By Gabriel Staples
TODO:
- Look into this one: https://gist.github.com/juanca/669c59f15a17e20022b8bd78b12889e6.
References:
By Gabriel Staples
TODO:
References:
<!DOCTYPE html> | |
<html lang="en"> | |
<head> | |
<meta charset="utf-8"> | |
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> | |
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.5.2/css/bootstrap.min.css" integrity="sha512-MoRNloxbStBcD8z3M/2BmnT+rg4IsMxPkXaGh2zD6LGNNFE80W3onsAhRcMAMrSoyWL9xD7Ert0men7vR8LUZg==" crossorigin="anonymous" /> | |
<title>XMRig API test</title> | |
</head> | |
<body> |
25/5/2020
Imagine a future where a user Alice has bitcoins and wants to send them with maximal privacy, so she creates a special kind of transaction. For anyone looking at the blockchain her transaction appears completely normal with her coins seemingly going from address A to address B. But in reality her coins end up in address Z which is entirely unconnected to either A or B.
Now imagine another user, Carol, who isn't too bothered by privacy and sends her bitcoin using a regular wallet which exists today. But because Carol's transaction looks exactly the same as Alice's, anybody analyzing the blockchain must now deal with the possibility that Carol's transaction actually sent her coins to a totally unconnected address. So Carol's privacy is improved even though she didn't change her behaviour, and perhaps had never even heard of this software.
My Fee
https://etherscan.io/tx/0xd50d3392352e6376421bdac847f92ea76433fc5dd277a2d998d4d7f2091c4394
Bob Deposit
https://kmdexplorer.io/tx/c763d3767c00be3eb227935872c5927650bef027ae09769155761888489f6511
Alice Payment
https://etherscan.io/tx/0x20457e3797e452c534818ceba088335a04a8987192ead2ee815833221f766d32
"number","date","guestAudio","cover","background","audio","title","guestCover","desc" | |
"001","May 5, 2014","eVRydayVR","cover","http://d1icj85yqthyoq.cloudfront.net/wp-content/uploads/2014/05/d-banner-1024x182.jpg","http://d1icj85yqthyoq.cloudfront.net/wp-content/uploads/2014/05/Voices-of-VR-001-eVRydayVR.mp3","#1: eVRydayVR on Virtual Reality evangelism, communities & education","guestCover","desc" | |
"002","May 13, 2014","Eric Hodgson","http://d1icj85yqthyoq.cloudfront.net/wp-content/uploads/2014/05/hive-schematic-300x247.jpg","http://d1icj85yqthyoq.cloudfront.net/wp-content/uploads/2014/05/voices-of-vr-header-image-faded-1024x323.jpg","http://d1icj85yqthyoq.cloudfront.net/wp-content/uploads/2014/05/Voices-of-VR-002-Eric-Hodgson.mp3","#2: Eric Hodgson on spatial perception, redirected walking & the split between Old VR vs. New VR","hive schematic","desc" | |
"003","May 15, 2014","Oliver Kreylos","cover","http://d1icj85yqthyoq.cloudfront.net/wp-content/uploads/2014/05/Header.jpg","http://d1icj85yqthyoq.clo |
000stthk.exe|Toshiba Hotkey Configuration|NONE | |
007ssinstall.exe|007 Spy Software|NONE | |
00thotkey.exe|Toshiba Keyboard Helper|NONE | |
123downloadsuk[1].exe|123Mania Hijacker|NONE | |
12popup.exe|12Ghosts Popup-Killer|NONE | |
153.exe|??? Dialer.W32.153 ???|MALICIOUS_SOFTWARE | |
180sainstalleradperform.exe|180Solutions Zango|NONE | |
180sainstallernusac.exe|180SearchAssistant|NONE | |
1xconfig.exe|SCM MicroSystems Helper|NONE | |
2portalmon.exe|2wSysTray|NONE |
d46af65cb7bd12ce77b4d88bbdd4a005 5000_1.1.4.sisx https://www.virustotal.com/en/file/ce6bdf3374777757a36b8c3ad5e6cc8b6aced6f5083efdd286e6cb8f6837057f/analysis/ | |
39be87178c84d4afd07a80323a1d4b91 5002_2.24.3_green.APK https://www.virustotal.com/en/file/263219f185aa2a847bcb4ca981ec4a7c7eff8ded2d3b49d6fb2b4a578b43af60/analysis/ | |
a5b589f4edac1aea9952d3faff261817 5002_-2.25.1_green.APK https://www.virustotal.com/en/file/2a1e5a7dafa54a23fe9050f1fdd1286d3bdfb75a80a90cafebfdbbc451f4f9a4/analysis/ | |
306adab7cfcb0d9a13956ca9e9dbd59a 5003_1.4.2.jad https://www.virustotal.com/en/file/cbd70044cdb54fcad29592a0c89d6b8aa9bf6af7fa825faa8447df134124dd5c/analysis/ | |
eb295fe2e40f12014cdb05de07edcae2 5006_-1.0.12.exe https://www.virustotal.com/en/file/c134e6f40de54e2c5635ea2e25d7ea5b8c36528849c6ef7dd4d3b860af5fb521/analysis/ | |
8f6a42defdc8632c1baf961d7d9c3e5b 5006_1.0.13.exe https://www.virustotal.com/en/file/530c80602f72df99a4ed6c609db16f76d6260c984852c4a3f9a2dd03180b180b/analysis/ | |
fa26d3c6fe253a35 |
[T](::1) |
<!DOCTYPE html> | |
<html> | |
<meta charset="utf-8"> | |
<head><title>sonic.asm</title></head> | |
<body> | |
<div class="input"> | |
<input type="button" value="Sonic 1" onclick="update(s1, 'Sonic 1')" /> | |
<input type="button" value="Sonic 2" onclick="update(s2, 'Sonic 2')" /> | |
<input type="button" value="Sonic 3&K" onclick="update(s3, 'Sonic 3&K')" /> | |
</div> |
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE | |
Version 2, December 2004 | |
Copyright (C) 2011 Jed Schmidt <http://jed.is> | |
Everyone is permitted to copy and distribute verbatim or modified | |
copies of this license document, and changing it is allowed as long | |
as the name is changed. | |
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE |