Daily news about bitcoin and cryptocurrencies

Monero XMR - On the rise due to market darknet adoption?

Monero XMR - On the rise due to market darknet adoption?

The price of Monero (XMR) pumped in the last week, from 2.5$ to 5$. The cause are big announcements from the Darknet. First of all, SIGAINT, a darknet mail provider, launched a Tor Monero node, followed by Oasis, a darknet market place, who started to accept Monero and last but not least, Alphabay, the leader and largest darknet marketplace, started the integration of Monero currency on his market platform.

Why Monero?

Monero was created in April 2014 and his primary focus is the privacy. Based on the concept od PoW (proof of work), the main features are:

  • Untraceable payments
  • Unlinkable transactions
  • Blockchain analysis resistance
  • Adaptive parameters

Unlike Bitcoin, Monero implement the Ring signatures algorithm to spread coins between users providing high anonimity. The ring signature algorithm allows you to send money to another user, without the need of revealing your identity. You are inside a ring (group) and you can sign a message on behalf of that group. The receiver is unable to identify which one of the ring signed the transaction.

This high level of anonimity is perfect for the darknet and for the deepweb market.

Monero XMR - On the rise due to market darknet adoption?


10 impossible and creepiest stories from the Deep Web

10 impossible and creepiest stories from the Deep Web

The Deep Web, the place where everything is possible!
Thanks to Reddit, we collected up to 10 impossible and creepiest stories happened all over the world.

1. No Love Deep Web Alternate Reality Game
I was a part of the No Love Deep Web Alternate Reality Game where we had to do a deepnet scavenger hunt which culminated in me driving to New York to answer a pay phone at 3:00AM. That was cool.

2. Mind the gap
I once found a forum dedicated to sharing recordings of the automated messages that tell you the next stop on trains. People would post the recordings that they presumably made themselves and then they would discuss them.
It haunts me to this day. I have so many questions.

3. We see you
This was back before Google. Web pages were, for the most part, still very basic HTML with Javascript. Hardly anyone used CSS. Only discussion boards and some banking sites had anything approaching mature front-end/back-end combinations. Etc. Early 'Net. Real "deep web" story, not just one about illicit activities on-line.
I was browsing random blogs, Geocities sites, and the like, just going from link to link. Eventually I came upon an odd page - it appeared to be random thoughts from different people, but for the time, it was very well-designed. The messages seemed to be cryptic in nature, like several people trying to pass secret notes. I started through the source, and hidden in the comments of a javascript were various IP addresses.
I gathered all of the IP's in a text file and began enumerating. Some were routers with banner messages I could telnet to - almost all at universities ("Warning! This is a secure system at University of Bla Bla...."). The default Cisco credentials from back in the day worked on most of them, but I didn't poke around. A few of the IP's were web servers with little to nothing on them, mostly Apache on Linux or some BSD, at least one IIS server I can recall.
I finally came upon a web server with a huge directory of HTML files and TIFF images, with a few smaller sub directories containing the same. nslookup returned no reverse records for the IP. A VisualRoute traced it as far as Colorado. The HTML files appeared to be records a psychologist or similar mental health professional would keep. The images were of faxes, apparently of both military and medical nature.
As I browsed from a sub directory back to the parent, at the top of was a new HTML file named something like "1-.HELLO-THERE.html". The time stamp was from right that minute. I opened it, and in plain text was the message "we see you". No quotes, all lower-case. About 15 seconds later the server dropped.

4. I know you
I posted a comment on a video, and when I went back to that page to watch the video later, someone replied to my comment saying: "That is very astute of you Mr. (insert my last name)"
I didn't internet for like a week. my last name is not a common one.

5. DIY stuff
DIY vasectomy kit on SR. it was a kit of weird dentist tool looking hooks and some tube thing. $20.

6. Crazy stuff
A few years ago I went searching for rhino horn for a story, one guy said he had a couple of whole horns he'd sell for six figures. I had to pass.

7. Mind-blowing Experience
Silk Road. Circa 2013. Purchased what was promised as a "mind-blowing" experience. Received a Dust Buster two days later. Strangely, no complaints on my end.

8. Nice guy
Back when IRC was on its way out and P2P was in its infancy I tried to download the sims via a private FTP. The guy I downloaded from found a Trojan on my computer and walked me through how to remove it. I would take a bullet for that dude.

9. Finally some food #1
Found a guy selling carrots. Like, it wasn't code for anything, he was literally just selling carrots for bitcoin. 10/10 would visit again.

10. Finally some food #2
There was a german man selling pretzels, just pretzels.

10 impossible and creepiest stories from the Deep Web


First Giant Step: OpenBazaar 2.0 Running on Tor Network

First Giant Step: OpenBazaar 2.0 Running on Tor Network

Today, 17 September 2016, Developer Chris Pacia was able to connect to OpenBazaar over Tor using an alpha version of the upcoming v2.0 software.

The trick has been revealed by the core developer Sam Patterson on Reddit about technical aspects:


Excitement and enthusiasm is spreading over the net and the darknet. In fact, the actual version of OpenBazaar is lacking security and does not support TOR protocol causing lot of people not using the market platform.

OpenBazaar plus DeepWeb plus TOR plus Bitcoin (and Monero).. a new era is coming!

First Giant Step: OpenBazaar 2.0 Running on Tor Network


Phishing in Darkweb to steal Bitcoin - Michael Richo

Phishing in Darkweb to steal Bitcoin - Michael Richo

WALLINGFORD - Michael Richo, 34, was arrested Wednesday on a criminal complaint charging him with credentials theft, bank fraud, identity theft and money laundering. He has developed a system with the aim to steal bitcoins via phishing in the darkweb.

The Man has developed dozens of phishing web-pages identical to some black market, sponsored the link in different forums and waited for the victims login in order to steal their credentials. Once in possession of credentials, the man used the credential and login on the real site, widthdrawing their bitcoin wallet address. He stole more than 15,000 credentials.

Although phishing is going out of "fashion", in the deep web, especially with the onion Protocol, phishing is difficult to identify. Websites are provided with link composed of random letters and numbers and it is difficult to identify the actual site or the fake one.

Here are some of the main site Alphabay onion:


In order to collect the money, the man exchanged bitcoin with FIAT currency and then deposited it on a traditional bank account.

Richo was released on a $100,000 bond.

Phishing in Darkweb to steal Bitcoin - Michael Richo