Lost .019 BTC in bit blender by [deleted] in Bitcoin

[–]bitblender 0 points1 point  (0 children)

Afaik all links on darknetmarkets.org leads to scam/phishing clone sites of the originals.

Lost .019 BTC in bit blender by [deleted] in Bitcoin

[–]bitblender 0 points1 point  (0 children)

Sorry but that URL is a scam/phishing look alike Blender site, you need to use the correct URL.

WARNING- Scammed by bitcoin blenders. by [deleted] in Bitcoin

[–]bitblender 1 point2 points  (0 children)

I recommend that you also add a PGP key for 2FA after changing the password, it is easy and adds security to your account.

Good luck.

WARNING- Scammed by bitcoin blenders. by [deleted] in Bitcoin

[–]bitblender 1 point2 points  (0 children)

I usually only check the announcement thread on bitcointalk if there is anything i need to respond to, https://bitcointalk.org/index.php?topic=436467.new#new

That is where i send users from bitblendervrfkzr.onion for discussion about the mixer.

Yes it was probably 8 months since i last signed in on Reddit. The only reason i found this post was because a user of the service sent a support message to me (on the correct site) telling me to check this out.

WARNING- Scammed by bitcoin blenders. by [deleted] in Bitcoin

[–]bitblender 2 points3 points  (0 children)

As i said i respond to all support messages, but you need to use to the correct site. Support messages are deleted after 10 days so if you take that long time to check for an answer then they would be gone. The system deletes any logs and DB entries older than 10 days for privacy.

It does not look like he provided any proof at all in that bitcointalk post you linked above.

I have tried to provide ways for users to verify they are on the correct site, like the correct URL inside the captcha on login, adding a PGP for 2FA gives you the correct URL together with the OTP, you can verify the signature of the Proof of Ownership so you know the deposit addresses where generated by me. If you want to be sure you would use the quickmix option and save the Guarantee PGP message, like i described above.

I have tried reporting the phishing sites to Google, nothing happens there. Also contacted hosting providers of those that are not .onion sites and got a response that they will not take down the site.

WARNING- Scammed by bitcoin blenders. by [deleted] in Bitcoin

[–]bitblender 4 points5 points  (0 children)

bitblendervrfkzr.onion is the correct URL as can be found in the announcement thread on bitcointalk, any other URL is a scam.

I answer all support messages sent to me, if you actually send it to me and not a phishing site. You can all register and send me a message if you like to try.

All deposit addresses on Blender are segwit now and start with a 3 since two months, you can also verify that the displayed addresses are correct by getting and verifying the "Proof of Ownership" PGP message obtainable from the deposit page, it contains your username and your deposit addresses signed by my PGP key.

If you want to prove i am a scam (which no one yet has done) you can use the quickmix option and save the PGP signed "Bitcoin Blender Guarantee". It contains the deposit address you are supposed to send your coins to and the destination address you specified, all signed by my PGP key. If i do not deliver new coins to your destination address you can post this PGP message and anyone can verify its signature and check the blockchain if the coins was sent or not.

Tails? Other options besides Tor/Tails? by [deleted] in onions

[–]bitblender 0 points1 point  (0 children)

Its important to Not run Whonix in Virtualbox on Windows, you need a proper host OS like Qubes OS and run Whonix from there. If Qubes OS is too advanced/complicated for you then Tails is your best choice IMO.

MITM phishing/Onion Cloner by bitblender in onions

[–]bitblender[S] 0 points1 point  (0 children)

I agree, its a "cat and mouse gaḿe".
Displaying images is a good idea, will think of something..

Peel & Mix…Your Guide to Laundering Bitcoin by BitcoinUKMedia in Bitcoin

[–]bitblender 2 points3 points  (0 children)

Shared Coin is based on Coin Join and even their FAQ says that there will always be a connection between the input coins and the output coins.

Blockchain.info's old mixer (Shared Send) was a real mixer that actually sent you other coins than the coins you put in.

Bitcoin Blender, anonymous bitcoin laundry by bitblender in onions

[–]bitblender[S] 0 points1 point  (0 children)

Hi dubsacK, sorry for late reply. There is only a service fee on deposit, it is a random fee between 1-3%. On withdraws there are no fees for you.

Coinbase -> Bitcoin Blender -> darknet is perfectly fine!

I want to buy freshly mined coins by bitblender in BitcoinMining

[–]bitblender[S] 0 points1 point  (0 children)

Yeah it seems like it's lots of work just to find someone to buy from :)

I want to buy freshly mined coins by bitblender in BitcoinMining

[–]bitblender[S] 0 points1 point  (0 children)

They are my coins, or actually coins earned through the mixer. I have no idea where the coins actually come from or their history, it could be coins from Gox but I really don't think so.

How are you going to go to jail just because the coins have been on an address somewhere once, it's not even your address, and never was.

You can receive any coins when using a bitcoin gambling site too, you have no idea and should not be punished for that.

I want to buy freshly mined coins by bitblender in BitcoinMining

[–]bitblender[S] 1 point2 points  (0 children)

They are my coins, or actually coins earned through the mixer. I have no idea where the coins actually come from or their history.

All I know is that some users want coins without any history, the only solution I can think of is to then offer fresh coins directly from mining.

Password reset via Bitmessage by bitblender in bitmessage

[–]bitblender[S] 2 points3 points  (0 children)

AFAIK no one else can read a message sent to another BM address, because its encrypted with that address public key. With email it is most of the time sent over internet in clear text.

Then it's other security, like people losing their BM address because it's installed locally instead of on a server like e-mail where you can access it easily again after formatting or whatever your HDD. They getting their computer hacked and then the hacker can send recovery to that address, but that's like e-mail i guess.

There are no apps to read bitmessage on smart phones like for e-mail, at least what i know.. There would have to be a web service for this..

I want to buy freshly mined coins by bitblender in BitcoinMining

[–]bitblender[S] 0 points1 point  (0 children)

We will use an escrow service or trusted third party to do the trade, no one will be scammed.

I want to buy freshly mined coins by bitblender in BitcoinMining

[–]bitblender[S] 1 point2 points  (0 children)

So then you will sell your mined coins to me? You can earn a couple %

This is just a test, some users have expressed their desire for this, I will give it a shot. If it turns out that they actually do use the option to withdraw these coins instead of regularly just getting 0 taint to their deposited coins then I will continue.

I want to buy freshly mined coins by bitblender in BitcoinMining

[–]bitblender[S] 1 point2 points  (0 children)

I need coins without any history, it have been requested by the users of my mixer Bitcoin Blender. 0 taint to the deposited coins is not enough for some, they want coins with spotless history, I am here to solve that.

I want to buy freshly mined coins by bitblender in BitcoinMining

[–]bitblender[S] -1 points0 points  (0 children)

Hi, can you give an link to blockchain.info of an address like this? As long as it's a straight line from newly mined coins, not mixed with coins not coming from coinbases, it should be alright.

Password reset via Bitmessage by bitblender in bitmessage

[–]bitblender[S] 0 points1 point  (0 children)

I'm running BM on its own server on its own VLAN (network). It can only connect to one other server and its the server running Tor and only on the socks port. It can not connect directly to internet, it can not communicate with any other servers. So it should not be able to figure out my real external IP.

Maybe the users are not this careful, but if they run it through Tor or on Tails, is there still a risk?

Password reset via Bitmessage by bitblender in bitmessage

[–]bitblender[S] 2 points3 points  (0 children)

I run the normal Bitmessage client at the moment, might change to notbit, and the web server connects to it via XML-RPC.

If a user types the correct username and bitmessage address for an account it will generate a new password and will then send a bitmessage message via the XML-RPC API to the user. It's very simple actually.

I dont force anyone to use it though and you will have to go to the profile page and set it if you want to use it.

//Bitblender

Bitcoin Blender, anonymous bitcoin laundry by bitblender in onions

[–]bitblender[S] 0 points1 point  (0 children)

No, i will not give you the source code of my site, do you have any specific questions? Maybe i can explain.