Has the Bitcoin Mining Industry Entered Into a "Death ...

The deepest report: Bitmain's self-help history

The deepest report: Bitmain's self-help history
The original intention of this article is to let readers understand the causes and consequences of Bitmain internal fighting, but after writing it, I found that it is not so much internal fighting as it is a long history of self-help.
The story is very long. Let's adjust the timeline to the eve of December 17, 2018. That was one of Bitmain's most critical moments and the beginning of a series of subsequent stories.
1. Self-immolation In September 2018, Bitmain's financial department warned management that the company's cash flow has become very tight and operating costs must be reduced to allow the company to continue. The blockchain unicorn, which is valued at more than 15 billion U.S. dollars, is crippled in the run and struggling to break the corner.
In 2017, Bitmain made a profit of 1 billion US dollars In the first half of 2018, Bitmain made a profit of 1 billion US dollars Three rounds of financing, a total of 800 million US dollars Net assets should exceed 3 billion U.S. dollars In September 2018, Bitmain had tight cash flow and was on the verge of bankruptcy
A simple comparison, it is not difficult to see that Bitmain's ability to make money is incredible, and its ability to burn money is even more extreme.
How does Bitmain burn money? Do you pour cash into gasoline and burn it, or hire a lot of employees to stuff the banknotes one by one into the shredder? The actual situation is closer to the latter.
The following data can help readers quickly learn Bitmain's money burning skills.
At the beginning of 2018, the entire cryptocurrency market has entered a bear market, but Bitmain's monthly operating costs have been rising wildly. Operating costs have risen from 10 million US dollars at the beginning of the year to 50 million US dollars at the end of the year.
Large-scale expansion of the R&D team is one of the main reasons. The HR who once worked at Bitmain revealed that the company once hired more than 50 employees a day and nearly 500 employees a month. Even so, it was criticized for its slow recruitment speed. The cash consumption in this area is approximately $250 million.
Operating costs are just the tip of the iceberg. Excessive chip trial production can become a classic case of project management courses. Readers who pay attention to Cryptocurrency mining can easily find that Bitmain is still working hard to clear the inventory of Antminer S9 in 2019. As the co-CEO, Ketuan Zhan did not listen to the advice or even warnings of the Finance Department, insisting on the implementation of Excessive chip trial production, resulting in a large accumulation of inventory and tight capital turnover. Another CEO, Jihan Wu, once revealed that the loss of Excessive chip trial production to the company was approximately US$1.5 billion.
Large-scale expansion of the R&D team is one of the main reasons. The HR who once worked at Bitmain revealed that the company once hired more than 50 employees a day and nearly 500 employees a month. Even so, it was criticized for its slow recruitment speed. The cash consumption in this area is approximately $250 million.
The BM1393 chip incident is even more incredible. Chip expert Ketuan Zhan invested a lot of money on a failed chip, and finally failed again. From 2017 to 2018, Bitmain has failed Trial production of mining machine chips at least 4 times, including 16nm, 12nm and 10nm chips, of which 16nm Trial production failed twice, thus losing at least US$1.2 billion.
It is rumored that Bitmain still holds a billion U.S. dollars worth of cryptocurrency in a state of floating loss. In view of the rebound in the market in 2020, we will not comment temporarily, waiting for the correct answer from the cryptocurrency market. But the losses pointed out in the previous article are all irreversible.
2. Sole power
In September 2018, Bitmain's management realized the seriousness of the problem. It turned out that the company's money could be squandered. As a result, the management began to discuss self-help plans, and the most reasonable and effective way was obviously to lay off employees.
The probation period for newly hired employees at Bitmain is half a year, and the probationary salary is 100% of the official salary, there is no difference. Once layoffs are made, new employees who have not passed the probationary period will be the main layoff targets. The department managed by Ketuan Zhan will face large-scale layoffs. The layoff plan is strongly opposed by Ketuan Zhan. Bitmain can only temporarily abandon the layoffs and replace it with continuous reductions. For marketing and travel expenses, a budget committee was established to strictly approve every expenditure. At the same time, employee benefits, such as reimbursement of taxi expenses, breakfast supply, snacks and drinks, etc., have also been abolished, and even the tradition of giving employees 400 yuan worth of BTC/BCH every month has been stopped.
In the face of huge cash flow pressure, trivial savings is obviously of no avail. Soon, the management again discussed the layoff plan, and it has reached the point where it has to be laid off.
In December 2018, Jihan Wu began to organize all entrepreneurial veterans and business backbones to persuade Ketuan Zhan to agree to layoffs, but Ketuan Zhan still insisted not to layoffs. The persuasion process was very unsuccessful. After many meetings and intense debates, Bitmain executives were caught in a dilemma of wasting time with Ketuan Zhan.
In this process, the shortcomings of the dual CEO system began to appear, and the relationship between the two CEOs gradually deteriorated.
On the night of December 16th, Ketuan Zhan reconvened the management meeting, and more than 30 managements who were present were asked to hand over their mobile phones. At this time, Jihan Wu was on a business trip in Hong Kong and was busy with listing related work.
In the meeting, Ketuan Zhan's core content was three items:
(1) Bitmain cannot have two CEOs, only one CEO and must be Ketuan Zhan. Ketuan Zhan said that he met an old leader during a business trip. He hadn't seen each other for many years. The old leader suggested that the company can only have one CEO, and it must be him. Ketuan Zhan feels that this is a kind of fate, an opportunity given by God.
(2) Ketuan Zhan believes that the company's cash flow problems, the biggest responsibility is the inability of the financial department. To prove his point, Ketuan Zhan announced Bitmain's financial data at the meeting. In the evening, employees in Taiwan began to post messages on social media, saying that the company's capital chain was broken and the top management was split.
(3) If Ketuan Zhan is not supported, the option will be cancelled and the equity will be voided.
Hearing about this, Jihan Wu, who lives in Hong Kong, sent a WeChat message to the management who are attending the meeting.

https://preview.redd.it/zkj2d44tqid51.jpg?width=1080&format=pjpg&auto=webp&s=9251c1f7308e155d7911d5969e71091a5ad5e14a
On the afternoon of December 17, 2018, Jihan Wu returned to Beijing to negotiate with Ketuan Zhan all night, and finally reached a consensus in the early morning. Bitmain co-founder Yuesheng Ge announced the results of the negotiations. Jihan Wu and Ketuan Zhan ceased to serve as CEOs, and Haichao Wang served as CEO. Jihan Wu voluntarily backed down and Ketuan Zhan served as chairman.
The "12.17 Incident" had a very bad impact on Bitmain, especially the disclosure of Bitmain's financial status, which caused vendors to start dunning. The loan that had just been negotiated with the Bank of Beijing was cancelled the next day. Jihan Wu's resignation as CEO caused an uproar in the industry, and it became a hot topic among Cryptocurrency mining, blockchain practitioners, and investor communities. The media focused their interpretation on Bitmain's series of incidents, and generally looked down upon its ongoing Hong Kong IPO, believing that the high-level changes had already signaled the failure of the IPO in advance.
On Christmas December 24, 2018, Bitmain finally began to implement the layoff plan. This long-delayed “correct decision” was achieved after a stalemate for nearly three months. The AI ​​teams in Beijing, Singapore, Taiwan, and Shanghai have laid off more than 50% of their employees. The Israeli R&D center was closed and Shenzhen New Species Technology Co., Ltd., which had been acquired for only ten months, was dissolved, and all employees were laid off. Copernicus, Bitmain's top blockchain development team, was not spared and was wiped out in this layoff. Copernicus and some of the laid-off employees joined the new company Matrixport co-founded by Jihan Wu and Yuesheng Ge, headquartered in Singapore.
3. Past events when starting a business
After the "12.17 Incident", Jihan Wu gradually faded out of Bitmain's management affairs and turned his attention to the IPO and new company. And this is one of Jihan Wu's major mistakes, he began to let Ketuan Zhan manage Bitmain alone.
In fact, as early as 2013, Jihan Wu planted hidden dangers.
Jihan Wu, an investment banker, was the earliest translator of the Bitcoin white paper. He began to get involved in the cryptocurrency mining industry in 2012. The disappearance of Kaomao and Nangua Zhang's ticket skipping led Jihan Wu to decide to develop his own chip.
In 2013, Jihan Wu established his own mining machine company. Together with Yuesheng Ge, who was only 20 years old, he found Ketuan Zhan, an integrated circuit designer of the Chinese Academy of Sciences, to create the protagonist of this article, and later the digital Cryptocurrency mining giant, Bitmain.
Jihan Wu promised Ketuan Zhan that every time a mining machine chip was successfully developed, he would give some shares to the Ketuan Zhan team. At that time, the company founded by Ketuan Zhan was on the eve of falling apart. In order to regroup the team, Ketuan Zhan promised to share half of his shares with the team members. Unfortunately, this is just a bad check. With the rapid development of Bitmain and higher and higher valuations, the expanding Ketuan Zhan almost monopolized all the shares.
Like many startups, Bitmain encountered many difficulties in its early days, and many jobs had to be done by the boss. For example, in the chip design and production process in the second half of 2013, Bitmain was caught in a dilemma of insufficient funds. Jihan Wu personally raised funds and met with TSMC’s sales to persuade TSMC to accept the production needs of a start-up company. Jihan Wu also participated in the selection of the thermodynamic parameters of the heat sink in the Antminer S1.
In 2014, Jihan Wu discovered that this company was independently operated by Ketuan Zhan, which had huge problems. Forcing Jihan Wu to continue to participate in company management.
At that time, Bitmain's mining machine chips had just achieved a certain lead in the standard design process. Jihan Wu believes that the next step must be to develop full customization technology, but Ketuan Zhan plans to invest resources in the research of mobile payment chips.
Ketuan Zhan met a mysterious person from the Party Central Security Bureau who claimed to be able to manipulate the Party Central Committee’s decision-making process for the next generation of mobile payment cryptography standards, but this direction is likely to lead to the fact that Bitmain has just gained the lead in the mining machine market. Regained.
Jihan Wu said that as a graduate of the School of Economics, with a little memory of his high school stage and the knowledge reserve of a computer technology amateur, he retrieves various materials and papers every day, learns theories related to full customization, and goes to Ketuan Zhan conducts persuasion work there.
Fortunately, in the direction of full customization technology, Ketuan Zhan finally listened to Jihan Wu's opinion. Bitmain quickly integrated the technical experts from the United States and Russia introduced by Jihan Wu, which greatly improved the design level of chips and complete machines.
In 2015, Jihan Wu suggested that Ketuan Zhan consider the direction of artificial intelligence. But Ketuan Zhan is not here, he prefers the CPU direction. After staying asleep at night, coupled with in-depth analysis by the Bitmain investment team, Ketuan Zhan finally agreed with this direction. It is a pity that after the Tianshi Chen brothers made major breakthroughs in theory and practice, Bitmain officially invested in the relevant direction, and it was still a step behind.
In the two years from 2016 to 2017, Bitmain's business performance has achieved rapid development, becoming a unique super unicorn in the blockchain industry. According to Froth & Sullivan, in 2017, Bitmain Technology Holdings was the second largest fabless chip design company in China and the tenth largest fabless chip design company in the world, and the fourth largest fabless ASIC chip design company in the world, accounting for 74.5% of global cryptocurrency market share.
However, the huge crisis has long been buried in the early days of entrepreneurship.
Ketuan Zhan's decision on major directions revealed his weakness of extremely lack of business understanding. But every mistake he made was blocked by the company's core employees. His overconfidence in his management ability led to the gradual intensification of conflicts, and the management differences between the two founders became more serious.
4.The giant gets lost
The contradiction between the two broke out on December 17, 2018. Ketuan Zhan used extreme means to force the management to compromise with him by canceling the option, so as to achieve the goal of sole control of the company. Jihan Wu returned to Beijing from Hong Kong overnight and negotiated with Ketuan Zhan all night. In the end, the two resigned as CEO. Jihan Wu retired. Ketuan Zhan has the exclusive rights of chairman in exchange for the implementation of the layoff plan.
Jihan Wu's voluntary retreat has intensified Ketuan Zhan's management to do whatever he wants.
A Bitmain employee commented on Ketuan Zhan's management skills, summed up in two letters-SM.
After becoming the sole helm of the company, Ketuan Zhan quickly "rectified" the department in charge of Jihan Wu as the chairman of the board. He guided the sales of mining machines at the dinner, and pointed out that the sales performance is not due to the sales staff. Ability is strong, but the company provides opportunities. Take two sales leaders as examples, saying that if the company hadn't given the opportunity, they would still be losers. In addition, Ketuan Zhan also instructed the sales staff on how to toast and imparted the wine table culture and experience.
After the meal, Ketuan Zhan came to the conclusion that the quality of Bitmain sales staff was too poor, and Huawei’s blood needs to be injected to drive the company’s progress. Soon, the marketing and sales director from Huawei officially took over Bitmain, opening the era of brand premium for Antminer.
In order to further understand and guide the sales work, Ketuan Zhan asked to meet the customers with the sales staff. During the negotiation process, Ketuan Zhan had a heated discussion with customers on the issue of Chinese and Western medicine, and had also forced the sales staff to be able to ship 10,000 machines due to insufficient production capacity.
Although the requirements for sales personnel are strict, Ketuan Zhan has provided a lot of convenience for "Mainland Ark". In addition to selling mining machines at a more favorable price, Bitmain's mining machines are also hosted in Ming Wang at a higher price than the market price. Mine. It is reported that both Ketuan Zhan and Ming Wang are shareholders of Ark.
The new sales strategy of Huawei's executives has also brought very obvious changes to Bitmain. The self-righteous brand premium reduces the price-performance ratio of Antminer, causing competing products to eat away at Bitmain's market share. Later, Bitmain found that the strategy was wrong and started to cut prices, and found that the mining machine market was saturated and the purchase demand of miners had decreased.
More dangerous than the sales strategy is that the technical advantages of Antminer are being chased by competing products, and even overtaken. At the same time, the two mining pools under Bitmain also lost their first and second positions. The AI ​​business, which Jihan Wu placed high hopes and Ketuan Zhan personally supervised, became a laughing stock in the industry. Not only did it fail to make a profit, it almost brought down Bitmain.
Blindly introducing senior executives from Huawei to occupy important positions completely destroys the company's internal cultural foundation. The bureaucracy within Bitmain began to corrode from high-level employees to ordinary employees. Ketuan Zhan is not aware of this. He is still keen on recruiting Huawei employees, imitating Huawei's organizational structure and strategy, letting HR do sales and R&D personnel to do HR.
The organizational structure adjustment in October 2019 was the fuse for Ketuan Zhan to completely anger Bitmain management. This time, Ketuan Zhan completely marginalized Bitmain’s veteran employees, and suddenly promoted some of the “airborne soldiers” who had just joined the company to the position of person in charge, which caused the former person in charge to report to the new employees. The two managers who were originally equal The hierarchy becomes the subordinate relationship, the operation and development of different business lines are merged into a large department, the upward reporting process becomes more cumbersome, and the relationship between employees becomes delicate.
5. Headwind
On October 29, 2019, Jihan Wu urgently held a staff meeting. Prior to this, the legal representative of Beijing Bitmain has been changed to Jihan Wu, including the parent companies Hong Kong Bitmain and Cayman Bitmain. Jihan Wu stood in the lobby of Building 25, B1, announcing that Ketuan Zhan has been relieved of all duties. Any employee in the Bitmain Group shall no longer execute Ketuan Zhan’s instructions and participate in any meetings convened by Ketuan Zhan. If there is any violation, the company will demotion and expel the company based on the severity of the circumstances. If losses are caused to the company, the company will be held accountable.
Jihan Wu's speech is very long, which can be summarized as follows:
(1) Ketuan Zhan has been relieved of all duties. Also expelled from the original Huawei company HR Zhi Wang introduced by Ketuan Zhan at the end of 2018. Zhi Wang’s reputation on Bitmain was extremely poor and was ridiculed by employees as "nine thousand years" (In ancient China, the emperor was called "ten thousand years old", and the prince was "eight thousand years old." However, in the Ming Dynasty, there was an eunuch who caused harm to the country and the people. He called himself "nine thousand years old", meaning that he was only A little lower than the emperor's level).
(2) Ketuan Zhan's ability to control the company's option incentive plan has disappeared, and it is no longer possible to cancel employees' options at will.
(3) The organizational structure adjustment plan led by Ketuan Zhan was suspended.
(4) We are optimistic about the future of AI business, but the premise is that the main business can continue to make profits in order to support the company's continued investment in AI business.
In the speech, Jihan Wu also told employees the whole story of the "12.17 Incident" and bluntly said that the company is not in good condition. If no measures are taken, Bitmain is likely to go bankrupt in three quarters and he must come back to save the company.
At this time, Ketuan Zhan, who was on a business trip in Shenzhen, finally experienced the situation of Jihan Wu in the "12.17 Incident".
After the official return, Jihan Wu began to clearly point out the company's various problems in operation and management, and went deep into each business line to understand the situation. In the mining machine sales department meeting, employees spoke enthusiastically, reflecting on the difficulties and opinions encountered in the work, the marketing and sales director from Huawei asked with a surprised look, "Why didn't these issues be reported to me before?", and soon , The director was interviewed and "voluntarily resigned."
On November 2, 2019, Jihan Wu announced a salary increase for all employees. Bitmain’s last salary increase dates back to 2018. In principle, Bitmain has two salary increases every year.
On November 7, 2019, Ketuan Zhan spoke on social media for the first time, describing his hardship in starting a business, and condemning Jihan Wu for “stabbing a knife in the back”. At the end of the article, he also set himself a KPI for 2020, that is, the mining machine market share will reach 90%, and the AI ​​business will earn 1 billion.
But Ketuan Zhan's majestic plan did not make Bitmain employees feel emotional, but ridiculed him instead. Employees exposed that he insulted employees, advocated Chinese medicine, believed in Buddhism, drank in meetings, practiced Qigong...
However, there is less than half a year before the halving of Bitcoin production, and the cryptocurrency market shows no signs of recovery, which makes Bitmain management very anxious.
On January 6, 2020, Bitmain ushered in another round of layoffs, with a layoff ratio of about 1/3. This time the layoffs have caused many employees who have just increased their salaries to feel very grieved. On the one hand, they were looking forward to Jihan Wu's return. On the other hand, the compensation for this layoff was less than 18 years.
Ketuan Zhan, who has been unable to enter the Bitmain office area, once again spoke on social media and firmly opposed to layoffs. We do not need to lay off staff and we cannot commit suicide.
During the Spring Festival, Covid-19 broke out. Mainland China has begun to extend the Spring Festival holiday and advocate working from home. Under the chain reaction caused by Covid-19, most companies have chosen to cut salaries or even lay off employees. In the first two months of 2020, China's exports fell by 17%, U.S. stocks were broken four times in a row, Bitcoin plunged 40% in 24 hours on March 12, 2020, and crude oil futures fell by 300% on April 20, 2020...
Obviously, Jihan Wu can't predict, but this layoff seems to be the right decision again. In addition, from January to April 2020, Bitmain's revenue exceeded US$400 million amid the spread of Covid-19 and the collapse of the financial market.
6. Fight to the death
When Jihan Wu tried to get the company back on track, Ketuan Zhan was not helpless. On April 28, 2020, Ketuan Zhan finally rolled back the legal representative of Beijing Bitmain to before October 28, 2019 by repeatedly submitting administrative reconsiderations, and restored his status as a legal representative.
On the morning of May 8, 2020, a piece of news about Bitmain quickly appeared on the real-time hot search rankings, and even dominated the headlines of the day. At window 52 on the second floor of the Haidian District Government Affairs Center, when Ketuan Zhan, the legal person of Beijing Bitmain Company, was receiving the business license, a group of unidentified people snatched the business license from the industrial and commercial administrative staff. A source at the scene said that the number of unidentified people in the group was about 60 people, of which Luyao Liu was directing at the scene.
This is a skillful piece of news. It first leads readers to think that Ketuan Zhan is a victim, using 60 people to grab business licenses as the focus. The masses accused Jihan Wu of lawlessness, but ignored whether the government affairs center could have 60 personnel. As for Hong Kong Bitmain to have the right to appoint a representative to obtain a business license, this is a deeper level of thinking.
The follow-up report restored the real situation at the scene. Only more than ten people were present, and both sides were equipped with security personnel. Bitmain employees also broke the news in the circle of friends, claiming that Ketuan Zhan's bodyguard had injured Bitmain's authorized person, and said in a threatening tone, "Be careful!"
However, the subsequent plot reversal did not have much effect. Jihan Wu's reputation has been greatly affected. From a bloody soldier who rescued the company in trouble to a lawless criminal, it can be said to be a world of war. do not.
Ketuan Zhan, who succeeded in the first battle, began to counterattack Bitmain continuously. On the afternoon of June 3, 2020, Ketuan Zhan led a team to pry open the back door of the Beijing Bitmain office and formally occupied the deserted Beijing headquarters.
On June 4, 2020, Ketuan Zhan called on Bitmain employees to resume work and promised to expand the company's market value to more than US$50 billion within three to five years. After that, Ketuan Zhan began to contact employees by phone, trying to acquire the options in the hands of employees at a valuation of 4 billion US dollars.
Subsequently, Ketuan Zhan recalled Huawei's executives and issued a series of personnel appointments and removals. As of June 9, 2020, Ketuan Zhan has successively eliminated CFO Luyao Liu, and Wenguang Wang, the head of the mining center. Luyao Liu is responsible for controlling Bitmain's IPO plan. He also appointed Yanwu Ma as the HR director, Gang Ren as the head of the mining center, Yonggang Sun as the head of the supply chain, Ling Gu as the financial director, and Bin Zhu as the head of the mining machine business department. Bin Zhu is the senior executive of Huawei who was interviewed and left as mentioned in the previous article. During his tenure, he reduced Antminer’s 90% market share to 50%, and received a large number of complaints from miners. Internal employees once speculated that he might be Compete against the spies sent by the company.
In addition to recalling senior executives of Huawei, Ketuan Zhan also urged employees to return to work. They can receive a bonus of 10,000 yuan when they return to work on the same day, which is only half the next day. Ketuan Zhan showed a very kind side. Every time the elevator door is opened, Ketuan Zhan's hot gaze can be met, shaking hands, taking photos, and receiving money. As there is no personnel information, Ketuan Zhan does not know whether the person receiving the money is a Bitmain employee, and these people did not resume work the next day.
The effect of gentleness was not good, Ketuan Zhan began to force employees to return to work. Seeing that there are still very few respondents, Ketuan Zhan threatened employees through SMS, phone calls, EMS, emails and other harassment, issued multiple threats such as termination of contract, suspension of payment of social insurance, suspension of wages, and even used personal information saved by employees to form a group of employees. Domicile threats, requiring employees to perform "work handover", trying to force employees to return work computers, etc.
On June 10, 2020, the media revealed that Ketuan Zhan had controlled Bitmain's Shenzhen factory and prohibited employees from delivering normal shipments to paid customers, which caused difficulties in the operation of the Bitmain mining machine department.
On June 13, 2020, Hong Kong Bitmain, the parent company of Beijing Bitmain, issued a statement accusing Ketuan Zhan of signing a "Sales Agency Agreement" with the Ark Data Technology Co., Ltd. in which it holds shares, in an attempt to embezzle Beijing Bit's assets.
On June 17, 2020, the media revealed that Ketuan Zhan started selling 14,000 T17+ series mining machines at low prices.
On June 20, 2020, Hong Kong Bitmain officially suspended the supply of chips to the Shenzhen factory.
On July 13, 2020, in the "A Letter to All My colleagues in the Shenzhen Factory" released by Bitmain in Hong Kong, more details were added on the series of Ketuan Zhan's actions in June.
The legal person Feng Zhou of the Shenzhen plant is related to Ketuan Zhan. After being relieved of Ketuan Zhan's post, Jihan Wu flew to Shenzhen to have a long talk with Feng Zhou. Jihan Wu believes that Feng Zhou is the right person to manage the factory and help the company overcome difficulties, and decides to leave Feng Zhou to continue to manage the factory.
This wrong decision staged a story of a farmer and a snake. When Ketuan Zhan began to counterattack Bitmain, Feng Zhou was also quickly instigated and began to assist Ketuan Zhan in seizing customer machines and transferring 17,000 T17 mining machines in the warehouse. Hainan Continental Ark Data Technology Co., Ltd., which is held by Ketuan Zhan, sold them at a low price.
In order to protect the interests of customers, Jihan Wu had to make a compromise and paid the payment for some goods to a bank account controlled by Ketuan Zhan in exchange for delivery. However, after the other party received a payment of 109 million, the delivery stopped. On July 8, 2020, 5600 mining machines have been overdue.
At the same time, the factory defaulted on suppliers’ accounts payable as much as 200 million yuan. Bank acceptance bills issued by the factory, exceeding 36 million yuan, will expire on July 17, and more than 34 million yuan will expire on July 23. It is understood that Ketuan Zhan, after receiving the bank's dunning call, made it clear that he would not repay the loan, which would destroy the company and the entire group's credit in financial institutions.
7、 This is not the end
So far, the power struggle between the founders of Bitmain has been more than half a year. The office building already occupied by Ketuan Zhan is still empty, and most employees choose to work from home. Some chip developers returned to the office with the acquiescence of Jihan Wu and continued to maintain research and development to reduce the impact of infighting on technological iteration and competitiveness.
This giant ship that once stood on top of the supercomputer chip is crashing into the iceberg due to the madness of the former helm. Ketuan Zhan's madness and Jihan Wu's compromise made mistakes again and again. Bitmain tried to save himself many times, but was unable to get out of the black hole.
If the time goes back to that day in 2013, would Jihan Wu and Yuesheng Ge still choose to dial Ketuan Zhan?
submitted by paulcheung1990 to Bitcoincash [link] [comments]

The deepest report: Bitmain's self-help history

The deepest report: Bitmain's self-help history
The original intention of this article is to let readers understand the causes and consequences of Bitmain internal fighting, but after writing it, I found that it is not so much internal fighting as it is a long history of self-help.
The story is very long. Let's adjust the timeline to the eve of December 17, 2018. That was one of Bitmain's most critical moments and the beginning of a series of subsequent stories.
1. Self-immolation In September 2018, Bitmain's financial department warned management that the company's cash flow has become very tight and operating costs must be reduced to allow the company to continue. The blockchain unicorn, which is valued at more than 15 billion U.S. dollars, is crippled in the run and struggling to break the corner.
In 2017, Bitmain made a profit of 1 billion US dollars In the first half of 2018, Bitmain made a profit of 1 billion US dollars Three rounds of financing, a total of 800 million US dollars Net assets should exceed 3 billion U.S. dollars In September 2018, Bitmain had tight cash flow and was on the verge of bankruptcy
A simple comparison, it is not difficult to see that Bitmain's ability to make money is incredible, and its ability to burn money is even more extreme.
How does Bitmain burn money? Do you pour cash into gasoline and burn it, or hire a lot of employees to stuff the banknotes one by one into the shredder? The actual situation is closer to the latter.
The following data can help readers quickly learn Bitmain's money burning skills.
At the beginning of 2018, the entire cryptocurrency market has entered a bear market, but Bitmain's monthly operating costs have been rising wildly. Operating costs have risen from 10 million US dollars at the beginning of the year to 50 million US dollars at the end of the year.
Large-scale expansion of the R&D team is one of the main reasons. The HR who once worked at Bitmain revealed that the company once hired more than 50 employees a day and nearly 500 employees a month. Even so, it was criticized for its slow recruitment speed. The cash consumption in this area is approximately $250 million.
Operating costs are just the tip of the iceberg. Excessive chip trial production can become a classic case of project management courses. Readers who pay attention to Cryptocurrency mining can easily find that Bitmain is still working hard to clear the inventory of Antminer S9 in 2019. As the co-CEO, Ketuan Zhan did not listen to the advice or even warnings of the Finance Department, insisting on the implementation of Excessive chip trial production, resulting in a large accumulation of inventory and tight capital turnover. Another CEO, Jihan Wu, once revealed that the loss of Excessive chip trial production to the company was approximately US$1.5 billion.
Large-scale expansion of the R&D team is one of the main reasons. The HR who once worked at Bitmain revealed that the company once hired more than 50 employees a day and nearly 500 employees a month. Even so, it was criticized for its slow recruitment speed. The cash consumption in this area is approximately $250 million.
The BM1393 chip incident is even more incredible. Chip expert Ketuan Zhan invested a lot of money on a failed chip, and finally failed again. From 2017 to 2018, Bitmain has failed Trial production of mining machine chips at least 4 times, including 16nm, 12nm and 10nm chips, of which 16nm Trial production failed twice, thus losing at least US$1.2 billion.
It is rumored that Bitmain still holds a billion U.S. dollars worth of cryptocurrency in a state of floating loss. In view of the rebound in the market in 2020, we will not comment temporarily, waiting for the correct answer from the cryptocurrency market. But the losses pointed out in the previous article are all irreversible.
2. Sole power
In September 2018, Bitmain's management realized the seriousness of the problem. It turned out that the company's money could be squandered. As a result, the management began to discuss self-help plans, and the most reasonable and effective way was obviously to lay off employees.
The probation period for newly hired employees at Bitmain is half a year, and the probationary salary is 100% of the official salary, there is no difference. Once layoffs are made, new employees who have not passed the probationary period will be the main layoff targets. The department managed by Ketuan Zhan will face large-scale layoffs. The layoff plan is strongly opposed by Ketuan Zhan. Bitmain can only temporarily abandon the layoffs and replace it with continuous reductions. For marketing and travel expenses, a budget committee was established to strictly approve every expenditure. At the same time, employee benefits, such as reimbursement of taxi expenses, breakfast supply, snacks and drinks, etc., have also been abolished, and even the tradition of giving employees 400 yuan worth of BTC/BCH every month has been stopped.
In the face of huge cash flow pressure, trivial savings is obviously of no avail. Soon, the management again discussed the layoff plan, and it has reached the point where it has to be laid off.
In December 2018, Jihan Wu began to organize all entrepreneurial veterans and business backbones to persuade Ketuan Zhan to agree to layoffs, but Ketuan Zhan still insisted not to layoffs. The persuasion process was very unsuccessful. After many meetings and intense debates, Bitmain executives were caught in a dilemma of wasting time with Ketuan Zhan.
In this process, the shortcomings of the dual CEO system began to appear, and the relationship between the two CEOs gradually deteriorated.
On the night of December 16th, Ketuan Zhan reconvened the management meeting, and more than 30 managements who were present were asked to hand over their mobile phones. At this time, Jihan Wu was on a business trip in Hong Kong and was busy with listing related work.
In the meeting, Ketuan Zhan's core content was three items:
(1) Bitmain cannot have two CEOs, only one CEO and must be Ketuan Zhan. Ketuan Zhan said that he met an old leader during a business trip. He hadn't seen each other for many years. The old leader suggested that the company can only have one CEO, and it must be him. Ketuan Zhan feels that this is a kind of fate, an opportunity given by God.
(2) Ketuan Zhan believes that the company's cash flow problems, the biggest responsibility is the inability of the financial department. To prove his point, Ketuan Zhan announced Bitmain's financial data at the meeting. In the evening, employees in Taiwan began to post messages on social media, saying that the company's capital chain was broken and the top management was split.
(3) If Ketuan Zhan is not supported, the option will be cancelled and the equity will be voided.
Hearing about this, Jihan Wu, who lives in Hong Kong, sent a WeChat message to the management who are attending the meeting.

https://preview.redd.it/c5cxea2lqid51.jpg?width=1080&format=pjpg&auto=webp&s=3d6a0388408f6b8abe10648e5e4b7a3a5434c821
On the afternoon of December 17, 2018, Jihan Wu returned to Beijing to negotiate with Ketuan Zhan all night, and finally reached a consensus in the early morning. Bitmain co-founder Yuesheng Ge announced the results of the negotiations. Jihan Wu and Ketuan Zhan ceased to serve as CEOs, and Haichao Wang served as CEO. Jihan Wu voluntarily backed down and Ketuan Zhan served as chairman.
The "12.17 Incident" had a very bad impact on Bitmain, especially the disclosure of Bitmain's financial status, which caused vendors to start dunning. The loan that had just been negotiated with the Bank of Beijing was cancelled the next day. Jihan Wu's resignation as CEO caused an uproar in the industry, and it became a hot topic among Cryptocurrency mining, blockchain practitioners, and investor communities. The media focused their interpretation on Bitmain's series of incidents, and generally looked down upon its ongoing Hong Kong IPO, believing that the high-level changes had already signaled the failure of the IPO in advance.
On Christmas December 24, 2018, Bitmain finally began to implement the layoff plan. This long-delayed “correct decision” was achieved after a stalemate for nearly three months. The AI ​​teams in Beijing, Singapore, Taiwan, and Shanghai have laid off more than 50% of their employees. The Israeli R&D center was closed and Shenzhen New Species Technology Co., Ltd., which had been acquired for only ten months, was dissolved, and all employees were laid off. Copernicus, Bitmain's top blockchain development team, was not spared and was wiped out in this layoff. Copernicus and some of the laid-off employees joined the new company Matrixport co-founded by Jihan Wu and Yuesheng Ge, headquartered in Singapore.
3. Past events when starting a business
After the "12.17 Incident", Jihan Wu gradually faded out of Bitmain's management affairs and turned his attention to the IPO and new company. And this is one of Jihan Wu's major mistakes, he began to let Ketuan Zhan manage Bitmain alone.
In fact, as early as 2013, Jihan Wu planted hidden dangers.
Jihan Wu, an investment banker, was the earliest translator of the Bitcoin white paper. He began to get involved in the cryptocurrency mining industry in 2012. The disappearance of Kaomao and Nangua Zhang's ticket skipping led Jihan Wu to decide to develop his own chip.
In 2013, Jihan Wu established his own mining machine company. Together with Yuesheng Ge, who was only 20 years old, he found Ketuan Zhan, an integrated circuit designer of the Chinese Academy of Sciences, to create the protagonist of this article, and later the digital Cryptocurrency mining giant, Bitmain.
Jihan Wu promised Ketuan Zhan that every time a mining machine chip was successfully developed, he would give some shares to the Ketuan Zhan team. At that time, the company founded by Ketuan Zhan was on the eve of falling apart. In order to regroup the team, Ketuan Zhan promised to share half of his shares with the team members. Unfortunately, this is just a bad check. With the rapid development of Bitmain and higher and higher valuations, the expanding Ketuan Zhan almost monopolized all the shares.
Like many startups, Bitmain encountered many difficulties in its early days, and many jobs had to be done by the boss. For example, in the chip design and production process in the second half of 2013, Bitmain was caught in a dilemma of insufficient funds. Jihan Wu personally raised funds and met with TSMC’s sales to persuade TSMC to accept the production needs of a start-up company. Jihan Wu also participated in the selection of the thermodynamic parameters of the heat sink in the Antminer S1.
In 2014, Jihan Wu discovered that this company was independently operated by Ketuan Zhan, which had huge problems. Forcing Jihan Wu to continue to participate in company management.
At that time, Bitmain's mining machine chips had just achieved a certain lead in the standard design process. Jihan Wu believes that the next step must be to develop full customization technology, but Ketuan Zhan plans to invest resources in the research of mobile payment chips.
Ketuan Zhan met a mysterious person from the Party Central Security Bureau who claimed to be able to manipulate the Party Central Committee’s decision-making process for the next generation of mobile payment cryptography standards, but this direction is likely to lead to the fact that Bitmain has just gained the lead in the mining machine market. Regained.
Jihan Wu said that as a graduate of the School of Economics, with a little memory of his high school stage and the knowledge reserve of a computer technology amateur, he retrieves various materials and papers every day, learns theories related to full customization, and goes to Ketuan Zhan conducts persuasion work there.
Fortunately, in the direction of full customization technology, Ketuan Zhan finally listened to Jihan Wu's opinion. Bitmain quickly integrated the technical experts from the United States and Russia introduced by Jihan Wu, which greatly improved the design level of chips and complete machines.
In 2015, Jihan Wu suggested that Ketuan Zhan consider the direction of artificial intelligence. But Ketuan Zhan is not here, he prefers the CPU direction. After staying asleep at night, coupled with in-depth analysis by the Bitmain investment team, Ketuan Zhan finally agreed with this direction. It is a pity that after the Tianshi Chen brothers made major breakthroughs in theory and practice, Bitmain officially invested in the relevant direction, and it was still a step behind.
In the two years from 2016 to 2017, Bitmain's business performance has achieved rapid development, becoming a unique super unicorn in the blockchain industry. According to Froth & Sullivan, in 2017, Bitmain Technology Holdings was the second largest fabless chip design company in China and the tenth largest fabless chip design company in the world, and the fourth largest fabless ASIC chip design company in the world, accounting for 74.5% of global cryptocurrency market share.
However, the huge crisis has long been buried in the early days of entrepreneurship.
Ketuan Zhan's decision on major directions revealed his weakness of extremely lack of business understanding. But every mistake he made was blocked by the company's core employees. His overconfidence in his management ability led to the gradual intensification of conflicts, and the management differences between the two founders became more serious.
4.The giant gets lost
The contradiction between the two broke out on December 17, 2018. Ketuan Zhan used extreme means to force the management to compromise with him by canceling the option, so as to achieve the goal of sole control of the company. Jihan Wu returned to Beijing from Hong Kong overnight and negotiated with Ketuan Zhan all night. In the end, the two resigned as CEO. Jihan Wu retired. Ketuan Zhan has the exclusive rights of chairman in exchange for the implementation of the layoff plan.
Jihan Wu's voluntary retreat has intensified Ketuan Zhan's management to do whatever he wants.
A Bitmain employee commented on Ketuan Zhan's management skills, summed up in two letters-SM.
After becoming the sole helm of the company, Ketuan Zhan quickly "rectified" the department in charge of Jihan Wu as the chairman of the board. He guided the sales of mining machines at the dinner, and pointed out that the sales performance is not due to the sales staff. Ability is strong, but the company provides opportunities. Take two sales leaders as examples, saying that if the company hadn't given the opportunity, they would still be losers. In addition, Ketuan Zhan also instructed the sales staff on how to toast and imparted the wine table culture and experience.
After the meal, Ketuan Zhan came to the conclusion that the quality of Bitmain sales staff was too poor, and Huawei’s blood needs to be injected to drive the company’s progress. Soon, the marketing and sales director from Huawei officially took over Bitmain, opening the era of brand premium for Antminer.
In order to further understand and guide the sales work, Ketuan Zhan asked to meet the customers with the sales staff. During the negotiation process, Ketuan Zhan had a heated discussion with customers on the issue of Chinese and Western medicine, and had also forced the sales staff to be able to ship 10,000 machines due to insufficient production capacity.
Although the requirements for sales personnel are strict, Ketuan Zhan has provided a lot of convenience for "Mainland Ark". In addition to selling mining machines at a more favorable price, Bitmain's mining machines are also hosted in Ming Wang at a higher price than the market price. Mine. It is reported that both Ketuan Zhan and Ming Wang are shareholders of Ark.
The new sales strategy of Huawei's executives has also brought very obvious changes to Bitmain. The self-righteous brand premium reduces the price-performance ratio of Antminer, causing competing products to eat away at Bitmain's market share. Later, Bitmain found that the strategy was wrong and started to cut prices, and found that the mining machine market was saturated and the purchase demand of miners had decreased.
More dangerous than the sales strategy is that the technical advantages of Antminer are being chased by competing products, and even overtaken. At the same time, the two mining pools under Bitmain also lost their first and second positions. The AI ​​business, which Jihan Wu placed high hopes and Ketuan Zhan personally supervised, became a laughing stock in the industry. Not only did it fail to make a profit, it almost brought down Bitmain.
Blindly introducing senior executives from Huawei to occupy important positions completely destroys the company's internal cultural foundation. The bureaucracy within Bitmain began to corrode from high-level employees to ordinary employees. Ketuan Zhan is not aware of this. He is still keen on recruiting Huawei employees, imitating Huawei's organizational structure and strategy, letting HR do sales and R&D personnel to do HR.
The organizational structure adjustment in October 2019 was the fuse for Ketuan Zhan to completely anger Bitmain management. This time, Ketuan Zhan completely marginalized Bitmain’s veteran employees, and suddenly promoted some of the “airborne soldiers” who had just joined the company to the position of person in charge, which caused the former person in charge to report to the new employees. The two managers who were originally equal The hierarchy becomes the subordinate relationship, the operation and development of different business lines are merged into a large department, the upward reporting process becomes more cumbersome, and the relationship between employees becomes delicate.
5. Headwind
On October 29, 2019, Jihan Wu urgently held a staff meeting. Prior to this, the legal representative of Beijing Bitmain has been changed to Jihan Wu, including the parent companies Hong Kong Bitmain and Cayman Bitmain. Jihan Wu stood in the lobby of Building 25, B1, announcing that Ketuan Zhan has been relieved of all duties. Any employee in the Bitmain Group shall no longer execute Ketuan Zhan’s instructions and participate in any meetings convened by Ketuan Zhan. If there is any violation, the company will demotion and expel the company based on the severity of the circumstances. If losses are caused to the company, the company will be held accountable.
Jihan Wu's speech is very long, which can be summarized as follows:
(1) Ketuan Zhan has been relieved of all duties. Also expelled from the original Huawei company HR Zhi Wang introduced by Ketuan Zhan at the end of 2018. Zhi Wang’s reputation on Bitmain was extremely poor and was ridiculed by employees as "nine thousand years" (In ancient China, the emperor was called "ten thousand years old", and the prince was "eight thousand years old." However, in the Ming Dynasty, there was an eunuch who caused harm to the country and the people. He called himself "nine thousand years old", meaning that he was only A little lower than the emperor's level).
(2) Ketuan Zhan's ability to control the company's option incentive plan has disappeared, and it is no longer possible to cancel employees' options at will.
(3) The organizational structure adjustment plan led by Ketuan Zhan was suspended.
(4) We are optimistic about the future of AI business, but the premise is that the main business can continue to make profits in order to support the company's continued investment in AI business.
In the speech, Jihan Wu also told employees the whole story of the "12.17 Incident" and bluntly said that the company is not in good condition. If no measures are taken, Bitmain is likely to go bankrupt in three quarters and he must come back to save the company.
At this time, Ketuan Zhan, who was on a business trip in Shenzhen, finally experienced the situation of Jihan Wu in the "12.17 Incident".
After the official return, Jihan Wu began to clearly point out the company's various problems in operation and management, and went deep into each business line to understand the situation. In the mining machine sales department meeting, employees spoke enthusiastically, reflecting on the difficulties and opinions encountered in the work, the marketing and sales director from Huawei asked with a surprised look, "Why didn't these issues be reported to me before?", and soon , The director was interviewed and "voluntarily resigned."
On November 2, 2019, Jihan Wu announced a salary increase for all employees. Bitmain’s last salary increase dates back to 2018. In principle, Bitmain has two salary increases every year.
On November 7, 2019, Ketuan Zhan spoke on social media for the first time, describing his hardship in starting a business, and condemning Jihan Wu for “stabbing a knife in the back”. At the end of the article, he also set himself a KPI for 2020, that is, the mining machine market share will reach 90%, and the AI ​​business will earn 1 billion.
But Ketuan Zhan's majestic plan did not make Bitmain employees feel emotional, but ridiculed him instead. Employees exposed that he insulted employees, advocated Chinese medicine, believed in Buddhism, drank in meetings, practiced Qigong...
However, there is less than half a year before the halving of Bitcoin production, and the cryptocurrency market shows no signs of recovery, which makes Bitmain management very anxious.
On January 6, 2020, Bitmain ushered in another round of layoffs, with a layoff ratio of about 1/3. This time the layoffs have caused many employees who have just increased their salaries to feel very grieved. On the one hand, they were looking forward to Jihan Wu's return. On the other hand, the compensation for this layoff was less than 18 years.
Ketuan Zhan, who has been unable to enter the Bitmain office area, once again spoke on social media and firmly opposed to layoffs. We do not need to lay off staff and we cannot commit suicide.
During the Spring Festival, Covid-19 broke out. Mainland China has begun to extend the Spring Festival holiday and advocate working from home. Under the chain reaction caused by Covid-19, most companies have chosen to cut salaries or even lay off employees. In the first two months of 2020, China's exports fell by 17%, U.S. stocks were broken four times in a row, Bitcoin plunged 40% in 24 hours on March 12, 2020, and crude oil futures fell by 300% on April 20, 2020...
Obviously, Jihan Wu can't predict, but this layoff seems to be the right decision again. In addition, from January to April 2020, Bitmain's revenue exceeded US$400 million amid the spread of Covid-19 and the collapse of the financial market.
6. Fight to the death
When Jihan Wu tried to get the company back on track, Ketuan Zhan was not helpless. On April 28, 2020, Ketuan Zhan finally rolled back the legal representative of Beijing Bitmain to before October 28, 2019 by repeatedly submitting administrative reconsiderations, and restored his status as a legal representative.
On the morning of May 8, 2020, a piece of news about Bitmain quickly appeared on the real-time hot search rankings, and even dominated the headlines of the day. At window 52 on the second floor of the Haidian District Government Affairs Center, when Ketuan Zhan, the legal person of Beijing Bitmain Company, was receiving the business license, a group of unidentified people snatched the business license from the industrial and commercial administrative staff. A source at the scene said that the number of unidentified people in the group was about 60 people, of which Luyao Liu was directing at the scene.
This is a skillful piece of news. It first leads readers to think that Ketuan Zhan is a victim, using 60 people to grab business licenses as the focus. The masses accused Jihan Wu of lawlessness, but ignored whether the government affairs center could have 60 personnel. As for Hong Kong Bitmain to have the right to appoint a representative to obtain a business license, this is a deeper level of thinking.
The follow-up report restored the real situation at the scene. Only more than ten people were present, and both sides were equipped with security personnel. Bitmain employees also broke the news in the circle of friends, claiming that Ketuan Zhan's bodyguard had injured Bitmain's authorized person, and said in a threatening tone, "Be careful!"
However, the subsequent plot reversal did not have much effect. Jihan Wu's reputation has been greatly affected. From a bloody soldier who rescued the company in trouble to a lawless criminal, it can be said to be a world of war. do not.
Ketuan Zhan, who succeeded in the first battle, began to counterattack Bitmain continuously. On the afternoon of June 3, 2020, Ketuan Zhan led a team to pry open the back door of the Beijing Bitmain office and formally occupied the deserted Beijing headquarters.
On June 4, 2020, Ketuan Zhan called on Bitmain employees to resume work and promised to expand the company's market value to more than US$50 billion within three to five years. After that, Ketuan Zhan began to contact employees by phone, trying to acquire the options in the hands of employees at a valuation of 4 billion US dollars.
Subsequently, Ketuan Zhan recalled Huawei's executives and issued a series of personnel appointments and removals. As of June 9, 2020, Ketuan Zhan has successively eliminated CFO Luyao Liu, and Wenguang Wang, the head of the mining center. Luyao Liu is responsible for controlling Bitmain's IPO plan. He also appointed Yanwu Ma as the HR director, Gang Ren as the head of the mining center, Yonggang Sun as the head of the supply chain, Ling Gu as the financial director, and Bin Zhu as the head of the mining machine business department. Bin Zhu is the senior executive of Huawei who was interviewed and left as mentioned in the previous article. During his tenure, he reduced Antminer’s 90% market share to 50%, and received a large number of complaints from miners. Internal employees once speculated that he might be Compete against the spies sent by the company.
In addition to recalling senior executives of Huawei, Ketuan Zhan also urged employees to return to work. They can receive a bonus of 10,000 yuan when they return to work on the same day, which is only half the next day. Ketuan Zhan showed a very kind side. Every time the elevator door is opened, Ketuan Zhan's hot gaze can be met, shaking hands, taking photos, and receiving money. As there is no personnel information, Ketuan Zhan does not know whether the person receiving the money is a Bitmain employee, and these people did not resume work the next day.
The effect of gentleness was not good, Ketuan Zhan began to force employees to return to work. Seeing that there are still very few respondents, Ketuan Zhan threatened employees through SMS, phone calls, EMS, emails and other harassment, issued multiple threats such as termination of contract, suspension of payment of social insurance, suspension of wages, and even used personal information saved by employees to form a group of employees. Domicile threats, requiring employees to perform "work handover", trying to force employees to return work computers, etc.
On June 10, 2020, the media revealed that Ketuan Zhan had controlled Bitmain's Shenzhen factory and prohibited employees from delivering normal shipments to paid customers, which caused difficulties in the operation of the Bitmain mining machine department.
On June 13, 2020, Hong Kong Bitmain, the parent company of Beijing Bitmain, issued a statement accusing Ketuan Zhan of signing a "Sales Agency Agreement" with the Ark Data Technology Co., Ltd. in which it holds shares, in an attempt to embezzle Beijing Bit's assets.
On June 17, 2020, the media revealed that Ketuan Zhan started selling 14,000 T17+ series mining machines at low prices.
On June 20, 2020, Hong Kong Bitmain officially suspended the supply of chips to the Shenzhen factory.
On July 13, 2020, in the "A Letter to All My colleagues in the Shenzhen Factory" released by Bitmain in Hong Kong, more details were added on the series of Ketuan Zhan's actions in June.
The legal person Feng Zhou of the Shenzhen plant is related to Ketuan Zhan. After being relieved of Ketuan Zhan's post, Jihan Wu flew to Shenzhen to have a long talk with Feng Zhou. Jihan Wu believes that Feng Zhou is the right person to manage the factory and help the company overcome difficulties, and decides to leave Feng Zhou to continue to manage the factory.
This wrong decision staged a story of a farmer and a snake. When Ketuan Zhan began to counterattack Bitmain, Feng Zhou was also quickly instigated and began to assist Ketuan Zhan in seizing customer machines and transferring 17,000 T17 mining machines in the warehouse. Hainan Continental Ark Data Technology Co., Ltd., which is held by Ketuan Zhan, sold them at a low price.
In order to protect the interests of customers, Jihan Wu had to make a compromise and paid the payment for some goods to a bank account controlled by Ketuan Zhan in exchange for delivery. However, after the other party received a payment of 109 million, the delivery stopped. On July 8, 2020, 5600 mining machines have been overdue.
At the same time, the factory defaulted on suppliers’ accounts payable as much as 200 million yuan. Bank acceptance bills issued by the factory, exceeding 36 million yuan, will expire on July 17, and more than 34 million yuan will expire on July 23. It is understood that Ketuan Zhan, after receiving the bank's dunning call, made it clear that he would not repay the loan, which would destroy the company and the entire group's credit in financial institutions.
7、 This is not the end
So far, the power struggle between the founders of Bitmain has been more than half a year. The office building already occupied by Ketuan Zhan is still empty, and most employees choose to work from home. Some chip developers returned to the office with the acquiescence of Jihan Wu and continued to maintain research and development to reduce the impact of infighting on technological iteration and competitiveness.
This giant ship that once stood on top of the supercomputer chip is crashing into the iceberg due to the madness of the former helm. Ketuan Zhan's madness and Jihan Wu's compromise made mistakes again and again. Bitmain tried to save himself many times, but was unable to get out of the black hole.
If the time goes back to that day in 2013, would Jihan Wu and Yuesheng Ge still choose to dial Ketuan Zhan?
submitted by paulcheung1990 to Bitcoin [link] [comments]

Looking back 18 months.

I was going through old emails today and came across this one I sent out to family on January 4, 2018. It was a reflection on the 2017 crypto bull market and where I saw it heading, as well as some general advice on crypto, investment, and being safe about how you handle yourself in cryptoland.
I feel that we are on the cusp of a new bull market right now, so I thought that I would put this out for at least a few people to see *before* the next bull run, not after. While the details have changed, I don't see a thing in this email that I fundamentally wouldn't say again, although I'd also probably insist that people get a Yubikey and use that for all 2FA where it is supported.
Happy reading, and sorry for some of the formatting weirdness -- I cleaned it up pretty well from the original email formatting, but I love lists and indents and Reddit has limitations... :-/
Also, don't laught at my token picks from January 2018! It was a long time ago and (luckliy) I took my own advice about moving a bunch into USD shortly after I sent this. I didn't hit the top, and I came back in too early in the summer of 2018, but I got lucky in many respects.
----------------------------------------------------------------------- Jan-4, 2018
Hey all!
I woke up this morning to ETH at a solid $1000 and decided to put some thoughts together on what I think crypto has done and what I think it will do. *******, if you could share this to your kids I’d appreciate it -- I don’t have e-mail addresses, and it’s a bit unwieldy for FB Messenger… Hopefully they’ll at least find it thought-provoking. If not, they can use it as further evidence that I’m a nutjob. 😉
Some history before I head into the future.
I first mined some BTC in 2011 or 2012 (Can’t remember exactly, but it was around the Christmas holidays when I started because I had time off from work to get it set up and running.) I kept it up through the start of summer in 2012, but stopped because it made my PC run hot and as it was no longer winter, ********** didn’t appreciate the sound of the fans blowing that hot air into the room any more. I’ve always said that the first BTC I mined was at $1, but looking back at it now, that’s not true – It was around $2. Here’s a link to BTC price history.
In the summer of 2013 I got a new PC and moved my programs and files over before scrapping the old one. I hadn’t touched my BTC mining folder for a year then, and I didn’t even think about salvaging those wallet files. They are now gone forever, including the 9-10BTC that were in them. While I can intellectually justify the loss, it was sloppy and underlines a key thing about cryptocurrency that I believe will limit its widespread adoption by the general public until it is addressed and solved: In cryptoland, you are your own bank, and if you lose your password or account number, there is no person or organization that can help you reset it so that you can get access back. Your money is gone forever.
On April 12, 2014 I bought my first BTC through Coinbase. BTC had spiked to $1000 and been in the news, at least in Japan. This made me remember my old wallet and freak out for a couple of months trying to find it and reclaim the coins. I then FOMO’d (Fear Of Missing Out”) and bought $100 worth of BTC. I was actually very lucky in my timing and bought at around $430. Even so, except for a brief 50% swing up almost immediately afterwards that made me check prices 5 times a day, BTC fell below my purchase price by the end of September and I didn’t get back to even until the end of 2015.
In May 2015 I bought my first ETH at around $1. I sent some guy on bitcointalk ~$100 worth of BTC and he sent me 100 ETH – all on trust because the amounts were small and this was a small group of people. BTC was down in the $250 range at that point, so I had lost 30-40% of my initial investment. This was of the $100 invested, so not that much in real terms, but huge in percentages. It also meant that I had to buy another $100 of BTC on Coinbase to send to this guy. A few months after I purchased my ETH, BTC had doubled and ETH had gone down to $0.50, halving the value of my ETH holdings. I was even on the first BTC purchase finally, but was now down 50% on the ETH I had bought.
The good news was that this made me start to look at things more seriously. Where I had skimmed white papers and gotten a superficial understanding of the technology before FOMO’ing, I started to act as an investor, not a speculator. Let me define how I see those two different types of activity:
So what has been my experience as an investor? After sitting out the rest of 2015 because I needed to understand the market better, I bought into ETH quite heavily, with my initial big purchases being in March-April of 2016. Those purchases were in the $11-$14 range. ETH, of course, dropped immediately to under $10, then came back and bounced around my purchase range for a while until December of 2016, when I purchased a lot more at around $8.
I also purchased my first ICO in August of 2016, HEAT. I bought 25ETH worth. Those tokens are now worth about half of their ICO price, so about 12.5ETH or $12500 instead of the $25000 they would be worth if I had just kept ETH. There are some other things with HEAT that mean I’ve done quite a bit better than those numbers would suggest, but the fact is that the single best thing I could have done is to hold ETH and not spend the effort/time/cost of working with HEAT. That holds true for about every top-25 token on the market when compared to ETH. It certainly holds true for the many, many tokens I tried to trade in Q1-Q2 of 2017. In almost every single case I would have done better and slept better had I just held ETH instead of trying to be smarter than Mr. Market.
But, I made money on all of them except one because the crypto market went up more in USD terms than any individual coin went down in ETH or BTC terms. This underlines something that I read somewhere and that I take to heart: A rising market makes everyone seem like a genius. A monkey throwing darts at a list of the top 100 cryptocurrencies last year would have doubled his money. Here’s a chart from September that shows 2017 year-to-date returns for the top 10 cryptocurrencies, and all of them went up a *lot* more between then and December. A monkey throwing darts at this list there would have quintupled his money.
When evaluating performance, then, you have to beat the monkey, and preferably you should try to beat a Wall Street monkey. I couldn’t, so I stopped trying around July 2017. My benchmark was the BLX, a DAA (Digital Asset Array – think fund like a Fidelity fund) created by ICONOMI. I wasn’t even close to beating the BLX returns, so I did several things.
  1. I went from holding about 25 different tokens to holding 10 now. More on that in a bit.
  2. I used those funds to buy ETH and BLX. ETH has done crazy-good since then and BLX has beaten BTC handily, although it hasn’t done as well as ETH.
  3. I used some of those funds to set up an arbitrage operation.
The arbitrage operation is why I kept the 11 tokens that I have now. All but a couple are used in an ETH/token pair for arbitrage, and each one of them except for one special case is part of BLX. Why did I do that? I did that because ICONOMI did a better job of picking long-term holds than I did, and in arbitrage the only speculative thing you must do is pick the pairs to trade. My pairs are (No particular order):
I also hold PLU, PLBT, and ART. These two are multi-year holds for me. I have not purchased BTC once since my initial $200, except for a few cases where BTC was the only way to go to/from an altcoin that didn’t trade against ETH yet. Right now I hold about the same 0.3BTC that I held after my first $100 purchase, so I don’t really count it.
Looking forward to this year, I am positioning myself as follows:
Looking at my notes, I have two other things that I wanted to work into this email that I didn’t get to, so here they are:
  1. Just like with free apps and other software, if you are getting something of value and you didn’t pay anything for it, you need to ask why this is. With apps, the phrase is “If you didn’t pay for the product, you are the product”, and this works for things such as pump groups, tips, and even technical analysis. Here’s how I see it.
    1. People don’t give tips on stocks or crypto that they don’t already own that stock or token. Why would they, since if they convince anyone to buy it, the price only goes up as a result, making it more expensive for them to buy in? Sure, you will have friends and family that may do this, but people in a crypto club, your local cryptocurrency meetup, or online are generally not your friends. They are there to make money, and if they can get you to help them make money, they will do it. Pump groups are the worst of these, and no matter how enticing it may look, stay as far away as possible from these scams. I even go so far as to report them when I see them advertise on FB or Twitter, because they are violating the terms of use.
    2. Technical analysis (TA) is something that has been argued about for longer than I’ve been alive, but I think that it falls into the same boat. In short, TA argues that there are patterns in trading that can be read and acted upon to signal when one must buy or sell. It has been used forever in the stock and foreign exchange markets, and people use it in crypto as well. Let’s break down these assumptions a bit.
i. First, if crypto were like the stock or forex markets we’d all be happy with 5-7% gains per year rather than easily seeing that in a day. For TA to work the same way in crypto as it does in stocks and foreign exchange, the signals would have to be *much* stronger and faster-reacting than they work in the traditional market, but people use them in exactly the same way.
ii. Another area where crypto is very different than the stock and forex markets centers around market efficiency theory. This theory says that markets are efficient and that the price reflects all the available information at any given time. This is why gold in New York is similar in price to gold in London or Shanghai, and why arbitrage margins are easily <0.1% in those markets compared to cryptoland where I can easily get 10x that. Crypto simply has too much speculation and not enough professional traders in it yet to operate as an efficient market. That fundamentally changes the way that the market behaves and should make any TA patterns from traditional markets irrelevant in crypto.
iii. There are services, both free and paid that claim to put out signals based on TA for when one should buy and sell. If you think for even a second that they are not front-running (Placing orders ahead of yours to profit.) you and the other people using the service, you’re naïve.
iv. Likewise, if you don’t think that there are people that have but together computerized systems to get ahead of people doing manual TA, you’re naïve. The guys that I have programming my arbitrage bots have offered to build me a TA bot and set up a service to sell signals once our position is taken. I said no, but I am sure that they will do it themselves or sell that to someone else. Basically they look at TA as a tip machine where when a certain pattern is seen, people act on that “tip”. They use software to see that “tip” faster and take a position on it so that when slower participants come in they either have to sell lower or buy higher than the TA bot did. Remember, if you are getting a tip for free, you’re the product. In TA I see a system when people are all acting on free preset “tips” and getting played by the more sophisticated market participants. Again, you have to beat that Wall Street monkey.
  1. If you still don’t agree that TA is bogus, think about it this way: If TA was real, Wall Street would have figured it out decades ago and we would have TA funds that would be beating the market. We don’t.
  2. If you still don’t agree that TA is bogus and that its real and well, proven, then you must think that all smart traders use them. Now follow that logic forward and think about what would happen if every smart trader pushing big money followed TA. The signals would only last for a split second and would then be overwhelmed by people acting on them, making them impossible to leverage. This is essentially what the efficient market theory postulates for all information, including TA.
OK, the one last item. Read this weekly newsletter – You can sign up at the bottom. It is free, so they’re selling something, right? 😉 From what I can tell, though, Evan is a straight-up guy who posts links and almost zero editorial comments.
Happy 2018.
submitted by uetani to CryptoCurrency [link] [comments]

PC to PS4 gaming. What happened to the joy?

I’d like to facilitate a discussion around this constant perplexing inner struggle I’m constantly waging, and I know others are too. But first a short background.
I grew up with a dad who worked as a computer and network repair man for our local University. Perks of his position were he was able to scoop up old hardware the University was throwing away for various reasons. Either they didn’t want to spend the money on refitting/reusing that part, or they were upgrading. This resulted in a lot of free parts for my dad, and in turn for me. At the age of 7 my dad basically made me build my own computer with a box full of scraps. When I went to ask him how something worked or why something wasn’t working - he would refer me to a bookshelf chalk full of computer hardware manuals and textbooks. Looking back now I realized everything he was doing was teaching me to think critically, rather than just ask for the answer. Something that admittedly eventually made me hugely knowledgeable in the tech space. This was 1994 after all, the internet was basically nonexistent in contrast to how it is today. So with his direction, I built and built until my first successful post and subsequent install of Windows NT 3.1. Up until this point my only goal for building a computer was to impress my dad, but I quickly discovered the word of gaming with classics like Doom, Might and Magic 3, Master of Orion 1, and with a holiday release Warcraft 1. Up until this point I had been an avid NES gamer, with frequent visits to my local mall arcade.
From the moment I had my first successful boot on my make shift Pentium PC until the release of Halo 1, the PC was my go to gaming device. After Halo 1, the original Xbox became my go to device. I had fallen in love with my brother PlayStation 1 with games like Metal Gear Solid and Gran Turismo, but the PS1 never took large chunks of my time. I went back to primarily PC when World of Warcraft released. When WoW released I was in high school, and running a machine that was frankensteined from an Athlon 2500+ eMachines PC an old compaq from my dad work, and few parts I got from Tiger Direct; Nvidia FX 5950 and a sweet Refurbished Alienware case. My desire to game had never been stronger than with WoW and Halo 1-3.
WoW and the achievements and trophy systems of the PS3/X360 ushered in a new era for me, psychologically. I still don’t really understand it. And this is what brings me to this post. Maybe to find some understanding and discussion. I got married in 2011 and shortly after that joined the Army. And shortly after that had my first kid. All those life moments decreased the time I had to play games. After all this I was more attracted to the narrative games such as Mass Effect 1-3 on the 360, and Uncharted and Last of Us. Which brought me to the PS3. I stopped playing WoW, mostly, after WoD. I raided in some top guilds in their realms, mainly because the old feeling of WoW for me dissipated. And once achievements and trophy’s became a thing to earn on consoles - I found myself striving for those ‘dings’ over the actual substance of the games being played. Then I found myself not wanting to play ANY PC games, aside from occasional Civilization with friends or Stellaris by myself for hours. But even then my Stellaris games are focused around completion and achievements.
I’ve probably owned 5 different PS4s since 2013. The original, the slim, a black pro, the white Pro, and a newer revision of the black pro (current). I find myself not playing for months on end. The only games that have really drawn me in this generation has been remasters of the narrative games already mentioned, a few outliers, and Horizon Zero Dawn. Horizon is by far and away my favorite game of this generation, and sits right up there with Mass Effect 1 for me.
Now comes the question. Why do I have a desire to build a PC, but zero desire to play games on that PC? I have no desire to buy an Xbox due to the only game I want to play by MS being on the PC soon (Halo), which in turn is the only PC game of even want to play. And then WHY can’t I get excited for most games anymore, but I feel like I HAVE to have a PS4 Pro? And why are games without achievements now massively less appealing to me? What’s happening lol? I miss that feeling I had with PC, and older consoles. Is the fact I have 3 kids and a career something I’m not taking into account?
Now armed with a 4k monitor, Ryzen 7 1700x, 16gb, 1tb nvme WD, RX 580 8gb (always wanting more 😥)
My last build was a i7-6700k, 2 1080 Tis, 16gb Ram, 1tb nvme, and a 40 inch Samsung 4K tv. I sold that during the 2016 bitcoin mining craze for a massive profit. And have sense just used the Ryzen 7 system above.
submitted by JediTreasley to pcmasterrace [link] [comments]

SAPE Inc. wrote a quick review on Jibrel Network

Jibrel Network
Name:
According to Muslim belief, God revealed the Quran to the Islamic prophet Muhammad through the angel Ǧibrīl - (Gabriel in English) This divine messenger was the emissary of God who connected the heavens to the terrestrial plane. In choosing the name Jibrel, the project leaders aim to be the bridging point between the earth, i.e contemporary traditional finance, and the heavens: finance of the future conducted on the blockchain.
Team:
-Talal Tabbaa(Co-founder, Business Development Leader): Is a part part of the founding team having graduated as an industrial engineer from Purdue university. His professional career prior to Jibrel involves financial advisory with Price Waterhouse Cooper and managing a private Saudi investment fund for a member of the royal family (~3 Bn AUM).
-Yazan Barghutti(Co-founder, Project Lead): Yazan is a UCL chemical engineer whose previous roles centred around management consultancy and data science spheres within the Oliver Wyman and Deloitte organisations. He has advised assets of over 1 trillion $ and has extensive experience in capital and financial markets in the US and GCC. He has extensive experience in capital and finance markets within the USA and GCC, managing assets over 1 trillion dollars in total.
-Victor Mezrin(Co-founder, CTO): Victor graduated with a masters Degree in physics from Moscow State University, and is a veteran in the crypto field having run one of the top 3 mining pools (pool.mn). He has over 10 years technical experience along with proficiency in C++,C, Python, Java, C#, PHP, JavaScript and solidity programming languages.
-Hamzeh Kolaghassi(Operations Lead): Hamzeh graduated from Marymount University and started working in the financial field as a financial advisor and investment manager in 2011.
-Nick Marinin: (UX/UI dev)

-Aleksey Selikhov Developer (Back-end)

-Ivan Violentov Developer (Front-end)

-Nikita Shchipanov (Web Analyst)

-Rust Khusyainov (Illustrator)

-Aleksey Smirnov (DevOps Engineer)

-Yuriy Homyakov Developer (Back-end)

-Nikita Shchipanov (Web Analyst)

-Anna Bordunova (Public Relations)

Further recruitment was confirmed in May 2018.
Advisors: -Don Tapscott: This legendary investor, business manager and author has become a big name in the blockchain scene in recent years, being best known for his consulting position on the ICON project and his bestselling book, The Blockchain Revolution. Tapscott’s authship is by no means limited to cryptocurrency and his book Wikinomics was a bestseller on the business book charts. -Moe Levin: Levin is also an all-star of the crypto scene. Since 2013 he organizes conferences for all industry representatives. His keynote conferences are among the most influential in the industry and he hold advisory positions on many promising projects. -Abbaz Zuaiter, Zuaiter was Chief Operating Officer of Soros Fund Management between 2002 and 2013. -Ruslan Gavrilyuk (CryptoFinance Advisor CEO & Founder of TaaS Fund) -Saul Hudson (Communications Advisor, GM at Thomson Reuters) -Mohammad Al Sehli (MENA Advisor, CEO & Founder of Arabian Chain)
If one was to compare the panel of advisors for each and every project in cryptocurrency, The Jibrel Network’s board of advisors would certainly be within the top 1 percentile. They have struck the right balance in their blend of experts within blockchain and within he world of conventional finance, so that the project is connected to every area of business and finance it needs to be in order to develop the vision of the founders. A perfect example of this is Don Tapscott’s presentation to Bank of England in March 2018 where he extolled the virtues of cryptocurrency and blockchain technology.
ICO: The ICO ran from 27/11/2017, to 27/12/2017, ending weeks before it was supposed to, and saw all 155 million ERC-20 JNT tokens sold at a price fixed at 0.25 USD. Both Bitcoin and Ethereum were accepted during the token sale in addition to fiat contributions facilitated by Bitcoin Suisse AG. The revenues in Bitcoin and Ethereum were sold immediately after the ICO (at $ 300 an ether and $ 4500 for a bitcoin) to avoid speculation with investors' funds. The remaining 45 million JNTs that have been withheld are paid out to the team after 3-5 years. The extreme length of the token locking period for team members shows the huge amount of confidence that the project leaders have in this project.
Vision:
In order to understand the vision of Jibrel in more detail, one must look at the state of the contemporary financial system. On the one hand, we have classic investment products such as bonds, gold, real estate, company shares and Fiat. Let's take a look at how transactions involving traditional assets will operate. Currently, we have a concentration of power where individual financial intermediaries clear the transactions for high fees. In addition, 2 billion people worldwide have no access to traditional banking and therefore rely on service providers MoneyGram or Western Union for international remittances.
The fees involved in transactions using Western Union for example can be exhorbitant and sometimes prohibitive. Other negative aspects of these kinds of service providers are the lengthy wait for transactions to clear and the effect of weekends and bank holidays on service operations. Through use of blockchain technology it is possible to avoid all of these negative aspects of current payment systems and transfer value in an extremely cheap safe and speedy manner, with possession of a mobile device being the only necessity within this new method of transacting.
However, the volatility risk is not to be understated. If we put ourselves in the position of a manual laborer from India who works in Dubai and earns just enough to send $ 100 a month to his family back home, we can better analyse the advantages and disadvantages of each form of transaction . For various reasons, be it regulations, the length of stay or simply because of the associated fees, the worker has no bank account with which he can transfer the money. The only way to send money free of volatility and without being tied to a bank account is to pay the approximate $10 processing fee to a service provider like Western Union, a fee which can mean 10-15% less cash sent home to relatives.. The cheaper and faster alternative would be to buy $100 worth of cryptocurrencies in Dubai and to make a simple blockchain transaction to send the corresponding value in rupees back to India. At first glance, this may seem like a more attractive alternative but drawbacks such as price volatility as well as tax and legal implications must be considered. The value of the cryptocurrency purchased may fluctuate by as much as 10% between purchase in Dubai and receipt in Indian and the resulting profit could be subject to capital gains tax.
Products:
The Jibrel Network’s range of products are aimed at tackling problems such as the scenario described above as well as many other inefficiencies and failings in the current financial system. The first and most significant of these the Crypto Depository Receipt (CryDR) builds on the existing depository receipt instrument in order to facilitate global transactions involving currencies or securities. The total volume of depository receipts issued in 2016 was $2.9 trillion which shows the potential magnitude of the endeavour the project founders are undertaking.
For example, Jibrel, in collaboration with central banks, will initially issue $USD, AED and KRW on the Ethereum Blockchain as so-called jCash tokens. Which can then be purchased in exchange for the JNT token. For our example, this means that the worker in Dubai buys the JNT token and then sends it to Jibrel. In return, he receives dirham tokens, so-called jAED in the same value. The tokens he receives remain stable in value regardless of market volatility, allowing them to be used as a potential means of payment weeks later, or to be converted back to fiat currency. Besides the peer-to-peer crypto-fiat JCash initiative, The Jibrel Network plans to tokenize a great many other financial instruments as CryDRs, such as bonds, gold, company shares and real estate. At present, there are many pilots on going between Jibrel and distinguished institutions that are in future make use of the technology. Jordan's Central Bank and the DFSA (Dubai's Financial Service Authority) are known to be taking part as in pilots we speak. Moreover, Talal confirmed at a conference that a central bank of one Europe nation is also piloting with Jibrel, however the name of the country has not been made public yet.
Use cases:
The issuance of shares by CryDR will be piloted usually in cooperation with a venture capital firm. In the future, cost-intensive IPOs of small companies can be replaced by the issuance of CryDRs, which can then be acquired with the JNT token. According to Jibrel founders, registering and trading real estate on the blockchain proves to be a difficult proposition. There are numerous bureaucratic obstacles that must be traversed and legislative progression to be made by the respective governmental entities of individual countries before the trading of land or real estate is possible on the blockchain. Some countries are committed to the introduction of blockchain technologies on a wide scale which will run parallel to their current systems and eventually may replace them, which will allow the trade of real estate to flourish in future. The United Arab Emirates, for example, has announced that the country's primary goal is to largely replace the bureaucracy by 2020 with the use of blockchains.
Bigger picture:
It is important to clarify the economic implications associated with the issuance of assets on the blockchain. A small business IPO can cost up to 500000 USD and involve regulatory hurdles that prohibit the majority of small time investors from participating. Alternatively, it was possible for companies seeking funding to be funded by venture capital. Liquidity and access to risk capital has so far been limited due to the lack of an open and transparent risk capital market. The increased liquidity provided by blockchain technology enables company shares and real estate to be traded worldwide in the smallest of volumes, with an internet connection being the only prerequisite for inclusion in the system. Extensive new opportunities are now available to investors, startups and estate agents. For example, a construction project or a start-up can be financed by several thousand investors, who then count as legal owners of the property / start-up. In this innovative system entrepreneurs are less reliant on the capital provided by a few large investors, with the investor base expanded. Furthermore, the "smart regulation" of the tokens allows the automated cash flow between the creditors and debtors, so, for example, rent payments of the tenants can automatically be paid in the form of jcash to the owners. This phenomenon of global financial inclusion is why ICOs have become the most popular startup fundraising tool - now Jibrel will attempt to transfer the liquidity and egalitarian benefits of using a blockchain to the classic economy.
Token Economics:
In general, one has to ask the question in blockchain projects whether a separate token is necessary or whether the decentralization goal of the project makes sense The ultimate goal of Jibrel is to be a decentralized autonomous organization (DAO) that manages the operational business without human influence through smart contracts. The Jibrel founders use the story of Pinocchio as a metaphor for their future development. Currently Jibrel is still a wooden doll that needs a puppeteer, which in this case is still the team. As soon as all regulatory and technical preparations have been made, Jibrel, like Pinocchio, is freed from the strings of it’s puppeteers and acts autonomously. The founders hope that at the end of this process the first decentralized bank will have been born.
Now, the question arises as to why the Jibrel Network uses its own token to secure values ​​rather than using an established cryptocurrency. For one thing, Jibrel is not the typical project based on short-term hype cycles and wants to maintain the the most stringent levels of legal compliance possible. The commitment to legal compliance is an essential requirement for any company seeking to operate in the financial services industry and was the core reason for the company making Switzerland the country within which to base its operations. Switzerland is one of the few countries that make high demands on projects but also gives a clear regulatory framework within which to operate. These include commitment to KYC, AML and other legal guidelines that emphasize the trustworthiness of the project. The issuance of a separate token allows the Jibrel organisation to maintain an independent legal compliance record which would not be possible if Jibrel were to take Ethereum as a collateral in the conducting of its operations. If the Ether token was used in place of the Jibrel Network Token the whole Jibrel project would be at the mercy of the regulatory health of the Ethereum Project, over which it would have no control. Similarly the stability of the Jibrel Project would be subject to the extremely volatile cryptocurrency market’s valuation of the Ether token, which would be disastrous for investor confidence.
The solvency, and thus the disbursement ability of the organization is achieved by depositing the CryDR using its own JNT token. If you wish to tokenize an asset the Jibrel DAO removes the captured JNT from circulation, decreasing the amount of JNT in circulation and consequently increasing the value of all remaining circulating JNT. If an asset is liquidated the previously locked up JNT are brought back into the market. In order to increase the number of tokens owned by the organization, Jibrel will provide its own products and services that charge the fee in the form of the JNT Token. One of the most important of these products is the jWallet, a cryptocurrency wallet with a far superior user interface and performance of its competitors. The alpha of the jWallet was published before the ICO and the beta version is in development with an expected release date of around the end of Q2.
Probably the most interesting and urgently needed product in the field of infrastructure is the blockchain explorer jSearch, which allows the user to view transactions on all blockchains. Existing solutions such as etherscan.io or etherchain.org provide only rudimentary insight and an unsatisfactory user experience. For example, jSearch can be used as a tool to search, filter and bookmark already-issued assets. It is safe to infer rom all the information available that the Jibrel Network is a serious startup attempting to ensure long term solvency by exploring alternative sources of revenue. The resulting Jibrel ecosystem will eventually become in a sense an isolated market within which the performance of other cryptocurrencies plays no role.
challenges:
The implementation of such a paradigm shift will naturally see many hurdles and challenges present themselves. The project stands and falls with the speculative volatility of the market, which can act so irrationally that the buffers of the deposits are not sufficient to counteract the undervaluation and the solvency of the organization is no longer ensured. For example, Jibrel announced that the first product, jCash, will initially only be deposited off-chain due to market volatility, meaning that for the time being no deposit of JNT is required to issue Fiat. As soon as volatility on the market decreases and Jibrel has enough equity to compensate for any shortfalls, all CryDRs will need a JNT deposit as this is the only way to ensure full decentralization of the organization. However, mechanisms such as off-chain / on-chain arbitrage ensure that undervaluation of assets is prevented. In order to get the most realistic token value, Jibrel is currently developing its own blockchain to decouple itself from the Ethereum blockchain and the events on the market. The in-house blockchain jCore is currently under development. Details on the consensus algorithm and the release date will be announced.
Milestones:
-SEED backing/ Office
-Jordan
-JWallet
-EEA
-VQF
-DSFA in Dubai
-MAMA
submitted by Crillus to JibrelNetwork [link] [comments]

Thoughts on my culminating analysis of Russia's involvement in the U.S elections?

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The proof is that the hackers used Bitly to mask the malicious URL and trick people into thinking the URL was legitimate. They made two mistakes, however.
First, they accidentally left two of their Bitly accounts public, rather than setting them to private. This allowed security researchers to view some general account information, like what URLs were shortened and what they were changed to.
Second, they used Gmail's official numeric ID for each person inside of their maliciously crafted URLs. This allowed cybersecurity researchers to find out exactly who had been targeted.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by MangekyouSharinganKa to AskTrumpSupporters [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to geopolitics [link] [comments]

BURST COIN Hard Drive Mining Cryptocurrency - YouTube Bitcoin Mining for Beginners 2016: Why you should Mine with Dragonmine Bitcoin Cloud Mining With Cryptominingfarm 50 GHS FREE 2016 New Legit Site Paying Instantly with BITCOIN Bitcoin Mining Profitability September 2018

Chinese Cloud Mining OXbtc: Review. OXbtc provides users with all types of equipment needed for cloud mining.This is a Chinese company, but we don’t know too much about its owners, since they prefer to stay anonymous.Many users from all over the world invest in OXbtc (gladly, there is an English version of the website) and claim it to be trustworthy and legit. Coinbulb is a free bitcoin platform created by crypto enthusiasticts. At coinbulb, our mission is to help introduce new people to bitcoin. We provide information to new users as well as offering them some free bitcoins so that they can ''try before they buy'', experimenting with a test transaction or two before putting real money on the line. Todi hit the jackpot when global bitcoin prices surged from $430 to $910 per BTC (unit for bitcoins) in 2016. A gain of over 100% makes bitcoins the best performer when compared with conventional asset classes such as equities, gold , real estate and bonds. You can purchase it on a Bitcoin Exchange there are plenty which allow people to buy or sell bitcoins using different currencies. Coinbase is a leading exchange for Bitcoin, along with Bitstamp and Bitfinex. But security can be a concern: bitcoins worth tens of millions of dollars were stolen from Bitfinex when it was hacked in 2016 so at this point Coinbase is more popular You can check out ... Bitcoin as a major cryptocurrency has come up as a shooting star of the 2017 and 2018 headlines. After exploding its price twenty times just in the twelve months of 2017, the tone has changed dramatically in 2018 after major price corrections and increasing concerns about its mining power consumption and overall sustainability.

[index] [23990] [18773] [6574] [32026] [10605] [33932] [2783] [6260] [9730] [22267]

BURST COIN Hard Drive Mining Cryptocurrency - YouTube

Published on Nov 2, 2016 In this video, I show you how to make money mining bitcoin with your computer. Disclaimer : This may void your warranty on your hardware. Tags: bitcoin mining, bitcoins investment, mining rig, mining bitcoins, crypto investor, cryptocurrency investing, brucewang, btcbruce, Bitcoin Mining September 2018, Antminer S9 Profitable in ... 2 new bitcoin mining site free to start no investment needed 2016 - Duration: 7:03. bitcoin RUB.MONEY ONLINE FREE &MORE TRICKS ... New High Paying Bitcoin Investment Site!! Profit Coin!!(2018 ... Word 2016 - Page Numbers Starting from a Specific Page - How To Number Start Pages in Add Numbering - Duration: 5:32. Professor Adam Morgan Recommended for you 5:32 Bitcoin Mining for Beginners 2016: Why you should Mine with Dragonmine ... After 3 years the original GH/s of your contract expires, but the accumulated extra GH/s you keep, so you keep on mining ...

#