Diversify your cryptocurrency investments with a single transaction now. 

How to Avoid Phishing Scams in the Crypto Space. 

Category Archives: Crypto Security

Introducing Receive Address Verification in TREZOR Wallet

The TREZOR Team would like to wish you Merry Christmas and Happy New Year! But, holidays notwithstanding, our team is still hard at work, especially our developers. Thanks to them, today, we are bringing you a small update to make your experience with the TREZOR Wallet even more convenient and safe.

Receive address verification

As this is a small incremental update, there are not many changes on the surface — most affect the logic underneath the application.

Be sure to continue to read at the source: Trezor Medium

Don’t get hacked! Keep your cryptos safe with this.

Don’t get hacked! Keep your cryptos safe with this.

Source: Crypto Rich

How to store crypto – Hardware wallet, Paper wallet, Software wallet – Programmer explains

How to store crypto – Hardware wallet, Paper wallet, Software wallet – Programmer explains

Source: Ivan on Tech

REALIST NEWS – WARNING about Bittrex Exchange (Person Hacked and bypassed 2 Factor Authentication)

REALIST NEWS – WARNING about Bittrex Exchange (Person Hacked and bypassed 2 Factor Authentication).

Source: jsnip4

BITTREX – How to Secure your Bittrex account the best way possible

$20,000 (7BTC) Stolen from Bittrex (captured live on video) Huge lesson learned: https://steemit.com/bitcoin/@cryptoiskey/usd20-000-7btc-stolen-from-bittrex-captured-live-on-video-huge-lesson-learned

BITTREX – How to make sure your Bittrex account is SECURED as much as possible: https://steemit.com/bitcoin/@cryptoiskey/bittrex-how-to-make-sure-your-bittrex-account-is-secured-as-much-as-possible#@jmsm2/re-cryptoiskey-bittrex-how-to-make-sure-your-bittrex-account-is-secured-as-much-as-possible-20170815t220128181z

Source: Crypto is Key

Veritaseum and VERI Price Show Resilience in Face of $8.4M Hack and More

The team at Veritaseum, the company, and the price of Veritas (VERI), the token used to access their products and services, have shown resilience despite the theft of an estimated $8.4m of VERI tokens on Sunday June 23, 2017. This and more will be covered in this article, including ways to protect yourself against such heists, while contributing to the success of the crypto movement in general.

Keeping the effect of price weakness in the overall crypto market in mind, the price of Veritas (VERI) shot back up surprisingly fast on Monday (beyond the $200 mark). This was less than a day after about 36k VERI tokens – worth an estimated $8.4m (or about $233 per token at the time) – were stolen from Veritaseum via a breach at a third party.

Reggie Middleton – Founder and CEO of Veritaseum

Photo Credit: Jamaica Stock Exchange (JSE)

Reggie Middleton, Founder and CEO of Veritaseum, reported late Sunday, that two Factor Authentication (2FA) was thwarted on two different accounts, including third party security among other things.

Reggie also remarked that the “…hackers were very sophisticated, although there attempt to hide the VERI by transferring to different accounts was amateur. I don’t want to get into the details of the how it was done so as not to incentivize others, but the attack vector was found and rectified ASAP, which kept the amount stolen to a minimum” (Veritaseum Slack, July 23, 2017).

Masiah Middleton, another valued member of the Veritaseum team, posted: “The amount that was taken from our wallet earlier today was only 36k VERI. Any other VERI being sold was accumulated differently” (Veritaseum Slack, July 24, 2017).

The 36k of stolen VERI tokens were dumped at EtherDelta – one of only two exchanges that have VERI listed at this stage. This was done in a manner that earmarked a deliberate act to cause maximum damage to the price of VERI.

Sell orders were placed far below the market price. The plan of the perpetrators was clearly not to exchange VERI for the maximum amount of Ethereum (ETH). This might explain why Reggie perceived them to be sloppy in their attempts to hide the VERI.

Furthermore, the Veritaseum ICO took place on April 25, 2017 – about 3 months ago. It was not hacked as falsely reported elsewhere.

Reggie also posted the following on July 24th:

“We were hacked, possibly by a group. The hack seemed to be very sophisticated, but there is at least one corporate partner that may have dropped the ball and be liable. We’ll let the lawyers sort that out, if it goes that far.

Although I hate to see assets stolen, and I hate thieves, the incident proved both the resilient demand for our tokens and the utility of the decentralized exchange EtherDelta.

The hacker(s) made away with $8.4M worth of tokens, and dumped all of them within a few hours into a heavy cacophony of demand. This is without the public knowing anything about our last traction.

I would like to make it known that we had the option to fork VERI, but chose not to. At the end of the day, the amount stolen was miniscule (less than 00.07%) although the dollar amount was quite material.

Another point that I would like to make clear is that Veritaseum tokens are software that represent our knowledge, advisory and consulting skills, products and capabilities. Without the Veritaseum team, the tokens are literally worthless! If someone were to someone confiscate 100% of the available tokens, all we need to do is refuse to stand behind them and recreate the token under a new contract. Again, we aren’t selling currencies, we aren’t selling securities. We are selling capabilities, and ability for those capabilities to connect parties P2P for the autonomous transfer of value. You can get away with a large securities heist, or a large currency heist. The Veritaseum team is what powers the value behind the Veritas token. A large theft of those tokens after a fork is as valuable as stealing 90M empty plastic cups.

The “market cap” as the media likes to refer to, may seem high to those who don’t understand how we employ platform economics, but those who understand should see that number as drastically undervalued. We have a roadshow for the NYC & Connecticut hedge funds next week. The Sr. partner of distressed credit of one of the world’s largest funds specifically took the meeting after hearing about what we are doing. “This is big, very big” (that is an exact quote from the person who arranged the meeting, who is a 40 year veteran of Wall Street, a literal brand name know by nearly every experienced professional – someone who had aggressively jumped on board team Veritaseum to assist in business development), for we are simultaneously lining up private and sovereign credits to Veritize. This is in addition to what may be our final meeting with one of the world’s top ten securities exchanges to use our product. That is in addition to our Veritizing a medical practice as a showcase for doctors and healthcare biz pros around the world to emulate (using Veritas, of course). Think of us just capturing 50 basis points of all of the medical practices and related healthcare businesses in the world. Which will actually scale exponentially without financial industry dealings (assuming we can capture .02%).

We have already landed the Jamaican Stock Exchange as VERI client just 30 days after the initial token offering. Actually, quite amazing…

Now, you can see how inconsequential the mere hack of a few million dollars” (Veritaseum Slack, July 24, 2017).

“Without the Veritaseum team, the tokens are literally worthless!”

Some took offense at what Reggie posted. All he meant is this: If you’re going to steal VERI on a large scale (or even all of it!), then the Veritaseum team has the power to simply “…refuse to stand behind them and recreate the token under a new contract.” Reggie went at length to explain why this is the case.

By no stretch of the imagination did Reggie disregard the support of VERI holders. What he posted is hugely positive for VERI holders – the Veritaseum team will have your back even when the worst of VERI heists occur!

Why would anyone go to that much trouble to steal VERI and not want to “cash out” at a maximum level?

The perpetrators not only dumped the VERI in a manner designed to cause maximum damage to the price. Someone launched a massive disinformation campaign shortly afterwards against Veritaseum via various channels.

Now we can at best speculate at this stage, but is it too far-fetched to suspect that state-sponsored actors were involved in this heist of VERI, especially considering the way they gained access and dumped the VERI onto the market? In fact, can one completely exclude the involvement of state-sponsored actors in various other crypto related heists, including the biggest bitcoin heists in history so far?

Let’s assume for a second that certain government agencies launched a secret war on cryptos. Let’s assume their aim is to slowly kill the crypto market by discouraging people to participate. Let’s assume that they attempt this through a combination of legal and illegal acts, including heists via phishing scams and hacks – primarily designed to eat away the confidence of participants in the crypto market. And perhaps more importantly, discourage people from entering the market.

Given restrictive regulations against cryptos within certain jurisdictions, is it too far-fetched to assume that certain government agencies are indeed waging war on cryptos? In addition, is it really that far-fetched to assume that various crypto news sources are within their control, especially given the disinformation and outright lies published at certain sources?

Is it that far-fetched to assume that an army of state-sponsored actors exists with the sole purpose to “bad mouth” or to play cryptos off against each other by spreading fear, uncertainty and doubt (FUD) based on disinformation and lies? Is it really that far-fetched to suspect that cryptos such as Ethereum (ETH), Veritas (VERI) and Populous (PPT) are among their main targets?

Furthermore, why are certain crypto news sources so quick to blame “Russian hackers” when there is a heist of cryptos? In addition, why are there deliberate attempts to come over as racist (e.g. see below)?

Reggie Middleton responds to racist slur posted at BitCoinTalk

Is it that far-fetched to assume that certain governments are trying to roll their non-crypto propaganda campaigns into the crypto space in a multi-pronged approach – hitting both primary and secondary targets in the process (so to speak)?

Source of Video: Let’s Invest

Don’t be surprised when they offer “solutions” to problems they created in the first place. It is all done under pretexts that might come over as “fine and dandy,” but are not. Don’t fall for their tricks. Don’t support their efforts to gain control over the crypto space.

Are you a true crypto supporter? Here are ways to help.

Regardless of whether you deem the above to be purely speculative nonsense or not, there are ways you can contribute, not only to safeguard your own crypto holdings, but to lend support to the crypto movement in general – a movement that seeks to free us for one from the control of central powers through the global embracement of decentralized, peer-to-peer, trustless, bankless, censorship-resistant and open source solutions based on blockchain technologies.

This is what you can do if you haven’t done so already (in no specific order):

Educate Yourself – Arm yourself with the willingness to learn. Be willing to walk the extra mile. If not, be ready to accept unnecessary risks and the potential losses that come with it!

Crypto Hardware Wallets – It is not safe to store your private keys on your local computer. Think Pony botnet. Utilize crypto hardware wallets such as Trezor to safeguard your private keys. No crypto storage solution is 100% full proof, but crypto hard wallets such as Trezor provide almost unmatched convenience and security.

Support Decentralized Crypto Exchanges – Why place your crypto holdings at risk by making use of centralized exchanges? If you do, you’re in effect handing over the private keys of your wallets to third parties. This creates unnecessary counterparty risks.

History in the crypto space has shown that third parties such as centralized crypto exchanges cannot be trusted to keep your private keys safe. Think Mt. Gox. Think Cryptsy. Think Bithumb. Think of numerous other security breaches at centralized exchanges.

Try to avoid centralized crypto exchanges by making use of decentralized crypto exchanges such as EtherDelta (even though the perpetrators used it as a means to exchange the stolen VERI). Don’t fall for cheap propaganda that suggests that EtherDelta is too difficult to use. There are various videos available at YouTube that show exactly how it is done.

Don’t fall for phishing scams by trusting addresses, URLs or messages received via private message or posted by someone anywhere besides on the official website of a company or token. Make use of a solution such as RoboForm in order to make sure that URLs match 100% (or at least use bookmarks).

Do Your Own Due Diligence – Don’t fall for fear, uncertainty and doubt (FUD) driven by disinformation and lies. 

Always keep the bigger picture in mind!

Rivetz ICO: First Mover Cyber Security Solutions to Open Crowdsale Soon

Update: Rivetz Crowdsale Postponed: August 10, 2017

Rivetz Corp., a company founded in 2013, is about to launch their crowdsale for Rivetz Token (July 25, 2017) – a decentralized, mobile security token that will be used to access the cyber security solutions and other capabilities provided by this first mover.

What is the Greatest Threat to Companies today?

The survival of companies is threatened by various factors today. To name a few: lone wolf attacks, losing competitive advantage, changes in the regulatory environment, high costs associated with unconstrained hiring, lack of innovation, bad management, natural disasters and market instability.

The list certainly doesn’t stop there, but what can be deemed the greatest threat to every single company out there today?

In my opinion, cyber crime – the use of computers or the internet to commit and/or facilitate criminal activities – is the biggest threat faced by every single company today.  This is regardless of whether they like to admit it or not.

To get an idea of the magnitude of the problem we’re facing: The global economy lost in excess of $450 billion due to cyber crime in 2016 alone. According to Juniper Research, this figure is estimated to reach in excess of $2 trillion dollars by 2019. Others such as Cybersecurity Ventures places the figure much higher – in excess of $6 trillion by 2021!

If the above is not shocking enough, a survey that was done by specialist insurer, Hiscox, revealed that less than half of the businesses in Germany, the U.K. and U.S. are ready to deal with cyber crime.

Furthermore, many businesses who think they are prepared, are not really prepared. They spent millions of dollars on outdated solutions such as firewalls, passwords and virtual private networks – all cyber security solutions that are no longer effective in the prevention of cyber crime.

All of these solutions assume that “the edge of the network is the network perimeter. This makes it too easy for non-authenticated users to probe and hack systems” (Rivetz White Paper, June 29, 2017, p.4).

What can be done to effectively fight against this growing threat?

You’ve got to love the approach proposed by Rivetz when it comes to data protection and information assurance (IA). Break the dependence on legacy solutions when it comes to cyber security – such as a password as a last line of defense – by expanding “the edge of security to the screen of the device” (Rivetz White Paper, June 29, 2017, p.4). 

Accomplish this by utilizing the Trusted Execution Environment (TEE) –  a vault like hardware platform that is present in each device – to make changes that cannot be altered nor observed by the processor. Use this trusted execution environment, not only to secure and process sensitive data, but also to guarantee information assurance (IA), including transaction assurance.

Build a network in order to improve the data protection capabilities of the devices. The Global Attestation and Identity Network being built by Rivetz, which is fueled by the Rivetz Token (RvT), will constantly monitor, measure and record the state of the device in terms of its integrity and health.

Rivetz plans to fully integrate their model into the Bitcoin (BTC) and Ethereum (ETH) blockchains at the end of the day – a move that will decentralize the approach to cyber security and information assurance (IA). They have already prototyped the technological capability required to make it work, but some of the core capabilities still need to be rolled out. This will happen in step with the roll out of the mainstream blockchain roadmap.

Ultimately each Rivetz Token (RvT) will serve as a “key” to unlock the cyber security controls enabled by Rivetz.  

Why should you participate in the Rivetz ICO?

The Rivetz ICO or crowdsale kicks off on July 25, 2017. They are hoping to sell a maximum of 70 million RvT tokens (maximum $50,000,000) during the crowdsale – 35% of the total supply of 200 million RvT tokens.

Here are reasons why you should participate:

Early Bird Bonus

Early birds will receive a 20% bonus. Why potentially pay more later when you can get in cheaper now, right?

Massive Market and Growth Potential

Given that for the most part, no provable security exists in terms of the end-point devices being used in the Internet of Things (IoT), Rivetz aims to change the status quo.

If Rivetz succeeds, IoT devices will leave the premises of manufacturers with security in the box so to speak. This means that the market targeted by Rivetz will include all Internet of Things devices, including mobile devices. This is a massive market!

The number of IoT devices is expected to hit the 20 billion mark this year (20 Billion Connected Internet of Things Devices in 2017, IHS Markit Says). This while it is estimated to reach 200 billion devices by 2020 (Intel Infographic) – an expected increase of 900% in about 3 years!

Can you imagine the perks of getting in at the ground floor in terms of this potential revenue growth?

Regulatory Compliance Data Protection Laws

The cyber security and information assurance solutions built by Rivetz should make it easier and more cost-effective than ever for businesses to comply with data protection laws, including compliance with the General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) and California S.B. 1386.

GDPR compliance will be compulsory from May 25, 2018 and forward. Love it or hate it – all signs are there that data protection laws are here to stay.

Get in during the Rivetz ICO – and chances are that your business might benefit from more than just discounted RvT tokens. If you ask nicely, they might throw in some promotional RvT tokens.

First Mover – Cyber Security Solutions – Blockchain Technology

Rivetz is a “first mover” in terms of cyber security solutions built by utilizing blockchain technologies. This provides them with a competitive advantage to at least some extent, especially considering that they have filed at least one patent to protect their intellectual property.

Experience and Leadership – Blockchain Technologies and Trusted Computing

Rivetz Corp. is a relatively young company (founded in 2013), but the Rivetz team is an established team made up of members who have decades of experience when it comes to blockchain technologies and trusted computing. The team includes among others, Steven and Michael Sprague (featured below).

Operational Technology

Non-blockchain capabilities currently offered by Rivetz include “multifactor authentication, embedded authentication, file encryption and secure messaging” (Rivetz White Paper, June 29, 2017, p.5). In addition, Rivetz currently has operational technology in place that is compatible with 500 million+ mobile phones.

Contracted Revenue, Other Revenue Streams and New Markets

The Rivetz team has managed to secure in excess of a million dollars in contracted revenue from the U.S. government. This is a drop in the bucket, but provides a “safety net” and the potential for more down the road.

Other revenue streams will include revenue generated from metered access to token-enabled services and other capabilities (see below) – something that should help to open new markets to serve the future $40bn Internet of Things market.

Token-Enabled Services

The Rivetz team is in the process of developing various token-enabled services. They are for one working on a means to provide support for secure micro-payment for these services and capabilities. All of these services will only be accessible via RvT tokens – the proverbial “keys” to start the “engine.”

General Purpose Use Cases

The Rivetz solution will provide general purpose use cases across the spectrum, including but not limited to: assured transaction instructions for e-commerce solutions, multisig wallets, assured instructions for cryptocurrency wallets (online and offline), multi-factor authentication with provable cybersecurity controls and token projection of client private keys and process. Details on this can be seen on pages 16-17 and 25-26 of the Rivetz White Paper.

Strategic Relationships

Rivetz’s strategic relationship with Trustonic, leaders in mobility and security, give access to more than a billion devices that are already in the field so to speak. Furthermore, the Rivetz team is hard at work to establish new strategic relationships. They have initiated discussions with Qualcomm – world leader in 3G and next-generation mobile technologies, Intel and others.

If successful, Rivetz will not only enjoy greater support for their commercial TEE solutions, but get access to even more devices.

Don’t be too surprised when Rivetz becomes the undisputed leader in trusted computing. The Rivetz ICO offers a golden opportunity to get in at the ground floor and  share in their potential failures and successes.


Bitcoin Security: How to Keep Your Coins Safe

Bitcoin security, or how to keep your bitcoins safe, should be at the top of your priority list if you’re a holder of bitcoins or intend to hold bitcoins. There are various ways to protect your bitcoins against cyber criminals. We’ve listed a couple here.


Be sure to leave your remarks in the comments section. All comments, except SPAM, are welcome.