Page 4,250«..1020..4,2494,2504,2514,252..4,2604,270..»

China and Japan Are Largely Responsible for the Current Success of Cryptocurrency – Futurism

In BriefThe adoption of digital currencies on both the individual andinstitutional level in China and Japan is propellingcryptocurrencies to ever greater heights. However, some are stillskeptical that they are the finance systems of the future due totheir current volatility. China and Japans Crypto Craze

The age of cryptocurrencies is upon us, and two countries in particular have been instrumental in their stratospheric rise: China and Japan.

Cryptocurrencies have become popular in China due to the governments stringent control of the yuan a power they occasionally exercise by artificially devaluing the currency for trading purposes. With private wealth in China growing, affluent individuals have found a more stable and accessible alternative to the yuan in cryptocurrencies.

Additionally, China has an abundance of cheap energy and hardware, which facilitates crypto mining (the process throughwhich new blocks in the blockchain are created and transactions are verified). Chinese exchanges runmining poolsto generate these blocks, and these efforts constitute 60 percent of Bitcoins total hashrate (the speed at which Bitcoin operations are completed).

Japan got its foot in the cryptocurrency door at the beginning of 2017 when the market in China experienced an institutional and systematic crackdown, with the most potent measure being a ban on all cryptocurrency withdrawals. This caused an increase in Japans trading volume, which grew from one percent to as high as six percent.

Cryptocurrency adoption was further amplified by currency turbulence in the country. Quantitive easing lead to extremely low interest rates, which have occasionally even become negative, meaning that it costs an individual to save money. As in China, cryptocurrencies therefore became viewed as a more stable asset than the native currency, so morepeople have chosen to invest and store their money in them.

The final piece in the cryptocurrency success puzzle for both countries is increasing institutional acceptance. In China, this takes the form of the countrys Royal Mint, which has invested resources and money into digitizing the yuan and promoting blockchain technology. Japan, meanwhile, began accepting payments in stores using cryptocurrencies earlier this year, and its three largest banks MUFJ, Mizuho, and SMBC have all backed the countrys largest Bitcoin exchange, bitFlyer.

The enthusiasm with which China and Japan have embraced cryptocurrency systems has contributed totheir worldwide success. Virtual currencies have become more popular and valuable than the vast majority of people could have anticipated upontheir inception around a decade ago. The value of a single bitcoin has risen from roughly $0.00075 to $2,500, and the market cap for all cryptocurrencies has exceed $100 billion.

The success of cryptocurrencies is also reflected in their increasing adoption by formal institutions. Wall Street is making moves to start using cryptocurrency systems by next year, a Swiss town called Zug has begun to accept payments in bitcoins, and the Gemini Trust in New York has been licensed to trade ether.

However, some worrying news concerning cryptocurrencies has emerged as well. Recently, in spite of claims that the systems are highly secure, hacks have lead to personal information being leakedand exchanges have been robbed, one to the tune of$79 million.

In addition, while cryptocurrencies may be more stable assets than the native currency in Japan and China, they are not absolutely stable. In fact, they are currently far from it, and though prices continue to rise, rapid drops are not uncommon, and public opinion can have a major impact on value.

Mark Cuban illustrated the issue perfectly when he took to Twitter to assert that Bitcoin wasnt a currency, its valuation dropped rapidly. Even more recently, Ethereum lost $4 billion worth of market value when a bogus story that its founder, Vitalik Buterin, had died in a car crash was published on 4chan.

Cryptocurrencies are clearly on the rise, and due to their successes, they can no longer be dismissed as a niche monetary system. The pertinent question is will this rise will lead to the worldwide adoption of an entirely new currency and finance system?

See original here:
China and Japan Are Largely Responsible for the Current Success of Cryptocurrency - Futurism

Read More..

National Science Foundation Awards $450k for Cryptocurrency Incentive Study – CoinDesk

A Princeton University researcher has receivedmore than $400,000 in federal funding to study mechanism incentivesand their applications to cryptocurrencies like bitcoin.

The study project, "Duality-based tools for simple vs. optimal mechanism design and applications to cryptocurrency", is being led by Seth Weinberg, an assistant professor of computer science at Princeton. The grant, worth $450,000, was awarded on 28th June by the National Science Foundation. The project is set to begin in September and will last until August 31, 2020, according to the NSF.

As theorganization's website explains:

"A secondary focus of this project is to apply these theoretical foundations to resolve cryptocurrency incentive issues arising within Bitcoin, an emerging cryptocurrency. While bitcoin has remained largely immune to traditional security breaches, numerous incentive issues have been discovered which could undermine its future security if not properly addressed."

Though cryptocurrencies constitute only part of the research study its primary focus is the design of algorithmic mechanisms and the theoretical incentives at play its the latest instance of a projectthat involves the tech receiving federal backing.

In mid-2015, the NSF awarded $3m to theInitiative for Cryptocurrency and Contracts (IC3), a research effort involving academics from Cornell, the University of Maryland and the University of California Berkeley. The NSF has also moved to back cybersecurity-related research that involves blockchain.

Image via Shutterstock

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

Read more:
National Science Foundation Awards $450k for Cryptocurrency Incentive Study - CoinDesk

Read More..

Trump Says He Pressed Putin, While Casting More Doubt On Election Meddling – NPR

President Donald Trump says he and Russian President Vladimir Putin agreed to form a joint cyber security unit during their talks at the G-20 Summit in Hamburg, Germany. Saul Loeb/AFP/Getty Images hide caption

President Donald Trump says he and Russian President Vladimir Putin agreed to form a joint cyber security unit during their talks at the G-20 Summit in Hamburg, Germany.

President Trump says he "strongly pressed" Russian President Vladimir Putin twice about Russia's meddling in the U.S. election and that it's now time "to move forward in working constructively with Russia."

That work, Trump said, will include a joint cyber security operation, as well as a new ceasefire in Syria.

In a series of tweets Sunday about his meetings with Putin at the G-20 Summit, Trump said Putin "vehemently denied" interfering in the U.S. election.

"I've already given my opinion," Trump added, apparently referring to his remarks in Poland shortly before attending the G-20 Summit in Germany. When he was asked about election hacking, Trump replied, "Well, I think it was Russia, and I think it could have been other people in other countries. Could have been a lot of people interfered."

He added, "Nobody really knows for sure."

At that news conference in Warsaw, Trump also noted that "three or four" U.S. intelligence agencies, rather than all of them, say that Russia sought to interfere in the election. And he compared their findings about Russia's involvement to the hunt for weapons of mass destruction in Iraq making it clear that he remains a skeptic.

Trump's posts on Sunday morning also included digs at the CIA, FBI and the Democratic National Committee, as well as a plan to work with Russia to form a "Cyber Security unit," raising questions about whether America's president agrees with U.S. intelligence agencies' conclusion that Russia carried out hacking to help Trump win the White House.

After Trump touted the plan to collaborate with Russia on Internet security issues, he was criticized by fellow Republicans, including his former rivals for the presidency.

"It's not the dumbest idea I've ever heard, but it's pretty close," Sen. Lindsey Graham, R-S.C., said on NBC's Meet the Press.

Graham called the meeting with Putin "disastrous," and said that while he sees Trump having success in other foreign policy areas, "when it comes to Russia, he's got a blind spot."

Sen. Marco Rubio, R-Fla., had a similar take, saying that "Partnering with Putin on a 'Cyber Security Unit' is akin to partnering with [Syrian President Bashar] Assad on a 'Chemical Weapons Unit.'"

Treasury Secretary Steve Mnuchin, defended the president, asking on ABC's This Week, "Why would President Trump broadcast exactly what he said" to Putin and adding, "Strategically that makes no sense."

It's the second time in recent days Trump has tweeted about the Russian hacking. On Friday, he wrote from the international talks in Hamburg to say, "Everyone here is talking about why John Podesta refused to give the DNC server to the FBI and the CIA. Disgraceful!"

Responding to that post, Podesta clarified that he had worked for Hillary Clinton's presidential campaign and not the DNC. He also reminded the president of his duties at the G-20 conference and told Trump, "Get a grip, man."

At the Hamburg meetings, Trump and Putin spoke for more than two hours. Afterwards, Putin said he thought Trump had "agreed" with his denials of Russia's involvement in the U.S. presidential campaign.

Secretary of State Rex Tillerson has offered a nuanced take on the two leaders' meeting, saying that while Trump raised the "concerns of the American people regarding Russian interference in the 2016 election" at the very start of his time with Putin, Trump also decided to focus on advancing talks on other issues. Tillerson added that in the meeting, "there was not a lot of re-litigating of the past."

When reporters asked Tillerson about how direct the American president had been in confronting Putin over Russia's interference in the U.S. democratic process and whether Trump had presented any evidence to try to convince Putin Tillerson replied:

"The Russians have asked for proof and evidence. I'll leave that to the intelligence community to address the answer to that question. And again, I think the President, at this point, he pressed him and then felt like at this point let's talk about how do we go forward. And I think that was the right place to spend our time, rather than spending a lot of time having a disagreement that everybody knows we have a disagreement."

After Friday's more than two-hour meeting between the two leaders, Tillerson's Russian counterpart, Foreign Minister Sergey Lavrov, implied that the U.S. president might not agree with his agencies' assessment, stating, "Of course, President Trump also mentioned that certain circles in the United States keep on spinning the issue of Russia's interference in the U.S. elections even though they are unable to prove that."

Trump didn't dispel that notion today, using the term "fake news" to refer to U.S. media outlets such as the Associated Press and New York Times that have clarified that four U.S. intelligence agencies (including the FBI and CIA) have concurred on Russia's attempt to meddle in America's national vote, rather than all 17 U.S. agencies that were mentioned in early reports.

There are no plans as of yet for another meeting between Trump and Putin, Tillerson said on Friday. He added that the State Department will explore "the cyber issue and this issue of non-interference."

On Sunday, Trump said the cyber collaboration unit would work to prevent election hacking. But that concern wasn't at the top of Lavrov's list earlier in the weekend, when he said the effort would focus on terrorism, organized crime, and problems such as child pornography and "so-called suicide networks," in addition to "hacking in all its forms."

Go here to read the rest:
Trump Says He Pressed Putin, While Casting More Doubt On Election Meddling - NPR

Read More..

Internet freedom must be protected but also respected – Independent Online

Cyber security, now theres an unusual juxtaposition. Trying to control the free flow of information on the internet is like trying to pull the plug on gravity.

Netizens are panicked, and rightly so, over the latest financial computer worm WannaCry which hit 150 countries. The good old mattress seems to be an appealing option to stash hard earned moolah.

A dark cloud hangs over the USs formidable security as there is a good possibility that Russian tinkering helped deliver motor-mouth Donald Trump to the countrys presidential seat. If true, the security breach is far-reaching and could turn geopolitics on its head.

There are a myriad viruses that challenge coders on a daily basis.

According to Chinas IT giant Tencents annual report on internet security, last year alone its anti-virus lab identified 148 million new internet viruses.

The US insurance industry estimates the cost of cybercrime to the global economy at more than $450 billion.

Governments all over the world are seeking to manage and rein in cyber criminals bustling trade. A mammoth task, but one must admire their temerity for trying. Even if its just to placate ordinary citizens and help them sleep at night.

In recent weeks, the US and China passed tough cyber security laws.

Chinas cyber security law came into effect on June 1. The country has 730 million netizens. The government has clarified that it was not intended to manage foreign websites nor restrict the free flow of information.

The Cyberspace Administration of China released a statement saying that the law was to prevent any infringement of its cyber sovereignty. It would stop illegal information entering China under the pretext of providing free flow of information.

The administration believed this did not contradict its support for the free flow of information.

In the real world, all enterprises or individuals are required to observe laws of the countries they enter, and there should be no exception in cyberspace, it said. While the merits of this statement may be heavily contested by freedom of information activists, there is a positive part of the law which deals with the protection of personal information.

Professor of law at the Communication University of China told monthly magazine Beijing Review that the law would protect the publics personal information.

The trading of customers personal information is a pesky business which internet and cellphone users have to endure. The law clarifies the responsibilities of internet service providers and operators and promises heavy penaltiesfor trading personal information.

A survey by the Internet Society of China showed 84% of internet users were affected by personal information leaks.

In South Africa, Parliament has tabled the controversial Cybercrimes and Cybersecurity Bill for public comment this month. The bill has been doing the rounds since 2015 and is inching closer to being signed into law.

Activists have cautioned that parts of the bill are so broadly defined that they are open to abuse. For example, whistleblowers and journalists have little or no protection. If information is obtained unlawfully, even if it is in the public interest, both the whistleblower who leaked it and the journalist who published it can face criminal charges. Parts of the bill regrettably also gag freedom of speech. If it succeeds, it would be a blight on our hard-fought democracy.

Drafting law to combat cyber crime is a worthy pursuit but turning ordinary citizens and journalists into criminals is a crime in itself.

Melanie Peters is the Live Editor of Weekend Argus. She is on a 10-month scholarship with the China Africa Press Centre. Instagram: mels_chinese_takeout

See the original post:
Internet freedom must be protected but also respected - Independent Online

Read More..

Common misunderstandings about SSL encryption: separating fact from fiction – AMEinfo

The amount of Internet traffic secured via SSL encryption is surging to new heights every day it is estimated that nearly 70 per cent of all web traffic uses SSL encryption and 86 per cent of that uses advanced encryption methods like Elliptical Curve Cryptography (ECC) and Perfect Forward Secrecy (PFS).

On top of that, when you consider the massive growth in Internet of Things (IoT) devices coming onto the network that are beginning to also require fast processing of encrypted traffic, it is no wonder businesses are concerned about a potential encryption crisis that vendors are struggling to address. To this point, research and analyst firm IHS Technology estimates that the number of IoT devices could spike to 30.7 billion in the next three years, and cautions that those devices should leverage secure communication methods such as encryption.

Despite the potential blind spots introduced by encrypted traffic, which makes it harder to detect malware and other cyber threats, some companies elect to go without the ability to inspect this encrypted SSL traffic at all. Why? Because there are a host of misconceptions regarding SSL-encrypted traffic.

Here, we separate fact from fiction and share a few common SSL misconceptions and the reality.

SSL is complicated, slow, requires many resources to inspect and introduces new risks for networks.

Actually, these days, it is possible for SSL processors to reach speeds as fast as 44,000 SSL connections per second (CPS)for 128B file sizes. And by using application delivery and server load balancing technology, you can offload the compute-intensive SSL/TLS processing from web servers for faster processing of SSL traffic.

We do not expect any increases in overall SSL traffic.

Some customers claim that as they are transitioning to using traffic-heavy applications such as Office 365, their SSL traffic nearly doubled. Introducing new business tools requires a better understanding of new demands on your network and an even greater need to inspect the traffic that is coming into your network. And when you consider the need to address the swell of traffic generated by IoT devices that comes in close proximity of your business, you add an even greater need to swiftly and securely process this traffic.

I already know whats happening with our network traffic

In reality, many IT professionals dont realize how much encrypted traffic is on their network until they actually install SSL/TLS encryption solutions especially those that support protocols other than HTTPS and can detect SSL/TLS on non-standard ports. SSL/TLS encryption in high-throughput, high-connection-rate scenarios can give enterprises assurance with their email platforms that can effectively become a ransomware killer.

I already have an encryption solution, so do not need a dedicated appliance

While it is true that many all-in-one solutions can process encrypted traffic, there is often an SSL performance tax associated. Can you sacrifice security for performance, or vice versa? Having a dedicated appliance for SSL encryption takes the processing demands off your other appliances, meaning you dont suffer the SSL performance hit.

All we have to do is block access to unsavory websites and we are safe

There are numerous examples of legitimate websites being exploited, cross site scripting and malware in the form of adware. All of this is prevalent in websites that employees visit during normal daily activity. On top of that, you also have to factor in all the added risks mobile workers bring into secured perimeters or simply office employees with mobile devices that include apps with weak security that can introduce malware to the corporate network. Bad traffic doesnt come from unsavory websites alone. Its important to have an encryption solution protects your network from all angles.

(By Mohammed Al-Moneer, Regional Director, MENA at A10 Networks. Al-Moneer has held various sales leadership positions at networking and other high tech companies. Most recently at Infoblox, he served as regional manager for Saudi Arabia, where he leveraged his success in leading the services business to drive operational efficiencies and innovation and achieve exceptional growth. Prior to that he worked as territory sales manager for enterprise servers, storage and networking at Hewlett-Packard)

Visit link:
Common misunderstandings about SSL encryption: separating fact from fiction - AMEinfo

Read More..

Global coalition urges "Five Eyes" to respect encryption – IFEX

This statement was originally published on article19.org on 4 July 2017.

ARTICLE 19 joins 82 other organisations in the following letter, calling on governments to protect strong encryption.

To the leaders of the world's governments,

We urge you to protect the security of your citizens, your economy, and your government by supporting the development and use of secure communications tools and technologies, rejecting policies that would prevent or undermine the use of strong encryption, and urging other leaders to do the same.

Encryption tools, technologies, and services are essential to protect against harm and to shield our digital infrastructure and personal communications from unauthorized access. The ability to freely develop and use encryption provides the cornerstone for today's global economy. Economic growth in the digital age is powered by the ability to trust and authenticate our interactions and communicate and conduct business securely, both within and across borders.

Some of the most noted technologists and experts on encryption recently explained (PDF) that laws or policies that undermine encryption would "force a U-turn from the best practices now being deployed to make the Internet more secure," "would substantially increase system complexity" and raise associated costs, and "would create concentrated targets that could attract bad actors." The absence of encryption facilitates easy access to sensitive personal data, including financial and identity information, by criminals and other malicious actors. Once obtained, sensitive data can be sold, publicly posted, or used to blackmail or embarrass an individual. Additionally, insufficiently encrypted devices or hardware are prime targets for criminals.

The United Nations Special Rapporteur for freedom of expression has noted, "encryption and anonymity, and the security concepts behind them, provide the privacy and security necessary for the exercise of the right to freedom of opinion and expression in the digital age." As we move toward connecting the next billion users, restrictions on encryption in any country will likely have global impact. Encryption and other anonymizing tools and technologies enable law yers, journalists, whistleblowers, and organizers to communicate freely across borders and to work to better their communities. It also assures users of the integrity of their data and authenticates individuals to companies, governments, and one another.

We encourage you to support the safety and security of users by strengthening the integrity of communications and systems. All governments should reject laws, policies, or other mandates or practices, including secret agreements with companies, that limit access to or undermine encryption and other secure communications tools and technologies.

Users should have the option to use - and companies the option to provide - the strongest encryption available, including end-to-end encryption, without fear that governments will compel access to the content, metadata, or encryption keys without due process and respect for human rights. Accordingly:

Governments should not ban or otherwise limit user access to encryption in any form or otherwise prohibit the implementation or use of encryption by grade or type;

Governments should not mandate the design or implementation of "backdoors" or vulnerabilities into tools, technologies, or services;

Governments should not require that tools, technologies, or services are designed or developed to allow for third- party access to unencrypted data or encryption keys;

Governments should not seek to weaken or undermine encryption standards or intentionally influence the establishment of encryption standards except to promote a higher level of information security. No government should mandate insecure encryption algorithms, standards, tools, or technologies; and

Governments should not, either by private or public agreement, compel or pressure an entity to engage in activity that is inconsistent with the above tenets.

Strong encryption and the secure tools and systems that rely on it are critical to improving cybersecurity, fostering the digital economy, and protecting users. Our continued ability to leverage the internet for global growth and prosperity and as a tool for organizers and activists requires the ability and the right to communicate privately and securely through trustworthy networks.

We look forward to working together toward a more secure future.

Read the letter in full

The rest is here:
Global coalition urges "Five Eyes" to respect encryption - IFEX

Read More..

Microsoft’s Cloud Focus Means Layoffs: Report – Investopedia

With cloud computing becoming a bigger revenue driver for Microsoft Corp. (MSFT), the company reorganized its business earlier this week, which resulted in large-scale job reductions at the software company.

A person familiar with the companys plans told The Wall Street Journal earlier this week that layoffs could be in the thousands range as it moves its sales focus to large enterprises and small and medium businesses. Late last week, the Puget Sound Business Journal broke the news that Microsoft would reorganize its business to focus on a so-called cloud-first strategy that is being led by Azure, its cloud hosting business.

According to reports, most the layoffs will be in the sales division and outside of the U.S., and the number of layoffs is estimated to be between 3,000 and 5,000. Microsoft has not confirmed any of these numbers, but has confirmed the process of informing employees has started.

In an email sent to employees Monday that was obtained by the Journal, the company said its sales efforts will focus on businesses instead of going after specific industries or market segments like startups or public companies. In the email sent by Judson Althoff, the executive vice president who pushes Microsofts technology, he said the sales reorganization is designed to align the right resources for the right customer at the right time and noted he wants to increase the companys technical depth and better align sales and services to solution areas.

The email did not mention layoffs, although they are a likely implication of a reorganization. The Journal said the job reductions will impact employees in offices located around the globe. Microsoft currently has 121,000 employees worldwide. (See also: Microsoft's Azure Cloud Revenue Estimated at $3B.)

While it has long played second fiddle to Amazon.com Inc. (AMZN) and its Amazon Web Services (AWS) unit, Microsoft has been chipping away at its dominance. In June, Pacific Crest Securities analyst Brent Bracelin said in a research report that Azure could have more revenue than AWS for the first time in 2017. The analyst said Microsoft is becoming the biggest cloud provider for the first time in 10 years, which would transition it from a cloud laggard to a cloud leader.

Bracelin said he came to this conclusion after conducting an analysis of the 60 biggest cloud computing companies. The analyst is predicting spending on cloud initiatives could explode to $239 billion in the span of five years, with the Redmond, Wash., software giant benefiting the most from the growth. Bracelin pointed to what he called unmatched product depth and breadth" in software as a service, platform as a service and infrastructure as a service as the main reasons. (See also: Amazon, Microsoft Still Rule Cloud; Oracle, Alibaba May Catch Up.)

Continued here:
Microsoft's Cloud Focus Means Layoffs: Report - Investopedia

Read More..

School district graduates to cloud-based websites – GCN.com

School district graduates to cloud-based websites

To compete with private schools in the region, Seminole County Public School system in Florida wanted to overhaul the districts online presence to create a user-friendly site that would be easy for school employees to update.

The redesign of the website involved paring 30,000 pages of information down to 3,000 and making it easy for parents to find and access information on to testing, enrollment or bus schedules from a variety of access points.

Supporting nearly 70,000 students and 10,000 employees, the school system wanted a user- and mobile-friendly site for the community "and a back-end content management system for our staff to manage and keep current, Michael Lawrence, SCPS communications officer, told GCN. We see our site as a living, breathing, and evolving entity that we need to continue to give attention to on a daily basis in order for it to be a useful.

SCPS tapped the Solodev Web Experience Platform that offered a content management system and Amazon Web Services for hosting. For the next phase in SCPSs website redesign project -- the 65 individual school websites -- school officials took a different approach.

The county wanted a digital agency quality site for every school, but no school district can afford that. So we worked with them to create a high-quality single-school site and trained them to build all of the school sites themselves, Solodev CTO Shawn Moore said.

By using Solodevs content management system, Moore estimates SCPS saved $3 to $4 million compared to hiring an agency to develop all of the individual websites.

Lawrence said a cloud-hosted environment benefits parents, students and faculty members who expect to have access to information regardless of the time of day.

Our district is moving away from on-premise services," Lawrence said, because it wants more flexibility and a more secure and stable environment. We cant have our websites go down because we are dealing with weather incidents or cyberattacks, he said.

On June 14, SCPS won a $50,000 credit from the 2017 AWS City on a Cloud Innovation Challenge. The credit will go toward the continued costs for hosting the website on AWS servers.

About the Author

Sara Friedman is a reporter/producer for GCN, covering cloud, cybersecurity and a wide range of other public-sector IT topics.

Before joining GCN, Friedman was a reporter for Gambling Compliance, where she covered state issues related to casinos, lotteries and fantasy sports. She has also written for Communications Daily and Washington Internet Daily on state telecom and cloud computing. Friedman is a graduate of Ithaca College, where she studied journalism, politics and international communications.

Friedman can be contacted at sfriedman@gcn.com or follow her on Twitter @SaraEFriedman.

Click here for previous articles by Friedman.

More here:
School district graduates to cloud-based websites - GCN.com

Read More..

USING ALTCOIN TRADER – rsainvestments.blogspot.co.za – Google

VISIT http://WWW.ALCOINTRADER.CO.ZA OR EVEN GOOGLE IT CLICK ON REGISTER. FILIN YOUR DETAILS AND REGISTER. IF YOU GET AN EMAIL FOR CONFIRMATION.LOGIN AND CONFIRM , IF YOU DONT GET IT JUST LOGIN WITH EMAIL AND PASSWORD YOU CHOSE. AFTER LOGGING IN YOU WILL SEE A SCREEN PAGE BELOW.

IF YOU DONT HAVE BITCOINS YOU CAN BUY THEM AT ALTCOINTRADER. SIMPLE WRITE THE VALUE OF BITCOINS YOU NEED ON BUY AS I DID BELOW. WRITE THE BITCOIN VALUE AS IT IS, THAN AUTOMATICALLY YOU WILL GET PRICE IN RANDS FOR THAT BITCOIN VALUE WHERE IT SAYS TOTAL, THE MONEY THERE IS IN ZAR/RANDS. IF YOU ALREAD HAVE BITCOINS, YOU WANA EXCHANGE/SELL THEM TO GET CASH IN YOUR BANK THAN YOU USE SELL NOT BUY. AGAIN YOU WRITE THE AMOUNT OR VALUE OF BITCOINS YOU HAVE. AUTOMATICALY YOU WILL SEE THE PRICE OR MONEY YOU WILL GET FRO THOSE BITCOINS YOU HAVE. NOTE: BITCOINS DONT START AT 1 BUT THEY START AT 0.0000... NUMBERS, SO YOU CAN GET BITCOINS FOR EVEN R500 TRY 0.05 E.T.C

IF YOU WANA BUY BITCOINS AND YOU HAVE CASH. YOU NEED TO DEPOSIT MONEY TO ALTCOIN TRADER THROUGH FNB, ABSA. THE AMOUNT OF MONEY YOU HAVE THAN YOU WILL GET BITCOINS EQUAL TO YOUR MONEY. MAKE SURE YOUR WRITE THE REFERENCE GIVEN TO YOU WHEN YOU CLICK ON DEPOSIT. CAUSE THAT YOUR OWN UNIQUE REFERENCE. IF YOU WRITE YOUR NAME OR ANYTHING ELSE. I FELL SORRY FOR YOU CAUSE I TOLD YOU. CHECK IMAGE BELOW

ONCE YOU DEPOSITED THE MONEY IT MUST REFLECT IN YOUR ALTCOINTRADER IN A DAY OR 2 PROVIDED YOU DIDNT MAKE MISTAKES ESPECIAL ON REFERENCE.

THAN ONCE YOUR MONEY IS THERE YOU SIMPLE DO WHAT I TOLD YOU ABOVE, YOU GO TO BUY, AND WRITE BITCOIN VALUE FOR THAT AMOUNT YOU HAVE. IF YOU DONT KNOW THERE VALUE , EASY, USE GOOGLE . EXAMPLE: YOU DEPOSIT R1500 NOW GO TO GOOGLE AND WRITE: BITCOIN VAUE FOR 1500 , BUT IT WILL NOLONGER BE 1500 IF YOU WANT 1500 ATLEAST DEPOSIT 1600, JUST ADD R100 MORE, YOU DOING THAT FOR DEPOSIT FEES. THAN YOU GET THE VALUE GO BACK TO ALTCOIN TRADER AND WRITE IT THERE ON BTC AMOUNT ON BUY. THAN YOU CLICK BUY. THE BALANCE YOU HAD IN ZAR WILL CHANGE IMMEDIATELT TO BALANCE IN BTC ( BITCOINS)

NOW YOU HAVE BITCOINS, BUT THEY ARE NOT IN YOUR WALLET. NOW YOU NEED TO SEND THEM TO YOUR WALLET. NOW YOU NEED TO CLICK ON WITHDRAW FUNDS/COINS. SCROLL DOWN TO WITHDRAW BTC

GO TO YOUR XAPO, COPY YOUR WALLET ADDRESS, COMEBACK TO ALTCOIN TRADER, PASTE YOUR WALLET ADDRESS THERE AS YOU SEE BELOW, WRITE BITCOIN VALUE YOU WANA WITHDRAW AND SEND TO YOUR WALLET THAN CLICK WITHDRAW. THATS IT, IF MINUTES YOUR BITCOINS WILL REFLECT IN XAPO, READY FOR YOU TO PH

NOW YOU WANA WITHDRAW, SO WE REVERSE THE PROCESS. LOGIN TO ALTCOIN TRADER AND CLICK ON DEPOSIT YES I DIDNT MAKE A MISTAKE CLICK ON DEPOSIT. WHAT YOU DOING NOW IS YOU WANA DEPOSIT BITCOINS TO ALTCOINTRADER AND SELL THEM TO GET CASH IN YOUR BANK ACCOUNT

SO CLICK ON DEPOSIT. SCROLL DOWN TO DEPOSIT BTC INTO YOUR ACCOUNT

THEY GOING TO GIVE YOU A WALLET ADDRESS THAT YOU USE ONLY TO TRANSFER BITCOINS TO ALTCOIN TRADER. COPY IT AS YOU SEE ON IMAGE BELOW. COPY IT AND PASTE IT ON XAPO THAN SEND YOUR BITCOIN TO ALTCOIN TRADER

ONCE YOUR BITCOINS REFLECT ON ALTCOIN TRADER BALANCE. NOW YOU GO ON SELL, WRITE THAT BITCOIN AMOUNT YOU HAVE AND CLICK ON SELL. IMMEDIATELY YOU BITCOINS ARE EXCHANGED TO CASH.

NOW YOU WANA GET THAT MONEY INTO YOUR BANK ACCOUNT CLICK ON WITHDRAW. ADD YOUR BANKING DETAILS. IF YOU ALREADY ADDE THEM THAN JUST WRITE AMOUNT OF CASH YOU NEED AND CLICK WITHDRAW AS SEEN BELOW

FUNDS WILL BE IN YOUR ACCOUNT WITHIN A DAY OR 2

IF YOU STILL DONT UNDERSTAND HERE IS A VIDEO WATCH IT IT WILL EXPLAIN MORE ABOUT USING ALTCOINTRADER

See original here:
USING ALTCOIN TRADER - rsainvestments.blogspot.co.za - Google

Read More..

Woman who contracted E.Coli returns home from Turkey after crowd funding appeal – Glasgow Live

A teacher stuck in a Turkish hospital after contracting E.coli has been flown back to the UK after a crowd-funding appeal raised more than 32,000 to bring her home.

Caroline Hope, who has been living in Turkey for four years, picked up the potentially deadly infection during surgery to treat advanced colon cancer last month.

The 37-year-old English teacher had decided to return home to Scotland after receiving her cancer diagnosis in January but complications from the surgery left her fighting for her life in Medical Park Hospital in Izmir, Turkey.

Desperate to bring her home, her family and friends raised more than 31,000 through a crowdfunding campaign to pay for a private medical evacuation, as there are strict rules around repatriations for medical reasons.

She was flown to Glasgow on an IAS medical air ambulance on Saturday, landing just before 7pm.

Her brother Scott Hope, who was with her in Turkey, said: "It has been a very emotional day today. Caroline was relieved and so happy this morning, she kept asking when the plane was coming and we had to keep saying we're just waiting for it to land.

"We were absolutely overwhelmed by the crowdfunding campaign, within two and a half days we had completely smashed our target of what we had hoped to get.

"The way everyone came together around the work to send love and support and best wishes was unbelievable."

Ms Hope has been taken by ambulance to hospital in Glasgow where her condition will be evaluated.

Mr Hope, who has remained in Turkey to sort out his sister's affairs, said his mother was waiting for her at the hospital.

His wife Pauline, who lives in South Africa, said the family were relieved that her sister-in-law has returned to Scotland and are grateful to those who supported the crowd-funding appeal.

She said: "It's just an amazing, overwhelming feeling. It's just been a really tough couple of months.

"She was very excited to be going back to Glasgow and to have her friends and family around to support her.

"Scotland is the most incredible nation. We were just very lucky to have the support that we got."

In a message on the JustGiving crowdfunding page, Ms Hope's friend Bella Shek wrote: "Thank you so, so, so, so much to everyone who has donated to get Caroline home.

"On behalf of Caroline, her family and all her friends, the support from all of you and the general public, many of whom have never met Caroline before has been truly overwhelming."

View post:
Woman who contracted E.Coli returns home from Turkey after crowd funding appeal - Glasgow Live

Read More..