11 Exchanges to Buy Bitcoin in India (2020 Updated)

India's Top 5 BitCoin Trading Websites

India's Top 5 BitCoin Trading Websites submitted by farooqahmadbhat to u/farooqahmadbhat [link] [comments]

3 Best And Popular Bitcoin Trading Websites In India

3 Best And Popular Bitcoin Trading Websites In India submitted by Ratan-Kumar to bitcointrading [link] [comments]

Updated list of Global Beermoney opportunities (+180!) - June 2020

Updated list of Global Beermoney opportunities (+180!) - June 2020

Introduction

The current, and now previous, Beermoney Global list started nearly 5 years ago. It’s been updated and has grown over all that time, but it also became a hassle to keep current. It was time to build a new list from scratch based on my experience in the Beermoney world over all these years and all the contributions all of you have been making in this sub.
The lists consist of opportunities that are available in at least one country that is not the US. This means there are sites which only work in Canada or the UK. There’s sites which are open to the whole world, but this does not mean everyone can really earn something on it. It’s all still very demographic and therefore location dependent. This list should give you a starting point to try out and find what works for you. I’m not using everything myself as I prefer to focus on a few, so not all are tested by me. They are found in this sub, other subreddits and other resources where people claim to have success.
I’ve chosen the format of a simple table with the bare minimum of information to keep things clean. It includes a link, how you earn, personal payment proof if available and sign-up bonus codes if applicable. Some of these bonuses are also one-time use codes specifically made for this sub! For the ones I don’t have payment proof (yet) feel free to provide some as a comment or via modmail so others know it’s legit. I am working on detailed instructions for each method that I personally use which will include things like cashout minimum, cashout options, tips & tricks,... For now I’ve split things up based on the type of earning like passive or mobile. Because of this there’s sometimes an overlap as some are both passive and on mobile or both earning crypto and a GPT (Get Paid To) website.
The lists are obviously not complete so I invite you to keep posting new ones in the sub, as a comment to this post, or in modmail. Especially if you have sites or apps which work for one single specific country I can start building a list, just like I did for The Netherlands and Belgium. If you recognize things which are in fact scams or not worth it let me know as well.

Beermoney opportunities

Get Paid To (Surveys, tasks, offers, videos, clicking links, play games, searching)
Register here How to earn Payment proof Sign-up bonus code
ySense - The best global site Surveys, tasks, offers, videos Paypal /
PrizeRebel Surveys, tasks, offers, videos Paypal Enter code 'beermoneyglobal'
SerpClix Google searching Paypal /
Swagbucks & SwagButton Surveys, tasks, offers, videos, shopping & cashback, games, apps Paypal /
GG2U Surveys, tasks, offers, videos Pending $1.00 if register here
Keep Rewarding Surveys, tasks, offers, videos, PTC Pending $0.25 if register here
Ebesucher Surfing, reading mails Bank transfer /
Reward XP Surveys, tasks, offers, videos Paypal $0.50 if register here
Gain.gg Surveys, tasks, offers, videos Paypal $0.10 if register here
Timebucks Surveys, tasks, offers, videos, Tik Tok, Shopping Pending $1.00 if register here
GamerMine Surveys, offers, videos, tasks, Pending $1.00 if register here
Gamehag Tasks, offers, play games, post on forum, writing Pending /
BTCSurveys Surveys Pending /
FruitLab Watch & upload video game clips Pending 100 pips if register here
Clickworker Transcripts, tasks, UHRS (categorizing), surveys Paypal /
FreeSkins Surveys, offers, tasks, videos Pending 100 coins if register here
iRazoo Games, surveys, videos, offers, apps Pending Enter code 'AK7DB2' for 500 points when signing up
EarnCrypto Data entry, surveys, offers, tasks, videos, games, apps Pending /
Blockreward Apps, surveys, videos, tasks, offers Pending $2.00 if register here and earn 20000b + $2.00 if earn 10000b within 30 days
PaidViewPoint Surveys Pending /
GrabPoints Suverys, videos, offers, games, apps Pending 500 points if register here
RewardingWays Surveys, offers, tasks, videos, contests Pending $0.20 if register here
SuperPay Surveys, offers, tasks, videos, contests Pending $0.20 if register here
InstaGC Surveys, tasks, videos, apps Pending /
GiftHunterClub Surveys, offers, videos, apps, games Pending $0.75 if register here
Idle-Empire Surveys, offers, videos, mining, apps, games Pending 500 points if register here
PicoWorkers Tasks, games, apps Pending /
ViewFruit Surveys Pending /
Mobrog (change language if needed) Surveys Pending /
Surveytime Surveys Pending /
Giveaway Pros Offers, videos Pending /
SEO Sprint (Russian, use Google Translate) Tasks Pending /
Earnhoney Surveys, tasks, offers, videos Pending /
Toluna Surveys Pending /
Spidermetrix Surveys Pending /
BeerSurveys Surveys, tasks, offers Pending /
CrowdHolding Co-create with startups Pending /
Diaworkers Tasks Pending /
Presearch Search & Earn Pending /
Univox Community Surveys Pending /
YouGov Surveys Pending /
Spare5 Tasks Paypal /
Rewardia Surveys, polls, games, videos, puzzles, trivia Pending 3000 points extra (when you earn 3000 points) if register here
Earnably Surveys, tasks, offers, videos Pending /
Neevo Tasks Pending /
Rakuten Insight (country specific links) Surveys Pending /
The Panel Station Surveys Pending /
Remotasks Tasks Pending /
Pureprofile Surveys Pending /
UserCrowd Tasks PayPal /
Sruvey Village Surveys Pending /
InboxDollars/InboxPounds Surveys, offers, videos, shopping Pending /
Qmee Surveys Pending /
MicroWorkers Tasks Pending /
Cinchbucks Surveys, offers, tasks, videos Pending /
Rewards1 Suverys, videos, offers, games, apps, polls, contests Pending /
Vindale Surveys Pending /
PointClub Surveys Pending /
TGM Panel Surveys Pending /
PaidPoints Tasks, offers, traffic exchange, ad clicking Pending /
RapidWorkers Tasks Pending /
AnyTask Sell your skills Pending /
Bounty0x Tasks Pending /
Opinion World Surveys Pending /
Lifepoints Surveys Pending /
Passive (desktop & mobile)
Register here How to earn Payment proof Sign-up bonus code
HoneyGain Desktop & mobile phone bandwith sharing (wifi + data) Paypal $5.00 if register here
FluidStack Desktop bandwith sharing (Linux needed) Paypal /
PacketStream Desktop bandwith sharing Pending /
LoadTeam CPU power sharing Pending $0.20 if register here
Gener8 Browser extension Pending 10 tokens if register here
Kryptex Crypto mining Pending /
Ebesucher Surfing, reading mails Bank transfer /
Honeyminer Mining Pending 1000 satoshis if register here
LazyBucks Rent out your Facebook account Pending /
HideoutTV and link to Reward XP to cashout Videos Paypal /
Honey Discounts & Cashback / 500 Honey Gold if register here
Fitplay Games Pending $0.33 if register here
Mistplay Games Pending /
Money SMS Receive SMS Pending /
McMoney Receive SMS Pending $0.22 if using code '60LGG3PR'
SMS Profit Net Receive SMS Pending /
Simcash Send SMS [risky] Pending /
Cash4sms Send [risky] & receive SMS Pending /
ControlMySMS Receive SMS Pending /
Birdchain Send SMS [risky] Pending /
Sweatcoin Walking Pending /
COIN Explore Pending 1000 coins if register here
Panel App Surveys, location sharing Pending /
Phoneum Games, mining Pending /
Crypto (faucets, mining, GPT)
Register here How to earn Payment proof Sign-up bonus code
Cointiply Faucet, surveys, tasks, offers, videos Bitcoin Enter code 'beermoneyglobal'
FreeBitcoin Faucet, lottery, betting, passive interest Bitcoin /
AdBTC Click ads, active window surfing, autosurfing Pending /
Faucetpay Faucet Wallet, exchange, offers, tasks, trading Pending /
Faucet Crypto Faucet, ads clicking, offers, shortlinks Pending /
More Money Faucet, ads clicking, offers, shortlinks Pending /
Kryptex Crypto mining Pending /
Quicrypto Surveys, tasks, offers, games, videos Pending /
Coinpot Faucet Bitcoin /
Honeyminer Mining Pending 1000 satoshis if register here
BitShark Faucet, games Pending /
Publish0x Read & write articles Pending /
Starbits Faucet (need FaucetPay account) Pending /
Coinpayu Ads clicking, videos, offers Pending /
BTCSurveys Surveys Pending /
Blockreward Apps, surveys, videos Pending $2.00 if register here and earn 20000b + $2.00 if earn 10000b within 30 days
Coinbase Crypto sign-up bonuses Bank transfer See links in thread
LBRY.tv Watch videos Pending /
Pi Network Crypto mining Pending (see here) To join you need a referral link
EarnCrypto Data entry, surveys, offers, tasks, videos, games, apps Pending /
Phoneum Games, mining Pending /
Mobile
Register here How to earn Payment proof Sign-up bonus code
Cointiply Faucet, surveys, tasks, offers, videos Bitcoin Enter code 'beermoneyglobal'
HoneyGain Desktop & mobile phone bandwith sharing (wifi + data) Paypal $5.00 if register here
Google Opinion Rewards Surveys Play Store credit /
FreeBitcoin Faucet, lottery, betting, passive interest Bitcoin /
AppKarma Games, quizes, surveys Pending Enter code 'Proim' for 300 points when signing up
CashKarma Surveys, offers, games Pending Enter code 'Proim' for 300 points when signing up
Cash Alarm Games Pending Receive 25% of my earnings if register here
Cash Magnet Games, offers, tasks, videos Pending /
AttaPoll Surveys Pending /
ClipClaps Videos, games, raffles PayPall $1.00 & Diamond Chest if register here
Quicrypto Surveys, tasks, offers, games, videos Pending /
Poll Pay Surveys Pending $0.30 if using code '4CS6L4SQ8D' when signing up
BuzzBreak Read news, videos, offers, surveys Pending Enter code 'B06472489' when signing up
Userlytics Software testing Pending /
WowApp Games, offers, surveys, videos, chat, phone unlock, calling, cashback, shopping cashback, browsing, news reading Pending /
CuriousCat Surveys Pending /
Quickthoughts Surveys Pending /
Fitplay Games Pending $0.33 if register here
TV-Two Make Money Apps, games, Youtube, browsing Pending 555 credits if register here
Mistplay Games Pending /
FeaturePoints Suveys, offers, apps, cashback Pending 50 points if register here
Money SMS Receive SMS Pending /
BIGtoken Suveys, location sharing, social media account Pending Use code 'GMGALLOIA'
McMoney Receive SMS Pending $0.22 if using code '60LGG3PR'
Pi Network Crypto mining Pending (see here) To join you need a referral link
Roamler Mystery shopping Pending /
SMS Profit Net Receive SMS Pending /
Streetbees Surveys, tasks, create videos, take pictures Pending Enter code '6115GF' when signing up
Simcash Send SMS [risky] Pending /
VoxPopMe Video feedback Pending /
Cash4sms Send [risky] & receive SMS Pending /
Citizen Me Surveys Pending /
ControlMySMS Receive SMS Pending /
Birdchain Send SMS [risky] Pending /
Sweatcoin Walking Pending /
COIN Explore Pending 1000 coins if register here
Panel App Surveys, location sharing Pending /
GiftHunterClub Surveys, offers, videos, apps, games Pending $0.75 if register here
Phoneum Games, mining Pending /
Research
Register here How to earn Payment proof Sign-up bonus code
Respondent Interviews, research, surveys Pending /
Prolific Surveys, research Paypal /
User testing
Register here How to earn Payment proof Sign-up bonus code
TestingTime Software testing Pending /
uTest Software testing Pending /
PingPong Software testing Pending /
TryMyUI Software/UI testing Pending /
Testbirds Software/UI testing Pending /
Pulselabs Voice app testing Pending /
PlaytestCloud Game testing Pending /
Userlytics Software testing Pending /
Investing (revenue share)
Register here How to earn Payment proof Sign-up bonus code
PaidVerts Ad clicking, offers, revenue sharing Bitcoin /
MyTrafficValue Games, investing PayPal /
Selling (designs on merchandise, skills/gigs)
Register here How to earn Payment proof Sign-up bonus code
Fiverr Sell your skills Pending 20% off on first purchase if register here
Redbubble Sell your designs Pending /
Zeerk Sell your skills Pending /
TeePublic Sell your designs Pending /
Teespring Sell your designs Pending /
Transcribing/Translating
Register here How to earn Payment proof Sign-up bonus code
Rev Transcribing, captioning, foreign subtitles Pending /
Gotranscript Transcribing, translating captioning, foreign subtitles Pending /
TranscribeMe Transcribing, translating, data annotation Pending /
Unbabel Translating Pending /
Others
Register here How to earn Payment proof Sign-up bonus code
Wealthy Affiliate Learn affiliate marketing Pending /
Brave Brows internet Pending /
Andromo Develop apps Pending /
The Netherlands specific
For The Netherlands there are a few very good options next to a bunch of ‘spaarprogramma’s. There ‘spaarprogramma’s are all the same where you receive and click a bunch of e-mails, advertisements, banners,... I advise you to create a separate e-mail address or use a good filter in your inbox as you will be spammed to death. I believe they can be a nice piece of beermoney but they take quite the effort.
Register here How to earn Payment proof Sign-up bonus code
Euroclix Surveys, shopping & cashback, offers, energy/internet providers Bank transfer €1.95 if register here
StemPunt Surveys Gift cards 500 points if register here
Cashback XL Shopping cashback, health insurance discount Bank transfer /
Scoupy Shopping cashback, free products Pending /
Cashback Korting Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €7.50 if register here
Lady Cashback Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €7.50 if register here
Enqueteclub Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €7.50 if register here
Snel Verdienen Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €2.50 if register here
Spaar Actief Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Klik Je Zakgeld Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Zinngeld Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €0.10 if register here
My Clics Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
Direct Verdiend Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €2.00 if register here
Spaar4Cash Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Qassa Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending /
My Flavours Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Cash Ze Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Geld Race Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
iPay Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
Double Points Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €2.00 if register here
Mailbeurs Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Qlics Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
Centmail Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Extra Euro Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
Gekken Goud Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Dutch Euro Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Nu Cash Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register
Snel Euro Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Cash Hier Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Betaalde Mails Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €2.00 if register here
Goudmails Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Online Cashen Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Crazy Mails Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Cash Paradijs Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Smart Clix Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €5.00 if register here
24/7 Discount Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending /
Beetje Zakgeld Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
Geldmolen Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.75 if register here
Online Zakcentje Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Geldcircus Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €0.75 if register here
Lady Clix Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €0.99 if register here
Geldwolf Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Zilvervloot Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Belgium specific
Register here How to earn Payment proof Sign-up bonus code
Buffl Surveys Gift cards /

Sign-up bonuses

The one-time sign-up bonus programs are still to be found here. If you find a new one let me know so I can create the post to keep all the ref links together.

Saving money

Although it’s not really about making money online, it’s still nice to save some money as well when shopping online.
Register here How to earn Payment proof Sign-up bonus code
Honey Discounts & Cashback / 500 Honey Gold if register here
G2A Game keys / /
Kinguin Game keys / /
Allkeyshop Game keys / /
AliExpress Save on online shopping / $24 coupons if register here
Gearbest Save on online shopping / /

Other subs & resources

submitted by Proim to beermoneyglobal [link] [comments]

Swipe Bi-Weekly Update #6

Swipe Bi-Weekly Update #6

https://preview.redd.it/n5pkxql0crh51.jpg?width=1280&format=pjpg&auto=webp&s=959d7b4051bd1c20b53cfc28ee1c4cbdd355382e
Swipe opened the month of August with the launch of its Swipe Network Staking and its announcement to run a Decentralized Finance Lending/Earn application on Binance Smart Chain. This was also followed by the plan to release product updates, events, listings, or partnerships every week until the end of 2020.
Bringing their promise and commitment true to the public, here are the activities that Swipe has released for the past two weeks:

https://preview.redd.it/5ztwd3p3crh51.jpg?width=1280&format=pjpg&auto=webp&s=a5305d9e040318cfe9e3da0a3a721c88cbaf80ae
Swipe Launches Staking/DeFi
Swipe has recently launched its test network for Swipe Network Testnet Staking and, at the same time, announced its plans to launch a Decentralized Finance Lending/Earn application on Binance Smart Chain.
With the launch of the Swipe Network testnet, users can use the Swipe Faucet to grab testnet-SXP to use on the decentralized finance application. Users will be able to bond SXP to the Swipe Network smart contract as collateral to ensure the guarantee of conversions for these exchanges. A reserve system in place to lock SXP and guarantee that the merchant and payment networks receive the exact fiat amount is in place as Swipe facilitates real-time conversions on-demand.
Users will receive up 12% APY on their staked SXP within the Swipe Network off-chain and a variable rate for on-chain. Swipe plans to enable staked SXP to earn the processing fees it charges in the future as well on top of the collateral rewards from staking.
Also, Swipe revealed its plans to launch a DeFi App on Binance Chain called SwipeFi, which will enable Binance Chain tokens to be used to earn interest on their supply of collateral to the protocol and borrow against their collateral directly on the Binance blockchain.
Swipe (SXP) Trading Competition
Last August 5 to 12, Swipe and Binance team have both committed a total of 100,000 SXP and 50,000 USDT in prizes to thank its users worldwide for their continued support and to also celebrate the Swipe acquisition and SXP/USDT listing in Futures, Margin and Spot markets. The contest was divided into three categories: a new user exclusive rewards, a trading competition, and the Lucky 99, which awarded users ranked 99th, 199th, 299th, 399th, and so forth until the 9999th place of the top 10,000 SXP traders based on their trading volume.
Swipe x WBTC
Swipe has partnered with WBTC Network and has officially been approved as a merchant for WBTC minting through the WBTC Network’s DAO Governance process. Swipe Wallet users will be able to benefit from instantly wrapping Bitcoin BTC to Wrapped Bitcoin (WBTC) and vice versa with just a few clicks. Swipe has also listed WBTC on the Swipe Wallet platform and Swipe Visa Card to enable users to buy, sell, exchange, and spend WBTC at over 60 million merchants worldwide.
SXP on CoinDCX
SXP, the native token of Swipe, is now listed and live on its second Indian Exchange CoinDCX. Trading for $SXP token is now live for CoinDCX users who wish to trade SXP/BTC and SXP/USDT.
CoinDCX trading links for SXP:
https://coindcx.com/trade/SXPBTC & https://coindcx.com/trade/SXPUSDT
Wazirx AMA Session
Swipe Chief Executive Officer (CEO) Joselito Lizarondo, held an AMA session with the Telegram community of Wazirx, a bitcoin exchange in India, last August 7. In the AMA session, Lizarondo answered questions about Swipe, Swipe Card, its new partnership with Binance, and the recent projects that the company has announced. The community also asked if Swipe is planning to bring its card services to India as it is one of the biggest crypto market countries at present.
To read the whole summary of the AMA visit:
https://blog.wazirx.com/ama-with-joselito-lizarondo-ceo-founder-of-swipe-summary/
New Swipe Product Manual
Swipe has released a new “redefined” white paper under the title: Swipe Product Manual. The Swipe Product Manual was designed with simplicity in mind for easy and coherent descriptions of the Swipe ecosystem of products. This will describe all of Swipe’s current and future products that the team has planned. Technical descriptions and documentation will be made available, as required, per protocol, as some will have API access for developers.
The Swipe Product Manual can be viewed by clicking here or by going to https://sw.pe/ProductManual or downloading https://swipe.io/ProductManual.pdf to your desktop.
Swipe 0% Fees
Starting Monday, August 17, Swipe Wallet and Swipe Card users will no longer have to pay any fees to buy, sell, and pay with crypto. Users can now purchase, sell, and convert cryptocurrencies to and from fiat currencies without the previous 1% fee. Swipe cardholders will also enjoy waived membership fees and free card shipping.
Swipe Staking
As Swipe prepares to launch the Swipe Network Staking mainnet, the Swipe Wallet application will support SXP staking. Users will enjoy staking rewards based on their SXP balances that are held on the Swipe Wallet beginning on August 23, 00:00 UTC.
More details of the staking can be viewed at:
https://medium.com/swipe/swipe-wallet-to-support-sxp-staking-acfab4589813
Swipe Reddit AMA
In his first blog post on Medium, Swipe CEO Joselito Lizarondo answered the questions that the Reddit community asked regarding Swipe’s activities and plans for the future. He talked about the new partnership programs of Swipe, its newly released “Product Manual,” and the new roadmap, which will be kept in stealth “to focus on bringing maximum value to these announcements and products.”
Read the whole transcript of Joselito Lizarondo’s AMA here:
https://medium.com/swipe/swipe-reddit-ama-8-13-80690e2f6589
Swipe and Kava Partnership
Swipe has formed a strategic partnership with Kava Labs to further grow the USDX DeFi Ecosystem as Swipe prepares to bring decentralized finance applications to the Binance Smart Chain. Swipe has also listed KAVA and USDX on the Swipe Wallet platform where users can buy and sell KAVA and USDX with a linked bank account or credit/debit card as well as enabled it to be converted and spent at over 60 million merchants worldwide with the Swipe Visa Card.
$16M+ Ecosystem Rewards Program for BNB Holders on Binance
Swipe is launching a 12-week-period $16,000,000 Ecosystem Rewards Program for BNB holders, starting August 17. This program aims to continue to promote the usage of Swipe products, including the Swipe Network Staking and Governance within a strong community. With Swipe’s partnership with Binance, a weekly distribution of 333,333.33 SXP will run to BNB holders on Binance.com.
Know more about the Rewards Program here:
https://medium.com/swipe/swipe-launches-16m-ecosystem-rewards-program-for-bnb-holders-on-binance-e79ffc9dc252
Swipe’s Chainlink Based Price Oracles Now Live
Swipe has collaborated with Chainlink, the market-leading decentralized oracle network, to launch a live SXP-USD price oracle on the Ethereum mainnet. By switching to Chainlink, users receive stronger guarantees around trust and transparency in the payments process, as critical price feeds for the network are now completely decentralized and available to monitor on the blockchain.
This decentralized infrastructure ensures that reward issuances and token burns only take place based on accurate, highly available, and tamper-proof on-chain prices that have no single point of failure or absolute truth. Users can independently verify the current price, how price updates occur, which nodes are providing data to the network, and more. This means users no longer need to rely on Swipe to produce fair conversion rates.
---
Stay up-to-date with all the latest news from Swipe
Website: https://swipe.io
Twitter: https://twitter.com/SwipeWallet
Facebook: https://facebook.com/Swipe
Instagram: https://instagram.com/Swipe
Medium: https://medium.com/Swipe
Telegram: https://t.me/SwipeWallet & https://t.me/Swipe
LinkedIn: https://www.linkedin.com/company/swipewallet
YouTube: https://youtube.com/SwipeWallet
submitted by SwipeWallet to Swipe_io [link] [comments]

Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.

Flatten the Curve. Part 48. Source Here
It's getting crazier day by day now, so are you following the Boy Scout motto?
On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”
Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it.
But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.
'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.
Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.
The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here
Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you.
Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
PACOM? Why isn't that command group responsible for the South China Sea?
Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.
Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Nah. I'm just fear mongering and Doomscrolling again.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads: https://old.reddit.com/Scams/search?q=common+scams+master+post&restrict_sr=on
Blackmail email scam thread: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5//
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.

Spoofing

Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
Dropshipping
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

Door to door scams

As a general rule, you should not engage with door to door salesmen. If you are interested in the product they are selling, check online first.
Selling Magazines
Someone or a group will come to your door and offer to sell a magazine subscription. Often the subscriptions are not for the duration or price you were told, and the magazines will often have tough or impossible cancellation policies.
Energy sales
Somebody will come to your door claiming to be from an energy company. They will ask to see your current energy bill so that they can see how much you pay. They will then offer you a discount if you sign up with them, and promise to handle everything with your old provider. Some of these scammers will "slam" you, by using your account number that they saw on your bill to switch you to their service without authorization, and some will scam you by charging higher prices than the ones you agreed on.
Security system scams
Scammers will come to your door and ask about your security system, and offer to sell you a new one. These scammers are either selling you overpriced low quality products, or are casing your home for a future burglary.
They ask to enter your home
While trying to sell you whatever, they suddenly need to use your bathroom, or they've been writing against the wall and ask to use your table instead. Or maybe they just moved into the neighborhood and want to see how you decorate for ideas.
They're scoping out you and your place. They want to see what valuables you have, how gullible you are, if you have a security system or dogs, etc.

Street scams

Begging With a Purpose
"I just need a few more dollars for the bus," at the bus station, or "I just need $5 to get some gas," at a gas station. There's also a variation where you will be presented with a reward: "I just need money for a cab to get uptown, but I'll give you sports tickets/money/a date/a priceless vase."
Three Card Monte, Also Known As The Shell Game
Unbeatable. The people you see winning are in on the scam.
Drop and Break
You bump into someone and they drop their phone/glasses/fancy bottle of wine/priceless vase and demand you pay them back. In reality, it's a $2 pair of reading glasses/bottle of three-buck-chuck/tasteful but affordable vase.
CD Sales
You're handed a free CD so you can check out the artist's music. They then ask for your name and immediately write it on the CD. Once they've signed your name, they ask you for money, saying they can't give it to someone else now. Often they use dry erase markers, or cheap CD sleeves. Never use any type of storage device given to you by a random person, as the device can contain malware.
White Van Speaker Scam
You're approached and offered speakers/leather jackets/other luxury goods at a discount. The scammer will have an excuse as to why the price is so low. After you buy them, you'll discover that they are worthless.
iPhone Street Sale
You're approached and shown an iPhone for sale, coming in the box, but it's open and you can see the phone. If you buy the phone, you'll get an iPhone box with no iPhone, just some stones or cheap metal in it to weigh it down.
Buddhist Monk Pendant
A monk in traditional garb approaches you, hands you a gold trinket, and asks for a donation. He holds either a notebook with names and amounts of donation (usually everyone else has donated $5+), or a leaflet with generic info. This is fairly common in NYC, and these guys get aggressive quickly.
Friendship Bracelet Scam More common in western Europe, you're approached by someone selling bracelets. They quickly wrap a loop of fabric around your finger and pull it tight, starting to quickly weave a bracelet. The only way to (easily) get it off your hand is to pay. Leftover sales
This scam involves many different items, but the idea is usually the same: you are approached by someone who claims to have a large amount of excess inventory and offers to sell it to you at a great price. The scammer actually has low quality items and will lie to you about the price/origin of the items.
Dent repair scams
Scammers will approach you in public about a dent in your car and offer to fix it for a low price. Often they will claim that they are mechanics. They will not fix the dent in your car, but they will apply large amounts of wax or other substances to hide the dent while they claim that the substance requires time to harden.
Gold ring/jewelry/valuable item scam
A scammer will "find" a gold ring or other valuable item and offers to sell it to you. The item is fake and you will never see the scammer again.
Distraction theft
One person will approach you and distract you, while their accomplice picks your pockets. The distraction can take many forms, but if you are a tourist and are approached in public, watch closely for people getting close to you.

General resources

Site to report scams in the United Kingdom: http://www.actionfraud.police.uk/
Site to report scams in the United States: https://www.ic3.gov/default.aspx
Site to report scams in Canada: www.antifraudcentre-centreantifraude.ca/reportincident-signalerincident/index-eng.htm
Site to report scams in Europe: https://www.europol.europa.eu/report-a-crime/report-cybercrime-online
FTC scam alerts: https://www.consumer.ftc.gov/scam-alerts
Microsoft's anti-scam guide: https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx
https://www.usa.gov/common-scams-frauds
https://www.usa.gov/scams-and-frauds
https://www.consumer.ftc.gov/features/scam-alerts
https://www.fbi.gov/scams-and-safety/common-fraud-schemes
submitted by EugeneBYMCMB to Scams [link] [comments]

India: Blockchain And Data Privacy: An India Perspective

Link to Mondaq: https://www.mondaq.com/india/fin-tech/978488/blockchain-and-data-privacy-an-india-perspective

A. Introduction

As a sequel to the first paper of Blockchain & Law article series titled 'A New Digital Order - Unveiling the Interplay of Law & Blockchain Technology', this paper explores the inter-operability of India's data privacy regime and blockchain technology. In this regard, recording of a webinar conducted on 'Blockchain & Data Privacy: An India Perspective' by the AKS Partners can be viewed on YouTube here.

B. Data privacy in India

Constitution of India

Article 21 of the Indian Constitution is a comprehensive, all-encompassing provision that inheres within itself basic, fundamental rights that are absolutely essential to the existence of a human being with dignity and personal liberty. In the judgment of K.S. Puttaswamy v. Union of India,1 a nine-judge bench of the Honourable Supreme Court of India held that the right to privacy falls within the contours of Article 21 and is incidental to life and personal liberty. This right to privacy includes the right to data protection and privacy.

Information Technology Act, 2000

In India, data privacy is governed by the Information Technology Act, 2000 ("IT Act") and the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 ("SPDI Rules"). Sections 43A (Compensation for failure to protect data) of the IT Act provides a statutory right to a data provider to claim compensation for unapproved disclosure of information (including in breach of a contract). Under Section 72A (Punishment for disclosure of information in breach of lawful contract) of the IT Act, wherever any person including an intermediary discloses information obtained under a lawful contract without consent shall be punished with imprisonment or with fine or both.

SPDI Rules

The SPDI Rules constitute a set of basic obligations to be adhered to in circumstances where sensitive data is being collected. It may be noted that the SPDI Rules apply only to 'Sensitive Personal Data or Information'.2 The SPDI Rules lay down guidelines for collection (Rule 5) and transfer of information (Rule 7) and also mandatorily require body corporates to adopt and implement a policy for privacy and disclosure of information (Rule 4).
On 24 August 2011, the Ministry of Electronics and Information Technology issued a clarification to the SPDI Rules ("Regulatory Clarification"). The Regulatory Clarification states that the SPDI Rules are applicable only to body corporates or persons located within India. Also, where a body corporate deals in data of any legal entity located within or outside India under a contractual arrangement, the SPDI Rules pertaining to collection (Rule 5) and disclosure of information (Rule 6) would not apply. It was also clarified that requirement to obtain written consent under Rule 5(1) of the SPDI Rules includes electronic consent as well.

The Personal Data Protection Bill, 2019 ("Bill")

The Bill is inspired from and is in many ways a replica of the European Union's General Data Protection Regulations ("GDPR"). The Bill lays down several provisions including in relation to crossborder transfer of data, sandboxing, privacy by design and introduces a more robust set of obligations for entities handling sensitive personal data. The Bill is currently pending before a Joint Parliamentary Committee. The Bill applies to and categorises data into 'Personal Data', 'Sensitive Personal Data' and 'Critical Personal Data'.

Sectoral regulations

Regulated sectors such as telecom and financial services have separate obligations of confidentiality which restricts disclosure and transfer of customer personal information and mandates use of such information only in the manner agreed with the customer. Certain sectoral regulators (like Reserve Bank of India) also mandate data localisation.

C. Blockchain technology and data privacy

For details on the working of a blockchain network, please refer to our previous paper here.
Coverage
The Bill defines 'Personal Data') as 'data about or relating to a natural person who is directly or indirectly identifiable'. This means where the origins of the data cannot be traced down to a natural person, the data would cease to be 'Personal Data'. Resultantly, storing the data in a manner where it cannot be traced to a natural person (including by introducing and implementing robust methods to address re-identification risks) may prove beneficial in reducing a blockchain network's interaction with data privacy regulations (such as by encryption or anonymisation of Personal Data).
Public v. Private Blockchain
Private blockchain which restricts and regulates network participation appears to be a more preferable fit when it comes to ensuring compliance with data privacy laws. Public blockchains with permissionless borders pose greater difficulty in procuring every participant to agree on and comply with relevant rules on protection of personal data.
Stakeholders
The Bill identifies three categories of stakeholders (similar to GDPR) viz. Data Principals, Data Fiduciary and Data Processor. The SPDI Rules only provides for data provider and body corporate or person collecting data. The term 'Processing' has been defined to include collection, storage, retrieval, adaptation, disclosure etc. (Section 3(31)). Accordingly, any data stored or transmitted on blockchain will amount to processing.
Blockchain network is a decentralised system with each node / miner (i.e. network participant) spread all over the world. There is no clear demarcation between a Data Principal and a Data Fiduciary or a Data Processor over a blockchain network. The way the network functions, no single person can be said to be in-charge of the network thereby making it all the more problematic for regulators to fix the compliance burden on a party. Accordingly, the question of determining the identity status and fixing liability of various participants attains significance and complexity over a distributed ledger network like blockchain.
Each node over the network functions as a Data Processor on account of participation in the verification of the data. At the same time one or more of such nodes may also be acting as a Data Principal. With respect to mining over the network while it is a single miner who is able to formulate a valid hash, all the other miners also participate in the mining activity when they attempt to arrive at the winning lottery number. Thus making such miner also a Data Processor. While fixing liability on a private blockchain network that restricts the number of network participants is comparatively less complex, the same would be quite challenging on a public blockchain network, such as Bitcoin. With regard to identifying the status and roles, the guidance issued by French data protection authority ("CNIL Guidance")3 in the context of GDPR is useful. The CNIL Guidance categorises blockchain actors into the following groups: (a) participants with full read and write access to the data; (b) participants with read only access; and (c) miners that validate the transactions.
Participants falling in category (a) above are Data Controllers (equivalent to a Data Fiduciary under the Bill) while categories (b) and (c) are not.
Collection and processing of data over a blockchain network
The Bill sets out a number of obligations that have to be performed by the Data Fiduciaries, some key compliances being, obtaining consent of the data principals, retaining the data only till absolutely necessary (Storage Limitation), providing notice to the Data Principals, ensuring data is used only for the purpose (which has to be specific, clear and lawful) for which it has been taken (Purpose Limitation). Rule 5 of the SPDI Rules also lays down similar obligations for collection of data. Key concerns that the inherent and intrinsic nature of the blockchain technology raises are as under:
Firstly, with respect to the Storage Limitation principle, the immutable nature of the technology prevents the data from being deleted once the purpose has been fulfilled.
Secondly, given the decentralised nature of blockchain, it becomes challenging to determine the exact purpose for which data is collected over such a widespread network and who is to keep a check that the data so collected is used only for such predefined purposes.
Thirdly, it is commonly argued that the network participants over a blockchain impliedly consent while sharing their data. This may not however fulfil the requirements under the Bill which requires consent to be clear, through an affirmative action. This gives birth to concomitant regulatory issues over a decentralised system as to who shall oblige with these compliances under the law and who should be made responsible / liable for any lapses in compliance.
Lastly, the Bill also proposes certain additional requirements such as transparent and fair processing and the Purpose Limitation. The blurred distinction in the status of identities in blockchain makes determining purpose and manner of processing challenging.
A detailed governance framework setting out roles and responsibilities, off-chain and on-chain personal data, may provide useful guidance towards addressing the aforementioned concerns.
Key rights of Data Principals

Right to Confirmation and Access

The Bill entitles the Data Principals to seek information regarding the types and nature of personal data stored with the Data Fiduciaries, or to ascertain the nature of processing activities that has been undertaken on his/her data, or seek a brief summary of processing activities undertaken. While enforcement of this right may not be technically difficult, however, blockchain networks may establish a proper governance framework that delineates a specific authority to pass over the requisite data to the data principal as and when asked for. The network may also consider laying out methods of searching and accessing the necessary information which may be de-encrypted with the use of the private key.

Right to Correction

Section 18 of the Bill and Rule 5 of the SPDI Rules provides the right to rectify or correct the data. Given the immutable nature of the decentralised ledger maintained on a blockchain, exercising this right may not be compatible. To accomplish alteration/correction of data would be a burdensome task since it will require a majority of nodes to come together to identify the data, alter and re-hash not just the concerned block but also all previous blocks as well. Alternatively, a new block with corrected information may be added once verified through the consensus mechanism.

Right to be Forgotten

The Bill introduces 'Right to be Forgotten' ("RTF"). RTF entitles data principals to request the removal of his/her personal data, without undue delay, from any business's storage. RTF has been in loggerheads with the inherent immutability of blockchain technology. Across jurisdictions the term 'forgotten' has been pegged with erasure and is construed in various senses in different jurisdictions, ranging from data anonymisation,4 destruction of hardware,5 putting data beyond use.6
Given the distinction within the types of blockchain, the modes for exercising RTF are uniform by and large. A widely discussed solution is the destruction of the private key, thereby rendering the data encrypted by a public key inaccessible.7 Owing to the setup of blockchain, a Data Principal may reach out to any entity in the chain that qualifies as a Data Fiduciary to enforce their rights. Similar
to the Google-Spain case,8 wherein data subject's action against Google remained unaffected by the fact that the data could have been removed by the newspaper's website itself.9 However, the nature of a public blockchain network that does not identify a central authority might prove somewhat problematic where the data principal seeks to enforce his/her right.
As countries are yet to formulate policies with respect to regulation of blockchains, some other alternatives for exercising RTF can be programming chameleon hashes, zero knowledge proofs or a censorable blockchain, as the same would be 'forgetful'.10
Cross-Border Transfer of Data
Chapter VII of the Bill, which deals with restrictions on cross-border transfer of data, requires a copy of the Sensitive Personal Data to be stored domestically while Critical Personal Data must exclusively be processed and stored in India. However, these clear demarcations blur when applied to a blockchain ecosystem where storage and processing of data can be universal. Transfer of Sensitive Personal Data, requires explicit consent and the transfer must be under a contract or an intra-group scheme approved by the data protection authority (envisaged to be established under the Bill). While both of these requirements may get fulfilled over a private blockchain easily, a public blockchain due to undefined groups and lack of a central entity / authority may find it more challenging to implement adequate safeguards on restricting such transfer. Over a private blockchain the central body may enter into e-contracts with any number of participants and also obtain their explicit consent.
Under the present regime, Rule 7 of the SPDI Rules provides that a transfer outside India may only be allowed where the country offers the same level of protection to the data. Again, enforcing this may be challenging over a public blockchain network comprising of thousands of nodes across borders. An in-built cross-border transfer consent clause in the governance framework or otherwise may also provide the needed legitimacy from the perspective of data privacy.

D. Jurisdictional Issues

The present uncertainty in law (including lack of adequate legal provisions) has resulted in jurisdictional issues concerning the domestic and transnational presence of the blockchain network. While Section 1(2) read with Section 75 of the IT Act accords limited extra-territorial applicability to the Act, the SPDI Rules, as mentioned in the Regulatory Clarification are applicable only to body corporates or persons located in India. Consequently, blockchain technology may need to comply with the IT Act to a certain extent, while, the mandate under the SPDI Rules will bind only the nodes/miners operating from India. As a result, the network participants operating outside India on the same blockchain will not be required to comply with the SPDI Rules or IT Act.
Section 2 of the Bill affords extra-territorial application but only in certain limited circumstances viz. where the processing which takes place outside India is in connection with any business in India, or which involves the profiling of individuals within India. This will result in a subjective assessment of blockchains and its purposes in order to ascertain the applicability of the provisions of the Bill.
The Civil-Commercial Courts in India, have applied the test as to whether a website is an 'interactive website'11 for determination of jurisdiction, in relation to websites that do not have a physical place of business in a jurisdiction.12 In other words, wherever a website facilitates or even intends to facilitate active trade / commercial transactions in jurisdictions where it does not have a physical place of business, in such cases cause of action, if any, arises in all such jurisdictions where the website operates interactively. However, applying such a test on a blockchain network may not be so straightforward. The intrinsic nature of the blockchain technology allows for processing and storage of data at multiple domestic and international jurisdictions simultaneously. Resultantly, in both domestic as well as international, identification of the place of cause of action becomes complex. The complexity increases as identification of the individuals processing and storing data (nodes) would require de-anonymisation.
The determination of applicable laws will also depend on the nature of a blockchain network. It is practically more difficult to regulate a public blockchain network than a private blockchain network. In a private blockchain the architect/controlling entity may determine the governing laws or the governance framework may provide for a governing law.
In light of the foregoing, it may come as a mammoth task for governments to enforce their respective data protection and cyber-security legislations against such transnational networks without consensus on a multi-national treaty suggesting a model law to regulate the use of blockchain networks. In the alternative, laws may promote self-regulation by merely identifying basic tenets of regulations like governing law, data privacy, certification etc. Non-compliance may include compulsory suspension/termination of participation rights of nodes or blocking access to blockchains which do not provide for adequate self-regulation.
The developers of blockchain networks may consider incorporating dispute resolution and regulatory mechanisms as integral parts of the networks. The developers may also consider coding networks with peer-to-peer decentralized courts such as 'kleros' or 'codelegit' as part of a network's dispute resolution process.

E. Way forward

Blockchain technology carries the potential of disrupting business operations right from supply, manufacturing, logistics and final consumption especially in a post Covid-19 era. Please refer to our previous article on use cases of blockchain here. Accordingly, it is crucial that data privacy laws (with adequate concessions, where necessary) be treated as an enabler and not inhibitor to continued adoption of blockchain technology. Certain additional rights like data portability and right to withdraw consent adds to the complexity of having a compliant blockchain network. Certain obligations like mandatory registration may also be problematic if the government notifies certain blockchain network as a significant data fiduciaries.
Set out below are few indicative measures towards harmonious application of data privacy laws and blockchain technology:
1) Every blockchain network must provide a detailed governance framework that is in alignment with the basic requirements under data privacy regulations. Such a framework would have to be binding on all participants over a blockchain network, stating all rights, obligations and duties of parties, including a detailed mechanism for communication, security measures, cross-border data transfer, and grievance redressal and may even set out applicable laws etc.
2) Such a self-governance framework could also include a privacy by design policy and provisions for Data Protection Impact Assessment (as set out in Chapter VI of the Bill).
3) 'Pruning' is used for situations where historical blocks of data beyond a certain timeline are deleted. Similarly, where data has to be altered or rectified, the same may be done by 'forking' where data is altered or deleted, the hash changed and a new fork is created. However, over a public blockchain Pruning and Forking can be challenging and may require a huge amount of computing consensus.
4) To ensure the safeguarding of right to privacy a Memory Optimized and Flexible Blockchain (MOF-BC) can be considered as an effective measure. It enables the IoT (Internet of Things) users and service providers to edit their transactions, thereby altering the details of data entry.13
submitted by BlockDotCo to u/BlockDotCo [link] [comments]

Interview With Eddie Jiang: How CoinEx Is Adapting To The Exchange Space And Growing

Interview With Eddie Jiang: How CoinEx Is Adapting To The Exchange Space And Growing
Written by chaintalk.tv
https://preview.redd.it/v238540taz751.jpg?width=1280&format=pjpg&auto=webp&s=2a852e171a74e49da802d7c12fadba452cf4cf43
We recently had the opportunity to interview the VP of ViaBTC Group, Eddie Jiang. ViaBTC Group owns popular crypto exchange CoinEx and ViaBTC Pool. In this interview Eddie discusses being the first exchange to use BCH as the base currency, ViaBTC Pool and integrating with CoinEx, new features and ambassador program, and competing with other exchanges like Binance and Huobi. Please enjoy the interview below.
How come you decided to open up CoinEx to other cryptos other than just BCH?
Eddie Jiang: CoinEx is the world’s first exchange to implement Bitcoin Cash as a base currency. At that time, it was evident that there was a demand for BCH trading markets, and we are the first to explore this opportunity. It also shows our determination to support the BCH’s development.
As CoinEx is developing, our goal becomes bigger and we are aiming at the global market. We need to constantly improve our product diversification to meet the different needs of more users, so we open up to other cryptos. In the past six months, we have listed more than 50 new tokens. Up to now, we have listed 129 cryptos and 313 markets. Besides, in addition to spot trading, CoinEx also supports perpetual contract and other derivatives trading.
How does CoinEx integrate with the ViaBTC Pool?
Eddie Jiang: ViaBTC Group announced a strategic upgrade, which included a new organizational structure, product innovations and service improvements, on 30 May.
As part of the change, the Group has established three dedicated business units (BU): the financial services BU, consisting of ViaBTC mining pool and CoinEx exchange; the infrastructure services BU, including ViaWallet and Blockchain Explorer; and the ecological development BU, focusing on the research and development of public chain technology and the construction of the ecology.
After halving, the combination of mining and finance will become closer and closer. Investing in mining machines is like buying a Bitcoin option. Miners need more flexible financial products to maintain and increase the value of assets, or hedging services. Based on this judgment, the operations of ViaBTC mining pool and CoinEx exchange will be integrated in the future to realize the financial empowerment of the mining pool to meet the diverse financial needs of miners.
Features of this integrated product upgrade can be summarized as: “ The mining pool is the wallet, and the wallet is the transaction.” ViaBTC is the world first mining pool that has a wallet embedded in the mining pool account. Users do not need to transfer the mined coins, and can realize the function of coin exchange within the wallet. For example, they can directly convert the mined coins into USDT to pay electricity bill. What’s more, users can store, deposit and withdraw their revenue, and transfer assets to CoinEx at any time without charge, as well as complete other operations on the exchange, such as purchasing wealth management products for asset preservation and appreciation. In addition, we also provide hedging services. All of the above functions can be completed in one stop in the mining pool, without the need to transfer assets between different platforms.
The exchange empowers the mining pool, and the mining pool will further bring more traffic and resources to the exchange. The two complement each other and development coordinately.
CoinEx has recently added many new features. Can you talk about what new updates were made to the platform and why you made them?
Eddie Jiang: We have always attached great importance to the development of overseas markets since our establishment, and one of our major goals this year is to cover at least 10 different languages speaking markets.
To realize this and to meet the needs of more users worldwide, CoinEx has been continuously optimizing and upgrading its operating strategies, products and services. Our product diversifications are constantly improving. As I said before, we have launched leverage trading, perpetual contract trading, and wealth management products in addition to just spot trading. However, we don’t ignore the importance of spot trading. More mainstream, popular, and high-quality tokens have been listed, and up to now, there are 129 tokens and 313 trading pairs on CoinEx.
During the epidemic, we have never slowed down our development. Lacking of the OTC service has always been a shortage for CoinEx. In March, we partner with Simplex to integrate the first fiat onramp to our platform. People now can buy crypto with their credit cards, which lowers the threshold for more people to enter the crypto world. Moreover, we announced global strategic partnership with Matrixport to provide people with large amount of fiat to crypto needs the OTC service. These newly launched services also help to attract more users.
At the same time, CoinEx has been launched in Arabic, Italian, English, Japanese, Russian, Korean and other 16 languages. Earlier we also carried out product upgrades, making the UI and function sections clearer.
In terms of operations, we launched an upgraded CoinEx Ambassador program in March. To best utilize each ambassador’s personal strengths, there are four categories of CoinEx Ambassador with different responsibilities, namely Referral Ambassador, Marketing Ambassador, Operation Ambassador, and Business Ambassador, which will expand our brand’s exposure and help CoinEx grow into a more international exchange platform.
From March until now CoinEx has seen a 100% increase in user registrations. Why is that and are you able to see where they are coming from?
Eddie Jiang: Because of the efforts mentioned above, in 2020, we’ve seen an exponential increase in activity in just the past few months alone. In this year alone, CoinEx’s daily registered users increased by 100%. These new users mainly come from markets such as the Middle East, Asia Pacific, and more.
Interestingly, we saw an uptick in traffic from the Middle East in March. User growth in Southeast Asia also picked up significantly, newly registered users increased by 133.6% in April.
With Binance, BitMex, Huobi, Bybit, and Deribit, controlling most of the crypto futures and options markets, where do you see CoinEx fitting in? How do you plan to capture market share from these large exchanges?
Eddie Jiang: We won’t compete with others. We focus on ourselves to improve products and our goal is to be better than yesterday.
Our pace is solid and steady, instead of focusing on temporary heat and flow. We have always attached great importance of spot trading, and we are committed to be responsible for users’ investment. We have set up CoinEx Institution, which is dedicated on project research. A listing committee consist of core team members review and vote on projects recommended by the CoinEx Institution. In this way, fraud projects are avoided as much as possible.
Besides, we will focus on niche areas with great potential. For example, Southeast Asia and the Middle East. CoinEx can serve users in those countries well by providing a platform with rich cryptos to trade, and will pay more efforts on refined operations in different countries.
Moreover, CoinEx has a very complete ecosystem. Financial services, infrastructure, and ecological development, the three business units complement each other. The infrastructure BU is our cornerstone and is positioned as a defensive product; the financial service BU is a cash cow and is positioned as an aggressive product; the ecological development BU focuses on the public chain ecology and is the future infrastructure.
What is the geographical breakdown of the CoinEx userbase?
Eddie Jiang: The current proportion of CoinEx’s overseas users has reached 80% of the total registered users, and mainly in Australia, Southeast Asia, North America, Middle East and South Korea.
Do you have plans to focus on any certain jurisdictions? How will you do that?
Eddie Jiang: When we evaluate regions, two things matter: policy and potential.
Whether an exchange’s business expansion in a region is smooth or not largely depends on the region’s policies. If the region is not very friendly towards cryptocurrency or has repeated attitudes, there will be more difficulties and the cost will be much higher.
For a region’s development potential, we need to think about the demand and market development status. South Korea, Southeast Asia, the Middle East and other regions are all areas with good potential for cryptocurrency development. Compared with Europe and America, policy risks in these countries are lower, and the supervision mechanism is relatively complete. The public has a high degree of awareness of cryptocurrencies. Besides, some regions or countries have inflation problems due to political and economic reasons.
CoinEx will continue to focus on the Middle East and South Asia, which are relatively niche. India has just lifted ban on cryptocurrency trading this year, and there are many cryptocurrency investors in Indian. CoinEx can serve them well by providing a platform with rich cryptos to trade. More people in the Middle East are interested cryptos, especially in countries that are subject to economic sanctions or high inflation. For those people, cryptocurrencies are one of the best choices for asset preservation.
Since the CoinEx Ambassador program launched in March, it has been almost three months. We are conducting the second round of ambassador recruitment. This time, we will use the power of ambassadors to expand our recruitment coverage and strive to attract more crypto enthusiasts from all over the world to grow together with CoinEx. Moreover, we will launch the National Expansion plan and leverage on the CoinEx and ViaBTC mining pool resources, to further explore the Russian market. At the market level, we will make more PR efforts in local markets, and start refined operations.
What is CoinEx Chain and CoinEx DEX?
Eddie Jiang: CoinEx Chain is a public chain built on the Tendermint consensus protocol and the Cosmos SDK. It consists of three dedicated public chains parallel to each other. Among these three chains, CoinEx DEX meets the most basic needs of DeFi for token issuance, transfer, and transactions. The Smart Chain is designed to meet the needs of complex financial scenarios and delivers programmable cash. The Privacy Chain facilitates privacy and security.
On November 11, 2019, we took the lead in launching the Mainnet of CoinEx DEX. CoinEx DEX is the world’s first public chain dedicated to decentralized transactions. Users can easily manage their digital assets on it.
CoinEx DEX can fully satisfy the following conditions: users have private keys at their own disposal; transfers and transactions are all completed on-chain, which is 200% transparent and checkable; the issuance, transfer, and transaction of tokens do not require review or permission; the community governance and operation is decentralized, similar to EOS, and validators are introduced to the community ecosystem construction and governance. There are currently 41 validators.
It also has extreme performance. TPS reaches as high as 10,000 and transactions are confirmed within seconds. The transaction fee, 0.0001 US dollars for each transaction, is negligible.
Third, it’s simple and easy to use. The new operation interface design helps beginners get started quickly; with the one-click token issuing module, users only need to fill in a few items to issue tokens; the built-in automated market-making module guarantees liquidity.
How will CoinEx DEX improve the decentralized exchange space that has been unable to gain much adoption?
Eddie Jiang: There are many challenges and difficulties facing centralized exchanges. The first difficulty is security. Security is a huge concern for CEXs. Over the last 10 years, hackers have stolen more than $1.5 billion from centralized exchanges. In fact, research groups estimate that hackers stole somewhere between $950 Million and $1 Billion from centralized exchanges in 2018 alone. There were also incidents of coin thefts in other exchanges in 2019. Many exchanges, such as Mt. Gox, Youbit, were forced to file for bankruptcy and shut down as a result of hacks.
The second is high management costs. Centralized exchanges need to list a large number of cryptocurrencies and each of them have different trading pairs. That entails huge efforts in development and maintenance and, thus, high management costs.
The last is global policies. Cryptocurrency is faced with different regulatory policies in different countries. Every time a centralized exchange enters a country, it needs to adapt itself to local regulatory policies for compliance. This is a holdback for the exchange’s rapid market expansion globally. Such adaptation will also bring a huge learning cost for the exchange team.
Obviously, these problems can be well solved by DEX. CoinEx DEX is a true DEX with full open source and full community governance, as well as without depending on official nodes, websites, wallets, etc. On DEX, users are able to in charge of their own private keys and assets all by themselves. Their assets are more safe and secure. Transfers and transactions are all completed on-chain, which is 200% transparent and checkable; and the issuance, transfer, and transaction of tokens do not require review or permission. What’s more, CoinEx DEX provides a great and convenient user experience.
How will CoinEx Chain and DEX help the crypto industry as a whole?
Eddie Jiang: The public chain is the cornerstone of the blockchain industry. CoinEx Chain has the parallelism of multiple dedicated public chains, each of which performs its own functions, by cross-chaining for both high performance and flexibility.
CoinEx Chain is committed to building the next generation of blockchain financial infrastructure. It is a more complete ecosystem built around the DEX public chain. The DEX public chain is a dedicated public chain developed specifically for token issuance and trading and the biggest improvement on trading speed, so it only supports the necessary functions, not smart contracts.
But smart contracts are the foundation for building more complex financial applications. Outside the DEX public chain, CoinEx Chain also includes a Smart Chain that supports smart contracts.
Moreover, as privacy issues on the current blockchain have been criticized, it is one of the core tasks of CoinEx Chain to safeguard users’ privacy. Similar to the Smart Chain, the Privacy Chain specifically supports transaction privacy protection. With cross-chain circulation, it can improve the privacy characteristic of the entire CoinEx Chain ecosystem.
Nowadays, 1.7 million people in the world have no bank accounts; however, among them, two thirds are smartphone users with huge demands for financial services. The public chain will empower DeFi applications’ development and popularization, not only help more companies to seize the huge market opportunity, but also to bring lasting transformations and improvements in people’s lives.
With so many crypto exchanges, what is the future outlook of CoinEx when it comes to the crypto exchange space?
Eddie Jiang: It has been nearly 3 years since CoinEx has been launched, but it’s quite young for an entrepreneurial team. We have seen too many projects’ failures due to governance issues. CoinEx has a very elite team with high technical and management capabilities. In terms of business, CoinEx has gradually developed with diversified business and a complete ecosystem. It’s clear that the market will still grow very fast in the future, and the market size is still very large. We will continue to improve our products, put more efforts in marketing and operations, as well as look for more high-quality projects, to increase the number of users and transactions on the platform. Lay a solid foundation, and I’m sure the time will come for us to shine.
What updates is the CoinEx team most excited for?
Eddie Jiang: We are very excited about the National Expansion Plan which will be launched later this year. It is an important part in CoinEx’s globalization strategy. We will actively explore some new markets while consolidate the original ones. CoinEx will set aside 10 million US dollars to set up a “Pioneer Fund” to support this plan. This fund will be used to support local cryptocurrency projects and promote the development of the local cryptocurrency communities through investment or cooperation. Our goal this year is to invest in projects and communities that are conducive to expanding the CoinEx ecosystem in countries with high development potential.
Original article
Click HERE to register on CoinEx
submitted by CoinExcom to btc [link] [comments]

Best Time To Trade Bitcoin Profit In India - MONSIEUR ... Bitcoin Trading Courses India - Safe Way To Trade Binary ... How To Trade Bitcoin In India  2020 Updated (In Hindi ... Not known Facts About Bitcoin Trading Courses India - Safe ... BITCOIN TRADING INDIA - YouTube

Unocoin is India’s most trusted place to trade Bitcoin (BTC), Ether (ETH) and Tether (USDT) and the largest ecosystem of traders in the country. Trade in USDT, BTC, ETH or INR market with high volume and liquidity. Bitcoin Investment – Bitcoin is cryptocurrency. Bitcoin has started gaining popularity in the year 2016. In five years, bitcoin has become the costliest currency across the world. As Bitcoin trading has become legal in India, many people India are searching for legitimate ways to invest in bitcoin. Leading Indian IT company, Tata Consultancy Services (TCS), is launching a cryptocurrency trading solution for banks to allow their customers to invest in cryptocurrencies. TCS is part of the Tata The Bitcoin industry in India was once growing at a terrific rate as users were flocking to this digital currency to take advantage of its rapid price appreciation. Meanwhile, the demonetization of the Indian rupee by the country’s government a couple of years ago had led to an increase in demand for Bitcoin, but the sad news is that Satoshi created Bitcoin because he felt that central banks were inefficient. 9 million in December 2017. org/), which is the most reliable & transparent bitcoin mining pool. bitcoin-india. Bitcoin (BTC) trading in India is experiencing a resurgence since the Supreme Court's decision to nullify the central bank's 2018 crypto ban.

[index] [5] [76] [48] [179] [369] [386] [23] [304] [109] [210]

Best Time To Trade Bitcoin Profit In India - MONSIEUR ...

Trade your INR P2P for crypto and receive instant access to the entire OKEx ecosystem. Watch this video for a step-by-step tutorial to get you started. Start trading crypto with INR here: https ... CoinSwitch : Indian Bitcoin Exchange Full Guide in Hindi Bitcoin Trading and Exchange BTC to INR App Download Link :- https://coinswitch.co/in/refer?tag=2h... Learn This Here Now: https://bit.ly/3gJk8CB - Bitcoin Trading Courses India - Safe Way To Trade Binary for Dummies Upgraded Jul, 2020 Classification - World ... Check Out This Site: https://bit.ly/3fK3EsT - Not known Facts About Bitcoin Trading Courses India - Safe Way To Trade Binary Excellent brokers have customer ... Weblink for More: https://bit.ly/2PGI4dW - What Does Best Time To Trade Bitcoin Profit In India - MONSIEUR MAJOR Do? The book and then it changes to intermed...

#