, who is a moderator for the BTC-E chat room said: Continue reading

Anti-Integrity Advocates Push Netflix to Break Contracts

Two days after the United States Federal Communications Commission decided to bring "Network Neutrality" regulations to the Internet in their country, an editorial in Ars Technica is advocating that prominent corporate advocate for these changes Netflix use the rules to break its contracts with a number of Internet Service Providers by having regulators impose more favorable terms for them in their relationships with other businesses. Continue reading

Windows Ecosystem Security Still Horrifying

Today it was revealed that Lenovo has been installing a piece of adware called "Superfish" which uses an SSL man in the middle attack to replace ads served to users and potentially engage in all kinds of other evil. Abuse of unaware users who run Microsoft Windows by computing vendors has a long history which includes many other notable episodes such as Sony proposing a lack of factory bloatware as a premium option to the entire existence of the venture known as "WildTangent." Continue reading

Your Disk Controller and You

A recent publication by Kaspersky Lab (mirror) describes the first publicly-confirmed instance of a Microsoft Windows 'trojan' capable of infecting hard disk drive firmware. For every word that's been written on the subject so far, ten thousand words of disinformation, FUD, and general-purpose obscurantist rubbish are floating about – eagerly passed around by spambots disguised as 'independent bloggers' and fleshy meat-puppets alike. Expect no shortage of 'product' from the well-funded – but, interestingly, not especially competent – FUD agency charged with spreading confusion and misplaced skepticism after this and every other Snowden-related tidbit. Continue reading

HSBC Clients Victims of Probable Social Engineering Attack

Private financial information on a number of customers of HBSC's Swiss operations have been leaked. The Guardian and the "International Consortium of Investigative Journalists" have latched on to the leaks in order to shame HSBC for providing financial services and to wealth shame HSBC customers for having money and desiring privacy at the same time. Continue reading

There is nothing new in the world. Except for the history you didn't know.

From the defunct Bruce Wagner1 Bitcoin podcast2 :

Bruce Wagner : When was the last time you chatted to satoshi
Gavin Andresen: Um… I haven't had email from satoshi in a couple months actually. The last email I sent him I actually told him I was going to talk at the CIA. So it's possible , that…. that may have um had something to with his deciding.

Yes, it is… possible.


  1. One of the Early Bitcoin Morons ™. Pedophile / gay prostitute / showman with the camera in demo mode. 

  2. Specifically, "The Bitcoin Show: Special Bitcoin Conference Coverage: 08/20/2011" – discussing an event in June 2011. The original website (onlyonetv.com) has been purged, but the podcast itself is still available from various sources including, ironically, Apple's iTunes. 

MuckRock: DEA Documents Show Parallel Construction Widely Used

Yesterday MuckRock released a number of United States Drug Enforcement Agency documents acquired through a Freedom of Information Act request. The documents reveal that methods of parallel case construction are widely utilized and trained institutionally within the Drug Enforcement Agency and collaborating agencies, with strong institutional controls in place to prevent knowledge of parallel construction involved in cases from reaching any court officers, including the prosecutors assigned the cases. Continue reading