GitHub - keeshux/bitcoinspv: A native Bitcoin SPV client ...

Proposal: The Sia Foundation

Vision Statement

A common sentiment is brewing online; a shared desire for the internet that might have been. After decades of corporate encroachment, you don't need to be a power user to realize that something has gone very wrong.
In the early days of the internet, the future was bright. In that future, when you sent an instant message, it traveled directly to the recipient. When you needed to pay a friend, you announced a transfer of value to their public key. When an app was missing a feature you wanted, you opened up the source code and implemented it. When you took a picture on your phone, it was immediately encrypted and backed up to storage that you controlled. In that future, people would laugh at the idea of having to authenticate themselves to some corporation before doing these things.
What did we get instead? Rather than a network of human-sized communities, we have a handful of enormous commons, each controlled by a faceless corporate entity. Hey user, want to send a message? You can, but we'll store a copy of it indefinitely, unencrypted, for our preference-learning algorithms to pore over; how else could we slap targeted ads on every piece of content you see? Want to pay a friend? You can—in our Monopoly money. Want a new feature? Submit a request to our Support Center and we'll totally maybe think about it. Want to backup a photo? You can—inside our walled garden, which only we (and the NSA, of course) can access. Just be careful what you share, because merely locking you out of your account and deleting all your data is far from the worst thing we could do.
You rationalize this: "MEGACORP would never do such a thing; it would be bad for business." But we all know, at some level, that this state of affairs, this inversion of power, is not merely "unfortunate" or "suboptimal" – No. It is degrading. Even if MEGACORP were purely benevolent, it is degrading that we must ask its permission to talk to our friends; that we must rely on it to safeguard our treasured memories; that our digital lives are completely beholden to those who seek only to extract value from us.
At the root of this issue is the centralization of data. MEGACORP can surveil you—because your emails and video chats flow through their servers. And MEGACORP can control you—because they hold your data hostage. But centralization is a solution to a technical problem: How can we make the user's data accessible from anywhere in the world, on any device? For a long time, no alternative solution to this problem was forthcoming.
Today, thanks to a confluence of established techniques and recent innovations, we have solved the accessibility problem without resorting to centralization. Hashing, encryption, and erasure encoding got us most of the way, but one barrier remained: incentives. How do you incentivize an anonymous stranger to store your data? Earlier protocols like BitTorrent worked around this limitation by relying on altruism, tit-for-tat requirements, or "points" – in other words, nothing you could pay your electric bill with. Finally, in 2009, a solution appeared: Bitcoin. Not long after, Sia was born.
Cryptography has unleashed the latent power of the internet by enabling interactions between mutually-distrustful parties. Sia harnesses this power to turn the cloud storage market into a proper marketplace, where buyers and sellers can transact directly, with no intermediaries, anywhere in the world. No more silos or walled gardens: your data is encrypted, so it can't be spied on, and it's stored on many servers, so no single entity can hold it hostage. Thanks to projects like Sia, the internet is being re-decentralized.
Sia began its life as a startup, which means it has always been subjected to two competing forces: the ideals of its founders, and the profit motive inherent to all businesses. Its founders have taken great pains to never compromise on the former, but this often threatened the company's financial viability. With the establishment of the Sia Foundation, this tension is resolved. The Foundation, freed of the obligation to generate profit, is a pure embodiment of the ideals from which Sia originally sprung.
The goals and responsibilities of the Foundation are numerous: to maintain core Sia protocols and consensus code; to support developers building on top of Sia and its protocols; to promote Sia and facilitate partnerships in other spheres and communities; to ensure that users can easily acquire and safely store siacoins; to develop network scalability solutions; to implement hardforks and lead the community through them; and much more. In a broader sense, its mission is to commoditize data storage, making it cheap, ubiquitous, and accessible to all, without compromising privacy or performance.
Sia is a perfect example of how we can achieve better living through cryptography. We now begin a new chapter in Sia's history. May our stewardship lead it into a bright future.
 

Overview

Today, we are proposing the creation of the Sia Foundation: a new non-profit entity that builds and supports distributed cloud storage infrastructure, with a specific focus on the Sia storage platform. What follows is an informal overview of the Sia Foundation, covering two major topics: how the Foundation will be funded, and what its funds will be used for.

Organizational Structure

The Sia Foundation will be structured as a non-profit entity incorporated in the United States, likely a 501(c)(3) organization or similar. The actions of the Foundation will be constrained by its charter, which formalizes the specific obligations and overall mission outlined in this document. The charter will be updated on an annual basis to reflect the current goals of the Sia community.
The organization will be operated by a board of directors, initially comprising Luke Champine as President and Eddie Wang as Chairman. Luke Champine will be leaving his position at Nebulous to work at the Foundation full-time, and will seek to divest his shares of Nebulous stock along with other potential conflicts of interest. Neither Luke nor Eddie personally own any siafunds or significant quantities of siacoin.

Funding

The primary source of funding for the Foundation will come from a new block subsidy. Following a hardfork, 30 KS per block will be allocated to the "Foundation Fund," continuing in perpetuity. The existing 30 KS per block miner reward is not affected. Additionally, one year's worth of block subsidies (approximately 1.57 GS) will be allocated to the Fund immediately upon activation of the hardfork.
As detailed below, the Foundation will provably burn any coins that it cannot meaningfully spend. As such, the 30 KS subsidy should be viewed as a maximum. This allows the Foundation to grow alongside Sia without requiring additional hardforks.
The Foundation will not be funded to any degree by the possession or sale of siafunds. Siafunds were originally introduced as a means of incentivizing growth, and we still believe in their effectiveness: a siafund holder wants to increase the amount of storage on Sia as much as possible. While the Foundation obviously wants Sia to succeed, its driving force should be its charter. Deriving significant revenue from siafunds would jeopardize the Foundation's impartiality and focus. Ultimately, we want the Foundation to act in the best interests of Sia, not in growing its own budget.

Responsibilities

The Foundation inherits a great number of responsibilities from Nebulous. Each quarter, the Foundation will publish the progress it has made over the past quarter, and list the responsibilities it intends to prioritize over the coming quarter. This will be accompanied by a financial report, detailing each area of expenditure over the past quarter, and forecasting expenditures for the coming quarter. Below, we summarize some of the myriad responsibilities towards which the Foundation is expected to allocate its resources.

Maintain and enhance core Sia software

Arguably, this is the most important responsibility of the Foundation. At the heart of Sia is its consensus algorithm: regardless of other differences, all Sia software must agree upon the content and rules of the blockchain. It is therefore crucial that the algorithm be stewarded by an entity that is accountable to the community, transparent in its decision-making, and has no profit motive or other conflicts of interest.
Accordingly, Sia’s consensus functionality will no longer be directly maintained by Nebulous. Instead, the Foundation will release and maintain an implementation of a "minimal Sia full node," comprising the Sia consensus algorithm and P2P networking code. The source code will be available in a public repository, and signed binaries will be published for each release.
Other parties may use this code to provide alternative full node software. For example, Nebulous may extend the minimal full node with wallet, renter, and host functionality. The source code of any such implementation may be submitted to the Foundation for review. If the code passes review, the Foundation will provide "endorsement signatures" for the commit hash used and for binaries compiled internally by the Foundation. Specifically, these signatures assert that the Foundation believes the software contains no consensus-breaking changes or other modifications to imported Foundation code. Endorsement signatures and Foundation-compiled binaries may be displayed and distributed by the receiving party, along with an appropriate disclaimer.
A minimal full node is not terribly useful on its own; the wallet, renter, host, and other extensions are what make Sia a proper developer platform. Currently, the only implementations of these extensions are maintained by Nebulous. The Foundation will contract Nebulous to ensure that these extensions continue to receive updates and enhancements. Later on, the Foundation intends to develop its own implementations of these extensions and others. As with the minimal node software, these extensions will be open source and available in public repositories for use by any Sia node software.
With the consensus code now managed by the Foundation, the task of implementing and orchestrating hardforks becomes its responsibility as well. When the Foundation determines that a hardfork is necessary (whether through internal discussion or via community petition), a formal proposal will be drafted and submitted for public review, during which arguments for and against the proposal may be submitted to a public repository. During this time, the hardfork code will be implemented, either by Foundation employees or by external contributors working closely with the Foundation. Once the implementation is finished, final arguments will be heard. The Foundation board will then vote whether to accept or reject the proposal, and announce their decision along with appropriate justification. Assuming the proposal was accepted, the Foundation will announce the block height at which the hardfork will activate, and will subsequently release source code and signed binaries that incorporate the hardfork code.
Regardless of the Foundation's decision, it is the community that ultimately determines whether a fork is accepted or rejected – nothing can change that. Foundation node software will never automatically update, so all forks must be explicitly adopted by users. Furthermore, the Foundation will provide replay and wipeout protection for its hard forks, protecting other chains from unintended or malicious reorgs. Similarly, the Foundation will ensure that any file contracts formed prior to a fork activation will continue to be honored on both chains until they expire.
Finally, the Foundation also intends to pursue scalability solutions for the Sia blockchain. In particular, work has already begun on an implementation of Utreexo, which will greatly reduce the space requirements of fully-validating nodes (allowing a full node to be run on a smartphone) while increasing throughput and decreasing initial sync time. A hardfork implementing Utreexo will be submitted to the community as per the process detailed above.
As this is the most important responsibility of the Foundation, it will receive a significant portion of the Foundation’s budget, primarily in the form of developer salaries and contracting agreements.

Support community services

We intend to allocate 25% of the Foundation Fund towards the community. This allocation will be held and disbursed in the form of siacoins, and will pay for grants, bounties, hackathons, and other community-driven endeavours.
Any community-run service, such as a Skynet portal, explorer or web wallet, may apply to have its costs covered by the Foundation. Upon approval, the Foundation will reimburse expenses incurred by the service, subject to the exact terms agreed to. The intent of these grants is not to provide a source of income, but rather to make such services "break even" for their operators, so that members of the community can enrich the Sia ecosystem without worrying about the impact on their own finances.

Ensure easy acquisition and storage of siacoins

Most users will acquire their siacoins via an exchange. The Foundation will provide support to Sia-compatible exchanges, and pursue relevant integrations at its discretion, such as Coinbase's new Rosetta standard. The Foundation may also release DEX software that enables trading cryptocurrencies without the need for a third party. (The Foundation itself will never operate as a money transmitter.)
Increasingly, users are storing their cryptocurrency on hardware wallets. The Foundation will maintain the existing Ledger Nano S integration, and pursue further integrations at its discretion.
Of course, all hardware wallets must be paired with software running on a computer or smartphone, so the Foundation will also develop and/or maintain client-side wallet software, including both full-node wallets and "lite" wallets. Community-operated wallet services, i.e. web wallets, may be funded via grants.
Like core software maintenance, this responsibility will be funded in the form of developer salaries and contracting agreements.

Protect the ecosystem

When it comes to cryptocurrency security, patching software vulnerabilities is table stakes; there are significant legal and social threats that we must be mindful of as well. As such, the Foundation will earmark a portion of its fund to defend the community from legal action. The Foundation will also safeguard the network from 51% attacks and other threats to network security by implementing softforks and/or hardforks where necessary.
The Foundation also intends to assist in the development of a new FOSS software license, and to solicit legal memos on various Sia-related matters, such as hosting in the United States and the EU.
In a broader sense, the establishment of the Foundation makes the ecosystem more robust by transferring core development to a more neutral entity. Thanks to its funding structure, the Foundation will be immune to various forms of pressure that for-profit companies are susceptible to.

Drive adoption of Sia

Although the overriding goal of the Foundation is to make Sia the best platform it can be, all that work will be in vain if no one uses the platform. There are a number of ways the Foundation can promote Sia and get it into the hands of potential users and developers.
In-person conferences are understandably far less popular now, but the Foundation can sponsor and/or participate in virtual conferences. (In-person conferences may be held in the future, permitting circumstances.) Similarly, the Foundation will provide prizes for hackathons, which may be organized by community members, Nebulous, or the Foundation itself. Lastly, partnerships with other companies in the cryptocurrency space—or the cloud storage space—are a great way to increase awareness of Sia. To handle these responsibilities, one of the early priorities of the Foundation will be to hire a marketing director.

Fund Management

The Foundation Fund will be controlled by a multisig address. Each member of the Foundation's board will control one of the signing keys, with the signature threshold to be determined once the final composition of the board is known. (This threshold may also be increased or decreased if the number of board members changes.) Additionally, one timelocked signing key will be controlled by David Vorick. This key will act as a “dead man’s switch,” to be used in the event of an emergency that prevents Foundation board members from reaching the signature threshold. The timelock ensures that this key cannot be used unless the Foundation fails to sign a transaction for several months.
On the 1st of each month, the Foundation will use its keys to transfer all siacoins in the Fund to two new addresses. The first address will be controlled by a high-security hot wallet, and will receive approximately one month's worth of Foundation expenditures. The second address, receiving the remaining siacoins, will be a modified version of the source address: specifically, it will increase the timelock on David Vorick's signing key by one month. Any other changes to the set of signing keys, such as the arrival or departure of board members, will be incorporated into this address as well.
The Foundation Fund is allocated in SC, but many of the Foundation's expenditures must be paid in USD or other fiat currency. Accordingly, the Foundation will convert, at its discretion, a portion of its monthly withdrawals to fiat currency. We expect this conversion to be primarily facilitated by private "OTC" sales to accredited investors. The Foundation currently has no plans to speculate in cryptocurrency or other assets.
Finally, it is important that the Foundation adds value to the Sia platform well in excess of the inflation introduced by the block subsidy. For this reason, the Foundation intends to provably burn, on a quarterly basis, any coins that it cannot allocate towards any justifiable expense. In other words, coins will be burned whenever doing so provides greater value to the platform than any other use. Furthermore, the Foundation will cap its SC treasury at 5% of the total supply, and will cap its USD treasury at 4 years’ worth of predicted expenses.
 
Addendum: Hardfork Timeline
We would like to see this proposal finalized and accepted by the community no later than September 30th. A new version of siad, implementing the hardfork, will be released no later than October 15th. The hardfork will activate at block 293220, which is expected to occur around 12pm EST on January 1st, 2021.
 
Addendum: Inflation specifics
The total supply of siacoins as of January 1st, 2021 will be approximately 45.243 GS. The initial subsidy of 1.57 GS thus increases the supply by 3.47%, and the total annual inflation in 2021 will be at most 10.4% (if zero coins are burned). In 2022, total annual inflation will be at most 6.28%, and will steadily decrease in subsequent years.
 

Conclusion

We see the establishment of the Foundation as an important step in the maturation of the Sia project. It provides the ecosystem with a sustainable source of funding that can be exclusively directed towards achieving Sia's ambitious goals. Compared to other projects with far deeper pockets, Sia has always punched above its weight; once we're on equal footing, there's no telling what we'll be able to achieve.
Nevertheless, we do not propose this change lightly, and have taken pains to ensure that the Foundation will act in accordance with the ideals that this community shares. It will operate transparently, keep inflation to a minimum, and respect the user's fundamental role in decentralized systems. We hope that everyone in the community will consider this proposal carefully, and look forward to a productive discussion.
submitted by lukechampine to siacoin [link] [comments]

Gridcoin 5.0.0.0-Mandatory "Fern" Release

https://github.com/gridcoin-community/Gridcoin-Research/releases/tag/5.0.0.0
Finally! After over ten months of development and testing, "Fern" has arrived! This is a whopper. 240 pull requests merged. Essentially a complete rewrite that was started with the scraper (the "neural net" rewrite) in "Denise" has now been completed. Practically the ENTIRE Gridcoin specific codebase resting on top of the vanilla Bitcoin/Peercoin/Blackcoin vanilla PoS code has been rewritten. This removes the team requirement at last (see below), although there are many other important improvements besides that.
Fern was a monumental undertaking. We had to encode all of the old rules active for the v10 block protocol in new code and ensure that the new code was 100% compatible. This had to be done in such a way as to clear out all of the old spaghetti and ring-fence it with tightly controlled class implementations. We then wrote an entirely new, simplified ruleset for research rewards and reengineered contracts (which includes beacon management, polls, and voting) using properly classed code. The fundamentals of Gridcoin with this release are now on a very sound and maintainable footing, and the developers believe the codebase as updated here will serve as the fundamental basis for Gridcoin's future roadmap.
We have been testing this for MONTHS on testnet in various stages. The v10 (legacy) compatibility code has been running on testnet continuously as it was developed to ensure compatibility with existing nodes. During the last few months, we have done two private testnet forks and then the full public testnet testing for v11 code (the new protocol which is what Fern implements). The developers have also been running non-staking "sentinel" nodes on mainnet with this code to verify that the consensus rules are problem-free for the legacy compatibility code on the broader mainnet. We believe this amount of testing is going to result in a smooth rollout.
Given the amount of changes in Fern, I am presenting TWO changelogs below. One is high level, which summarizes the most significant changes in the protocol. The second changelog is the detailed one in the usual format, and gives you an inkling of the size of this release.

Highlights

Protocol

Note that the protocol changes will not become active until we cross the hard-fork transition height to v11, which has been set at 2053000. Given current average block spacing, this should happen around October 4, about one month from now.
Note that to get all of the beacons in the network on the new protocol, we are requiring ALL beacons to be validated. A two week (14 day) grace period is provided by the code, starting at the time of the transition height, for people currently holding a beacon to validate the beacon and prevent it from expiring. That means that EVERY CRUNCHER must advertise and validate their beacon AFTER the v11 transition (around Oct 4th) and BEFORE October 18th (or more precisely, 14 days from the actual date of the v11 transition). If you do not advertise and validate your beacon by this time, your beacon will expire and you will stop earning research rewards until you advertise and validate a new beacon. This process has been made much easier by a brand new beacon "wizard" that helps manage beacon advertisements and renewals. Once a beacon has been validated and is a v11 protocol beacon, the normal 180 day expiration rules apply. Note, however, that the 180 day expiration on research rewards has been removed with the Fern update. This means that while your beacon might expire after 180 days, your earned research rewards will be retained and can be claimed by advertising a beacon with the same CPID and going through the validation process again. In other words, you do not lose any earned research rewards if you do not stake a block within 180 days and keep your beacon up-to-date.
The transition height is also when the team requirement will be relaxed for the network.

GUI

Besides the beacon wizard, there are a number of improvements to the GUI, including new UI transaction types (and icons) for staking the superblock, sidestake sends, beacon advertisement, voting, poll creation, and transactions with a message. The main screen has been revamped with a better summary section, and better status icons. Several changes under the hood have improved GUI performance. And finally, the diagnostics have been revamped.

Blockchain

The wallet sync speed has been DRASTICALLY improved. A decent machine with a good network connection should be able to sync the entire mainnet blockchain in less than 4 hours. A fast machine with a really fast network connection and a good SSD can do it in about 2.5 hours. One of our goals was to reduce or eliminate the reliance on snapshots for mainnet, and I think we have accomplished that goal with the new sync speed. We have also streamlined the in-memory structures for the blockchain which shaves some memory use.
There are so many goodies here it is hard to summarize them all.
I would like to thank all of the contributors to this release, but especially thank @cyrossignol, whose incredible contributions formed the backbone of this release. I would also like to pay special thanks to @barton2526, @caraka, and @Quezacoatl1, who tirelessly helped during the testing and polishing phase on testnet with testing and repeated builds for all architectures.
The developers are proud to present this release to the community and we believe this represents the starting point for a true renaissance for Gridcoin!

Summary Changelog

Accrual

Changed

Most significantly, nodes calculate research rewards directly from the magnitudes in EACH superblock between stakes instead of using a two- or three- point average based on a CPID's current magnitude and the magnitude for the CPID when it last staked. For those long-timers in the community, this has been referred to as "Superblock Windows," and was first done in proof-of-concept form by @denravonska.

Removed

Beacons

Added

Changed

Removed

Unaltered

As a reminder:

Superblocks

Added

Changed

Removed

Voting

Added

Changed

Removed

Detailed Changelog

[5.0.0.0] 2020-09-03, mandatory, "Fern"

Added

Changed

Removed

Fixed

submitted by jamescowens to gridcoin [link] [comments]

PDQ Deploy packs v72.0.0 (2020-09-18)

Background

This is v72.0.0 (v71.0.0, v70.0.0, v69.0.0, etc...) of our PDQ installers and includes all installers from the previous package with old versions removed.
All packages:
  1. ...install silently and don't place desktop or quicklaunch shortcuts
  2. ...disable all auto-update, nag popup and stat-collection/telemetry "features" possible
  3. ...work with the free or paid version of PDQ Deploy but do not require it - each package can run standalone (e.g. from a thumb drive) or pushed with SCCM/GPO/etc if desired. PM me if you need assistance setting something like that up

Download

Primary:
Download the torrent.
Secondary: Download the self-extracting archive from one of the repos:
Mirror HTTPS HTTP Location Host
Official link link US-NY SGC-Hosting
#1 link link FR mxmod
Tertiary:
Plug one of these keys into Resilio Sync (formerly called "BT Sync") to pull down that repository:
- BTRSRPF7Y3VWFRBG64VUDGP7WIIVNTR4Q (Installer Packages, ~2.25 GB) - BMHHALGV7WLNSAPIPYDP5DU3NDNSM5XNC (WSUS Offline updates, ~12.00 GB) 
Make sure the settings for your Sync folder look like this (or this if you're on v1.3.x). Specifically you need to enable DHT.
Quaternary: (source code)
The Github page contains all scripts and wrapper files used in the pack. Check it out if you want to see the code without downloading the full binary pack, or just steal them for your own use. Note that downloading from Github directly won't work - you need either this provided pack or go manually fetch all the binaries yourself in order to just plug them in and start working.

Pack list

Installers:
(Updates in bold. All installers are 64-bit unless otherwise marked)
  • 7-Zip v19.00
  • 7-Zip v19.00 (x86)
  • Adobe Acrobat Reader DC v20.012.20041
  • Adobe AIR v32.0.0.125
  • Adobe Flash Player v32.0.0.433 (Chrome)
  • Adobe Flash Player v32.0.0.433 (Firefox)
  • Adobe Flash Player v32.0.0.433 (IE / ActiveX)
  • Apple iTunes v12.5.1.21
  • CDBurnerXP v4.5.8.7128
  • FileZilla Client v3.50.0
  • Gimp v2.10.20 (x86)
  • Google Chrome Enterprise v85.0.4183.102
  • Google Chrome Enterprise v85.0.4183.102 (x86)
  • Google Earth Pro v7.3.3
  • Java Development Kit 8 Update 261
  • Java Development Kit 8 Update 261 (x86)
  • Java Development Kit 11.0.7
  • Java Runtime 8 update 261
  • Java Runtime 8 update 261 (x86)
  • Java Runtime 10.0.2
  • KTS KypM Telnet/SSH Server v1.19c (x86)
  • LibreOffice v7.0.1
  • Microsoft .NET Framework v3.5.1 SP1 (x86)
  • Microsoft Silverlight v5.1.50918.0
  • Mozilla Firefox v80.0.1
  • Mozilla Firefox v80.0.1 (x86)
  • Mozilla Firefox ESR v68.12.0
  • Mozilla Firefox ESR v68.12.0 (x86)
  • Mozilla Thunderbird v78.2.2 (x86) (customized; read notes)
  • Notepad++ v7.8.9 (x86)
  • Pale Moon v28.13.0
  • Pale Moon v28.13.0 (x86)
  • Spark v2.9.2 (x86)
  • TightVNC v2.8.27
  • TightVNC v2.8.27 (x86)
  • UltraVNC v1.2.4.0 (x86)
  • VLC media player v3.0.11
  • WinSCP v5.17.7 (x86)
Utilities:
  • Clean Up ALL Printers (purge all printers from target)
  • Clean Up Orphaned Printers (remove non-existent printers from the spooler)
  • Empty All Recycle Bins (force all recycle bins to empty on target)
  • Enable Remote Desktop
  • Install PKI Certificates
  • Reboot (force target reboot in 15 seconds)
  • Remove Adobe Flash Player (removes all versions)
  • Remove Java Runtime (removes JRE versions 3-11 using all means necessary)
  • Remove Microsoft Silverlight (removes all versions of Silverlight)
  • Temp File Cleanup
  • USB Device Cleanup. Uninstalls non-present USB hubs, USB storage devices and their storage volumes, Disks, CD-ROM's, Floppies, WPD devices and deletes their registry items. Devices will re-initialize at next connection

Instructions

  1. Import all .XML files from the \job files directory into PDQ deploy (it should look roughly like this after you've imported them).
  2. Copy all files from the \repository directory to wherever your repository is.
  3. All jobs reference PDQ's $(Repository) variable, so make sure it's set in preferences.

Package Notes

  1. Read the notes in the PDQ interface for each package, they explain exactly what that installer does. Basically, most packages use a .bat file to accomplish multi-step installs with the free version of PDQ. You can edit the batch files to see what they do; most just delete "All Users" desktop shortcuts and things like that. changelog-v##-updated-.txt has version and release history in addition to random notes where I complain about things like Reader DC and how much of a pain it is to build packages for.
  2. Thunderbird:
    • Thunderbird is configured to use a global config file stored on a network share. This allows for settings changes en masse. By default it's set to check for config updates every 120 minutes.
    • You can change the config location, update frequency, OR disable this behavior entirely by editing thunderbird-custom-settings.js.
    • A copy of the config file is in the Thunderbird directory and is called thunderbird-global-settings.js
    • If you don't want any customizations, just edit Thunderbird's .bat file and comment out or delete all the lines mentioning the custom config files.
  3. Microsoft Offline Updates - built using the excellent WSUS Offline tool. Please donate to them if you can, their team does excellent work.

Integrity

In the folder \integrity verification the file checksums.txt is signed with my PGP key (0x07d1490f82a211a2, pubkey included). You can use this to verify package integrity.
If you find a bug or glitch, PM me or post it here. Advice and comments are welcome and appreciated.

Donations

These packs will always be free and open-source. If you feel like giving away your hard-earned cash to random strangers on the internet you may do so here:
Patreon
Bitcoin: 1Bfxpo1WqTGwRXZKrwYZV2zvJ4ggyj9GE1
Monero (preferred):
46ZUK4VDLLz3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6CFAnPSo
"Do not withhold good from those to whom it is due, when it is in your power to act."
submitted by vocatus to sysadmin [link] [comments]

PDQ Deploy packs v72.0.0 (2020-09-18)

Background

This is v72.0.0 (v71.0.0, v70.0.0, v69.0.0, etc...) of our PDQ installers and includes all installers from the previous package with old versions removed.
All packages:
  1. ...install silently and don't place desktop or quicklaunch shortcuts
  2. ...disable all auto-update, nag popup and stat-collection/telemetry "features" possible
  3. ...work with the free or paid version of PDQ Deploy but do not require it - each package can run standalone (e.g. from a thumb drive) or pushed with SCCM/GPO/etc if desired. PM me if you need assistance setting something like that up

Download

Primary:
Download the torrent.
Secondary: Download the self-extracting archive from one of the repos:
Mirror HTTPS HTTP Location Host
Official link link US-NY SGC-Hosting
#1 link link FR mxmod
Tertiary:
Plug one of these keys into Resilio Sync (formerly called "BT Sync") to pull down that repository:
- BTRSRPF7Y3VWFRBG64VUDGP7WIIVNTR4Q (Installer Packages, ~2.25 GB) - BMHHALGV7WLNSAPIPYDP5DU3NDNSM5XNC (WSUS Offline updates, ~12.00 GB) 
Make sure the settings for your Sync folder look like this (or this if you're on v1.3.x). Specifically you need to enable DHT.
Quaternary: (source code)
The Github page contains all scripts and wrapper files used in the pack. Check it out if you want to see the code without downloading the full binary pack, or just steal them for your own use. Note that downloading from Github directly won't work - you need either this provided pack or go manually fetch all the binaries yourself in order to just plug them in and start working.

Pack list

Installers:
(Updates in bold. All installers are 64-bit unless otherwise marked)
  • 7-Zip v19.00
  • 7-Zip v19.00 (x86)
  • Adobe Acrobat Reader DC v20.012.20041
  • Adobe AIR v32.0.0.125
  • Adobe Flash Player v32.0.0.433 (Chrome)
  • Adobe Flash Player v32.0.0.433 (Firefox)
  • Adobe Flash Player v32.0.0.433 (IE / ActiveX)
  • Apple iTunes v12.5.1.21
  • CDBurnerXP v4.5.8.7128
  • FileZilla Client v3.50.0
  • Gimp v2.10.20 (x86)
  • Google Chrome Enterprise v85.0.4183.102
  • Google Chrome Enterprise v85.0.4183.102 (x86)
  • Google Earth Pro v7.3.3
  • Java Development Kit 8 Update 261
  • Java Development Kit 8 Update 261 (x86)
  • Java Development Kit 11.0.7
  • Java Runtime 8 update 261
  • Java Runtime 8 update 261 (x86)
  • Java Runtime 10.0.2
  • KTS KypM Telnet/SSH Server v1.19c (x86)
  • LibreOffice v7.0.1
  • Microsoft .NET Framework v3.5.1 SP1 (x86)
  • Microsoft Silverlight v5.1.50918.0
  • Mozilla Firefox v80.0.1
  • Mozilla Firefox v80.0.1 (x86)
  • Mozilla Firefox ESR v68.12.0
  • Mozilla Firefox ESR v68.12.0 (x86)
  • Mozilla Thunderbird v78.2.2 (x86) (customized; read notes)
  • Notepad++ v7.8.9 (x86)
  • Pale Moon v28.13.0
  • Pale Moon v28.13.0 (x86)
  • Spark v2.9.2 (x86)
  • TightVNC v2.8.27
  • TightVNC v2.8.27 (x86)
  • UltraVNC v1.2.4.0 (x86)
  • VLC media player v3.0.11
  • WinSCP v5.17.7 (x86)
Utilities:
  • Clean Up ALL Printers (purge all printers from target)
  • Clean Up Orphaned Printers (remove non-existent printers from the spooler)
  • Empty All Recycle Bins (force all recycle bins to empty on target)
  • Enable Remote Desktop
  • Install PKI Certificates
  • Reboot (force target reboot in 15 seconds)
  • Remove Adobe Flash Player (removes all versions)
  • Remove Java Runtime (removes JRE versions 3-11 using all means necessary)
  • Remove Microsoft Silverlight (removes all versions of Silverlight)
  • Temp File Cleanup
  • USB Device Cleanup. Uninstalls non-present USB hubs, USB storage devices and their storage volumes, Disks, CD-ROM's, Floppies, WPD devices and deletes their registry items. Devices will re-initialize at next connection

Instructions

  1. Import all .XML files from the \job files directory into PDQ deploy (it should look roughly like this after you've imported them).
  2. Copy all files from the \repository directory to wherever your repository is.
  3. All jobs reference PDQ's $(Repository) variable, so make sure it's set in preferences.

Package Notes

  1. Read the notes in the PDQ interface for each package, they explain exactly what that installer does. Basically, most packages use a .bat file to accomplish multi-step installs with the free version of PDQ. You can edit the batch files to see what they do; most just delete "All Users" desktop shortcuts and things like that. changelog-v##-updated-.txt has version and release history in addition to random notes where I complain about things like Reader DC and how much of a pain it is to build packages for.
  2. Thunderbird:
    • Thunderbird is configured to use a global config file stored on a network share. This allows for settings changes en masse. By default it's set to check for config updates every 120 minutes.
    • You can change the config location, update frequency, OR disable this behavior entirely by editing thunderbird-custom-settings.js.
    • A copy of the config file is in the Thunderbird directory and is called thunderbird-global-settings.js
    • If you don't want any customizations, just edit Thunderbird's .bat file and comment out or delete all the lines mentioning the custom config files.
  3. Microsoft Offline Updates - built using the excellent WSUS Offline tool. Please donate to them if you can, their team does excellent work.

Integrity

In the folder \integrity verification the file checksums.txt is signed with my PGP key (0x07d1490f82a211a2, pubkey included). You can use this to verify package integrity.
If you find a bug or glitch, PM me or post it here. Advice and comments are welcome and appreciated.

Donations

These packs will always be free and open-source. If you feel like giving away your hard-earned cash to random strangers on the internet you may do so here:
Patreon
Bitcoin: 1Bfxpo1WqTGwRXZKrwYZV2zvJ4ggyj9GE1
Monero (preferred):
46ZUK4VDLLz3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6CFAnPSo
"Do not withhold good from those to whom it is due, when it is in your power to act."
submitted by vocatus to pdq [link] [comments]

Google Alternatives huge list restore your privacy

This guide aims to be the most exhaustive resource available for documenting alternatives to Google products.
With growing concerns over online privacy and securing personal data, more people than ever are considering alternatives to Google products.
After all, Google’s business model essentially revolves around data collection and advertisements, both of which infringe on your privacy. More data means better (targeted) ads and more revenue. The company pulled in over $116 billion in ad revenue last year alone – and that number continues to grow.
But the word is getting out. A growing number of people are seeking alternatives to Google products that respect their privacy and data.
So let’s get started.
Note: The lists below are not necessarily in rank order. Choose the best products and services based on your own unique needs.

Google search alternatives

When it comes to privacy, using Google search is not a good idea. When you use their search engine, Google is recording your IP address, search terms, user agent, and often a unique identifier, which is stored in cookies.
Here are ten alternatives to Google search:
  1. Searx – A privacy-friendly and versatile metasearch engine that’s also open source.
  2. MetaGer – An open source metasearch engine with good features, based in Germany.
  3. SwissCows – A zero-tracking private search engine based in Switzerland, hosted on secure Swiss infrastructure.
  4. Qwant – A private search engine based in France.
  5. DuckDuckGo – A private search engine based in the US.
  6. Mojeek – The only true search engine (rather than metasearch engine) that has its own crawler and index (based in the UK).
  7. YaCy – A decentralized, open source, peer-to-peer search engine.
  8. Givero – Based in Denmark, Givero offers more privacy than Google and combines search with charitable donations.
  9. Ecosia – Ecosia is based in Germany and donates a part of revenues to planting trees.
*Note: With the exception of Mojeek, all of the private search engines above are technically metasearch engines, since they source their results from other search engines, such as Bing and Google.
(Startpage is no longer recommended.)

Gmail alternatives

Gmail may be convenient and popular, but there are three major problems:
  1. Your inbox is used as a data collection tool. (Did you know Google is tracking your purchasing history from the receipts in your inbox?)
  2. Rather than seeing just emails, your email inbox is also used for ads and marketing.
  3. The contents of your inbox are being shared with Google and other random third parties.
When you remain logged in to your Gmail account, Google can easily track your activities online as you browse different websites, which may be hosting Google Analytics or Google ads (Adsense).
Here are ten alternatives to Gmail that do well in terms of privacy:
  1. Tutanota – based in Germany; very secure and private; free accounts up to 1 GB
  2. Mailfence – based in Belgium; lots of features; free accounts up to 500 MB
  3. Posteo – based in Germany; €1/mo with 14 day refund window
  4. StartMail – based in Netherlands; $5.00/mo with 7 day free trial
  5. Runbox – based in Norway; lots of storage and features; $1.66/mo with 30 day free trial
  6. Mailbox.org – based in Germany; €1/mo with 30 day free trial
  7. CounterMail – based in Sweden; $4.00/mo with 7 day free trial
  8. Kolab Now – based in Switzerland; €4.41/mo with 30 day money-back guarantee
  9. ProtonMail – based in Switzerland; free accounts up to 500 MB
  10. Thexyz – based in Canada; $1.95/mo with 30 day refund window

Chrome alternatives

Google Chrome is a popular browser, but it’s also a data collection tool – and many people are taking notice. Just a few days ago, the Washington Post asserted that “Google’s web browser has become spy software,” with 11,000 tracker cookies observed in a single week.
Here are seven alternatives for more privacy:
  1. Firefox browser – Firefox is a very customizable, open-source browser that is popular in privacy circles. There are also many different Firefox modifications and tweaks that will give you more privacy and security. (Also check out Firefox Focus, a privacy-focused version for mobile users.)
  2. Iridium – Based on open source Chromium, Iridium offers numerous privacy and security enhancements over Chrome, source code here.
  3. GNU IceCat – A fork of Firefox from the Free Software Foundation.
  4. Tor browser – A hardened and secured version of Firefox that runs on the Tor network by default. (It also does a good job against browser fingerprinting.)
  5. Ungoogled Chromium – Just as the name says, this is an open source version of Chromium that has been “ungoogled” and modified for more privacy.
  6. Brave – Brave is another Chromium-based browser that is rather popular. It blocks trackers and ads by default (except for “approved” ads that are part of the “Brave Ads” network).
  7. Waterfox – This is a fork of Firefox that is configured for more privacy by default, with Mozilla telemetry stripped out of the code.
Of course, there are other alternatives to Chrome, such as Safari (from Apple), Microsoft Internet ExploreEdge, Opera, and Vivaldi – but these also come with some privacy drawbacks.

Google Drive alternatives

If you’re looking for a secure cloud storage option, you can check out these Google Drive alternatives:
  1. Tresorit – A user-friendly cloud storage option based in Switzerland.
  2. ownCloud – An open source and self-hosted cloud platform developed in Germany.
  3. Nextcloud – Nextcloud is also an open source, self-hosted file sharing and collaboration platform, based in Germany.
  4. Sync – Based in Canada, Sync offers a secure, encrypted cloud storage solution for businesses and individuals.
  5. Syncthing – Here we have a decentralized, open source, peer-to-peer cloud storage platform.
Of course, Dropbox is another popular Google drive alternative, but it’s not the best in terms of privacy.

Google Calendar alternative

Here are some Google Calendar alternatives:
  1. Lightning Calendar is an open source calendar option developed by Mozilla, and it’s compatible with Thunderbird and Seamonkey.
  2. Etar, an open source, basic calendar option.
  3. Fruux, an open source calendar with good features and support for many operating systems.
For those wanting a combined solution for both email and calendar functionality, these providers offer that:

Google Docs / Sheets / Slides alternative

There are many solid Google Docs alternatives available. The largest offline document editing suite is, of course, Microsoft Office. As most people know, however, Microsoft is not the best company for privacy. Nonetheless, there are a few other good Google Docs alternatives:
  1. CryptPad – CryptPad is a privacy-focused alternative with strong encryption, and it’s free.
  2. Etherpad – A self-hosted collaborative online editor that’s also open source.
  3. Mailfence Documents – From the Mailfence team, this is a secure file sharing, storage, and collaboration tool.
  4. Zoho Docs – This is another good Google Docs alternative with a clean interface and good functionality, although it may not be the best for privacy.
  5. OnlyOffice – OnlyOffice feels a bit more restricted than some of the other options in terms of features.
  6. Cryptee – This is a privacy-focused platform for photo and document storage and editing. It’s open source and based in Estonia.
  7. LibreOffice (offline) – You can use LibreOffice which is free and open source.
  8. Apache OpenOffice (offline) – Another good open source office suite.

Google Photos alternative

Here are a few good Google Photos alternatives:
Shoebox was another alternative, but it closed operations in June 2019.

YouTube alternatives

Unfortunately, YouTube alternatives can really be hit or miss, with most struggling to gain popularity.
  1. Peertube
  2. DTube
  3. Bitchute
  4. invidio.us
  5. Vimeo
  6. Bit.tube
  7. Dailymotion
  8. Hooktube
Tip: Invidio.us is a great Youtube proxy that allows you to watch any Youtube video without logging in, even if the video is somehow restricted. To do this, simply replace [www.youtube.com] with [invidio.us] in the URL you want to view.

Google translate alternative

Here are a few Google translate alternatives I have come across:
  1. DeepL – DeepL is a solid Google Translate alternative that seems to give great results. Like Google Translate, DeepL allows you to post up to 5,000 characters at a time (but the pro version is unlimited). The user interface is good and there is also a built-in dictionary feature.
  2. Linguee – Linguee does not allow you to post large blocks of text like DeepL. However, Linguee will give you very accurate translations for single words or phrases, along with context examples.
  3. dict.cc – This Google Translate alternative seems to do a decent job on single-world lookups, but it also feels a bit outdated.
  4. Swisscows Translate – A good translation service supporting many languages.
If you want to translate blocks of text, check out DeepL. If you want in-depth translations for single words or phrases, then Linguee is a good choice.

Google analytics alternative

For website admins, there are many reasons to use an alternative to Google analytics. Aside from privacy concerns, there are also faster and more user-friendly alternatives that also respect your visitors’ privacy.
  1. Clicky is a great alternative to Google Analytics that truncates and anonymizes visitor IP addresses by default. It is lightweight, user-friendly, and fully compliant with GDPR regulations, while also being certified by Privacy Shield.
  2. Matomo (formerly Piwik) is an open-source analytics platform that respects the privacy of visitors by anonymizing and truncating visitor IP addresses (if enabled by the website admin). It is also certified to respect user privacy.
  3. Fathom Analytics is an open source alternative to Google Analytics that’s available on Github here. It’s minimal, fast, and lightweight.
  4. Get Insights – Another privacy-focused analytics platform, with a full analytics suite. The front-end client is open source and available here.
  5. AT Internet is a France-based analytics provider that is fully GDPR compliant, with all data stored on French servers, and a good track record going back to 1996.
Many websites host Google Analytics because they run Google Adsense campaigns. Without Google Analytics, tracking performance of these campaigns would be difficult. Nonetheless, there are still better options for privacy.

Google Maps alternative

A map alternative for PCs is OpenStreetMap.
A few Google Maps alternatives for mobile devices include:
  1. OsmAnd is a free and open-source mobile maps app for both Android and iOS (based on OpenStreetMap data).
  2. Maps (F Droid) uses OpenStreetMap data (offline).
  3. Maps.Me is another option that is free on both Android and iOS, but there is a fair amount of data collection with this alternative, as explained in their privacy policy.
  4. MapHub is also based on OpenStreeMap data and it does not collect locations or user IP addresses.
Note: Waze is not an “alternative” as it is now owned by Google.

Google Play Store alternative

Currently the best Google Play Store alternative is to use F-Droid and then go through the Yalp store. As explained on the official site, F-Droid is an installable catalog of FOSS (Free and Open Source Software) applications for the Android platform.
After you have installed F-Droid, you can then download the Yalp store APK, which allows you to download apps from the Google Play Store directly as APK files.
📷The Yalp Store is a good alternative to the Google Play Store.
See the F-Droid website or the official GitHub page for more info. Other alternatives to the Google Play Store include:

Google Chrome OS alternative

Want to ditch the Chromebook and Chrome OS? Here are a few alternatives:
  1. Linux – Of course, Linux is arguably the best alternative, being a free, open-source operating system with lots of different flavors. With some adjustments, Linux Ubuntu can be run on Chromebooks.
  2. Tails – Tails is a free, privacy-focused operating system based on Linux that routes all traffic through the Tor network.
  3. QubesOS – Recommended by Snowden, free, and also open source.
Of course, the other two big operating system alternatives are Windows and Apple’s operating system for MacBooks – Mac OS. Windows, particularly Windows 10, is a very bad option for privacy. While slightly better, Apple also collects user data and has partnered with the NSA) for surveillance.

Android alternatives

The biggest alternative to Android is iOS from Apple. But we’ll skip over that for reasons already mentioned. Here are a few Android OS alternatives:
  1. LineageOS – A free and open-source operating system for phones and tablets based on Android.
  2. Ubuntu Touch – A mobile version of the Ubuntu operating system.
  3. Plasma Mobile – An open source, Linux-based operating system with active development.
  4. Sailfish OS – Another open source, Linux-based mobile OS.
  5. Replicant – A fully free Android distribution with an emphasis on freedom, privacy, and security.
  6. /e/ – This is another open source project with a focus on privacy and security.
Purism is also working on a privacy-focused mobile phone called the Librem 5. It is in production, but not yet available (estimated Q3 2019).

Google Hangouts alternatives

Here are some alternatives to Google Hangouts:
  1. Wire – A great all-around secure messenger, video, and chat app, but somewhat limited on the number of people who can chat together in a group conversation via voice or video.
  2. Signal – A good secure messenger platform from Open Whisper Systems.
  3. Telegram – A longtime secure messenger app, formerly based in Russia, now in Dubai.
  4. Riot – A privacy-focused encrypted chat service that is also open source.

Google Domains alternative

Google Domains is a domain registration service. Here are a few alternatives:
  1. Namecheap – I like Namecheap because all domain purchases now come with free WhoisGuard protection for life, which protects your contact information from third parties. Namecheap also accepts Bitcoin and offers domain registration, hosting, email, SSL certs, and a variety of other products.
  2. Njalla – Njalla is a privacy-focused domain registration service based in Nevis. They offer hosting options, too, and also accept cryptocurrency payments.
  3. OrangeWebsite – OrangeWebsite offers anonymous domain registration services and also accepts cryptocurrency payments, based in Iceland.

Other Google alternatives

Here more alternatives for various Google products:
Google forms alternativeJotForm is a free online form builder.
Google Keep alternative – Below are a few different Google Keep alternatives:
Google Fonts alternative – Many websites load Google fonts through Google APIs, but that’s not necessary. One alternative to this is to use Font Squirrel, which has a large selection of both Google and non-Google fonts which are free to download and use.
Google Voice alternativeJMP.chat (both free and paid)
G Suite alternativeZoho is probably the best option
Google Firebase alternativeKuzzle (free and open source)
Google Blogger alternativesWordPress, Medium, and Ghost are all good options.
submitted by giganticcobra to degoogle [link] [comments]

✴Bitcoin Customer Service +▶𝟏⥂𝟪𝟦𝟦⥂𝟗𝟭𝟎⥂2𝟑𝟎𝟭 Phone Number Customer Care Number ✴USA CANADA $#[email protected]#&#@",>>✴

Bitcoin is Customer Password chief and all specialized Support needs effective Bitcoin Customer Service has a Phone number For all Kind of client care for Bitcoin establishment mistake uphold telephone number



Bitcoin is astounding assistance programming that is widely utilized by a huge number of clients. the most effective method to secret key not working. Bitcoin uphold telephone number will fix issues of Antiviruss specialized focus will assist you with client support care for moment ink It blesses effortlessly of access and flexibility to its clients. Bitcoin webmail guarantees top of the line security by utilizing secure encryption strategy for correspondence and information sharing by means of messages. Street Runner proffers plentiful scope of web mail administrations, prompt responsiveness and direct arrangements, strong group of experts, 24 X 7 constant backings, solid management and specialized or non specialized help over a call by means of helpline numbers. Bitcoin CUSTOMER SERVICE NUMBER Bitcoin is remarkable webmail administration programming that is generally utilized by a great many clients. It blesses without any difficulty and adaptability to its clients and thus Road Runner has picked up notoriety among its rivals whether expert or private. Bitcoin webmail gives high email security by utilizing secure encryption for messages. Security, Confidentiality and Ease of access are the engaged zones that make Road Runner not quite the same as different contenders. An uncommon alternative of "Permit and Block" is given by the webmail on the off chance that you are getting irritated by email from a particular mail id. Bitcoin Customer Care Number New clients may confront challenges in managing not many of its development includes yet once they get the necessary comprehension of executing it essentially to their everyday schedule they will acknowledge how keen work helps in this serious world. KEY FEATURES OF ROAD RUNNER EMAIL: Huge location book: Huge location space is given to store every one of your contacts at one advantageous and secure spot that can be gotten to whenever, anyplace. Primary Email with 5 Sub email accounts: An essential email account with 5 sub email accounts are permitted with discrete capacity limit exclusively. Secure messaging: Bitcoin gives very good quality security to the protected stockpiling of your information alongside the start to finish scrambled security for the sends sent and got. Parental controls: This alternative gives you a simplicity of psyche since utilizing this component you don't need to stress over the children interfering with your stuff No-limit stockpiling: Bitcoin offers huge extra room for each email account. You will have sufficient of extra room that you don't need to stress over the size of your records. Comprehensive spam insurance: Automatic spam security is given to every one of its clients. BEING A HIGHLY SECURED EMAIL Bitcoin SECURITY FEATURES INCLUDE: Complete sweep for infections. Highly created security choices Complete spam control Automatic dispose of for tainted messages Automatic erase for garbage/spam messages Despite of these you can really send the hefty documents in a single mail by taking up the alternative of a paid part. Being a perpetual and paid part at financially savvy and pocket inviting costs lets you remembered from the problem of packing the documents for the sends and trading off with the quality. SETTING UP A Bitcoin EMAIL: Creating a Bitcoin email account is a straightforward and inconvenience free errand. All you need is to choose onto making one and for that its highlights are sufficient that pulls in you towards making an email id for using the favorable circumstances gave by Road Runner Email. Simply follow the couple of steps and you are good to go to exploit site. STEPS TO CREATE RR EMAIL: Go to range net authority page. Click on Create account/Create Username to begin with making another one. Enter the subtleties requested enrollment. Complete the enlistment and confirm the record to sign in to the record. Log in to the record by entering sign in id and secret word. Go to menu and snap on oversee account alternative Select web and snap on make email address choice You will see a brief and will get your email subtleties Click on make letter box and enter the secret key. in the event that you overlooked the secret word of the email you can at present access your record by experiencing a basic methodology for resetting it and you can get to a similar record whose secret word you couldn't recollect. Go to the Spectrum Webmail page. Click on Forgot Password? Select I don't have the foggiest idea about my email secret key. Enter your Email Address. Select the "I'm not a robot" check box, and Submit. Enter your link modem ID (MAC address) Enter the Answer to a security confirmation question. Select Reset Password. Generate another secret phrase. Setting up your record is simple however alongside these settings is a significant point that you have to underscore on. You won't have the option to exploit Road sprinter's administrations if the settings are not accurately done by you. Your programmed settings are unique and on the off chance that you physically set up your settings than you will have the option to oversee everything pleasantly and freely. Bitcoin POP SETTINGS: A steady and solid web association is everything you require to start RR webmail account and enter POP settings: Open the Bitcoin email on your gadget Click on the settings Opt for manual worker settings and snap on the POP settings. Construct the record type as POP or POP3 Modify the approaching worker mail to twc.com Modify the approaching worker port to 110 Mark security type as none for the port Modify the active worker to twc.com Modify the active worker port to 587 Mark the security type as None Enter the Bitcoin email address Enter the secret key Click on the done and you are finished with POP settings Bitcoin IMAP SETTINGS Open the Bitcoin email on your gadget Provide the login accreditations Click on the manual set up choice and un-tick the programmed design SELECT THE IMAP SETTINGS AND MAKE THE CONFIGURATIONS AS FOLLOWS: Mark the record type as IMAP Modify the approaching worker to:twc.com Modify the approaching mail worker port to 143 Mark the security type as SSL/TLS and security type as None Modify the active worker to: twc.com Modify the active port to 587 Modify the security type to none and imprint the unreliable port as none Enter the email id and secret word Deselect the alternative of the safe worker Deselect the choice of the confirmed endorsement After the confirmation by the SMTP worker, you will be made to the following stride Enter the qualifications again Click Next Enter the record name to be shown and you are finished. The benefits of Bitcoin messages are everlasting. You simply need to find out increasingly more about it to get its best utilization. If there should arise an occurrence of any sort of specialized or non specialized issue experienced you can straightforwardly take the help from the client assistance administration to get moving. For what reason to sit around fathoming an experienced issue when you can really get it settled by the specialized help group inside only couple of moments. REASONS FOR ENCOUNTERING ISSUES: Issues with the worker Incorrect login accreditations Inappropriate arrangement of the workers Incorrect IMAP or POP settings Network issues COMMON PROBLEM SOLVING TIPS: on the off chance that you are getting issue in accepting mail that may because of organization issue or settings issue, attempt to change the settings as referenced previously. Inactive records get secured so case you have to choose TWC login email to initiate the record once more. Test mail can be utilized to check the issue of sending sends. Encountered email gives that may be tended to by email setup. FEW ISSUES THAT MIGHT FORCE YOU TO CONTACT CUSTOMER SERVICE: Issues in Signing in or Signing up. Blocked mail account. Issue with sending or accepting email. Road Runner not working. Not ready to dispose of spam. Could not synchronize sub clients with email. Bitcoin email account bolted. Too much time utilization for sending and accepting messages. Issues with respect to the SMTP worker. Errors in singing in your record. Syncing issues with respect to the contact of Bitcoin email. Inbox the board of your Bitcoin email account. Problem in resetting your secret phrase. Road Runner Email administration ensures the issue settling in only couple of moments with the assistance of gifted and experienced client support chiefs. Tending to the clients concerns is the principle intention of Road Runner group. Keeping in the brain that any sort of issue looked in the middle of the work with respect to email is an excessive amount of disappointing and makes the temperament excessively low if not figure everything out on schedule, an accomplished group is only a summon and you will get the issue tended to inside couple of moments and you are simply in the groove again taking focal points of this astonishing help. HOW TO REACH Bitcoin TECHNICAL SUPPORT? You are only a summon from settling your experienced issues and the helpline contact numbers are accessible on the site from where you can connect with the client assistance heads to get moving. Our client support chiefs are accessible 24 X 7 and are only a summon. WHY TO CHOOSE Bitcoin CUSTOMER SUPPORT? Bitcoin client assistance administration group is included very much prepared and expert people with wanted capability and experience under a similar field. All the people are prepared and tested well for delivering the finest customer service to its customers. 24 X 7 non-stop supports. Immediate and straightforward solutions.A sturdy team of professionals. A sturdy team of professionals. Reliable supervision and support. One stop for all issues. Efficient and time saving. User-friendly. How much time is required to get a response? Your call will be connected instantaneously with the customer service executive and they will provide you the finest solutions in minimal time.
submitted by Calm_Eye_2949 to u/Calm_Eye_2949 [link] [comments]

My collection of amazing early Bitcoin comments, right here from Reddit:

On buying (or not) a gaming rig to mine Bitcoin:
With the difficulty skyrocketing and exchange rates sitting stagnant at $5~8 for the last week or so, you pretty much missed the boat to buy dedicated mining hardware, IMHO. If you already have the hardware, or are looking for an excuse to buy a couple bitchin' new graphics cards for a gaming rig, there's definitely money to be made mining when you're not using it.
But I don't think I'd drop $1k into a rig that's only to mine with unless it was $1k I'd blow on something even more retarded. I certainly wouldn't sink next month's rent into it.
https://reddit.com/AskReddit/comments/hnp7f/_/c1wuv1b/?context=1
On easily cashing out Bitcoin using mtgox:
I think getting money is not that difficult. The daily volume on mtgox is over $100K, so I think anyone can currently sell Bitcoins for USD without problems.
https://reddit.com/AskReddit/comments/hnp7f/_/c1wuhjh/?context=1
On it being $10:
Is Bitcoin 10 usd yet?
https://reddit.com/Bitcoin/comments/hpq6c/is_bitcoin_10_usd_yet/
Bonus: Snapshot of the isbitcoin10usdyet website from 2011: https://web.archive.org/web/20110606125320/http://www.isbitcoin10usdyet.com/
Mtgox might disappear:
400K bitcoins is $4M dollars. Given all risks and uncertainties around bitcoins, no wonder some of the early founders exit their investments. Tomorrow mtgox or dwolla may disappear. It is the matter of one government intervention.
https://reddit.com/Bitcoin/comments/hq1wj/_/c1xgesq/?context=1
Bitcoin is terrible at friendly front-end:
This is a dangerous point-of-view. The entire bitcoin ecosystem is ugly, confusing, and deeply unusable. Really think about the questions posed in the article. The client works, as in, it creates a functional front-end for some bitcoin-related tasks, but it isn't at all designed for how humans would want to interact with the currency. The point of the article isn't that the client is hard, it's that the client works pretty well for obsessive nerds (present company included), but if bitcoin is really going to succeed at the goals it sets out to accomplish, it needs to not only be usable by normal people, it needs to be exceptional. If you think it's reasonably usable, you're welcome to that opinion, but please understand that you're the exact sort of person Mr. Falkvinge was referring to. Great with complex logic, terrible at friendly front-end.
https://reddit.com/Bitcoin/comments/hrqpm/_/c1xtfuy/?context=1
On wallets going out of sync:
One thing that I think is lacking is the ability to functionally use wallets on different machines as they will tend to get out of sync. This might be able to be overcome if new addresses were deterministically created from a seed contained in the wallet, but there are probably better ways.
Also, the UI for the official client is kind of a bone.
https://reddit.com/Bitcoin/comments/hrqpm/_/c1y730k/?context=1
On Bitcoin’s ease of use:
In fact, BTC is in such an infant state right now only enthusiasts investors, and geeks who can actually grasp how the system truly works, are using it for real.
The usability issues raised by the article are real. No grandma, or any well respected enterprise for that matter, would accept working with this type of GUI. If anything, a REAL enterprise backend still needs to be developed to handle the BTC's ungly guts, with all transactions details, hashes, mining, wallets, proxy connections, peer discovery via IRC channels... I mean... this is all too RAW for the end user. I can see a near future where startups will begin to offer user friendly GUIs, online access, maybe even online banking for your bitcoin accounts, automated backups and safety mechanisms to protect your coins in case of theft.
All of us geeks will end up supporting the bootstrap of this network so that, later on, your grandma will be able to use this just as she would use a credit card today.
https://reddit.com/Bitcoin/comments/hrqpm/_/c1xungz/?context=1
rBitcoin is not a sub for memes:
This isnt a subreddit for memes. Take it back to pics
https://reddit.com/Bitcoin/comments/i7z0v/_/c21m3ld/?context=1
I think I’ll keep my money elsewhere:
This further reinforces BC's image as nothing more than a Ponzi scheme. When the distribution is skewed that heavily towards early adopters, they will have almost total control over the market. Those 32 could manipulate to their hearts content. I think I'll keep my money elsewhere....
https://reddit.com/Bitcoin/comments/ifl26/_/c23e3ei/?context=1
Tulip mania:
http://en.wikipedia.org/wiki/Tulip_mania
https://www.reddit.com/AskReddit/comments/hnp7f/i_just_invested_half_of_my_next_months_rent_in/c1wuhkt/
submitted by wisequote to btc [link] [comments]

guide to how to restore your privacy huge list

This guide aims to be the most exhaustive resource available for documenting alternatives to Google products.
With growing concerns over online privacy and securing personal data, more people than ever are considering alternatives to Google products.
After all, Google’s business model essentially revolves around data collection and advertisements, both of which infringe on your privacy. More data means better (targeted) ads and more revenue. The company pulled in over $116 billion in ad revenue last year alone – and that number continues to grow.
But the word is getting out. A growing number of people are seeking alternatives to Google products that respect their privacy and data.
So let’s get started.
Note: The lists below are not necessarily in rank order. Choose the best products and services based on your own unique needs.

Google search alternatives

When it comes to privacy, using Google search is not a good idea. When you use their search engine, Google is recording your IP address, search terms, user agent, and often a unique identifier, which is stored in cookies.
Here are ten alternatives to Google search:
  1. Searx – A privacy-friendly and versatile metasearch engine that’s also open source.
  2. MetaGer – An open source metasearch engine with good features, based in Germany.
  3. SwissCows – A zero-tracking private search engine based in Switzerland, hosted on secure Swiss infrastructure.
  4. Qwant – A private search engine based in France.
  5. DuckDuckGo – A private search engine based in the US.
  6. Mojeek – The only true search engine (rather than metasearch engine) that has its own crawler and index (based in the UK).
  7. YaCy – A decentralized, open source, peer-to-peer search engine.
  8. Givero – Based in Denmark, Givero offers more privacy than Google and combines search with charitable donations.
  9. Ecosia – Ecosia is based in Germany and donates a part of revenues to planting trees.
*Note: With the exception of Mojeek, all of the private search engines above are technically metasearch engines, since they source their results from other search engines, such as Bing and Google.
(Startpage is no longer recommended.)

Gmail alternatives

Gmail may be convenient and popular, but there are three major problems:
  1. Your inbox is used as a data collection tool. (Did you know Google is tracking your purchasing history from the receipts in your inbox?)
  2. Rather than seeing just emails, your email inbox is also used for ads and marketing.
  3. The contents of your inbox are being shared with Google and other random third parties.
When you remain logged in to your Gmail account, Google can easily track your activities online as you browse different websites, which may be hosting Google Analytics or Google ads (Adsense).
Here are ten alternatives to Gmail that do well in terms of privacy:
  1. Tutanota – based in Germany; very secure and private; free accounts up to 1 GB
  2. Mailfence – based in Belgium; lots of features; free accounts up to 500 MB
  3. Posteo – based in Germany; €1/mo with 14 day refund window
  4. StartMail – based in Netherlands; $5.00/mo with 7 day free trial
  5. Runbox – based in Norway; lots of storage and features; $1.66/mo with 30 day free trial
  6. Mailbox.org – based in Germany; €1/mo with 30 day free trial
  7. CounterMail – based in Sweden; $4.00/mo with 7 day free trial
  8. Kolab Now – based in Switzerland; €4.41/mo with 30 day money-back guarantee
  9. ProtonMail – based in Switzerland; free accounts up to 500 MB
  10. Thexyz – based in Canada; $1.95/mo with 30 day refund window

Chrome alternatives

Google Chrome is a popular browser, but it’s also a data collection tool – and many people are taking notice. Just a few days ago, the Washington Post asserted that “Google’s web browser has become spy software,” with 11,000 tracker cookies observed in a single week.
Here are seven alternatives for more privacy:
  1. Firefox browser – Firefox is a very customizable, open-source browser that is popular in privacy circles. There are also many different Firefox modifications and tweaks that will give you more privacy and security. (Also check out Firefox Focus, a privacy-focused version for mobile users.)
  2. Iridium – Based on open source Chromium, Iridium offers numerous privacy and security enhancements over Chrome, source code here.
  3. GNU IceCat – A fork of Firefox from the Free Software Foundation.
  4. Tor browser – A hardened and secured version of Firefox that runs on the Tor network by default. (It also does a good job against browser fingerprinting.)
  5. Ungoogled Chromium – Just as the name says, this is an open source version of Chromium that has been “ungoogled” and modified for more privacy.
  6. Brave – Brave is another Chromium-based browser that is rather popular. It blocks trackers and ads by default (except for “approved” ads that are part of the “Brave Ads” network).
  7. Waterfox – This is a fork of Firefox that is configured for more privacy by default, with Mozilla telemetry stripped out of the code.
Of course, there are other alternatives to Chrome, such as Safari (from Apple), Microsoft Internet ExploreEdge, Opera, and Vivaldi – but these also come with some privacy drawbacks.

Google Drive alternatives

If you’re looking for a secure cloud storage option, you can check out these Google Drive alternatives:
  1. Tresorit – A user-friendly cloud storage option based in Switzerland.
  2. ownCloud – An open source and self-hosted cloud platform developed in Germany.
  3. Nextcloud – Nextcloud is also an open source, self-hosted file sharing and collaboration platform, based in Germany.
  4. Sync – Based in Canada, Sync offers a secure, encrypted cloud storage solution for businesses and individuals.
  5. Syncthing – Here we have a decentralized, open source, peer-to-peer cloud storage platform.
Of course, Dropbox is another popular Google drive alternative, but it’s not the best in terms of privacy.

Google Calendar alternative

Here are some Google Calendar alternatives:
  1. Lightning Calendar is an open source calendar option developed by Mozilla, and it’s compatible with Thunderbird and Seamonkey.
  2. Etar, an open source, basic calendar option.
  3. Fruux, an open source calendar with good features and support for many operating systems.
For those wanting a combined solution for both email and calendar functionality, these providers offer that:

Google Docs / Sheets / Slides alternative

There are many solid Google Docs alternatives available. The largest offline document editing suite is, of course, Microsoft Office. As most people know, however, Microsoft is not the best company for privacy. Nonetheless, there are a few other good Google Docs alternatives:
  1. CryptPad – CryptPad is a privacy-focused alternative with strong encryption, and it’s free.
  2. Etherpad – A self-hosted collaborative online editor that’s also open source.
  3. Mailfence Documents – From the Mailfence team, this is a secure file sharing, storage, and collaboration tool.
  4. Zoho Docs – This is another good Google Docs alternative with a clean interface and good functionality, although it may not be the best for privacy.
  5. OnlyOffice – OnlyOffice feels a bit more restricted than some of the other options in terms of features.
  6. Cryptee – This is a privacy-focused platform for photo and document storage and editing. It’s open source and based in Estonia.
  7. LibreOffice (offline) – You can use LibreOffice which is free and open source.
  8. Apache OpenOffice (offline) – Another good open source office suite.

Google Photos alternative

Here are a few good Google Photos alternatives:
Shoebox was another alternative, but it closed operations in June 2019.

YouTube alternatives

Unfortunately, YouTube alternatives can really be hit or miss, with most struggling to gain popularity.
  1. Peertube
  2. DTube
  3. Bitchute
  4. invidio.us
  5. Vimeo
  6. Bit.tube
  7. Dailymotion
  8. Hooktube
Tip: Invidio.us is a great Youtube proxy that allows you to watch any Youtube video without logging in, even if the video is somehow restricted. To do this, simply replace [www.youtube.com] with [invidio.us] in the URL you want to view.

Google translate alternative

Here are a few Google translate alternatives I have come across:
  1. DeepL – DeepL is a solid Google Translate alternative that seems to give great results. Like Google Translate, DeepL allows you to post up to 5,000 characters at a time (but the pro version is unlimited). The user interface is good and there is also a built-in dictionary feature.
  2. Linguee – Linguee does not allow you to post large blocks of text like DeepL. However, Linguee will give you very accurate translations for single words or phrases, along with context examples.
  3. dict.cc – This Google Translate alternative seems to do a decent job on single-world lookups, but it also feels a bit outdated.
  4. Swisscows Translate – A good translation service supporting many languages.
If you want to translate blocks of text, check out DeepL. If you want in-depth translations for single words or phrases, then Linguee is a good choice.

Google analytics alternative

For website admins, there are many reasons to use an alternative to Google analytics. Aside from privacy concerns, there are also faster and more user-friendly alternatives that also respect your visitors’ privacy.
  1. Clicky is a great alternative to Google Analytics that truncates and anonymizes visitor IP addresses by default. It is lightweight, user-friendly, and fully compliant with GDPR regulations, while also being certified by Privacy Shield.
  2. Matomo (formerly Piwik) is an open-source analytics platform that respects the privacy of visitors by anonymizing and truncating visitor IP addresses (if enabled by the website admin). It is also certified to respect user privacy.
  3. Fathom Analytics is an open source alternative to Google Analytics that’s available on Github here. It’s minimal, fast, and lightweight.
  4. Get Insights – Another privacy-focused analytics platform, with a full analytics suite. The front-end client is open source and available here.
  5. AT Internet is a France-based analytics provider that is fully GDPR compliant, with all data stored on French servers, and a good track record going back to 1996.
Many websites host Google Analytics because they run Google Adsense campaigns. Without Google Analytics, tracking performance of these campaigns would be difficult. Nonetheless, there are still better options for privacy.

Google Maps alternative

A map alternative for PCs is OpenStreetMap.
A few Google Maps alternatives for mobile devices include:
  1. OsmAnd is a free and open-source mobile maps app for both Android and iOS (based on OpenStreetMap data).
  2. Maps (F Droid) uses OpenStreetMap data (offline).
  3. Maps.Me is another option that is free on both Android and iOS, but there is a fair amount of data collection with this alternative, as explained in their privacy policy.
  4. MapHub is also based on OpenStreeMap data and it does not collect locations or user IP addresses.
Note: Waze is not an “alternative” as it is now owned by Google.

Google Play Store alternative

Currently the best Google Play Store alternative is to use F-Droid and then go through the Yalp store. As explained on the official site, F-Droid is an installable catalog of FOSS (Free and Open Source Software) applications for the Android platform.
After you have installed F-Droid, you can then download the Yalp store APK, which allows you to download apps from the Google Play Store directly as APK files.
📷The Yalp Store is a good alternative to the Google Play Store.
See the F-Droid website or the official GitHub page for more info. Other alternatives to the Google Play Store include:

Google Chrome OS alternative

Want to ditch the Chromebook and Chrome OS? Here are a few alternatives:
  1. Linux – Of course, Linux is arguably the best alternative, being a free, open-source operating system with lots of different flavors. With some adjustments, Linux Ubuntu can be run on Chromebooks.
  2. Tails – Tails is a free, privacy-focused operating system based on Linux that routes all traffic through the Tor network.
  3. QubesOS – Recommended by Snowden, free, and also open source.
Of course, the other two big operating system alternatives are Windows and Apple’s operating system for MacBooks – Mac OS. Windows, particularly Windows 10, is a very bad option for privacy. While slightly better, Apple also collects user data and has partnered with the NSA) for surveillance.

Android alternatives

The biggest alternative to Android is iOS from Apple. But we’ll skip over that for reasons already mentioned. Here are a few Android OS alternatives:
  1. LineageOS – A free and open-source operating system for phones and tablets based on Android.
  2. Ubuntu Touch – A mobile version of the Ubuntu operating system.
  3. Plasma Mobile – An open source, Linux-based operating system with active development.
  4. Sailfish OS – Another open source, Linux-based mobile OS.
  5. Replicant – A fully free Android distribution with an emphasis on freedom, privacy, and security.
  6. /e/ – This is another open source project with a focus on privacy and security.
Purism is also working on a privacy-focused mobile phone called the Librem 5. It is in production, but not yet available (estimated Q3 2019).

Google Hangouts alternatives

Here are some alternatives to Google Hangouts:
  1. Wire – A great all-around secure messenger, video, and chat app, but somewhat limited on the number of people who can chat together in a group conversation via voice or video.
  2. Signal – A good secure messenger platform from Open Whisper Systems.
  3. Telegram – A longtime secure messenger app, formerly based in Russia, now in Dubai.
  4. Riot – A privacy-focused encrypted chat service that is also open source.

Google Domains alternative

Google Domains is a domain registration service. Here are a few alternatives:
  1. Namecheap – I like Namecheap because all domain purchases now come with free WhoisGuard protection for life, which protects your contact information from third parties. Namecheap also accepts Bitcoin and offers domain registration, hosting, email, SSL certs, and a variety of other products.
  2. Njalla – Njalla is a privacy-focused domain registration service based in Nevis. They offer hosting options, too, and also accept cryptocurrency payments.
  3. OrangeWebsite – OrangeWebsite offers anonymous domain registration services and also accepts cryptocurrency payments, based in Iceland.

Other Google alternatives

Here more alternatives for various Google products:
Google forms alternativeJotForm is a free online form builder.
Google Keep alternative – Below are a few different Google Keep alternatives:
Google Fonts alternative – Many websites load Google fonts through Google APIs, but that’s not necessary. One alternative to this is to use Font Squirrel, which has a large selection of both Google and non-Google fonts which are free to download and use.
Google Voice alternativeJMP.chat (both free and paid)
G Suite alternativeZoho is probably the best option
Google Firebase alternativeKuzzle (free and open source)
Google Blogger alternativesWordPress, Medium, and Ghost are all good options.
submitted by giganticcobra to privacytoolsIO [link] [comments]

PDQ Deploy packs v71.0.0 (2020-06-12)

Background

This is v71.0.0 (v70.0.0, v69.0.0, etc...) of our PDQ installers and includes all installers from the previous package with old versions removed.
All packages:
  1. ...install silently and don't place desktop or quicklaunch shortcuts
  2. ...disable all auto-update, nag popup and stat-collection/telemetry "features" possible
  3. ...work with the free or paid version of PDQ Deploy but do not require it - each package can run standalone (e.g. from a thumb drive) or pushed with SCCM/GPO/etc if desired. PM me if you need assistance setting something like that up

Download

Primary:
Download the torrent.
Secondary: Download the self-extracting archive from one of the repos:
Mirror HTTPS HTTP Location Host
Official link link US-NY SGC-Hosting
#1 link link FR mxmod
Tertiary:
Plug one of these keys into Resilio Sync (formerly called "BT Sync") to pull down that repository:
- BTRSRPF7Y3VWFRBG64VUDGP7WIIVNTR4Q (Installer Packages, ~2.25 GB) - BMHHALGV7WLNSAPIPYDP5DU3NDNSM5XNC (WSUS Offline updates, ~12.00 GB) 
Make sure the settings for your Sync folder look like this (or this if you're on v1.3.x). Specifically you need to enable DHT.
Quaternary: (source code)
The Github page contains all scripts and wrapper files used in the pack. Check it out if you want to see the code without downloading the full binary pack, or just steal them for your own use. Note that downloading from Github directly won't work - you need either this provided pack or go manually fetch all the binaries yourself in order to just plug them in and start working.

Pack list

Installers:
(Updates in bold. All installers are 64-bit unless otherwise marked)
  • 7-Zip v19.00
  • 7-Zip v19.00 (x86)
  • Adobe Acrobat Reader DC v20.009.20063
  • Adobe AIR v32.0.0.125
  • Adobe Flash Player v32.0.0.387 (Chrome)
  • Adobe Flash Player v32.0.0.387 (Firefox)
  • Adobe Flash Player v32.0.0.387 (IE / ActiveX)
  • Apple iTunes v12.5.1.21
  • CDBurnerXP v4.5.8.7128
  • FileZilla Client v3.48.1
  • Gimp v2.10.20 (x86)
  • Google Chrome Enterprise v83.0.4103.97
  • Google Chrome Enterprise v83.0.4103.97 (x86)
  • Google Earth Pro v7.3.3
  • Java Development Kit 8 Update 241
  • Java Development Kit 8 Update 241 (x86)
  • Java Development Kit 11.0.7
  • Java Runtime 8 update 241
  • Java Runtime 8 update 241 (x86)
  • Java Runtime 10.0.2
  • KTS KypM Telnet/SSH Server v1.19c (x86)
  • LibreOffice v6.4.4
  • Microsoft .NET Framework v3.5.1 SP1 (x86)
  • Microsoft Silverlight v5.1.50918.0
  • Mozilla Firefox v77.0.1
  • Mozilla Firefox v77.0.1 (x86)
  • Mozilla Firefox ESR v68.9.0
  • Mozilla Firefox ESR v68.9.0 (x86)
  • Mozilla Thunderbird v68.9.0 (x86) (customized; read notes)
  • Notepad++ v7.8.7 (x86)
  • Pale Moon v28.10.0
  • Pale Moon v28.10.0 (x86)
  • Spark v2.8.3 (x86)
  • TightVNC v2.8.27
  • TightVNC v2.8.27 (x86)
  • UltraVNC v1.2.4.0 (x86)
  • VLC media player v3.0.10 -- ! NOTE: Switched to x64 only (dropped x86 package)
  • WinSCP v5.17.6 (x86)
Utilities:
  • Clean Up ALL Printers (purge all printers from target)
  • Clean Up Orphaned Printers (remove non-existent printers from the spooler)
  • Empty All Recycle Bins (force recycle bin to empty for every user on target)
  • Enable Remote Desktop (enables Remote Desktop on the target machine)
  • Install PKI Certificates
  • Reboot (force target reboot in 15 seconds)
  • Remove Adobe Flash Player (removes all versions)
  • Remove Java Runtime (removes JRE versions 3-11 using all means necessary)
  • Remove Microsoft Silverlight (removes all versions of Silverlight)
  • Temp File Cleanup
  • USB Device Cleanup. Uninstalls non-present USB hubs, USB storage devices and their storage volumes, Disks, CD-ROM's, Floppies, WPD devices and deletes their registry items. Devices will re-initialize at next connection

Instructions

  1. Import all .XML files from the \job files directory into PDQ deploy (it should look roughly like this after you've imported them).
  2. Copy all files from the \repository directory to wherever your repository is.
  3. All jobs reference PDQ's $(Repository) variable, so make sure it's set in preferences.

Package Notes

  1. Read the notes in the PDQ interface for each package, they explain exactly what that installer does. Basically, most packages use a .bat file to accomplish multi-step installs with the free version of PDQ. You can edit the batch files to see what they do; most just delete "All Users" desktop shortcuts and things like that. changelog-v##-updated-.txt has version and release history in addition to random notes where I complain about things like Reader DC and how much of a pain it is to build packages for.
  2. Thunderbird:
    • Thunderbird is configured to use a global config file stored on a network share. This allows for settings changes en masse. By default it's set to check for config updates every 120 minutes.
    • You can change the config location, update frequency, OR disable this behavior entirely by editing thunderbird-custom-settings.js.
    • A copy of the config file is in the Thunderbird directory and is called thunderbird-global-settings.js
    • If you don't want any customizations, just edit Thunderbird's .bat file and comment out or delete all the lines mentioning the custom config files.
  3. Microsoft Offline Updates - built using the excellent WSUS Offline tool. Please donate to them if you can, their team does excellent work.

Integrity

In the folder \integrity verification the file checksums.txt is signed with my PGP key (0x07d1490f82a211a2, pubkey included). You can use this to verify package integrity.
If you find a bug or glitch, PM me or post it here. Advice and comments are welcome and appreciated.

Donations

These packs will always be free and open-source. If you feel like giving away your hard-earned cash to random strangers on the internet you may do so here:
Patreon
Bitcoin: 1Bfxpo1WqTGwRXZKrwYZV2zvJ4ggyj9GE1
Monero (preferred):
46ZUK4VDLLz3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6CFAnPSo
"Do not withhold good from those to whom it is due, when it is in your power to act."
submitted by vocatus to sysadmin [link] [comments]

PDQ Deploy packs v71.0.0 (2020-06-12)

Background

This is v71.0.0 (v70.0.0, v69.0.0, etc...) of our PDQ installers and includes all installers from the previous package with old versions removed.
All packages:
  1. ...install silently and don't place desktop or quicklaunch shortcuts
  2. ...disable all auto-update, nag popup and stat-collection/telemetry "features" possible
  3. ...work with the free or paid version of PDQ Deploy but do not require it - each package can run standalone (e.g. from a thumb drive) or pushed with SCCM/GPO/etc if desired. PM me if you need assistance setting something like that up

Download

Primary:
Download the torrent.
Secondary: Download the self-extracting archive from one of the repos:
Mirror HTTPS HTTP Location Host
Official link link US-NY SGC-Hosting
#1 link link FR mxmod
Tertiary:
Plug one of these keys into Resilio Sync (formerly called "BT Sync") to pull down that repository:
- BTRSRPF7Y3VWFRBG64VUDGP7WIIVNTR4Q (Installer Packages, ~2.25 GB) - BMHHALGV7WLNSAPIPYDP5DU3NDNSM5XNC (WSUS Offline updates, ~12.00 GB) 
Make sure the settings for your Sync folder look like this (or this if you're on v1.3.x). Specifically you need to enable DHT.
Quaternary: (source code)
The Github page contains all scripts and wrapper files used in the pack. Check it out if you want to see the code without downloading the full binary pack, or just steal them for your own use. Note that downloading from Github directly won't work - you need either this provided pack or go manually fetch all the binaries yourself in order to just plug them in and start working.

Pack list

Installers:
(Updates in bold. All installers are 64-bit unless otherwise marked)
  • 7-Zip v19.00
  • 7-Zip v19.00 (x86)
  • Adobe Acrobat Reader DC v20.009.20063
  • Adobe AIR v32.0.0.125
  • Adobe Flash Player v32.0.0.387 (Chrome)
  • Adobe Flash Player v32.0.0.387 (Firefox)
  • Adobe Flash Player v32.0.0.387 (IE / ActiveX)
  • Apple iTunes v12.5.1.21
  • CDBurnerXP v4.5.8.7128
  • FileZilla Client v3.48.1
  • Gimp v2.10.20 (x86)
  • Google Chrome Enterprise v83.0.4103.97
  • Google Chrome Enterprise v83.0.4103.97 (x86)
  • Google Earth Pro v7.3.3
  • Java Development Kit 8 Update 241
  • Java Development Kit 8 Update 241 (x86)
  • Java Development Kit 11.0.7
  • Java Runtime 8 update 241
  • Java Runtime 8 update 241 (x86)
  • Java Runtime 10.0.2
  • KTS KypM Telnet/SSH Server v1.19c (x86)
  • LibreOffice v6.4.4
  • Microsoft .NET Framework v3.5.1 SP1 (x86)
  • Microsoft Silverlight v5.1.50918.0
  • Mozilla Firefox v77.0.1
  • Mozilla Firefox v77.0.1 (x86)
  • Mozilla Firefox ESR v68.9.0
  • Mozilla Firefox ESR v68.9.0 (x86)
  • Mozilla Thunderbird v68.9.0 (x86) (customized; read notes)
  • Notepad++ v7.8.7 (x86)
  • Pale Moon v28.10.0
  • Pale Moon v28.10.0 (x86)
  • Spark v2.8.3 (x86)
  • TightVNC v2.8.27
  • TightVNC v2.8.27 (x86)
  • UltraVNC v1.2.4.0 (x86)
  • VLC media player v3.0.10 -- ! NOTE: Switched to x64 only (dropped x86 package)
  • WinSCP v5.17.6 (x86)
Utilities:
  • Clean Up ALL Printers (purge all printers from target)
  • Clean Up Orphaned Printers (remove non-existent printers from the spooler)
  • Empty All Recycle Bins (force all recycle bins to empty on target)
  • Enable Remote Desktop
  • Install PKI Certificates
  • Reboot (force target reboot in 15 seconds)
  • Remove Adobe Flash Player (removes all versions)
  • Remove Java Runtime (removes JRE versions 3-11 using all means necessary)
  • Remove Microsoft Silverlight (removes all versions of Silverlight)
  • Temp File Cleanup
  • USB Device Cleanup. Uninstalls non-present USB hubs, USB storage devices and their storage volumes, Disks, CD-ROM's, Floppies, WPD devices and deletes their registry items. Devices will re-initialize at next connection

Instructions

  1. Import all .XML files from the \job files directory into PDQ deploy (it should look roughly like this after you've imported them).
  2. Copy all files from the \repository directory to wherever your repository is.
  3. All jobs reference PDQ's $(Repository) variable, so make sure it's set in preferences.

Package Notes

  1. Read the notes in the PDQ interface for each package, they explain exactly what that installer does. Basically, most packages use a .bat file to accomplish multi-step installs with the free version of PDQ. You can edit the batch files to see what they do; most just delete "All Users" desktop shortcuts and things like that. changelog-v##-updated-.txt has version and release history in addition to random notes where I complain about things like Reader DC and how much of a pain it is to build packages for.
  2. Thunderbird:
    • Thunderbird is configured to use a global config file stored on a network share. This allows for settings changes en masse. By default it's set to check for config updates every 120 minutes.
    • You can change the config location, update frequency, OR disable this behavior entirely by editing thunderbird-custom-settings.js.
    • A copy of the config file is in the Thunderbird directory and is called thunderbird-global-settings.js
    • If you don't want any customizations, just edit Thunderbird's .bat file and comment out or delete all the lines mentioning the custom config files.
  3. Microsoft Offline Updates - built using the excellent WSUS Offline tool. Please donate to them if you can, their team does excellent work.

Integrity

In the folder \integrity verification the file checksums.txt is signed with my PGP key (0x07d1490f82a211a2, pubkey included). You can use this to verify package integrity.
If you find a bug or glitch, PM me or post it here. Advice and comments are welcome and appreciated.

Donations

These packs will always be free and open-source. If you feel like giving away your hard-earned cash to random strangers on the internet you may do so here:
Patreon
Bitcoin: 1Bfxpo1WqTGwRXZKrwYZV2zvJ4ggyj9GE1
Monero (preferred):
46ZUK4VDLLz3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6CFAnPSo
"Do not withhold good from those to whom it is due, when it is in your power to act."
submitted by vocatus to pdq [link] [comments]

TKEYSPACE — blockchain in your mobile

TKEYSPACE — blockchain in your mobile

https://preview.redd.it/w8o3bcvjrtx41.png?width=1400&format=png&auto=webp&s=840ac3872156215b30e708920edbef4583190654
Someone says that the blockchain in the phone is marketing. This is possible for most applications, but not for Tkeycoin. Today we will talk about how the blockchain works in the TkeySpace app.
Who else is not in the topic, TkeySpace is a financial application for decentralized and efficient management of various cryptocurrencies, based on a distributed architecture without using a client-server.
In simple words, it is a blockchain in the user’s mobile device that excludes hacking and hacker attacks, and all data is encrypted using modern cryptographic methods.
https://preview.redd.it/8uku6thlrtx41.png?width=1280&format=png&auto=webp&s=e1a610244da53100a5bc6b821ee5c799c6493ac4

Blockchain

Let’s start with the most important thing — the blockchain works on the principles of P2P networks, when there is no central server and each device is both a server and a client, such an organization allows you to maintain the network performance with any number and any combination of available nodes.
For example, there are 12 machines in the network, and anyone can contact anyone. As a client (resource consumer), each of these machines can send requests for the provision of some resources to other machines within this network and receive them. As a server, each machine must process requests from other machines in the network, send what was requested, and perform some auxiliary and administrative functions.
With traditional client-server systems, we can get a completely disabled social network, messenger, or another service, given that we rely on a centralized infrastructure — we have a very specific number of points of failure. If the main data center is damaged due to an earthquake or any other event, access to information will be slowed down or completely disabled.
With a P2P solution, the failure of one network member does not affect the network operation in any way. P2P networks can easily switch to offline mode when the channel is broken — in which it will exist completely independently and without any interaction.
Instead of storing information in a single central point, as traditional recording methods do, multiple copies of the same data are stored in different locations and on different devices on the network, such as computers or mobile devices.

https://i.redd.it/2c4sv7rnrtx41.gif
This means that even if one storage point is damaged or lost, multiple copies remain secure in other locations. Similarly, if one part of the information is changed without the consent of the rightful owners, there are many other copies where the information is correct, which makes the false record invalid.
The information recorded in the blockchain can take any form, whether it is a transfer of money, ownership, transaction, someone’s identity, an agreement between two parties, or even how much electricity a light bulb used.
However, this requires confirmation from multiple devices, such as nodes in the network. Once an agreement, otherwise known as consensus, is reached between these devices to store something on the blockchain — it can’t be challenged, deleted, or changed.
The technology also allows you to perform a truly huge amount of computing in a relatively short time, which even on supercomputers would require, depending on the complexity of the task, many years or even centuries of work. This performance is achieved because a certain global task is divided into a large number of blocks, which are simultaneously performed by hundreds of thousands of devices participating in the project.

P2P messaging and syncing in TkeySpace

TkeySpace is a node of the TKEY network and other supported networks. when you launch the app, your mobile node connects to an extensive network of supported blockchains, syncs with full nodes to validate transactions and incoming information between nodes, so the nodes organize a graph of connections between them.
You can always check the node information in the TkeySpace app in the ⚙ Settings Contact and peer info App Status;

https://preview.redd.it/co1k25kqrtx41.png?width=619&format=png&auto=webp&s=e443a436b11d797b475b00a467cd9609cac66b83
TkeySpace creates initiating connections to servers registered in the blockchain Protocol as the main ones, from these servers it gets the addresses of nodes to which it can join, in turn, the nodes to which the connection occurred share information about other nodes.

https://i.redd.it/m21pw88srtx41.gif
TkeySpace sends network messages to nodes from supported blockchains in the app to get up-to-date data from the network.
The Protocol uses data structures for communication between nodes, such as block propagation over the network, so before network messages are read, nodes check the “magic number”, check the first bytes, and determine the type of data structure. In the blockchain, the “magic number” is the network ID used to filter messages and block traffic from other p2p networks.
Magic numbers are used in computer science, both for files and protocols. They identify the type of file/data structure. A program that receives such a file/data structure can check the magic number and immediately find out the intended type of this file/data structure.
The first message that your node sends is called a Version Message. In response, the node waits for a Verack message to establish a connection between other peers. The exchange of such messages is called a “handshake”.

https://preview.redd.it/b6gh0hitrtx41.png?width=785&format=png&auto=webp&s=0101eaec6469fb53818486fa13da110f6a4a851d
After the “handshake” is set, TkeySpace will start connecting to other nodes in the network to determine the last block at the end of the required blockchain. At this point — nodes request information about blocks they know using GetBlock messages — in response, your node receives an inv (Inventory Message) from another node with the information that it has the information that was requested by the TkeySpace node.
In response to the received message, inv — TkeySpace sends a GetData message containing a list of blocks starting immediately after the last known hash.

https://preview.redd.it/lare5lsurtx41.png?width=768&format=png&auto=webp&s=da8d27110f406f715292b439051ca221fab47f77

Loading and storing blocks

After exchanging messages, the block information is loaded and transactions are uploaded to your node. To avoid storing tons of information and optimize hard disk space and data processing speed, we use RDBMS — PostgreSQL in full nodes (local computer wallet).
In the TkeySpace mobile app, we use SQLite, and validation takes place by uploading block headers through the Merkle Tree, using the bloom filter — this allows you to optimize the storage of your mobile device as much as possible.
The block header includes its hash, the hash of the previous block, transaction hashes, and additional service information.
Block headers in the Tkeycoin network=84 bytes due to the extension of parameters to support nChains, which will soon be launched in “combat” mode. The titles of the Bitcoin block, Dash, Litecoin=80 bytes.

https://preview.redd.it/uvv3qz7wrtx41.png?width=1230&format=png&auto=webp&s=5cf0cd8b6d099268f3d941aac322af05e781193c
And so, let’s continue — application nodes receive information from the blockchain by uploading block headers, all data is synchronized using the Merkle Tree, or rather your node receives and validates information from the Merkle root.
The hash tree was developed in 1979 by Ralph Merkle and named in his honor. The structure of the system has received this name also because it resembles a tree.
The Merkle tree is a complete binary tree with leaf vertexes containing hashes from data blocks, and inner vertexes containing hashes from adding values in child vertexes. The root node of the tree contains a hash from the entire data set, meaning the hash tree is a unidirectional hash function. The Merkle tree is used for the efficient storage of transactions in the cryptocurrency blockchain. It allows you to get a “fingerprint” of all transactions in the block, as well as effectively verify transactions.

https://preview.redd.it/3hmbthpxrtx41.png?width=677&format=png&auto=webp&s=cca3d54c585747e0431c6c4de6eec7ff7e3b2f4d
Hash trees have an advantage over hash chains or hash functions. When using hash trees, it is much less expensive to prove that a certain block of data belongs to a set. Since different blocks are often independent data, such as transactions or parts of files, we are interested in being able to check only one block without recalculating the hashes for the other nodes in the tree.
https://i.redd.it/f7o3dh7zrtx41.gif
The Merkle Tree scheme allows you to check whether the hash value of a particular transaction is included in Merkle Root, without having all the other transactions in the block. So by having the transaction, block header, and Merkle Branch for that transaction requested from the full node, the digital wallet can make sure that the transaction was confirmed in a specific block.

https://i.redd.it/88sz13w0stx41.gif
The Merkle tree, which is used to prove that a transaction is included in a block, is also very well scaled. Because each new “layer” added to the tree doubles the total number of “leaves” it can represent. You don’t need a deep tree to compactly prove transaction inclusion, even among blocks with millions of transactions.

Statistical constants and nChains

To support the Tkeycoin cryptocurrency, the TkeySpace application uses additional statistical constants to prevent serialization of Merkle tree hashes, which provides an additional layer of security.
Also, for Tkeycoin, support for multi-chains (nChains) is already included in the TkeySpace app, which will allow you to use the app in the future with most of the features of the TKEY Protocol, including instant transactions.

The Bloom Filter

An additional level of privacy is provided by the bloom filter — which is a probabilistic data structure that allows you to check whether an element belongs to a set.

https://preview.redd.it/7ejkvi82stx41.png?width=374&format=png&auto=webp&s=ed75cd056949fc3a2bcf48b4d7ea78d3dc6d81f3
The bloom filter looks for whether a particular transaction is linked to Alice, not whether Alice has a specific cryptocurrency. In this way, transactions and received IDs are analyzed through a bloom filter. When “Alice wants to know about transaction X”, an ID is requested for transaction X, which is compared with the filled segments in her bloom filter. If “Yes” is received, the node can get the information and verify the transaction.

https://preview.redd.it/gjpsbss3stx41.png?width=1093&format=png&auto=webp&s=4cdcbc827849d13b7d6f0b7e7ba52e65ddc03a82

HD support

The multi-currency wallet TkeySpace is based on HD (or hierarchical determinism), a privacy-oriented method for generating and managing addresses. Each wallet address is generated from an xPub wallet (or extended public key). The app is completely anonymous — and individual address is generated for each transaction to accept a particular cryptocurrency. Even for low-level programming, using the same address is negative for the system, not to mention your privacy. We recommend that you always use a new address for transactions to ensure the necessary level of privacy and security.
The EXT_PUBLIC_KEY and EXT_SECRET_KEY values for DASH, Bitcoin, and Litecoin are completely identical. Tkeycoin uses its values, as well as other methods for storing transactions and blocks (RDBMS), and of course — nChains.

Secret key

Wallets in the blockchain have public and private keys.
https://preview.redd.it/br9kk8n5stx41.png?width=840&format=png&auto=webp&s=a36e4c619451735469a9cff57654d322467e4fba
Centralized applications usually store users’ private keys on their servers, which makes users’ funds vulnerable to hacker attacks or theft.
A private key is a special combination of characters that provides access to cryptocurrencies stored on the account. Only a person who knows the key can move and spend digital assets.
TkeySpace — stores the encrypted key only on the user’s device and in encrypted form. The encrypted key is displayed as a mnemonic phrase (backup phrase), which is very convenient for users. Unlike complex cryptographic ciphers, the phrase is easy to save or write. A backup keyword provides the maximum level of security.
A mnemonic phrase is 12 or 24 words that are generated using random number entropy. If a phrase consists of 12 words, then the number of possible combinations is 204⁸¹² or 21¹³² — the phrase will have 132 security bits. To restore the wallet, you must enter the mnemonic phrase in strict order, as it was presented after generation.

Result

Now we understand that your application TkeySpace is a node of the blockchain that communicates with other nodes using p2p messages, stores block headers and validate information using the Merkle Tree, verifies transactions, filters information using the bloom filter, and operates completely in a decentralized model. The application code contains all the necessary blockchain settings for communicating with the network, the so-called chain parameters.
TkeySpace is a new generation mobile app. A completely new level of security, easy user-friendly interfaces and all the necessary features that are required to work with cryptocurrency.
submitted by tkeycoin to Tkeycoin_Official [link] [comments]

How to fix Clash Royale: Client and server are out of sync! Easier way! 10 Types Of Women To Avoid & Not Marry! - YouTube Customer IMMEDIATELY Regrets Complaining To Ramsay  Hell ... How to use eM Client - YouTube Clash of Clans -

Bitcoin Core initial synchronization will take time and download a lot of data. You should make sure that you have enough bandwidth and storage for the full block chain size (over 350GB). If you have a good Internet connection, you can help strengthen the network by keeping your PC running with Bitcoin Core and port 8333 open. In the figure, this occurs in Bitcoin block 4. The link-out transaction must be part of the loken chain (it must consume the loken, and create a new loken). After the link-out transaction is included in a Bitcoin block 4, block 4 should be referenced by the checkpoint of an RSK block (or skipped by a checkpoint, which causes the same effect). The client contains hard coded IP addresses that represent bitcoin nodes. These addresses are only used as a last resort, if no other method has produced any addresses at all. When the loop in the connection handling thread ThreadOpenConnections2() sees an empty address map, it uses the "seed" IP addresses as backup. BitcoinSPV. BitcoinSPV is a native Bitcoin SPV (Simplified Payment Verification) client library for iOS written in Objective-C.It conveniently supports Bloom filters and hierarchical deterministic wallets ().BitcoinSPV is still experimental and you DO NOT want to use it in production environments today.. Structure. The library is thorough and features a moderately high granularity to isolate ... Digital money that’s instant, private, and free from bank fees. Download our official wallet app and start using Bitcoin today. Read news, start mining, and buy BTC or BCH.

[index] [33486] [11311] [17290] [18445] [32099] [28943] [29888] [15014] [34470] [19429]

How to fix Clash Royale: Client and server are out of sync! Easier way!

That was rough. NEW!! Get your official Hell’s Kitchen t-shirts and more at the **OFFICIAL HELLS KITCHEN STORE** , please click here to visit: http://amazon.... A short tutorial on how to fix the Clash of Clans "Client and Server are out of Sync" error message. Leave a comment if you have any questions. How to FIX Client and Server out of sync use GG - Duration: 2:06. IKMA TANBU YOGYAKARTA 250,278 views. 2:06. STRANGEST VILLAGES - BANNED in Clash of Clans! - Duration: 15:31. To be clear TIP #10 is meant for the woman who calls herself a feminist but is a feminazi. I believe the right feminist woman does see men with compassion bu... eM Client is a powerful email client with a lot of additional tools and features eM Client2 is developed by eM Client .Inc. Read the full review of eM Client...

#