Alterego

2 readers
2 users here now

(4) ✙ Alterego (Midshipman) ✙ (@CASBT_OSINT_UA) / X https://twitter.com/CASBT_OSINT_UA

founded 6 months ago
MODERATORS
1
 
 

Клиенты криптобиржи Beribit с 11 часов утра штурмуют её офис в башне «Федерация» в Москве. Люди требуют вернуть миллионы, которые они не могут снять со своих счетов уже несколько дней.

Сумма замороженных активов составляет около ₽400 млн. Представители компании обещают отдать 50% вложений, а остальное забрать в течение 1-15 дней.

Тем временем народу перед дверями офиса биржи становится всё больше.

Представители компании пытались сбежать через чёрный ход, но у них не вышло. Beribit официально зарегистрирована в России и занимается обменом рублей на крипту, P2P, USDT и активами.

Since 11 a.m., customers of the crypto exchange Beribit have been gathering outside the company's office in the Federation Tower in Moscow. They are demanding the return of millions of dollars that they have been unable to withdraw from their accounts for several days.

The total amount of frozen assets is approximately ₽400 million. The company has stated that 50% of the investments will be returned, with the remainder to be reclaimed within 1-15 days.

Meanwhile, the number of individuals in front of the exchange office continues to grow.

Company representatives attempted to exit through the rear entrance, but were unsuccessful. Beribit is officially registered in Russia and specializes in the exchange of rubles for cryptocurrency, P2P, USDT, and assets.

Video proof: pixelfed https://pixelfed.social/i/web/post/689784619729854844

2
 
 

Dialogues with an internal censor or Red Lines that we crossed a long time ago.

Online privacy is a concept that concerns the protection of users' personal information and data during their online activities. It includes many aspects, including the protection of personal data, online anonymity, security of information exchange and the principle of non-interference in personal life.

Basic principles of online privacy:

  1. Protection of personal data: This includes the protection of user identity information such as name, address, telephone number, email address, etc. Organizations and Internet service providers are required to comply with data protection laws and ensure secure storage and use of personal information.

  2. Anonymity: Users should be able to remain anonymous online and not disclose their personal information without their consent. This is important to protect privacy and prevent unwanted tracking.

  3. Data Encryption: Transmitted information must be encrypted to ensure its confidentiality and prevent access by third parties.

  4. Control over Information: Users should be able to control what information is collected about them, how it is used, and with whom it can be shared.

  5. Connection Security: Maintaining a secure Internet connection through encryption protocols such as SSL/TLS helps prevent third parties from intercepting your data.

  6. Compliance with Laws: Organizations and Internet service providers must comply with data protection laws and ensure the confidentiality and security of users' personal information.

Overall, online privacy plays an important role in ensuring the security and confidentiality of users in the online environment, and its protection requires joint efforts on the part of users, organizations and government agencies.

The role of cryptocurrencies in the modern world can be characterized as follows:

  1. Media of Exchange: Cryptocurrencies can be used as a medium of exchange to conduct transactions, both online and offline. They allow you to quickly and without intermediaries transfer funds between network participants.

  2. Investment Asset: Many people view cryptocurrencies as an investment asset similar to gold or stocks. Rising prices of cryptocurrencies can lead to profits for investors, and many types of cryptocurrencies present interesting investment opportunities.

  3. Technological Innovation: Blockchain, the technology behind cryptocurrencies, is an innovation in the field of distributed databases and data security. This technology can be applied in various fields such as finance, logistics, healthcare and more.

  4. Inflation Avoidance: In countries with unstable currencies or high inflation, cryptocurrencies can serve as a store of value and financial risk avoidance.

  5. Global Payment Systems: Cryptocurrencies allow you to quickly and inexpensively send money around the world without having to go through banks or payment processors, which is especially useful for international transfers.

  6. Decentralization and Freedom: Cryptocurrencies are usually based on the principles of decentralization, which means there is no central governing body. This provides users with a greater degree of freedom and control over their finances.

Despite their benefits, cryptocurrencies also come with risks, such as price volatility, potential for illicit uses, and regulatory risks. However, their role in the modern world continues to grow, and they remain an important element of the financial and technological infrastructure.

Crypto projects are subject to various risks from governments, intelligence agencies and crime. Here are a few main aspects that can affect them:

  1. Regulatory Risks: Many governments in different countries are introducing or planning to introduce laws and regulations governing cryptocurrencies and crypto-projects. This may include licensing requirements, compliance with KYC/AML (know your customer/anti-money laundering) standards, tax reporting and other restrictions. Violation of these rules can lead to fines, bans, or even criminal liability for participants in crypto projects.

  2. Control of intelligence agencies: Intelligence agencies of various countries may show interest in crypto projects for various reasons, including the fight against crime, terrorism and other threats to national security. They may use various methods, such as transaction monitoring, hacking computer systems, and other technical or legal measures to gain access to information about crypto projects and their participants.

  3. Cybercrime: Crypto projects can also be the target of cybercriminals who may be seeking to steal funds, commit fraud or extort. Software vulnerabilities, attacks on exchanges and wallets, social engineering and other methods can be used to attack crypto projects and their users.

  4. Geopolitical Conflicts: Cryptocurrencies may become the subject of geopolitical conflicts between different countries. This could lead to sanctions, bans on the use of cryptocurrencies in certain countries, or even attempts to create alternative cryptocurrencies to circumvent existing financial systems.

Overall, crypto projects must be prepared to manage these risks by taking measures to ensure legal compliance, protect against cyber threats, and develop strategies to respond to geopolitical events.

Countering threats to crypto projects is complex, and approaches may vary depending on the specific project and its context. However, there are several basic strategies and measures that crypto projects can use to protect against various threats:

  1. Regulatory Compliance: Crypto projects must strictly comply with regulations and laws in the countries in which they operate. This includes licensing, compliance with KYC/AML standards, tax reporting and other measures.

  2. Information Security: Protection against cyber threats is key. Crypto projects should invest in developing and maintaining secure infrastructure, including data encryption, multi-factor authentication, security monitoring systems, and regular security audits.

  3. Ensuring confidentiality and anonymity: In the field of cryptocurrencies, great importance is attached to confidentiality and anonymity of transactions. Projects must develop and implement mechanisms that ensure the protection of users' personal data and the confidentiality of their financial transactions.

  4. Anti-corruption measures: Crypto projects must take measures to prevent corruption and abuse within their structures. This may include the development of codes of ethics, controls and transparency of financial transactions.

  5. Cooperation with Law Enforcement: In the event of threats from criminals, crypto projects must cooperate with law enforcement to prevent and investigate crimes.

  6. Education and Information: It is important to educate users about the safe use of cryptocurrencies and crypto-projects, as well as provide them with information about possible threats and ways to protect them.

These and other measures can help crypto projects effectively counter threats and provide a safe and secure environment for their users.

In non-democracies, where the government may pose threats to citizens and their assets, protection may be difficult, but not always impossible. Here are some strategies that can help citizens protect themselves and their assets:

  1. Use of decentralized technologies: Cryptocurrencies and blockchain technologies offer decentralized means for asset management that may be less susceptible to government intervention. The use of decentralized exchanges, wallets and platforms can help citizens maintain control over their finances.

  2. Store Assets in Secure Locations: Using high-security cryptocurrency wallets, such as hard wallets or cryptographically secure wallets, can prevent unauthorized access to assets even in the event of government intervention.

  3. Use of anonymous and secure cryptocurrencies: Some cryptocurrencies offer improved privacy and anonymity of transactions. Choosing such cryptocurrencies can help citizens hide their financial transactions from the government and other unwanted parties.

  4. Use of Virtual Private Networks (VPN) and Anonymous Browsers: These tools can help citizens keep their online activities private and protect themselves from intrusive government surveillance.

  5. Education and Awareness: Citizens should be aware of their rights and how to protect their assets in non-democratic countries. Education about cryptocurrencies, crypto exchanges and crypto wallets will help them make informed decisions and minimize risks.

  6. Cooperation with international organizations: Citizens can seek support and protection from international human rights organizations and groups that can put pressure on governments of non-democratic countries in case of violations of citizens' rights.

While none of these strategies is ideal, a combination of different measures can help citizens reduce risks and protect their assets in an undemocratic regime.

In a civil society, citizens can and should take an active part in ensuring their own security and protecting their rights and interests. In some cases, especially in countries with limited democratic freedoms, citizens must assume additional responsibilities to protect their assets and personal safety.

This may include using sensitive technologies to protect financial data, fighting for rights and freedoms through civil society activism, education and awareness of rights and opportunities, and collaborating with other citizens and organizations to achieve common goals of security and freedom.

However, it is important to remember that civic responsibility and civic engagement should not replace the functions and responsibilities of the state to protect the rights and interests of its citizens. The state must also fulfill its obligations to its citizens by ensuring security, justice and protection of rights at all levels of society. Thus, civic activity and participation complement and strengthen the actions of the state in ensuring security and protecting the rights of citizens.

Yes, in some countries the role of the state in protecting the rights and interests of citizens has been reduced to a minimum, and some states use their power to suppress opposition and control society. This can lead to a situation where the state acts not in the interests of its citizens, but in the interests of a narrow group of elites or the ruling regime.

In such conditions, citizens have to take greater responsibility for their own safety and protection of their rights. This may include using anonymous technologies to protect your privacy online, actively participating in civil movements and organizations, fighting for your rights through the courts and international organizations, and using alternative methods of protection such as cryptocurrencies.

However, it is important to remember that the fight for your rights must be carried out taking into account the risks and consequences that may arise from opposing authoritarian regimes. In such conditions, solidarity and support from the international community also play an important role in protecting the rights and freedoms of citizens.

For some people, going underground and using anonymity or privacy may seem like the most effective way to protect themselves from persecution by the state or criminal gangs. However, you should remember that such actions may carry certain risks and restrictions.

First, going underground and relying on anonymity often means limited access to society and resources, which can lead to social isolation and economic hardship.

Secondly, the use of anonymity does not always guarantee protection from persecution. Tracking and monitoring technologies and methods are constantly evolving, and anonymity can be compromised, especially if you are targeted by a highly skilled adversary such as government agencies or cybercriminals.

Instead, it is important to develop and support civil society, legal institutions and international organizations that can act in the interests of protecting the rights and freedoms of citizens. In addition, it is necessary to promote transparency and accountability on the part of the state and combat corruption and human rights violations in order to create conditions for justice and equality for all citizens.

I knew that you wouldn't understand me. There is such a thing as internal underground. When you are in full view, as the government and punitive authorities expect from you, and for yourself you choose to withdraw all your activity into privacy and anonymity. But on the outside, you are what is expected of you. An inconspicuous gray mouse that doesn't stand out in any way.

Got it, you're talking about stealth strategy and maintaining personal safety by maintaining a low profile and maintaining confidentiality in your actions and communications. In this case, you prefer to avoid unnecessary attention from the authorities or criminal elements, maintaining your independence and safety.

This strategy may include the use of message encryption, anonymous payment methods, and avoidance of publicly expressing certain political or social views. This reduces the risk of attracting attention and maintains freedom of action and expression.

However, it should be remembered that even when using such a strategy, you must be careful in your behavior in public networks and communicate with people around you in order to avoid attracting the attention of the authorities or criminals. It is also important to consider local laws and regulations to avoid unwanted consequences.

Naturally. Absolutely spot on. Like an agent in enemy territory.

Yes, in this context, maintaining a low profile and ensuring security becomes especially important. This helps minimize the risk of attracting attention and maintain independence and protection of personal interests in difficult conditions. It is important to be careful and prudent in order to operate effectively in such conditions.

Let's get to practice...

Let's move on to practice. Since money (and now almost everything in real life, not fake for show) has the meaning of a vital resource for security and access to material (and not only) values. After all, in the Mafia State (let's call it PGM - parasitic state mafia), it is almost certainly possible at a critical moment to buy off persecution by punitive authorities (special services, police, real bandits, officials). And we (I), any conscious citizen, must have the knowledge and skills to protect ourselves, our family, and loved ones who are poorly informed due to non-technical education. For example, a neighbor who has worked as a truck driver all his life and did not finish high school, or a relative who worked in the same position in her youth when there were no computers at all.

I completely agree. Ensuring the safety of yourself and your loved ones is a priority in any setting, especially in situations where the legal system and state protective mechanisms may be insufficient or even contradictory.

For people without technical training or experience in information security, it is important to start with the basic principles of protection and awareness of possible threats. Below are some practical steps that can help them stay safe in the digital world:

  1. Passwords: Use unique and complex passwords for each account, and enable two-factor authentication (2FA) where possible.

  2. Training: Conduct simple and clear training sessions for loved ones about basic internet safety principles, such as recognizing phishing attempts and virus threats.

  3. Antivirus Software: Install reliable antivirus software and update it regularly.

  4. Encryption: Use encryption to protect sensitive information, such as using encrypted messaging apps or password storage apps.

  5. Regular Updates: Update operating systems and software on all devices to fix vulnerabilities and ensure security.

  6. Caution on the Internet: Teach your loved ones to be careful on the Internet, not to open suspicious links or unknown attachments.

  7. Physical Security: Ensure the physical security of devices, for example, do not leave them unattended in public places.

  8. Regular backups: Regularly back up important data to external media or cloud storage.

These steps can be the first step to keeping your loved ones safe in both the digital and real world.

This is a must have. Without an initial level of security principles, everything else is down the drain.

https://bit.ly/3Ub4iWr

3
 
 

Moreover, the use of torture in this case undermines the credibility not only of these obviously false testimonies, but also of all others. Fear of new torture is a sufficient motivator for the suspect to immediately, without hesitation, confirm all the guesses of the security officers, including outright false ones.

That is, even if, according to some, they “deserved” it, they still cannot be tortured. Not only out of a sense of humanity or the desire to comply with Russian law (and it directly prohibits torture ), but also out of banal practical necessity: a person under torture will say anything to stop it. It will be impossible to use such testimony to establish the truth in the case and find the real criminals. Actually, this is why torture, which was once upon a time ordered by court decision, has long become a thing of the past in all countries with a viable judicial system and was subsequently prohibited.

The Network case Here it will be useful to recall another terrorist case: the “Network” case. In October 2017, the FSB detained a company of anarchists and accused them of creating a terrorist community. Security forces tortured several detainees with a stun gun and beat them - and they testified against themselves. Here is what one of the defendants in the case, Viktor Filinkov, said :

“They asked me questions. If I didn’t know the answer, they shocked me; if the answer did not coincide with their expectations, they shocked me; if I thought about it, they shocked me; if I forgot what they said, they shocked me. There were no breaks, blows and questions, blows and answers, blows and threats.”

A large public campaign was held in defense of those involved in the Network case; many activists and public figures insisted on their innocence. And indeed: how can one take confessions seriously if the person who gave them was tortured with electric shock?

But shortly before the verdict, new circumstances were revealed in the case: Alexey Poltavets, who fled to Ukraine and was arrested in absentia, told Meduza journalists that he and his associates Maxim Ivankin and Dmitry Pchelintsev were involved in a double murder. The murder was definitely not a fabrication or a hoax by the security forces: the bodies were actually found. The only question was who did it. Maxim Ivankin pleaded guilty and was sentenced to 24 years in prison. But then he told reporters that he was also forced to sign a confession under torture.

And here we are faced with the question: how to relate to such statements? If you and I did not doubt for a second the legality of the actions of the security forces, one would think that Ivankin simply made up a story about torture in order to avoid punishment. But before this, Network members were actually tortured.

Torture as the norm Anarchist Azat Miftakhov, who had just been re-sentenced in a fictitious case, was also beaten and tortured with a screwdriver. Ruslan Kostylenkov from New Greatness, whom the security forces decided to appoint as the main culprit, was beaten and raped with a meat hammer during his arrest - after which he was forced to record on camera a confession that he and his student friends were preparing a coup. And along with them, thousands of other people were tortured: prisoners , suspects , and even witnesses .

Torture is so commonplace in the Russian law enforcement system that Ivankin's statements should at least be taken seriously. And this example very well shows the second half of the problem, which we partially touched upon in the Crocus City example: torture not only leads to the punishment of the innocent, but also makes it possible for real criminals to avoid this punishment. After all, if Ivankin was really forced to incriminate himself, it means that the killer was someone else. Maybe this is one of the other defendants in the case, or maybe even a stranger who is now walking freely on the streets. But we no longer have a way to distinguish the innocent from the criminals, since trust in all the actions of the investigation in this case has been undermined.

https://bit.ly/3JsYsuJ

4
 
 

Annotation: This analytical report explores the trend of modern cryptocurrency exchanges resembling traditional banking institutions, potentially compromising the core principles of decentralization and anonymity. It delves into the factors driving users towards these "Banking 2.0" platforms, such as regulatory requirements, user acquisition strategies, and commercial interests. The report also examines the dilemma faced by users between maintaining privacy and decentralization versus accessing additional services and bonuses offered by exchanges in exchange for verification.

Quote: "When exchangers do it, we understand that they do it not because it is their whim, but because they are obliged to do it by the relevant authorities. Making an exchange on the exchange or in the exchanger we purposefully go to some risks, that in the end to keep their capital on a decentralized wallet. And here you are offered something like the Sberbank ecosystem, for passing the verification you will get bonuses and Tonami bonuses and your wallet and your transactions and all to whom you will receive and send them will be verified."

The quote highlights how some users perceive modern cryptocurrency exchanges and exchanges as something more akin to banking than the ideal of decentralization on which cryptocurrency is based. Instead of storing their assets in decentralized wallets, people are being asked to surrender their personal data and undergo verification to access various services and bonuses, which can reduce the level of anonymity and decentralization characteristic of cryptocurrencies.

So why are people being "pushed" into this "Banks 2.0"? It is probably for a number of reasons:

  1. Regulatory requirements: Some exchanges and exchanges may be under pressure from regulators to insist on certain security and customer identification (KYC) standards, resulting in the need to undergo verification in order to use their services.

  2. Attracting new users: Offering bonuses and favorable terms and conditions can be a strategy to attract new users and increase the customer base. This allows exchangers and exchanges to increase their popularity and competitiveness in the market.

  3. Commercial interests: Some exchangers and exchanges may seek to increase their profits by offering additional services and verification bonuses. This may be financially beneficial to them, even if it reduces the degree of decentralization and anonymity for users.

As a result, users face a dilemma between the desire to maintain their anonymity and decentralization characteristic of cryptocurrencies and the opportunity to receive additional bonuses and services offered by exchanges and exchanges for verification.

*** Translated with www.DeepL.com/Translator (free version) ***

Keywords: cryptocurrency exchanges, decentralization, anonymity, banking 2.0, user verification, regulatory compliance, user acquisition, commercial interests, privacy, bonuses

Hashtags: #CryptocurrencyExchanges #Decentralization #Anonymity #Banking2_0 #UserVerification #RegulatoryCompliance #UserAcquisition #Privacy #Bonuses

Editorial comment: This report sheds light on a significant shift in the cryptocurrency landscape, where exchanges are evolving to resemble traditional banks, raising concerns about privacy and decentralization. By analyzing the underlying motivations and implications, it provides valuable insights for users navigating this evolving ecosystem.

Conclusion:

The increasing resemblance of modern cryptocurrency exchanges to traditional banking institutions represents a notable departure from the core principles of decentralization and anonymity that underpin cryptocurrencies. While regulatory pressures, user acquisition strategies, and commercial interests may drive this trend, users are faced with a fundamental dilemma. They must weigh the desire to maintain privacy and decentralization against the allure of accessing additional services and bonuses offered by exchanges in exchange for verification.

In navigating this landscape, users must carefully evaluate the trade-offs involved and consider the long-term implications for the cryptocurrency ecosystem. By remaining vigilant and informed, they can better protect their interests and uphold the principles that define the essence of cryptocurrencies.

Links:

Source: https://bit.ly/3xMXaId

5
 
 

В дампах AlabugaLeaks та в публікаціях InformNapalm (https://t.me/informnapalm/21400) не було цих даних, які сьогодні поширила "Труха" і підхопили деякі українські медіа та блогери.

Хоча "Труха" робить посилання на нашу статтю, але представлених в її дописі даних НЕ БУЛО ні в дампах, ні в дослідженні.

Вірогідно, цю інформацію вкидають через "Труху", при цьому посилаючись на статтю InformNapalm якісь невідомі актори, щоб легалізувати власну інформацію, яка може бути викривленою, або хибною.

https://t.me/khunta_info/116132