What you need to know about a Hacker Fare

Hacker fare Travelling

A few questions you can expect to be answered in this article about Hacker Fare:

  • What is a hacker fare?
  • Where can you find a hacker fare?
  • How can you use a hacker fare?
  • In which industry can you find the use of hacker fare?

It is the dream of many travelers today to spend less on an airfare.  This is because the lesser you spend, the more money you have available for you to secure the choicest hotel accommodation. It also means that you would have much more money to enjoy an amazing tour around the country of your visit.  This goes to show just how important it is for travelers to consider as much as possible, how to cut down on their flight fares. This is were hacker fare comes in. It is usually made in such a way that you can pair your one-way tickets and as such receive a discount on your round-trip ticket. It is now an open secret that many one way tickets cost just much with its high price tag unless it is a domestic flight. This is because many airlines find it a challenge to plan and carry out an open-ended one-way flight

hacker fare flying rates

Hacker fare enables you to get tickets far less expensive as compared to if you are to purchase the standard round trip ticket. No doubt hacker fares is indeed a blessing when it comes to saving money for you. The only challenge many people face is that they feel that it is very difficult to book hacker fares and that the process could be tricky and confusing.  In the turn of 2018, KAYAK (a well known online booking site for travels) came up with a new idea called the hacker fares. It also provided a hacker fare guide which has some of the best places you can also look at when using hacker fares for your trip both domestic and for international destinations. Contained therein the Kayak Flight Hacker Guide,  is also the list of the top-notch airlines’ services in the country and the best stopover counties. The use of hacker fares just got easier.  Now that we know that hacker fares have come to stay, what are some of the answers to your questions as earlier mentioned on the outset of this guide? Let us see.

What is a hacker fare?

cheap flying rates
Cheaper flying rates

Hacker fare simply put is a legal and honest method which could mean saving of flights for you. Instead of just looking to purchase a round trip one a particular airline, it helps you create a kind of road trip which has about two different one-way tickets from the different airline for each travel direction. Well if you are thinking in your mind that this could indeed save good money for you, you are probably right. Hacker fare sometimes does save a good sum of money.

Instead of putting you in a dogged situation where you may be required to book one round ticket for your trip with a single airline, KAYAK makes it much better for you. KAYAK helps you find a two one way ticket which still makes for tour round trip when put together.  It might In some cases entail that you have to make use of a different airline home as compared to the one you traveled with. Sometimes though, it could still be the same airline, but you are in the system traveling as two one ways. Still, your need is that you get to your destination and back paying lesser than you would on a usual round trip flight.  This is your goal no doubt when making use of the hacker fare. KAYAK has the goal of making it possible for you to have various options when you want to travel and to save cost for you as much as possible even if it means breaking your trip for you.

Where can you find a hacker fare?

where to find a hacker fare

Hacker fares have good application and can be used majorly when you want to embark on regional flights. These regional flights include those within the United States, Asia, the Middle East, Europe, South America, and Africa.  In many airlines within the United States, hacker fares work extremely well but with less application in international flights such as between the  US or England to Europe. It is also important to note that whether you fly economy or first class, hacker fares apply to you.

How can you use a hacker fare?

Firstly,  you have to search for a flight. When you find one, you should see a hacker fee boldly and clearly written under the price of your flight. All you just need to do is to simply tap the view deal button, and the process begins. You need to be extra sure that the prices for each of the tickets are available before you book your flight. In order for this to be done, you need to open the flight booking page on a new page or tab in your browser and check again if the price stated earlier is available. After crosschecking, if this is available, you can then book your flight and leave the page. If you so desire, you can forward your booked flight to trips@kayak.com, and  they will start to plan a travel route for you.

It is very important that before you book a flight, you should look at what it would cost you if you choose to select a round trip or if you decide to make use of the two one way tickets KAYAK prices. If you are going from one location to another, why don’t you first search if a round trip will do you good and then also search for the one-way ticket option too? Calculate the cost of the trip from your starting point to your destination and vice versa. It is a very simple and legit practice that would probably save you so much cost.

Which industry can you find hacker fares?

cheaper ticket deals for traveling

Travel

As has been mentioned throughout this article,  hacker fares have a major application in transportation. It has over the years led to cheap flight transport and can make you focus your expenses on other aspects of your travel. It has seen an application with the use of airlines, and now many people look to this whenever they want to book flights for their travels. This is one important industry were hacker fees can and is currently being used.

Hotels

From the inspiration gotten from how much money that was saved by travellers due to hacker fares,  the principle of hacker fares was also tried with hotels too.  Now,  it is commonplace to see what is commonly called “Hacker stays” in some selected hotels today.  How this work is that the company you contacted to help you out with hacker stays could find great deals for the same hotel from different service providers in harmony with when you want to stay. If we confirm that two different rooms, for example, have a special rate on some days of your stay and cheaper for the subsequent days, it can be combined for you. You can then book separately on each of the sites, and we will give you a special confirmation even though it in a way adds up to just one stay. You only need to inform the front desk that you have booked for consecutive stays to avoid switching rooms.

Are you still unsure if hacker fare is the right option for you? Well, take another cursory look at this guide and ask yourself this question: What could really go wrong which cannot be corrected? After your fears must have been allayed, start making plans to make good use of these services.

The Intellectual Dark Web – Defining What It Means

The Intellectual Dark Web

Over the years there has been a gradual shift from the dogmatic acceptance of political and moral views that have put hidden chains on the feet of citizens of this generation. Political and moral views have plagued the world for several years, limiting what people can do and how people can behave in society. People are stigmatized all over the world for doing what most will call “political defiance” or just simply following their hearts and passion. This is where Intellectual Dark Web comes into play.

In the time of oppression, tyranny and general oppression to those who will not simply subject to established morals and political views of the society, a change has come. There is a new shift, a new kid in the block that has the capacity to combat the revered bully (this political injustice) and help create a society where individuals can live free.

There is a movement that has been expanding for many years now, although new to many people it is growing very fast in fame and popularity. There is a name for this movement— it is called “The Intellectual Dark Web.”

Read more about the Dark Social and How you can Track it!

The Intellectual Dark Web was devised by the renowned Financier and mathematician—Eric Weinstein. He put a name on this group, not to expose them (they are not obscured) but to know this group of intellectuals.

What is the Intellectual Dark Web?

What is the Intellectual Dark Web

This bears no similarities with the actual Dark Web that incorporates concealed internet networks or users and has no requirement for sophisticated software.  This group is not hidden; This is a heterogeneous group of intellectuals from students to professors and professionals in different fields. The Intellectual Dark Web consist of individuals who have a different mindset from the one that the political society has instilled in a lot of us.

This group of individuals; Biologists, neuroscientist, Sports commentators, comedians, journalists, entrepreneurs, and physiologist share a common belief. They believe that “political correctness” stifles their ideas and so they see the already established political views that limit individuals and rid them of their personal choices as their enemy.

The ideas of the Intellectual Dark Web

Intellectual Dark Web rebels

What is the Intellectual Dark Web and what precisely are the thoughts that have made individuals like Eric Weinstein, Dave Rubin, Tim Ferriss, Jordan Peterson, Joe Rogan, Sam Harris and Ben Shapiro

Into what an ongoing New York Times profile portrayed as scholarly “rebels” (intellectual renegades)? As indicated by the Times author Bari Weiss, most underscore the natural contrasts among people, an inclination that free discourse is “under attack,” and a dread that identity politics can bring peril to the US.

The Intellectual Dark Web: What People Think

An audience of Harris’ digital broadcast may add to the rundown a vociferous barrier of the legitimacy of hereditary clarifications for IQ contrasts between racial clusters, a supporter of Peterson’s recordings may demand the loathsome impact of “postmodern neo-Marxism” on school grounds, and an aficionado of Ben Shapiro may add an incredulity toward the truth of “transgenderism.”

The Intellectual Dark Web considers itself to be a partnership that resists grounded political classifications so as to protect these thoughts against the crawling impact of thought control. This directs us to another vital definition of the term Intellectual Dark Web, the proposal that its thoughts are dubious, as well as especially inventive in our political minute. On the off chance that the Intellectual Dark Web excites the annoyance of specific pundits in the media, it is for similar reasons that new advances in the web age are “troublesome.”

It would take a certain level of forgetfulness, in any case, not to see that these type of polemics over political rightness are definitely not new: they have existed for something like 30 years, as far back as a strikingly comparative arrangement of media discusses based on school grounds started in the late 1980s and mid-1990s.

At the finish of the Reagan years, political rightness turned into a most loved terror of traditionalist learned people, who trusted that school teachers had locked onto illiberal or authoritarian ideas of equality, and were teaching their understudies with an incendiary perspective of American culture. The present “Intellectual Dark Web” provocateurs once in a while name these ancestors, who in the relatively recent past possessed a comparative place in national media discusses. In any case, the examination recommends that the “renegade” thoughts of these figures are really a settled organization in American talk: an establishment whose house is on the political right.

The Intellectual Dark Web as of today

What is the Intellectual Dark Web and what is evidently so novel about the “Intellectual Dark Web”? It isn’t only its astute utilization of video channels like YouTube or Patreon, however its case to be diverse and trans-partisan. It has turned out to be run of the mill for the individuals from this club when they show up openly — on the web broadcasts of Harris or Joe Rogan, for instance, or on the YouTube channels of Dave Rubin and Peterson— to stretch decidedly both their ideological partitions and their regard for the scholarly ideas that they accept enable them to defeat them. In his prelude to their dialog on his show, for instance, the liberal Harris distinctively lauded the convectional Shapiro for his readiness to discuss him in spite of their differences on inquiries, for example, religion and “free or unrestricted will.” But this kind of collegial discussion will, in general, be a sideshow for where individuals from the heterogeneous group (Intellectual Dark Web) collectively concur.

The primary fascination of Shapiro and Harris’s discussion was not their Ethical hurly-burly, but rather their display of unanimity against the left-wingers that had assaulted both of them. Even with the politically right left, and to a minor degree the neo-extremist far right, these masterminds mean to introduce themselves as protectors of “motive,” “truth,” and “certainties.” This connection to sane standards — not to gatherings or clans — directs them now and again to portray themselves as another political focus.

What is the Intellectual Dark Web teaching us?

Intellectual Dark Web teaching us

On a basic level, these Intellectual Dark Web publicists are right; that motive and discipline have a place with neither right nor left. In any case, a closer look into the real ideas set forward with regards to these qualities, these–as far as anyone knows moderate crusaders against political accuracy may share more similarities with preservationist ancestors than this group care to admit. In spite of the fact that it is unlike political “tribalism,” as one author penned it in the web-based magazine Quillette — the nearest thing there is in comparison to the Intellectual Dark Web — the campaign tends to consider dissidents, progressives, and liberals as its essential enemies.

Be that as it may, not exclusively do these scholars contradict themselves “to one side,” extensively, they reuse the neoconservative arraignment of “postmodernism” so as to clarify the reason for this left adoption by political rightness or correctness.

Jordan Peterson has been the most intense advertiser of this thought, having expressed on endless events that the contemporary left determines its thoughts and strategies from a mix of post-structuralism and Marxism prepared in the US’ colleges: a hypothesis of class battle rethought as a battle to the death between racial, ethnic, including sexual personality clusters.

This theory of post-structuralism and Marxism mix proposed by Peterson is not unanimously accepted by his allies in full. In any case, in different structures all through the diverse open stages of the “Intellectual Dark Web,” you can see endless reiterations of the thought that radical or leftist school educators outfitted with perilous speculations from the Old Continent are transforming cohorts of youthful progressives into foes of the liberal democracy. In a few renditions of this holdback, the Intellectual Dark Web goes more distant than their neoconservatives’ predecessors, whose paeans to customary school educational program frequently had little ramifications outside the grounds.  

What does VPN stand for? Are you using VPN? You should start today!

What is a VPN?

It is well known that the internet is not a safe place to be due to the number of different hackers and troublemakers who are ready to capitalise on errors in your system and hack your PC and steal your identity while you are streaming that free video online. Not only this, but the government agencies are also very keen to track your online activities and your personal information. This puts you in a situation where the “bad” and “good” guys are also monitoring you and are curious in your online behaviour.

VPN to protect data

For many years now your privacy is at risk, and if you are following the news, you probably heard about CAMBRIDGE ANALYTICA case, which is a great example of “good” guys selling your data. Between all this, you all are well aware that the public internet is very much prone to get your identities and data stolen. This is the case with cafe’s, public libraries and sometimes even public transport.

We live in a world where everyone is willing to know what you are doing online and is trying to breach your privacy all the time, and this is where and when the time to think about VPNs (Virtual Private Networks) come in to play. Once you start using them, you are taking a first step of minimizing the risk of your identity and data being tracked and using the internet becomes safer and allows you to sleep at night.

So what does VPN mean and how does VPN work?

What does VPN stand for?

VPN – a Virtual Private Network, is a protected and secure tunnel between two or more devices.What does VPN stand for?

You are accessing the internet via your system that connects you to a server (it is usually a website). So, when you are connected to that server (aka website), at that point your internet activity is accessible to hackers and the agencies.

On the other hand, when you use a VPN, it establishes another connection (a middleman) that involves a private server (VPN). In this case, your connection is routed through the private server which keeps your online activity and personal information hidden. In simple terms, you have got yourself a new server by using a VPN which is a buffer between you and the website.

So now, all you do on the internet passes through that server which is a powerful gateway that opens a new path to access the public internet. So if anyone is looking forward to recording what is being done by you, they will trace you to an anonymous server, not your original location. Which of course means that your identity is now protected.

VPN is NOT a PROXY

A very important thing to understand is that a VPN is not a proxy. Getting this out of the way is very important, so no mistakes are done. A proxy is similar to a VPN but it is not a VPN. It also hides behind a server when you are using internet through a proxy, nevertheless, usually, the quality of the paid private proxies does not devote resources to encrypting all traffic that passes through them, and therefore can accept simultaneous connections from many more users. See a simple explanation below:

VPN and Proxy difference

The functioning of VPN: How VPN works?

As previously mentioned, VPNs offer you a very safe and encrypted gateway to access the internet without revealing your true identity. So when you are assessing internet from just anywhere in the world, any person who would be willing to track your activities will find nothing. So the answer to the question: What does a VPN do? Is:

VPNs are all about encryption where P2P (peer to peer) connections safeguards your data and connections. Just in case the snooper gets his hands on some of the data, he would not be able to access the servers due to secure encryption at both ends.

It is not the only protection of your identity; it is also allowing you to have a whole new location and a new IP address for yourself where you can access the internet without any content filters and intermediation by any of the government agencies. Even your internet service provider will have no clue about what is going on at your end. This allows you to watch Canadian Netflix, or access Linked in if you are in Russia (yes, it is banned in Russia), or use google in China.

Why VPNs are effective?

However, keeping into consideration the utility and effectiveness, VPNs are a high tech product for the people that are looking to keep their private data safe and secure. It is also well known to the people who like their online privacy to be visible only to them.

Which VPNs to use for better safety?

So now since you are aware of why a VPN is extremely necessary and how it works, it is time to introduce you to some of the famous and easy to use VPN services.

Some of these services are free while some are paid. But the one thing that is common in both of them is the quality! They both work fine. It only depends on what you are planning to use the VPN for. I will start with my favourite ones:

  • NordVPN:

NordVPN top VPN

It is one of the VPNs that serve from a lesser number of locations and just around 5000 servers. However, they make sure that their servers are not flooded while they maintain the privacy to hold their brand name and reputation strong as they position themselves as the most secure service you would ever find. Its connections are an end to end encrypted and can be used on as many as six devices in a single time. As far as the prices are concerned, its longer duration plan is very economical while the short-term ones are equally ridiculous in my opinion.

  • Express VPN:

ExpressVPN free trial

It is one of the most reliable VPNs with over 2000 servers in 148 locations that are supported on three device types. It is well known among the users for its fast speed and efficient customer support. However, it is a paid service and comes in various packages. Each of the packages has certain perks that come with it for you to choose from. You can even opt for its free trial in the start which is something I like that companies do.

  • IPVanish VPN:

IPVanish VPN service

It is known for its superb speed although it has about 1000 servers in 60 countries only and does not offer a trial (which is a pitty from my point of view). Still, it is widely known across the world for its connectivity and a well-built client support. The only drawback it has is that it is much more expensive than the other VPNs, but the point here is; here, you get what you pay for! Seriously!

  • VyprVPN:

vypr VPN security

It is the VPN service we would recommend you if you want to remove the data limits while streaming from your VPN clients. They offer unlimited data usage and are supported by 700+ servers. Not only this, VyprVPN has about 200,000+ IP addresses for its users which means you can do just about anything you wish! It even supports above 3-5 devices which is another plus in comparison with other competitors. The only issue you might have is, its monthly plan is a bit expensive especially in the case when your usage is not that big.

  • TunnelBear:

Tunnel Bear VPN

This one is one of the trending VPNs. Its 1000 servers are located around 20 countries while they are proliferating. TunnelBear is the easiest VPN to use with a free VPN as a free trial backed by 500 MB data limit tool! Regarding pricing, they offer a competitive price on all kinds of packages.

  • Ivacy

The company has servers in 50+ countries, with 1000+ servers in 100+ locations. They have a variety of uses they supports which in my understanding other companies should build their content around. I had a chance to use their VPN across my devices, and most of the time the connections was stable, nevertheless, some applications refused to connect through the recommended servers. They are a competitor in their market and can be considered as an option.

  • NameCheap VPN

This service provider I am using for many years to host my websites, buying domains, using website builders and other services they provide. Everything is working great on their end, except a little bit uneducated service support. The pricing is very competitive on the market, and the quality represents and over delivers with the prices they have.

In short, if you want to stay safe while browsing online, do use a VPN to make sure your privacy and security are both upheld.

What is Instagram Shadowban?

instagram Shadowban ban

There is a great buzz about Shadowban and people are looking for the most proper information about what is it and how it is affecting the social media presence. Today we have come up with the latest information about Instagram shadowban as well as twitter shadowban, what it is, how to get it, avoid it, and the reasons why are people getting it.

So, to know more about this, all you need is to read this article for the better understanding of the whole process.

What is Shadowban?

The term Shadowban refers to ghost banning, and sometimes as stealth banning. This banning type is affecting the online accounts that are found to be violating the rules and terms of service and conditions of a specific social media platform which regulates online community’s ethics.

You might have heard about Instagram shadowbanning and shadowbanned twitter accounts. These are the most known bans, which are affecting the users and are very frustrating because it takes you some time to realize what had happened. What to do when you get shadowbanned?

 

  • Instagram Shadowban
    instagram Shadowban

Before going deep into the Instagram Shadowban, it is necessary to keep in mind that Instagram has been implementing different algorithms since 2016 and as a result of this, there are accounts which have got affected and now are experiencing decreased engagement on their channels, decreased post visibility and likes.

This still does not mean that your account has been shadowbanned, it might be that the content on your account is not engaging enough. Due to all the updates Instagram releases, it has become very difficult to have engagement like it was 2 years ago.

In 2018 Instagram shadowban happens when an account has violated Instagram TOS or does not fulfil the requirements of rules and terms and services of the platform. And because botting and other violations, Instagram started filtering out those accounts more strictly and are looking even into real peoples accounts which are not satisfying their terms of service

When your account is Shadowbanned, it becomes practically invisible and blocks your ability to engage new people. In more simple words, the account will no longer be able to share your images by the use of hashtags which people who are not already following you. Research by hashtags is still a very powerful and popular way of engagement on Instagram, and by blocking all the tags on your photos is equal to yelling under water.

Your photos are still can be seen by your current followers but will they not appear in the news feeds of other people when they use your specific hashtags. This is bad news for new accounts because nowadays building a following is much harder than ever before in the history of Instagram.

How to check if your Instagram is Shadowbanned?

There is a website which allows you to check if your Instagram account was shadowbanned, of if some posts or hashtags which you have posted are shadowbanned by the community. To check:

  1. Go to Tribberr
  2. Fill in your usernameInstagram Shadowban
  3. The tool will analyze last 10 posts and checks if you have any hashtags which are banned
  4. Instagram Shadowban dexter_rullez
  5. Remove the hashtags which are affecting the post from being visible on that specific hashtag

Twitter Shadowban

twitter shadowban

A very similar case with Twitter; because they have rolled out stealth banning by merely cracking up their algorithms. So if your account is suffering from Twitter Shadowban, means that your tweets will be harder to find and will not appear on everyone’s feed who is following you. Therefore, as we have mentioned above, the reason for both platforms is a same-the violation of terms and services.

If you think that you can get more followers, or tweet replies by bots or some other manipulation, then you are wrong. The reason is now the social media platforms are securing their platforms for the purest and fair search results and user experience, and using bots, buying links, buying shares and reposts is not going to benefit you account in the long run.

How to know if my account is being Shadowbanned?

The simplest way to check whether or not shadowban has targeted your account is simply asking few people who do not follow you to check your specific photo with any hashtag or use the website I have mentioned above. We aware that sometimes the number of hashtags can also be an indication of a shadowban of your account, as abusing those to get more likes is just not going to work.

But in another case, if there any hashtags banned on your account, it must be a problem with your engagement strategy, which is most often the issue. The positive side of it is that you can work on it!

What are the reasons for Shadowbanning?

Until now Instagram and Twitter have not clearly defined what the main reasons behind shadowbans are, but according to professional internet marketers, there are more of your actions which are responsible. For example spamming people, commenting the same comment always, getting reported for something insignificant already puts you on the list of accounts to be aware of.

There are a couple of well known and popular reasons why you can get shadowbanned:

  • Using Bots and Scheduling Software

If you are using Instagram bots or software for your Instagram, then you are violating the terms and services of Instagram. Scheduling software allows posting images on your behalf regularly, follow and unfollow users, like pictures, comments on pictures etc. These actions are forcing the application to send push notifications to more users by abusing the system, and that is a violation of terms and conditions as you are exploiting the software abilities in an unethical way.

  • You are abusing Hourly Limits

Instagram has a limitation of likes, comments, messages per day. If you are abusing those limitations, then surely, you will be penalized for it. Some penalties mean that you cannot like, comments or follow others anymore. This can last to a couple of days, or in a shadowban or a ban of the account, which is, of course, everyone wants to avoid.

  • Broken Hashtags

Most of the time the platform categorizes your content by hashtags which are being used. Which is why it is essential to choose hashtags which are in a very unsaturated, not shary or grey area niche. For example, if you use an innocent hashtag #beautyblogger, then might be it can overrun with inappropriate or adult content, which can count as spam and Instagram can take notice of it and ban your account. Keep in mind that this is just an example and Instagram is not that radical, nevertheless, this is a flag which is not beneficial for your account.

popular banned hashtags

How to avoid being shadowbanned?

  • Stop using automated software and bots

It is essential to remove all kinds of bots and software to report, reschedule, and re-comment on your account posts. The reason is if you are using multiple accounts with the same bot, the chances you might get suspected when using same IP address is very high.

It is always better to have 100 followers who love you and support you than to have millions of followers who do not know you, or are bots themselves or irrelevant to your niche.

  • Take a break of 48 hours from actions from your account

Please hold on and do not get your account overloaded with a bundle of images, comments, likes, personal messages, follow and unfollows. It might be considered as spamming if you are doing more than the limit that has been defined for your account. IF your account has more than 5k, 10k, 25k, 50k, 100k of followers, the limits for actions differ.

Conclusion

Use Instagram responsibly, do not use bots, engage with your audience, get into a niche which can bring value to the followers and audience of your account. Do not abuse the system, because it will backfire on you sooner or later.

You can follow me on my Instagram

Effects of Overeating and How to Stop

Overeating

Are you suffering from overeating? Are you one of the compulsive eaters and desire to stop eating? Well, it is common and you do not need to panic. All you need is to find a solution that can help you to overcome this issue.

Today we will look into the problem which some people struggle with – overeating. As well as we will answer how you can overcome it, and what are the solutions you can consider to solve it. Moreover, we will discuss the effectiveness of overeaters anonymous and what are overeaters anonymous meetings are all about.

If you are one of those who likesDoritoss and mountain dew while watching Bojack, I want to prove to you that there is hope and you can achieve anything with sheer will-power and courage.

Definition of overeating

Overeating Anonymous

“The simple meaning of overeating is the excess relationship to the energy that organism starts to consume, which lead to weight gain and often obesity. Overeating is also known as an eating disorder that can target anyone”

Moreover, the term overeating also refers to specific over-consumption episodes. Means, people start to over consume during festivals, binge-watching Netflix, stress, boredom etc. If we look at the symptoms of overeating, then anorexia, bulimia, nervosa, and binge eating disorder are the most common one.

The reasons why some people over consume varies. For example, some people overeat in stress, to relieve depression, while some do when they have feelings of helplessness. Noticed that happy people do not overeat?

Problem Statement: Overeating

Overeating

No doubt, global overeating has become the most common and even bigger problem than world hunger. More people are now overweight than underweight. However, the biggest study of worldwide trends in body index has recently revealed that, over the past 40 years, the rate of obesity has increased up to 2.6 fold and that the number of obese people worldwide has blown out from 105 million to 641 million.

Well, why we are discussing this issue at a worldwide level? Let us have a look at on our overeating patterns.

We all are overeater from time to time, and take an extra hand when drinking with friends and family dinners, when you are full but still having dessert is like a religious thing to you. However, this is the case with ordinary people. For binge eaters, it is almost uncontrollable to stop overeating. With this disorder, the patient finds himself helpless to stop this bad habit and consume a normal amount of food.

The symptoms of Binge Overeaters usually begin in early adulthood or late adolescence. The episode in such state remains last for two hours or might be a full day long. It is not necessary to be hungry to overeat; they eat because they “just feel like it”. It is more like a cycle when a person consumes when in a good mood. The same as when a person is in depression and to sate food cravings.

There are many reasons for overeating, but the most common is to sate body needs. However, if it becomes an eating pattern for someone and he gets easily compromised with it, then overeating can lead to many eating disorders.

overeating

So, the people with disorders like binge overeating and Bulimia Nervosa use food for the following reasons:

  • To escape from anxiety and depression
  • To reward themselves
  • There is a stressful issue, or they need to get away from some problem
  • Soothe fear, shame, and sometimes loneliness
  • Might be eager or frustration.

However, it is not necessary that overeating will remain for a short time like during holidays. It will not remain for a short time as in most cases overeating can cause long-term damage to individual health due to over-consumption. With the passage of time, overeating can further lead to obesity and heart diseases which can cause medical complications. Which are:

  • Gallbladder disease
  • Type 2 diabetes
  • High Blood pressure (mostly in elder people)
  • Heart disease
  • Different types of cancer
  • High cholesterol
  • Joint and Muscle pain etc.

We have reached a conclusion that almost everyone is dealing with overeating disorder, therefore special treatment is necessary for recovery. There are a variety of treatments available on the market such as level of care, interventions, clinicians who are ready to help obese people and of course the overeater’s anonymous meetings, which are trending nowadays.

However, binge eating disorder is commonly treated as an outpatient because the condition can be controlled with the help of specific programs which offer a variety of treatments. Therapists are also available to work with people who have an eating disorder and work privately.

After reading this, you may be asking yourself if you are overeating and what will be the most effective way to treat your habit of overeating. What about discussing your issue with another person that has the same problem? This can motivate you and also provide you with enough information about what are the eating patterns, reasons, why people do so, and how to overcome this while not being alone.

Online there is a club called “Overeaters anonymous.” Yes, you have heard it right. Let me tell you what overeaters anonymous is all about and how they can help you or other overeaters.

What is Overeaters Anonymous?

Overeaters Anonymous is a community or fellowship of different individuals who share their experience, hope, strategies, and strength to overcome the habit of compulsive overeating. This club is specially designed for the people who want to recover from compulsive eating habits.

The best thing about this program is you don’t need to pay fees, nor it takes any donations. There is no involvement of outside organizations, nor is a political movement, the sole purpose of this program to educate people about compulsive food behaviors and to carry the simple message of recovery through twelve step of OA.

The primary focus of this plan is abstention from overeating behaviors rather than weight loss. The best part of this plan is you do not need to be overweighed to join OA. It is a perfect choice for you if you:

  • Obsess about food, and more food
  • Obsess about your body weight
  • Consume diet pills for weight loss
  • Or a binge eater

Overeating is physical, spiritual, and emotional, so with the help of the 12-steps program, you can get the goal of looking slim and being smart about it. This program includes group meetings, recovery tools/lessons, and dietary plans for everyone.

You can have a real-time meeting such as telephone meetings, face-to-face interaction, and even more options available to choose from.

What is the most highlighted advantage of this plan?

  • One of the highlighted advantages of this plan is it is fully individual, based on the best results for you and ways comfortable to you. You can create your own eating plan that can support you in a long term.
  • Another benefit is whether or not a specific plan is helpful; you can shift it out and again start from scratch.

So, what are you waiting for? Just plan what will be your next step to overcome your overeating habit and share it with us.

What is “Dark Social” and how to track it?

What is dark social 2018

A senior editor at The Atlantic, Alexis C. Madrigal, devised a term “Dark Social”, to refer to the social sharing of content that cannot be tracked by Web Analytics Programs like Googla analytics or bit.ly. This means that one cannot monitor website referrals and social media activity. in 2018 Dark Social challenges marketers to trace the origins of traffic and engagement.

Through an analytic platform, you can tell if a visitor came from Facebook, Instagram or Twitter. But this isn’t possible in the case of dark social. In the past, when everything was link-based, we discovered something through links/search or by browsing via bookmarks. So, the site visitor who arrived on a site without referrer he/she had to be the direct visitor. But now it’s not the same.

Simple Sharing

Dark Social Traffic comes with no apparent evidence of a consumer visiting and interacting with the business website. But being able to detect traffic, it gives you a complete picture of your content.

Now let’s get this straight. When someone publishes a website link from his Facebook page, his/her goal is for as many of his/her customers as possible to see it. The customers can now like, comment or share it on Facebook elsewhere. This is a public social media someone uses to gain an audience and drive traffic to his/her website. This is one kind of sharing. Now let’s see another way of sharing and gathering an audience.

Dark Social Sharing

Suppose that someone finds a great blog on a website. Now instead of sharing it on his/her Facebook page, directly paste the link into a message and send it to his/her friends using Facebook messenger. Now, this link is available for their friends to click and explore. This type of sharing is known as Dark Social Sharing.

 

Dark Social Marketing

Using private messaging, for example, WhatsApp, Facebook Messenger, Instagram, etc. to connect with your customers is an old traditional method of sale and customer service. This can be referred to as the Dark Social way of marketing experience.

Dark Social Dominates Over Sharing Activity

According to Researches and Reports, dark social accounted for 84% of the content shared online in 2016. However, this shows it’s important for the marketers to find a better and relevant way of sharing experience.

 Well, according to a report, almost 85% of all the sharing occurs with copy/paste action of URL. However, the rest of the 15% is done with the help of the sharing button. So, it is concluded that still a significant amount of visits are unknown according to Dark Social Traffic to the marketers. The only option that left is to track the audience by tracking activity via Dark Social.

How to hunt down Dark Social Traffic

The best way to track Dark Social Traffic is to use the Google Analytics to find out the unidentified traffic.

1.   Google Analytics

Google Analytics Dark Social

The best way to perform is it by creating a new section in Google Analytics.

•   Click on Audience, then on Overview and then Add Segment

•   Now select Direct Traffic

•   This helps you only to access traffic marked as “direct.”

•   Now click on Advance which is on the top right

•   Add the pages that are super easy to keep in mind in the following format:

§ Jobs/blog/contact/about

After doing this, the results which will be displayed will be those links that consider as DARK SOCIAL TRAFFIC. Many other different tools are targeting to lessen the probabilities of traffic being checked off as “Direct” even though without acknowledging where it comes from.

2.   Add This

add this dark social

AddThis helps you to track traffic simply from Dark Social by generating a share button for your website, moreover, it also helps you to simply copy/paste the code for tracking. However, It is also probable to include sharing to more than 200 networks with this. Plus, the customization options it offers assure you that the browsing isn’t interrupted.

3.   GerSocial.io

gersocial.io dark social

GerSoical.io is a tool that helps you analyze different kinds of shares. Once you install this tool, it allows you to copy/paste the code to site, and thus aid you to track all the copy/pasted shares by offering real-time data analysis. GetSocial.io also offers you a cross-device sharing measurement, makes all types of sharing visible.

4.   Po.st

po.st dark social

With the help of Po.st, you can have link shortening and at the same time social sharing option to track the messages that directly come from Dark Social.

Moreover, it enables the different marketers to check out the Dark Social Traffic simply by copy/pasting the URLs.

This tool enables marketers to monitor that dark social traffic from copy-paste URLs. This tool is beneficial for marketers to dig into for audience. On the other hand, it also provides visitors with an opportunity to revisit the page where they clicked through copy/past by single click.

5.  Bit.ly

bit.ly dark social tracking

Bit.ly is a popular tool which works by shortening the links and also helps as a useful assistant in tracing the dark social traffic. The best way to use this tool is by providing a abridged link to your every post and to embolden the visitor at your site to share the useful content through this link. In this way, you can have check and balance on the traffic.

Overview

With the evolution of social platforms, and the rapid change of social networks, it is getting quite difficult for the marketers to comprehend all the changes just to keep their value audience in touch and active.

With the passage of time, the users now tend to opt using mobile applications, messaging services, and private networks; however, dark social will get higher from now on.

Yes, it’s true that dark social traffic can prove as a headache for many business owners. But on the contrary, there are many tools available to detect such traffic. No doubt, it can be quite challeging to go through such tools and analyze, but we believe that marketers can easily detect and undertsand from where the traffic is coming from.

Dark social shares may be difficult to track, but this doesn’t mean that the marketers should give up on acquiring insights into their user’s behavior. Howeever, with the help of testing different tools, one can be able to find the perfect solution to detect dark social traffic by assisting you to understand consumers behavior.

Read more interesting articles about Bitcoin InsecuritySME CybersecurityDeepWeb Investigations and more here on our website.

Sources:

How Criminals Sell Drugs Online – Tutorial

how to sell drugs online

Introduction

This is something I am committing and putting my soul into, and this article will guide you and provide step by step instructions on how you can start selling drugs online. This is of course for educational purposes, but this is legit if you decide to use it.

Why should you sell drugs online?

The logical parallel to this would be, why should you eat healthily, why should you work out, why should you smoke weed or do absolutely nothing? You do not have to do anything, you have a human right to do whatever your heart desires, or not to. As long as this does not hurt lives, does not limit freedom or damages someone else’s property. This is your (if you want, GODS) given human right.

So let us rephrase the title here a little bit. Did a voluntary exchange of good hurt anybody? I do not think so…

Why should you sell drugs online? Because there is nothing wrong in exchanging goods, even it these goods are cocaine, MDMA, LSD etc… We are grownup intellectuals who can make a decision when it comes to making a choice, and making out choice illegal (I am talking on about selling drugs online) is a crime.

You are a criminal!

A criminal is someone who takes your goods using violence, power, and authority. Let me help you here. Police, governments, laws, FBI, and even Facebook… but selling what others need and want to offer a fair exchange for it is should not be a crime.

Morals?

At this moment you are probably yelling at your screen and comparing this to some other disgusting stuff you saw on “the Television” and read on some beauty blog. There are indeed some moral things you might have a conflict with, but this more about the utilitarian reasons for why you should sell drugs online.

This type of business can make the world a better and safer place. How? Imagine that you (who is probably not a drug lord) are living in a country where drugs are illegal and the only way to get some is to find a local dealer in a dark corner. Now imagine that you could order it online from someone who is a clean seller, who can even be your neighbor with 3 kids, a wife, and 12 cats?

The second scenario allows you to make a transaction without risking your life in that dark alley where you might as well get robbed, killed or beaten up by some random dude whose number you got from some online forum, or a beauty blog…

Is it safe to sell drugs online?

This is the case where a more positive than negative answer will apply. We understand that selling drugs online is not something you would brag about, therefore it is most recommended to stay one step ahead of the authorities. This indeed holds some risk, and I will try to mitigate the risks to a minimum in this article.

Key elements to stay anonymous

  1. Operations Security (OpSec)
  2. Online Security (Digital)

Anonymous Cryptocurrency Payments

In my previous article, we have discussed the end of Bitcoin Security Being a Myth, where the most recommended anonymous currency is going to be Monero. If you want to sell drugs online, then Monero is your cup of tea if you like it or not.

Monero has a hard-coded anonymity, which is why we will use ZION Market as an example because is uses Monero as the main currency.

This Guide Outline

To make this guide as understandable as possible, I will divide it into many sections and subsections with their own small tutorials and guides. It is important that you follow and dive in the steps and information, as this can save your life.

We will be using different software, so please read carefully about the installation and execution of each software.

You have to know about:

  • TAILS – This is a secure operating system which we will be using in the tutorial.
  • PGP (Pretty Good Privacy) – Read about encrypted Communication
    • Another good source from Pittsburgh University
  • Monero – A detailed guide about the coin

Even though I will try to be as straight to the point as possible with this guide, I still recommend reading much more about Operations Security and digital security in general. This is especially important if you are planning to sell drugs online. Darknet is an amazing thing, not a typical place for an everyday user, but it is monitored excessively by authorities.

Most important part of this whole guide is to stay safe, protected and secured on the interwebs. Think about yourself first. Do not know how to emphasize it even more but read more than just my guide recommended sources. This will pay off when you have your Darknet Drug Empire up and running.

Operations Security (OpSec)

This is a must know for anyone who is working cybersecurity, but in short Operations Security is a method in which you approach data and information protection. In its cor,e it is a 5 step process where you identify critical information leaks which can lead to exposing the victim if it is a person or an organization.

In other words, look at OpSec as a methodology where you as a user protect yourself and your data from being collected from different sources which if exposed can make you “visible” and approachable by authorities.

A perfect example would be the world-famous story of Ross Ulbricht and the SilkRoad. (I highly recommend reading and watching documentaries about this guy and what he did)

SilkRoad Operations Security Fail

Mr. Ross was a person behind the largest darknet drug (and not only) selling market on TOR. The market was shut down after an ongoing investigation found some traces in 2013 which lead to Ross.

Case:

  • An FBI after googling “SilkRoad” and “onion” and ended up on a forum.
  • He used the forums filter to filter the posts to 2011 (right before SilkRoad became HUGE)
  • He found a post name “A Heroin Store” and Bitcointalk.com
  • Alias of the original poster was “altoid” with a link in his account
  • Link redirected to a WordPress page with instructions how to get access SilkRoad (Just like this article tells you how to sell drugs online)
  • The agent doxed the nickname and found a post where “altoid” was searching for “the best and brightest IT pro in the bitcoin community to be the lead developer in a venture-backed Bitcoin startup company.”
  • Braking point – He used his personal Gmail in the early stages of the process
how to sell drugs online

Lesson to learn

Everything you put on the internet stays here, safe and sound, and can be used against you in court. Can be traced. Can be doxed. Can be traced back to you. Let us be a few steps ahead of that.

P.S. Ross is serving a life sentence for his victimless venture.

Mindset

You have to develop a mindset of being as anonymous as possible as this is very important and sometimes crucial part of survival. Keeping anonymity is important not only using different software but as well hardware.

Cannot emphasize that safety is a very crucial part of what we are doing, this indeed can cause some discomfort in terms of steps which has to be taken regarding the approach of this process. But with higher levels of comfort, you are lowering your level of security and therefore have higher risks of punishment.

If you do not mind people going through your mailbox, then this is a mindset you must change. Think of the fact that people searching your mailbox or mailman is delivering you dildo magazines which have your name on it. This is the level of concern you must have in this business. You must think in terms of no one has to know or have interest in what is in that mail, only the person it is intended for.

Your goal is to keep high levels of OpSec stay anonymous and separate your online personality with your real life so there is absolutely nothing connecting you in real life from day 0.

Operation Security Tips

  • Never use your real name (duh…)
  • Never use a name you have used before
  • Never use a nickname previously used by you or is somehow connected to you
  • Never tell anyone or login with there new credentials in front of people (be alone)
  • Never tell anyone (do I even have to mention this?)
  • Communicate using ENCRYPTED only communication
  • Never use a camera monitored public space or place to do your dirty thing

Online Security

Now when you are aware of OpSec and have the right mindset, be ready to make some investments which are going to represent everything that was mentioned earlier. You have to get a new phone. When I say new, I mean NEW, because it should have zeroed history and have no trace of the previous usage.

Never show your new device to anyone! See tips. You have to create a new identity. Are you an android user? Buy an iPhone, cheapskate…. Be different… And do not brad about it. I mean, you got the idea. Oh yeah, do not put your moms’ number on the new phone or order pizza from the new phone (do I really have to emphasize such things?).

Always use TOR and TAILS. TOR should operate on a non-persistent installation of TAILS. You probably know now that TOR is using .onion domains which are operating majority of darknet markets and are used to sell drugs online.

If you are hearing about TOR the first time and still have no clue what is TAILS, delete your internet, shut down your computer and go get some fresh air.

SHOPPING!

We need:

  • New smartphone
  • Pre-paid SIM card with internet data
  • Stock (drugs and narcotics of course)
  • Laptop
  • TAILS OS on a memory stick
  • Label Maker or printer
  • Shipping supplies (packaging, bags, tape etc)
  • Monero

Hardware

Remember, you have to be someone you are not and stay anonymous and using your credit card is probably going to land you in jail pretty quick. If the police in case of something is going to trace your hardware which you were using for selling drugs online, sorry, your own fault. The goal is not to leave a digital trace. So, use cash, please. Preferably withdrawn where you were having a beer in a pub.

Laptop

Nowadays laptops are pretty cheap, so go ahead and get some low-end computer and it will be enough because our software does not require a lot of computing power to run.

If your local shop will ask your name, address or phone number, give them fake information. By law, you are not required to give them your ID. They ask it for advertising data and refunds anyway.

Please do not buy your hardware from your friend Tim who works in the electronics store… We want to keep you as anonymous as possible, and better wear clothes you usually do not wear in public and wear a cap/hat. Chances that you be caught only because of this, but this is a great step to avoid future paranoia.

Do not use a previously used laptop. We need something with no previous digital traces.

TAILS OS on a memory stick

I mentioned this in the beginning but here you go

Label maker or printer

Why? Well… You can use a printer; the only idea here is you avoid writing labels by hand when sending drugs.

One thing to consider here is that if you have some super advanced printer, it can be traced, somewhat. Some printers have a “feature” which is called “tracking dots” which can lead back to the original printer. To be sure, check if your printer is mentioned in the EFF (Electronic Foundation Frontier).  If you have to buy a new printer, please use cash….

Smartphone

Similar case as with the laptop. Do not buy it from Tim and use false credentials. Pay with cash. Get a new one, because it has no traced used data.

I personally recommend Android over iPhone as they are factory encrypted. Just do not buy a smartphone which is too old, as it might not support up to date encryption.

Put all possible passwords on your new phone which are NOT 1234 or your date of birth.

Do not use your new device for calling, it will serve as a hotspot for internet sharing. Consider it to be your modem.

Perfect case scenario, do not take your 2 phones with you when you are planning to do your dark stuff because they both can be connected to the same GSM and this might connect your criminal phone with your phone as you were at the same place at the same time.

Obviously, you should not connect your phone to your private Wi-Fi, or any other hotspot. Same goes for your laptop.

Prepaid SIM-card with internet data

Do you really need an explanation regarding why you need a prepaid SIM card? Yes? Well then… You should avoid registering your name with your new number. In some countries (like the Netherlands), you can get a free number from a guy on the street who is giving them away. Or some small kiosks in shops where they do not ask you to register.

Better option to ask someone to get the prepaid SIM card for you with the data, so you do not appear on any surveillance cameras.

Let us assume you have your phone up and running. Now forget to use it for telephone purposes. This means no calling and no text messaging from the phone because we do not want to leave a digital data trace. Even if you ordered pizza with the phone, you are giving a lead to the authorities. Never give anyone your phone number, because any connection with it can lead to revealing your true identity

BEST CASE SCENARIO:

The biggest recommendation would be to change the number on a monthly basis. The reason for that the authorities can trace the uptime (live signal) of the phone. So not only changing the SIM cards will help, but also changing the location where you are using it. When I say different places, do not make these places in walking distance from your home. Remember that you have to act like you are someone else, a new identity.

Internet connection and WIFI adaptor

Using your phone as a hotspot is an amazing way in terms of portability and ease of usage. But there are some really critical downsides to this. While using your phone as a hotspot for one purpose only, you are aligning the connection time with the time your sales account is being live while selling drugs online. Quite a nice coincidence, isn’t it?

Imagine you got caught (which you will not if you are using my methods), and the data provider sees that the data transfer was used mostly through a secured browser TOR. I mean, does not prove anything, but then we connect the being live on your sales account and being connected to TOR and we got ourselves very nice pattern to investigate.

Another great alternative would be to use open routers (which is a very hard thing here in the Netherlands). You can buy a small external WIFI adaptor which you connect to your

computer through a USB port. It makes the connection read the information from the adaptor rather than your computer, and then you connect your computer to this adaptor.

The best choice would be this adaptor which was tested by Freedom Activists.

how to sell drugs online

Phone Method (Not Recommend)

Something I do not recommend but might be an option for you. You can hide your phone which is connected to a power source and has hotspot turned on and enough data. But in this case it has to be hidden pretty well, so during a raid, it will not be found, and it should be protected with a password. Wifi and phone. Both. Okay?

Drugs and Narcotics.

Well, if you would really like to use this tutorial, you probably figured out this step.

Shipping supplies

This is another very important and even crucial part you have to take into consideration because the level of stealth here has to be “Top Notch”.

Requirements:

  • Envelopes
  • Rubber gloves (disposable)
  • Vacuum bags and machine (this is an amazing machine)
  • Spirit or any other alcohol to clean your workplace after packing
  • Face mask (if you are selling something that requires a mask)
  • Workspace

How do I sell drugs online?

Launch TAILS and TOR and navigate to Reddit Link where you can find all the redirecting addresses to Zion. The market is running using the latest TOR v3 protocols which means that it is a fast loading website in comparison with other markets online.

Navigate to the website -> Complete captcha -> Create an account (Register)

Zion Onion Market
Zion Onion Market

I really hope you still remember the OpSec lesson above and did not use your real name when creating the account. Same goes for the password, please do not make it your date of birth jeez…

Zion Market
Zion Market Account

User Experience on drug markets are the same as on Twitter, therefore navigate the “Sign up as a vendor”. The faster you click, the faster you will become a drug lord.

If you are not a drug lord yet, go with the “Lite Version” of the store. If you have plantations, then sign up as a regular drug seller. As mentioned above, the beautiful thing about Zion is that is works with the most anonymous currency Monero. So set up your account and pay using Monero and add Moreno to your accounts balance.

Zion Market Account Activation

To be able to transfer Monero to your account, you have to set up a PIN which you will use when you will be cashing out from Zion. The transfers usually take a minute or two.

Zion Market Account Activation

When you got some Monero on your account and created a PIN, we must repeat the procedure by signing up as a vendor again in the top left corner. After that finish setting up the account by filling in some information regarding your market.

Zion Account
Zion Account

Note: Enter a bitcoin addressed, as it seems to be a mandatory field by the system, even though we are going to use Monero.

If you do not have a Bitcoin wallet, use TAILS to run Electrum Wallet and create a Bitcoin Wallet and a Public Key for the Multisignature.

Enter your PGP key and complete your signing up as a vendor.

Zion Vendor Account

You should have received a PGP encrypted message from Zion which you have to decrypt to get the code.

Copy the code, navigate to the top left corner where you will see the Clipboard being changed to a padlock. Click on Decrypt/Verify Clipboard and enter your copied PGP code and click ok. This will decrypt the message which you will have to copy back to the Zion market.

PGP Code Decryption
PGP Code Decryption
PGP Code Decryption
PGP Code Decryption

YOUR VENDOR ACCOUNT HAS BEEN CREATED

Navigate to “Vendors Settings” on the left and continue filling in the necessary information for your online store.

Zion Vendor Account

Important Sections:

E-commerce

  • Setting up an attractive profile page
  • Refund Policy (yes, we need it as well)
  • Product page setup
    • Targeting
    • Product Description
    • Shipping
    • Encryption (PGP key)

Profile setup & Refund Policy

  • Include an attractive description of your shop and what you are doing, can check other profiles for inspiration.
  • Refund Policy is important, but most of them do not offer refunds, that is why you should offer the best product to avoid refunds being a thing.
  • Update your description and add a new product
Zion Vendor Account

Product page setup

  • Description of the product must be very accurate and attractive, including practical information about its use (depending on what you are selling)
  • Targeting must include the countries you are shipping to. A great indication can be the Language you write your description (Russian for example)
  • Select the relevant category for your product to be found more easily
  • ALWAYS requests PGP-encryption of all sensitive data and shipping address format
Zion Vendor Account Product Setup

Operations Security

  • Do not take product pictures where you are holding it while smiling and exposing your face to the rest of the world
  • Never show faces in an image
  • Avoid reflections of people in the photo
  • No people in the pictures
  • Do not upload photos from a recognizable place or well-known background.
  • Do not show exposed fingers and hands to avoid fingerprints being read from the photo (yes you can do that)

Great example for inspiration would be other vendors on the market, where you can copy what suits your profile of work. As well as comparing yourself with the competitors in the same region and offering a better service, products or simply better communication (Content and Photo wise).

Select the currency and add the prices of your products in order for your buyers to transfer Monero into EUR, USD etc. Please do a competitive analysis before setting up an insanely high price. Start lower as a new vendor and increase prices over time. Gain reputation and recognition first.

Zion Vendor Account Product Setup
Zion Vendor Account Product Setup

In order to make it visible to the buyers, you have to activate the product by navigating to your products and in the drop-down menu above the product which says “action”.

The path: Action -> Enable -> Batch Update Products (this is useful if you have more than one products to make sure your store has all product “live”)

Zion Vendor Account Product Page

This is the moments of excitement of any entrepreneur where you wait for your first order to be placed. Login after some time, maybe 3-7 days and see if you received any orders from fellow clients.

Zion Vendor Account Product Page

If there is a sale, navigate to “1 Order to ship” where will see all the orders.

Zion Vendor Account order

Firstly, do not click anything before you have reviewed the encrypted PGP message which the buyer should have provided. This is important because if you have a very specific shipping and the country focused business, a person might not have taken all the criteria into consideration and purchased the products anyways without you being able to ship it there.

Secondly, click on the “Unread Message” and copy the PGP key. Navigate to the padlock in the clipboard button (just like we did previously) to decrypt and verify the PGP key.

PGP key message decryption

After decryption, you should see the address to where you would like to deliver the goods.

PGP key message decryption

You should see the address and move forward with the order as soon as you feel you can fulfill it.

Navigate back to the website and click “Accept Order”. Another recommendation would be to communicate with the buyer, as there might be some details which should be discussed. Use a PGP key to communicate, and never just text.

Shipping

Shipping of goods and preparation:

OpSec:

  • Alcohol (spray)
  • Gloves (silicone, one use, disposable)
  • Workstation (easy to clean, preferably a cover to just trash)
  • Disposable clothes or cheap apron
  • Plastic bags (large trash bags)

The crucial part of the packing process is not to leave any DNA or fingerprints. By no DNA, your sneezing and coughing leave DNA traces as well, so use a mask and not clothes where your cats’ hairs are not going fall on the products.

After you will complete the packaging process wipe, clean all the fingerprints even if they are not yours, they might be from someone at your local store downstairs which will ultimately narrow the investigation which holds a risk for your business. So spray/wipe/rub the envelopes, packaging to remove all the DNA, fingerprints and grease from the KF next door. Do not, lick the stamps, ok?

Get your equipment ready!

Laboratory work
Laboratory work

This is your first step to perfecting the art, so keep in mind that after you will deliver your products locally and feel comfortable in what you are doing, you can start sending this out to the rest of the world. You might want to use a sponge soaked in alcohol to wipe the packaging and/or if you break a sweat.

Laboratory work

Mailboxes

Never go to the post office to send the package, because they have surveillance cameras which can trace back you. Pick different post box locations in your city and drop the packages there. Do not touch the packages with your hands, do not carry them around. Put them in a clean bag when you are leaving home and then just chuck them from the bag into the postbox. Can use disposable gloves if some post boxes are not easily accessible.

After dropping the products go back and login to your market and mark the order as shipped.

Zion is an amazing market which uses Escrow which might take a few days for the transaction to occur and Moreno will be transferred to your account. The process behind Escrow is secure and will transfer you the money after 3 days even if the buyer will not confirm the delivered package on his end.

If your business will explode and you will feel a little bit like El Chapo, you can pay 500$ to be able to finalize your orders as soon as the order is placed and the buyer transferred you Monero. Is it worth being credited right away? Yes. Do you want to pay half a grand for it? You decide.

Zion Monero Payments

Monero will automatically be transferred to your provided wallet after you reach 0.5 Monero on your account on Zion. This automatic transfer ensured that you will always get your money. If Zion shuts down tomorrow, the max amount you will lose will always be under 0.5. If you cannot wait, just click “Send immediately” and get your Monero right away.

Confraternities, first sale complete. Feeling the hype? The Adrenaline? The Possibilities? The happiness someone will get from your product?

Zion Monero Payments

Data removal from images

In the cybersecurity world, this is one of the first things that is getting checked when searching for a person or exposing a phishing account. Ethical hackers are looking and investigating the data which is getting saved on any image taken. In this case, you were probably taking photos of your products and uploading the images to your product pages. That image holds data which literally can lead the police right to your front door.

Any camera, digital or phone camera includes such data as resolution, date, time, camera model, and GPS location. This data is called EXIF-data. This is why you should take this step very seriously when you are uploading images to the market.

This is very easy to remove in TAILS:

Navigate to: Applications -> System Tools -> MAT (Metadata Anonymization Toolkit)

Clean Image Data

You can drag the images to the toolkit and click clean to erase the data from the images. Keep in mind that you are only able to save the images in TAILS folder “Persistent”, because that is how the OS is designed.

Psychoanalytical analysis

Every person in the world has a different style of writing. If you are writing in a non-native language, it complicated things when you want to stay anonymous, because some saying and phrases are not translatable or are used only in one language. Some languages are some prone to make specific grammatical mistakes in specific words and phrases, and it happens much more than you think.

If you thought already of a perfect sales pitch for your product, kill it, delete it. Write your text all lowercase or all caps, with no punctuation and stick to short sentences. Avoid your writing personality as well.

Should I buy a Lamborghini?

You can, but the important part of spending your money is to do it correctly. Money earned this way are not the same when you have worked at McDonald’s. Being mindful when spending this money will save you jail sentence and a lot of nerves avoiding every night paranoia. Few ways to go from here.

Cryptocurrency debit card

If you have not heard yet, this is a great business model and interesting industry to read on. Banks and separate companies now offer debit cards which can be connected to cryptocurrency exchange and directly to a bank account. This is a great way when it comes to sending your hard-earned drug money (usually Bitcoin) to a fake company address and then withdrawing the money.

Bitcoin Credit Card

This is not such an easy task to have such cards anonymously, as they 100% of time required to have it connected to an ID, passport or address. I am not saying that you cannot fake an ID, passport or an address, but we want to make it look as legit a possible. It is difficult NOT to leave a trail when transferring larger amounts, and not only difficult, it is also dangerous for our case because we are not buying 3 tons of donuts, but trying to run a narco business here.

Crypto ATM

In the Netherlands, there are a few bitcoin ATMs that give cash for Bitcoin. Might be a travel for some people, but this is a great solution if you need some quick cash.

Bitcoin ATM Netherlands

Monero – Online exchange

There are 3 most popular cryptocurrencies which are widely used and are easy when it comes to exchanging, they are Ether, Bitcoin and of course Monero. A very practical solution for easy an fast exchange service is Shapeshift

Shapeshift

Now I can buy a Lamborghini?

If you have everything set up and working to stay anonymous, you are pretty much welcome to spend your money any way you want. Some countries are okay with people spending specific amounts a day.

The Netherlands allows spending 10.000EUR a day with no control. You can walk around and buy yourself a lot of ice cream and nice clothes if you are into that. Do not be scared to live a little with your hard-earned money! Some people live very comfortably from cryptocurrencies humbly drinking coffee for 2.50EUR.

Is there a risk of getting caught?

We went in detail through how to keep yourself anonymous online, TAILS, TOR, Crypto, OpSec etc. And after all this, you ask if there is a risk? Well, good catch, because the answer is YES

I have never said that this business is not risky. By following the steps mentioned in this “Manual” or we may even call it “Tutorial” can mitigate the risks to a bare minimum, but there is always a risk. Statistically, you can get eaten by a shark, or drawn in the sea, or your bathtub. My point is, there are risks in everything.

Look at this manual as something educational yet be ready to go to jail if this business is something you want to commit to and live a rich life and become the next Pablo Escobar of the Internet. “Don’t do the crime, if you can’t do the time” – Urban Dictionary

Trust issues and Mitigating risks

Selling drugs online is a much safer environment than being a black person in America trying to buy roses. Biggest risk in this business comes from gang shootings, junkie hobo customers on the streets, putting your face our there and in general standing in a dark dirty corner to sell the dope. This method is a great step up and advantages which focuses on more sophisticated users.

In the online vendor community there are many discussions regarding customer trust, yet the online world we must trust blindly, yet the phenomenon of it working without having any contact with the vendors and customers can be a great example for some legal businesses. The average online customer in this industry is usually more professional than an average customer in Walmart.

How to be sure that I will not get raided?

You cannot be sure. Highest risk would be when your products is getting to or from the supplier. Imagine getting caught while holding 1000 pills of MDMA in your hands. You do not need a high IQ to understand that your place would be raided after 10 minutes after you being caught.

Operation security reminder – do not keep your equipment in your house, otherwise, next stop will be jail. 

If you were working from home, you still have a chance to minimize the splash effect and your prison sentence. If you were encrypting all your devices, do not have a digital trail and kept your mouth shut, the police will have a very hard time connecting you to your sells. Being caught is not where we want to be, but this is something that can save you a life sentence.

Another Reminder – Do not run your business by paying with your own bank

This can lead to your house and might get the authorities interested in your persona, which is what we want to avoid at all cost. Which is why running your business from a different address (not your private one) is so crucial. The goal is to make the investigation a complicated as possible and keep your mouth shut.

Exit strategy

Paranoia can be a silly thing, but sometimes it can be a lifesaver, which is if you have any suspicion of an investigation, you should have an exit strategy which you can strategically follow.

Some situations for exiting the business:

  • Your landlord being interrogated
  • Your job employees are getting interrogated
  • Your friends receiving strange calls or being interrogated
  • You see police following you or people with a headpiece
  • Just want to exit the game

This shortlist can, of course, be extended of you can have your own reasons to backup, but in any case, you need to have an exit strategy to avoid being backtracked later. So, do not throw away your kit into your trash bin, but if you want to do so, let it be someone else’s bin or the one far away.

Before you throw it away, clean the DNA with alcohol, remember the OpSec lesson. Better off, burn everything. The phone can be burned as well, but just drown it, or pull piece by piece apart and dump it in different bins.

Social Engineering and Public relations techniques (if caught)

Let us assume that you were caught by the authorities and are now being interrogated by them. What do you do? What do you say? Do you just spit all the information out? How much do you want to say? Well, there are a few facts and practices which are super simple and can save you from ending up in jail.

The majority of cases against criminals are constructed on the information which the criminals have provided themselves. This means that you just have to keep calm, be silent and do not incriminate yourself by acting stupid.

Some interrogation techniques can be very serious and very pushy, psychologically they can break you down, some people break in 30 min, some walk away as free people, your choice. But do remember one phrase which can save your life and repeat it again and again:

“I DO NOT ANSWER QUESTIONS”

This phrase is going to work if you are located in the western part of Europe because here you do not have to testify against your own personality which is stated in the Administration of Justice Act. If you are located in another country, please look into the possibilities of your countries act and legislations.

This chapter is very similar in logic with the “Operations Security” chapter, as you have to develop a mindset where you are not yourself, in order to do that, you should obtain some skills. People in their core are very emotional people and the exact same emotions are leading our lives and leading a lot of people to jail. Great cases which you probably heard about people confessing to the things they have not done, which is a very interesting phenomenon where the authorities break people into saying what they have not done. This is why you have to train a skill to actively fight the urge to confess to anything.

The social engineering techniques which are used by the authorities include searching for moments where he will be able to connect with you on a personal or interpersonal level. Asking generic questions and offering you a cup of coffee. Recognize the act? A good cop he is.

Recommendation: Keep your answers short and simple “Yes”, ”No” or “I do not answer questions”

This might seem as a very unnatural conversation, which it is, which is why you have to practice you Yes and No to make it as natural as possible. This is done to avoid engaging in any conversation with the authorities, which might lead to something you do not even realize. So keep is silent, short answers and be ready for unpleasant face expressions your way.

Brief Checklist

This is a very brief checklist for you to recap everything we have discussed here:

  • Operations Security
  • New PC
  • New Prepaid Phone
  • Memory stick
    • TOR
    • TAILS
  • Cash for Purchases
  • DNA Removal (Alcohol)
  • No home WIFI accessing
  • Do not tell your Mom
  • Do not work in your home
  • Do not use your bank debit card
  • Do not use your real name anywhere
  • Learn the phrase “I do not answer questions”

Conclusion

This business can be very dangerous and stressful but at the same time extreme and monetary compensating. This can sound great to be the next Pablo Escobar, but this is as well a very boring, cheeky and diligent work, and if you are not ready to do that and take the risk, then consider this as an educational material which is being practised massively in the world. Keep in mind, using torrents is also illegal and can get you jailed, but telling your prison mates that you were jailed for a torrented “Bee Movie” is not as cool as for being the next Pablo Escobar of the internet.

Food Waste – How We’re Destroying Our Planet and Why We Have to Change

Food Waste

When we think of factors that harm the planet, cars, oil spills, power plants, and maybe even CO2 emissions from cows come to our mind. It seems obvious that these aspects speed up the process of global warming. But there is another, often overlooked cause that we should all be concerned about: food waste.

Food WasteAccording to the UN Food and Agriculture Organization, 6.7% of all global greenhouse gases come from food wastage.

Doesn’t sound like much? Imagine this:

If food waste were a country, it would be the number 3 emitter of greenhouse gas in the world, right after China and the United States!

 

We overlook, ignore and don’t pay enough attention to the negative impacts. It’s time to raise awareness before it’s too late.

The Biggest Food Wasters

It’s easy to point a finger at others, blaming restaurants and farms, but just take a moment to realize that there are three other fingers pointing at yourself. We, the consumers, have the power to make a change. Our impact is greater than we think.

Farms

Food Waste

My sister spent a few months on a small farm, just an hour out of Perth. ‘It was a little orange farm in the middle of nowhere, the first time I worked as a fruit picker.’ She remembers, ‘The first days were not easy. The sun was either burning or rain was pouring down heavily, it didn’t matter, we had to clear the trees of every single fruit. After eight hours of hard work, 8 bins, the size of big dining room tables, had to be filled.’ Her features clouded with anger, ‘1/3 of the oranges went straight to the garbage!’ This waste of food occurs even before we have the chance to buy it. In fact, almost half of all vegetables and fruits produced go, just like the oranges, straight to the garbage (I’ll talk about the reason for this later on in the article).

Restaurants

Food Waste

I have worked in several restaurants and the amount of perfectly edible food I’ve seen landing in the garbage has been extreme. But surprisingly, restaurants are not the number 1 food wasters. While 40% of waste occurs here, it is still less than in our homes. However, this waste costs the American industries alone 57$ billion annually.

Homes

Food Waste

We, at home, waste the most food of all. 43% of food waste occurs in our own four walls! While it has a massive impact on the environment, our wallets also suffer: According to Selina Jull, a typical European household loses 900€ per year on wasted food and a US household over 1000$.

What Damage Do We Cause by Wasting Food?

While different types of damage are  caused when we throw away immense amounts of food, there are two points I would like to highlight.

Humans

Food Waste

Two facts stand out when looking at the world’s population.

  1. 3 metric giga-tons of edible food are wasted each year.
  2. At least 795 million people suffer from hunger.

So while 1 out of 9 people in the world are undernourished, we continue to waste food on a large scale.

The connection between those in need, and those that have too much, seems to be missing completely. There is an obvious distribution problem but luckily, companies such as copia are attempting to help us and make it easier for us to tackle the issue.

Environment

Food Waste
But the damage goes even beyond hunger and starvation:

we damage our planet in ways that cannot be reversed. The climate pollution caused by food waste is explained easily. Let’s just picture our typical Saturday supermarket stroll.

We’ve worked through most of the list. Next stop, bananas. Three, four? Maybe just a dozen, they’re on special and they’ll get eaten eventually, right? Into the basked they go.

But hold on.

What is needed to produce them?

Land, water, hard work, time and other resources.

How do they get to the supermarket?

Depending on where they are from, they have probably travelled more kilometers than we have in the past year.

And what about the 3 left over bananas ?

Turns out, 12 bananas were too many. Three of them end up on the counter, slowly but surely turning into brown mush. The thing is, they produce methane, which is 25 times more aggressive than carbon dioxide. What actually happens here is that the gas absorbs the heat of the sun, thus heating up the entire atmosphere – simply said: it speeds up global warming.

How Can We Waste Less Food?

Food Waste

The damage we are causing is extreme. But luckily, food waste is a problem that is comparatively easy to tackle for each one of us.

1. Know The Labels

Shockingly, 90% of America’s food waste is due to confusion about products’ expiry date. So here is a little reminder:

Best Before: This is NOT when you should toss food away. Until this day, the producer guaranties highest quality. After that, it’s up to you to decide whether a product is still enjoyable.

 Use By: You should eat it before this date! After, the consumption is no longer advisable due to health risks.

2. Conquer Fridge Confusion

We often don’t know what’s in the mysterious depths of our fridge. Try to stay on top of it. If you’ve ever worked in a restaurant, you’ve probably heard of the FIFO rule. First in, first out. It’s a simple food rotation system: label your food products with dates and store the older items in front (what went in first, will go out first). Don’t let that good piece of cheese disappear into the dark corners of your fridge where you’ll forget it and eventually toss it into the bin.

3. Susceptible in Supermarkets

Food Waste

I do this all the time – I go to the supermarket with no list, an empty stomach and am susceptible to every special. The result? A basket full of things I like to eat BUT which will definitely not  add up to a proper meal .Also, I simply buy way too much. We should all try to shop in a smarter way. How? With a meal plan for the week, a shopping list and definitely a full stomach.

4. The Odd Bunch

When my sister told me about all the oranges that landed in the bin, the main reason was that they weren’t good enough for the market – too small, too big or not perfectly round.

Many supermarkets in Australia are now offering the “odd bunch” at lower prices. It is a bunch of imperfectly formed fruits and vegetables -the ones that should have e landed in the garbage, according to the guidelines.

We should support this, show some love for the odd bunches in the supermarkets and see if our local farmers have some odd bunches ‘to waste’. (We can save money AND contribute to reducing food waste.)

What Will You Change?

Food Waste

Food waste is destroying our planet. It is clear that a change needs to happen. Each one of us is part of the problem and can be part of the solution. I hope you will keep some of these things in mind when you go shopping the next time, when you go through your cluttered fridge and when you toss those brown bananas in the bin.

The damage is done, but it is not too late to turn things around.

We can change the world

We can fight hunger and slow down global warming.

We can stop wasting food.

 

Bitcoin Security Is a Myth

We have reached the moment when Bitcoin security is a myth, so if you are one of those people who is buying tickets to furry conventions, I recommend you stop, now… Forever, and generally, what is wrong with you? Anyway, bitcoin is at 145 Billion Market cap and might be approaching a trillion dollar cap pretty soon.

It is an amazing investment opportunity for some people within the bitcoin conversation, and the other party is yelling about it being a bubble and that everyone will end up the same as bitconeeeeeeeeeeeeect.

Honestly, it is getting very hard to tell if this is going to grow or die tomorrow, but who am I to say? I do not have any clue what I am talking about most of the time. But one thing I was sure about is that Bitcoin a myth and not secure for darknet, deep web, dank net and dark web transactions.

Was Bitcoin secure before?

bitcoin security

Bitcoin is famous for its security, but please let me tell you that bitcoin was not safe from the beginning. Why? Because the deep web markets like Silkroad was busted and 20 different markets together with it. Not that bitcoin transaction security was the fault, but no doubt it played a large role in it. At that moment Bitcoin transactions were already traced, especially when larger bitcoin transactions were involved.

Not a secret that due to darknet bitcoin transaction a large number of markets were seized. Sometimes due to lazy laundering of the owners or laundering websites being honeypots gathering transactional information from both parties. That was as well the moment when everybody started to recognize other cryptocurrencies as Zipcash, Cloakcoin, DeepOnion, and my favorite one, Monero which are trying their best to be anonymous.

Will Monero be the next secure cryptocurrency?

Monero Security

Maybe. If you think about it, not all crypto transactional information is publicly available, which makes one cryptocurrency much harder to trace than another. This is exactly why Monero is becoming the new favorite coin for a majority of deep web markets.

Bitcoin and Ethereum are still the most popular deep web currencies. For a newbie or an average person who is making his baby steps into purchasing drugs the first time or trying to get the tickets to the furry convention might not have the knowledge about the options and will refer to the most simple and popular one. Almost everyone knows what bitcoin is and making this shift will take some time and awareness of it not being the secure cryptocurrency anymore.

Monero and other previously mentioned cryptocurrencies are smaller or very tiny, which makes them unconventional when it comes to implementation of the deep web markets. Deep Web markets are the same as Amazon, customers want to avoid all this unnecessary hustle of payment, we just want the drugs man…

Other cryptocurrency alternatives?

There are thousands of different cryptocurrencies which are not popular and even unheard of. This is a potential that worries me a little because all these little currencies can actually be an opportunity which can help anonymizing the transactions. Due to the low popularity of the currencies, they can avoid being under the radar yet serve their purpose.

Bitcoin Security

Another issue with these small cryptocurrencies are the usage instructions. No one really knows how they work, which again makes people drop the idea and switch to the easiest solution, bitcoin. Some of the cryptocurrencies, unlike Monero, are not widely available on most popular exchange websites. Most crypto trading websites stick to Bitcoin, Litecoin, Ethereum, Bitcoin Cash, and Monero. I was not able to find many markets or traders who would focus on cloakcoin, which is a bummer now and is an opportunity for someone who is not as lazy as I am.

The trouble with these small cryptocurrencies is not only in their purchase availability but with the tumblers. Most popular tumblers are as well working with the most common cryptocurrencies, and when you finally find a tumbler which supports unconventional crypto, you should be skeptical as these tumblers are mostly scams and are very sketchy. This is another reason why people are sticking to the easiest option that is available on the market.

Should we switch to other cryptocurrencies?

Keep in mind that when people say it is now traceable, it does not mean that all the police and FBI resources are going to be thrown to fight the 16-year-old teen who bought some weed because his state is the last in line for legalization.

Even though this is indeed a red flag and should be taken with some caution, the shift should happen sooner or later. If you think that you are the smartest and will tumble Bitcoin, then transfer it to another bitcoin wallet, then tumble and then transfer it again. Or buying bitcoin, transferring to another wallet, buying Litecoin, then back to Bitcoin, then tumbling, buying Litecoin again and buying bitcoin with it again. Got carried away here… Whatever you money laundering method is, my obvious recommendation would be switching to Monero.

What should deep web markets and vendors do?

Bitcoin SecurityIt is very obvious at this point that in order to escape taxes and buy or sell your favorite drugs on the deep web you should consider this shift in the long-term perspective. There are vendors on the dank net who have never used Bitcoin, which at this moment have already established their presence, have a reputation and recognizable brand. These vendors will highly profit from this change. Which proves the point that when something becomes mainstream, you should drop it if you want to really profit (not only in a monetary way).


Any other payment alternatives on the darknet?

While surfing the darknet, I have surfed through some vendors that were offering payment methods like PayPal, Western Union, and even Credit Cards. Well my friend, if someone actually bought something using these payment methods probably got SCAMMED, because these payment methods are just collecting easy money from noobs.

The second scenario is that these people are already in jail or are waiting to be arrested because actually purchasing something using these methods is easily traceable and will probably get you arrested.

Bitcoin security jail

When purchasing illegal stuff from the darknet, you are committing multiple felony crimes. And most of the time, you do not even have clue who are these vendors.

Thirds scenario (connected to the second), these vendors are honeypots. As these markets can be created by cops just to lure the noobs and newcomers into purchasing drugs with just a click of a button which is leaving a paper trail.

Conclusion

While I see the future currencies being more decentralized and more people are sharing the cryptographic ways if connecting everybody to these systems I feel that is will be very safe to use cryptocurrencies. Should be very interesting. Buy Monero, my dude.

Bitcoin Security

We are moving to more decentralized currency and time where people can create their own cryptocurrency and connect their communities and societies while being able to save up on transnational fees. I honestly think it’s going to get totally safe and I am waiting for that moment.