British columbia Casino Accidentally Prints 5 Secrets to Beat the House

Casinos Don’t Expect You To Do This. But They Can’t Stop You…

With the insane amount of online casino and slot machine advertising in Canada recently, people are wondering if they can actually win money by playing at any of these sites. We spoke to a PRO casino player recently and he let us in on some great secrets.

#1: Cash In On Risk-Free Money Bonuses

Competition in the Online Gambling Industry is massive with multiple billion dollar companies facing off against each other to get new players.

This has resulted in online casinos literally throwing money at people to get you through the door. This includes both risk-free money and new player deposit incentives. Some of the top online casinos like Zodiac Casino will even give you free chances to become a millionaire.

#2: Find a High Variance Slot Machine, WIN LARGER JACKPOTS

Slots are really a game of luck. The Variance is the technical term in the gaming world that is used to calculate how risky a game is to play. The lower the variance, the more frequent the wins, the less the win amount.

The high variance slots such as Mega Moolah are the ones that will pay out larger amounts of money, but the wins will happen less frequently. The less time you spend spinning the reels, the lower the house edge so we learned you need to play in short bursts, betting a little more than usual, and you’ll have a better chance of beating the odds.

If you do get a nice win, be prepared to take a break and move on to another game.

#3: Play Progressive Jackpots Online to Make Millions!

Yes, it’s true! When you bet on any of these progressive jackpot slot games, you are playing for a chance to win the jackpot, which is regularly over $1 million (currently over $3.3 million!).

We recommend trying your luck on Mega Moolah by Zodiac Casino.

The largest ever progressive jackpot won online was $15,143,600 on the 20th of January 2013 by a female player aged 47 in Finland.

#4: Not All Online Gambling Sites in Canada are Legal

It was only recently that the Canadian government deemed certain forms of online casinos gambling legal and decided to regulate it. As such, not all casino gambling websites have passed the regulation process, which requires demanding tests proving that the site is fair and honest.

For example, Zodiac Casino is a member of the Interactive Gaming Council, operating under their code of conduct to guarantee fair and honest gaming. They have been awarded Safe & Fair certification by independent auditor eCOGRA, which provides assurance for secure and honest gaming practices.

Playing on regulated online casino websites means that the funds you deposit are safe and you’ll be able to cash out quickly!

#5: Don’t Get Greedy! Cash Out Your Winnings

Lastly, perhaps the most important rule of all is “Don’t Be Greedy”.

Online casino success is about winning money – not winning money and then losing it all again. A win is a win, no matter how big or small. Set yourself targets and stick to them.

Let’s say your target is to win $250. Once you reach that amount, cash out your winnings and wait for the casino to offer you another deposit bonus and start again. Know when to quit. Don’t keep playing it all back because of greed!

Source:http://dailynews-reports.com/ca/casino/399/?c1=British+Columbia

Microsoft drops another big batch of Windows patches

On Tuesday Microsoft released a bunch of patches, most of which will elicit little more than a snore from users. One of the patches still hasn’t been documented — Microsoft’s posts not being in sync with its bits is common problem — and a bunch of older security bulletins haven’t been updated. But such are the vagaries of the patching business.

Take control! 30 essential OS X command-line tips

Go beyond the graphical user interface and take full advantage of Mac OS X at the command line

There are seven new patches for MS16-019, the Important security bulletin released last Tuesday that deals with .Net-based denial-of-service attacks. According to the Software Update master list, they all apply to versions of .Net in Windows Embedded. Oddly, the underlying KB articles haven’t been updated to say they pertain to Windows Embedded.

The other 40 patches (there’s a complete list on AskWoody.com) mostly apply to servers.

One patch, KB 3095113, updates Server 2012 and 2012 R2 so that they better “sync and distribute feature upgrades for Windows 10.” Apparently if you try to sync upgrades in WSUS without applying this patch, you’ll get an unholy mess that “is recoverable but the process is nontrivial and can be avoided altogether if you make sure to install the update before enabling sync of upgrades.”

As poster ch100 on AskWoody notes:

[this] was finally promoted to Windows Update in March 2016 as promised last year at the time of release. Until now it was only a hotfix and discussed here only few days ago in relation to the new behaviour of Windows 10 Upgrade for Windows 7… It applies only to WSUS on Windows 2012 R2. We may see something equivalent now in Windows 7 in the sense of a new category appearing in Windows Update.

I can hardly wait.

Poster Michael says:

Just did a sync of my WSUS server, but not a single new patch shows up (we have W7 and W2012 in our environment). I just patched KB3095113 manually on WSUS, still nothing new showing. (Although now I can see all the Windows 10 update classifications in the options, urgh.)

Another patch, KB 3105115, fixes a problem when you try to RDP into a Win 8.1 or Server 2012 R2 device while using a low-resolution screen. “When this issue occurs, you can only see the Start screen, but you can’t switch to the desktop.” That makes it hard to run a server from your phone, I suppose.

There’s an odd bug that crashes Windows Explorer if you try to play an MPEG-4 file that has a zero for the UTC time offset. If that’s been a problem for you, see KB 3136019.

Then there’s the mystery patch, KB 3115224, which is described as an optional update for Win 8.1, RT 8.1, Server 2012, Server 2012 R2, and Windows Embedded 8 standard. Other than that, I can’t find any details about it anywhere. The KB article hasn’t been posted.

Source: http://www.infoworld.com/article/3044510/microsoft-windows/microsoft-drops-another-big-batch-of-windows-patches.html

Cybera partners with CIRA to offer new high-performance DNS services for Alberta’s public and education sectors

CIRA’s D-Zone Anycast Domain Name System helps improve performance for Canadian users while adding enhanced Distributed Denial-of-Service protection

EDMONTON, March 15, 2016 /CNW/ – The Canadian Internet Registration Authority (CIRA) and Cybera, Alberta’s not-for-profit technology accelerator, have partnered to offer Cybera’s members improved Domain Name System (DNS) protection and performance.

This service will be useful for larger public and education institutions in the province that run their own .ca domain, and are at risk of Distributed Denial-of-Service (DDoS) attacks. CIRA’s D-Zone Anycast DNS service will be offered to Cybera members at no cost, bringing advanced cyber-security and web-performance to public and education sector institutions of all sizes.

Key facts

  • CIRA’s D-Zone Anycast DNS service has an expansive Canadian server footprint, offering several important advantages for Canadian institutions. CIRA’s service keeps DNS data in Canada, improving performance for Canadian users and helping to limit the unnecessary flow of cross-border data.
  • With the majority of DDoS attacks originating from overseas, CIRA’s service can help to maintain network performance, even when it is experiencing a significant attack. Global servers can soak up the attack before it reaches Canadian servers, allowing D-Zone to reduce the risk of critical failures due to DDoS attacks.
  • Cybera operates Alberta’s high-speed Research and Education Network, which connects members to researchers and educators around the world. It also offers members direct peering and internet bulk-buying services, generating major network efficiencies. This new service will bring advanced cybersecurity protection to educators, libraries, and government organizations across the province, helping to increase network performance and protect these institutions from malicious attacks.

This service is available immediately, and can be accessed by Cybera members at no cost. The setup can be completed in a matter of minutes.

Executive quotes

“Our DNS service has the most expansive Canadian server footprint available on the market today. CIRA shares this intentional Canada-first approach philosophy with national research networks, making Cybera an excellent partner to launch our service with Alberta’s public and education sectors.”

- Dave Chiswell, vice president of product development at CIRA

“We are excited to be offering this free DNS service, as it will greatly improve the performance and reliability of the DNS infrastructure used by our members, who include some of the largest education and government organizations in the province. CIRA is very experienced with global DNS infrastructure and DDoS mitigation, and we are pleased to partner with them to offer this beneficial service.”

- Jean-Francois Amiot, network and operations director, Cybera

About Cybera
Cybera is a not-for-profit technology-neutral organization responsible for driving Alberta’s economic growth through the use of digital technology. Its core role is to oversee the development and operations of Alberta’s cyberinfrastructure — the advanced system of networks and computers that keeps government, educational institutions, not-for-profits, business incubators and entrepreneurs at the forefront of technological change.

About CIRA

The Canadian Internet Registration Authority (CIRA) manages the .CA top-level domain on behalf of all Canadians. A Member-based organization, CIRA also develops and implements policies that support Canada’s Internet community, and represents the .CA registry internationally.

Source: http://www.broadcastermagazine.com/press-releases/story.aspx?id=1004075497&er=NA

Altcoin exchange Poloniex affected by DDOS attack

Until last night, it had been a while until DDoS attacks affected any of the popular bitcoin and altcoin exchanges.

The latest reports now indicate that a couple of hours ago, popular bitcoin exchange Poloniex was the target of a strong DDoS attack, which not only took the site offline, but it also affected the API, and therefore forced the exchange to stop carrying out transactions.

The announcement was made via a Twitter post, which read: ‘It appears we’re under a DDOS attack. We’re investigating and working on getting the site back online as quickly as we can’. Luckily, the security team behind the company managed to quickly mitigate the attack, and restore service.

However, it is believed that the attack was in fact a stress test, meant to differently target the attack next time, or even force the exchange to make a security mistake. This strategy has been put to use before, so Poloniex will have to be particularly careful in the near future.

For those who do not know, Poloniex can be considered one of the best altcoin exchanges, as it works hard to introduce as many coins as possible, while also keeping the services up and running at all times. In our review of the exchange, The Merkle also noted its friendly customer support, trading fee structure and more.

Based on everything that has been outlined so far, what do you think about the DDoS attack carried out on Poloniex? Was it the full attack, or just a simple stress test? Let us know your thoughts in the comment section below.

Source: http://themerkle.com/altcoin-exchange-poloniex-affected-by-ddos-attack/

DDoS attacks: Getting bigger and more dangerous all the time

Distributed Denial of Service (DDoS) attacks are more frequent, bigger and more damaging than ever before a new report by internet security firm Verisign has warned.

According to statistic published in the VeriSign Distributed Denial of Service Trends Report, DDoS activity is the highest it’s ever been, with the final quarter of 2015 seeing an 85 percent rise in instances – almost double the number of attacks – when compared with the same same period in 2014. The figures for Q4 2015 also represent a 15 percent rise on the previous quarter.

The report also suggests that cyber attackers are getting much more persistent as targets are now being hit by repeated attacks, with some reportedly being the target of DDoS attacks up to 16 times in just three months.

If an increase in attacks isn’t worrying enough for potential targets, the size and the amount of damage DDoS attacks can do is also on the rise. The fastest flood attack detected by Verisign occurred during the final quarter of 2015, targeting a company in the telecommunications industry by sending 125 million packets per second (Mpps), and driving a volumetric DDoS attack of 65 gigabits per second (Gbps).

“The 125 Mpps flood is one of the highest packets per second floods ever observed by Verisign, surpassing the previous flood of 91 Mpps mitigated by Verisign in Q2 2014. This attack, aimed at disrupting critical network services, consisted of multiple short bursts in DDoS traffic and continued intermittently for several weeks,” says the report.

While that particular attack was made against a company in the telecommunications sector, Verisign has warned that organisations in all industries are potentially at risk from “indiscriminate” DDoS attacks.

Indeed, it was companies which provide IT, cloud, and software services which are currently most targeted, with 32 percent of DDoS attacks made against this sector. However, the number of DDoS incidents media and entertainment providers wasn’t far behind, with 30 percent of attacks made against organisations in this industry.

Attacks against the financial sector made up 15 percent of incidents, the public sector accounts for 10 percent and while the biggest DDoS event was recorded against the telecommunications industry, this sector accounts for only 8 percent of DDoS attacks.

In terms of preventing attacks, Verisign recommends organisations “consider augmenting your existing DNS capacity with a cloud-based hosted DNS or managed DNS service”.

Source: https://www.gconew.com/tech/222878/ddos-attacks-getting-bigger-and-more-dangerous-all-the-time.html

DDoS Attack Data Fort McNair

In 2014, distributed denial of service event denial of service assaults reached a mean price of 28 per hour – and they proceed to develop when it comes to scope, frequency tool ddos and complexity. Step one in arming your IT group towards DDoS is to arm your self and your workers with information.

Some one hacked my yahoo mail and is sending messeges to all my contacts that am stranded within the uk and need £1300 this particular person has even bloacked me i cant how to ddos attack an ip access my account ave tried to warn my contacts through facebook however many aren’t even on face book all am asking is for yahoo to terminate this account i will open a new one ASSIST before he swindles someone.

Hello Koolmuse, I keep in mind you from Buzz. A couple of days in the past I was in a discussion on Buzz, when this crazy woman (who thought-about something to the left of the Libertarian Party to be socialist, and who called disabled vets and Medicare recipients freeloaders) came on and began insulting folks, primarily me. I attempted to motive together with her, but she received nastier and extra profane, until after a while I decided to disregard her and advised all people else to do free server stresser the identical, since she clearly had some problems.

Ultimately, this data hopefully to explain how DDoS is served and how DDoS is always on operation. Also how a few of these services are wrapped with a simple GUI to be used for the attack. Suspending domain or mitigating DDoS companies like these is not making a lot impact, and we’d like more firm act to stop people and infrastructure used to perform it. They’re utilizing common domains, websites, even YouTube for promotion, moreover a few of them are using known DDoS safety service to protect their DDoS’er websites (see under picture), it’s just went too far, and perhaps now’s a right time to say CEASE”.

Cyberterrorism represents acts of Web-primarily based hacking that cause massive-scale disruption to computer networks by means of using pc viruses and different malicious instruments, reminiscent of worms and Trojan programs. The motivation for cyberterrorism assaults is to create widespread panic and disruption. Hacktivist groups might use cyberterrorism campaigns to protest or promote certain ideological or political beliefs. Study extra about cyberterrorism within the DDoS Assaults Against World Markets white paper

These days booters also use websites reminiscent of downornot as well/hit sites offline. I might suggest blocking the following websites (Can’t present IPs). In order to do that, you should first ping the web sites and after you get the websites IP then ban it in your server. If you are on a shared hosting then I feel you can ban them by means of cloudflare.

There are lots of ways to scale back your possibilities of getting SYNed, together with setting your firewall to dam all incoming packets from unhealthy external IP addresses like 10.zero.0.0 to 10.255.255.255, 127.zero.zero.0 to 127.255.255.255, 172.16.0.zero to 172.31.255.255, and 192.168.zero.0 to 192.168.255.255, in addition to all inside addresses. However, as SCO discovered, when you throw sufficient SYN packets at a site, any website can still be SYNed off the net.

In 2013, CloudFlare, Inc. CEO Matthew Prince predicted that DDoS assaults would solely increase in scope and ease in 2014 and this has remained true for 2015. In April of this year, Arbor Networks, Inc. reported one of many largest DDoS assaults ever detected at 334Gbps. Akamai Applied sciences Restricted backed up these figures stating that attacks had increased in volume and high quality, the report said that the overall variety of DDoS assaults increased 132.43 percent compared to Q2 2014.

Source: http://marketlisters.com/for-sale/animals/ddos-attack-data_i59475

Trivial path for DDoS amplification attacks found by infosec bods

Security researchers have discovered a new vector for DDoS amplification attacks – and it’s quite literally trivial.

Improperly configured services such as DNS or Network Time Protocol (NTP) have been exploited to launch a string of DDoS attacks over the last couple of years.

Researchers at Edinburgh Napier University have discovered that the TFTP protocol (Trivial File Transfer Protocol) might be abused in a similar way.

Unlike DNS and NTP, TFTP has no business being exposed on internet-facing systems. Yet port scanning research indicated that there about 599,600 publicly open TFTP servers.

That’s bad in itself but the situation gets worse: the researchers discovered that TFTP offers a higher amplification factor than other internet protocols.

“The discovered vulnerability could allow hackers to use these publicly open servers to amplify their traffic, similarly to other DDoS amplification attacks like DNS amplification. If all specific conditions are met this traffic can be applied up to 60 times the original amount,” researcher Boris Sieklik told El Reg.

“I also studied effects of this attack on different TFTP software implementations and found that most implementations automatically retransmit the same message up to six times, which also contributes to the amplification.”

TFTP protocol (Trivial File Transfer Protocol) is a simplified version of FTP (File Transfer Protocol). It is generally used in internal networks and in environments where OS image transfers are required regularly. For instance, Cisco uses TFTP to send OS images to the VoIP phones and they can also be used by all Cisco equipment to update firmware or to transfer files as part of schemes to provide centralised storage of these images. The technology is also widely used during PXE booting of machines.

Essentially, any file can be transferred by TFTP.

Attackers could use this vulnerability to perform large amplification attacks to both external and internal targets, Sieklik warns. Sieklik worked together with Richard Macfarlane and Prof. William Buchanan, both of Edinburgh Napier University, in putting together the research, which also looked at ways to mitigate potential attacks and possible countermeasures.

DDoS reflection/amplification attacks in general allow an attacker to magnify the amount of traffic they can generate. Sending a dodgy request with a forged return address in the name of an intended target can generate a response, much bigger in size than the original request, hence the amplification terminology.

The trick ultimately relies on using misconfigured services at third-party sites in order to flood targeted websites with junk responses to forged web requests. Improperly configured services such as DNS or Network Time Protocol (NTP) have been exploited to launch a string of DDoS attacks over the last couple of years, the most high profile of which battered Spamhaus and buffeted internet exchanges back in March 2013.

Something along the same lines might be possible, at least in theory, when it comes to TFTP, the researchers warn. The computer scientists are unable to point to specific examples of DDoS attacks based on TFTP.

Source: http://www.theregister.co.uk/2016/03/09/trivial_ddos_amplification_method/

Google Brings Task Shield in order to DDoS Battlefield

Search engines on Thurs announced it was growing its Task Shield plan offering to safeguard news as well as human privileges websites through distributed refusal of support attacks free of charge. Project Protect uses Google’s protection infrastructure in order to detect as well as filter DDoS episodes which ton websites along with Internet visitors or support requests to be able to impair their own functioning or even take all of them down completely.

A easy, inexpensive dispersed denial associated with service attack can be executed by almost any person with use of a pc and have a site totally offline prior to its proprietors even know they have been attacked inch noted Jared Cohen, leader of Jigsaw as well as advisor in order to Alphabet Professional Chairman Eric Schmidt.

 

These episodes threaten free of charge expression and use of information 2 of Google’s primary values, Cohen stated. With this particular expansion, hundreds and hundreds of news websites will get access to Project Protect. In addition, simply because Project Protect is free of charge, even the tiniest independent information organizations can continue their own important work with no fear to be shut lower.

Inexpensive DDoS

Project Shield is really a valuable answer that highlights an essential issue: the living of inexpensive DDoS-for-hire providers that enable one to launch DDoS episodes of considerable size, towards any focus on stated Igal Zeifman, older digital strategist from Imperva. Google can also be correct in let us assume that news websites are between the most notable targets with regard to DDoS offenders.

Google’s action seems to be well-timed as DDoS attacks have grown to be larger and much more frequent. Recently, we noticed an assault of 500 Gb/sec just 2 yrs ago it had been 300 Gb/sec, that is more compared to any typical website are designed for stated Rene Paap, an item marketing supervisor with A10 Systems.

Infrastructure Muscle mass

Google’s DDoS defenses could be extremely efficient additional Sumit Agarwal, vice leader of technique at Form Security, as well as former innovator of cellular project administration at Search engines. Defending towards DDoS episodes requires 2 things: substantial scale, and wide visibility within the entire Web.

Google most likely has much more of each attributes compared to anyone does on the internet. The answer Google provides combines visitors filtering and a chance to present cached content material while an internet site is coping with more traffic it can manage. This might help against particular attack vectors however, it doesn’t completely address the various DDoS risks that web sites are dealing with today.

The actual Stale Information Solution

 

Task Shield cannot mitigate system layer episodes especially direct-to-IP episodes that focus on specific IP handles and aspects of a network’s national infrastructure according in order to Zeifman. There is the query of assault duration as numerous DDoS assaults could be easily continual for times, weeks as well as months at any given time he stated. For episodes like these types of, serving stagnant cached content is really a hard compromise maybe even more so for any news business.

Google’s Position

Project Protect also might improve Google’s search engine results, noted Anthony Khamsei, BOSS of Precious metal Security. Google really wants to show probably the most relevant search engine results, so showing a website that is not accessible is not desirable, he or she told. Consequently, Google includes a lot to achieve by making the net a less dangerous place. When Web companies provide something free of charge some skepticism might be in purchase.

Source: http://www.techowiz.com/google-brings-task-shield-in-order-to-ddos-battlefield.html

Twitter Is Banning Anonymous Hackers for Harassing ISIS Members

A tweet from a disgruntled Anonymous hacktivist has just gone viral, and the hacker is accusing Twitter of protecting ISIS terrorists as part of their “no bullying” campaign by suspending Anonymous accounts that report ISIS Twitter profiles on a too frequent basis.

Ever since the Charlie Hebdo attacks from early 2015, Anonymous hackers have been waging cyber-war against ISIS terrorists, an initiative that intensified tenfolds last November after the brutal Paris attacks.

While sometimes the group has taken down ISIS sites via DDoS attacks, most of the time, the group has been sabotaging ISIS’ online presence by reporting their Twitter or Facebook accounts and having them taken down.

Twitter took down 125,000 ISIS accounts

In fact, the hacker collective group has been so efficient at its job that Twitter announced at the middle of February that it took down more than 125,000 ISIS-related Twitter accounts. But as one of the Anonymous hackers explains, it’s exactly this announcement that has annoyed the group’s members.

In a message posted on his Twitter account (see the first tweet below the article), Wauchula Ghost, a former GhostSec member and current Anonymous affiliate, says that Twitter actually took credit for Anonymous’ work while also sabotaging their efforts.

As the hacker explains, Twitter is slow to react to takedown notices for ISIS accounts, often requiring more than twenty such reports for an account to be taken down, and numerous times, the social network has been taking down Anonymous accounts as well.

In an interview with Epoch Times, Wauchula Ghost is saying that this might be because of Twitter’s newly announced anti-harassment policy. He says that Twitter is mislabeling their takedown reports against ISIS accounts as online bullying and banning its members instead.

Twitter is cutting the branch from under its feet

Even his account was among those that got taken down, and he says that Twitter didn’t even bother to let him know why he had his profile suspended.

In his case, a quick response from the community, which quickly and fervently tweeted at Twitter’s support staff managed to get his profile reinstated, but there are countless other accounts that weren’t.

The reason for the hacker’s public outrage against Twitter is the fact that the company seems to revel in the positive public image, which comes with being an active anti-ISIS fighter, but it’s not really doing “any” of the work. Even worse, the company seems to avoid any type of collaboration with the Anonymous group.

Taking into account that Twitter made its “125,000 ISIS accounts taken down” announcement only a month after a Florida woman sued the company for giving ISIS a platform for their propaganda, Anonymous is hinting at the fact that Twitter is not really dedicated to taking down ISIS accounts at all.

Source: http://news.softpedia.com/news/twitter-is-banning-anonymous-hackers-for-harassing-isis-members-501448.shtml

A Pastor With A Bitcoin Hacks Into A Bank…

It was only a matter of time.

That a pastor … got nabbed for his alleged involvement in a bitcoin banking hacking scheme?

But more on that later.

First, we’ll start with bitcoin’s nightmare of the week.

The contentious debate about bitcoin’s block size that has dominated the bitcoin news cycle for months has finally hit a breaking point: Bitcoin’s core network, and its ability to properly process transactions, has hit its max.

Perhaps, it’s time to get Satoshi Nakamoto out of hiding.

Where this debate started was with the fear that bitcoin’s network needed to be overhauled and its core software needed work to expand its block size to 2MB in order to ensure the network could continue growing. Well, as you’ve probably noticed if you’ve been paying attention to the debate at all, no one could agree on what to do.

And so, the Bitcoin Core vs. Bitcoin Classic debate raged on.

But what has reportedly happened as a result is that the network has reached its capacity, which has inevitably delayed transactions from occurring — or, in some instances, simply failing. As a result, it’s delayed some transaction times from 10–43 minutes, according to a report by The Verge. And from other reports, this has led to shops that once accepted bitcoin to stop doing so. And users are just left in the dark at the moment.

Wait, wasn’t the blockchain our answer to faster payments?

But we digress.

The whole block size dilemma is why many in the bitcoin community pushed to increase the block size limit, but that never happened. At the moment, bitcoin’s blocks take about 10 minutes to mine and are 1MB in size. But the problem is that, with the current volumes running through the network, it simply can’t keep up.

Increasing the size would enable bitcoin to continue growing, gain more users and essentially get more attention from the masses.

Of course, as with anything related to bitcoin, it’s not as simple as it sounds. And that’s where the legality debate over what’s referred to as the bitcoin “hard fork” has originated. At least, according to one pro-bitcoin attorney, that hard fork of bitcoin could be illegal and could open up a whole new can of worms for bitcoin developers over liability issues.

On the legal side, it’s been argued that having a new fork in bitcoin’s code would open up an entirely new batch of legal issues for the new creators. That complicates things for investors, users and the entire bitcoin community, some have argued. It could also open up bitcoin exchanges to more legal issues and complicate the entire process of enabling bitcoin transactions as an exchange.

Surely, no one can be that surprised that the bitcoin community can’t come to a consensus on this issue. The debate has even pushed out a prominent developer who left after he said the network was controlled by too few voices and that the divide in the community was just too much to overcome.

There are skeptics who suggest that growing bitcoin’s capacity would destroy the virtual currency. And there’s another side of the debate that’s saying this divide in the bitcoin community is preventing any innovation from occurring.

And guess what else? Surprise, surprise. The most recent debate has reportedly caused some mudslinging and reportedly sketchy tactics by some to argue their side of the case. The Core side says the network is being overloaded with spam transactions by the Classic side that is overwhelming miners. The Classic people have claimed block miners have been hit with DDoS attacks during this process.

Oy.

In the end, it’s up to the bitcoin miners to sort out what computing power bitcoin should be running at, regardless of what the community actually votes for. As The Verge article points out, it’s similar to the delegates selecting a candidate to run in the presidential election.

Or, more appropriately, between a fork and a hard place.

 

Pastor Indicted In Bitcoin-Linked JPMorgan Hacking Case

A pastor, bitcoin and a bank hacking case. Now, there’s three things you don’t often see in one headline.

Just yesterday (March 3), a New Jersey pastor was indicted for his alleged connection to a bribery scheme that involved — yes, you guessed it — a bitcoin exchange. But, even juicier, that bitcoin exchange has been linked to cyberattacks on JPMorgan Chase and other major companies.

This case involves the pastor, Trevon Gross, who was the former chairman of the Helping Other People Excel Federal Credit Union. He has been charged with taking payments that enable an illegal bitcoin exchange to operate and eventually gain control of the credit union.

Allegedly, Gross accepted $150,000 in bribes from a group who operated an unlicensed bitcoin exchange. Well, that exchange eventually was connected to a scheme that was intended to hold that credit union and other banks captive — leading to a massive hacking scheme.

How massive? Reports show that the banking hack involved over a dozen companies’ networks, which resulted in the personal information of 100 million people stolen. JPMorgan was one of the companies, with records of more than 83 million customers being potentially compromised.

And here’s where bitcoin comes into the mix. Prosecutors claim that the bitcoin exchange, Coin.mx, then exchanged millions of dollars worth of bitcoin for other customers, including the pastor’s credit union. Federal regulators liquidated that credit union last November, according to Reuters.

Gross eventually gave himself to the FBI and is scheduled to be arraigned today.

 

Bitcoin’s Tech Gets The Big Bank Test

All was not lost for bitcoin this week — at least on its technology side. That side, of course, is the side of bitcoin everyone wants to talk about (the blockchain).

And, from the sounds of it, the technology that powers bitcoin is making inroads with Wall Street’s banks. This news follows the FinTech company R3 CEV, which brought together 42 banks to test how a set of standards could be established for financial service companies looking to implement blockchain’s tech.

This week, R3 announced that the initial trial has concluded, which involved 40 banks within the consortium participating by testing five blockchains on how they could be used to issue, trade and redeem a fixed-income product.

And that’s a big step for blockchain in the financial services arena, as it’s believed to be the biggest test of its kind that has to do with a real-life scenario that impacts the financial markets ecosystem. And during a time when bitcoin and blockchain are undergoing their own sort of identity crisis, this just might be the bright spot that’s needed for the digital currency and its technology.

Some of the major banks that participated in the trial included Bank of America, Barclays , BBVA, Bank of New York Mellon, Citi, Deutsche Bank, JPMorgan, Goldman Sachs, HSBC, Morgan Stanley, State Street and Wells Fargo.

Not a shabby list.

“This development further supports R3′s belief that close collaboration among global financial institutions and technology providers will create significant momentum behind the adoption of distributed ledger solutions across the industry,” David Rutter, R3’s chief executive, said in a statement.

“These technologies represent a new frontier of innovation and will dramatically improve the way the financial services industry operates, in much the same way as the advent of electronic trading decades ago delivered huge advancements in efficiency, transparency, scalability and security.”

Source: http://www.pymnts.com/news/bitcoin-tracker/2016/a-pastor-with-a-bitcoin-hacks-into-a-bank/