Official forum for Utopia Community
You are not logged in.
thrive;8543 wrote:Kelechi;8517 wrote:So much has been added to the ecosystem, Utopia p2p has shown that they actually have the interest of the community at heart but I would like to see better communication between the team and community here in the forum.
If you're waiting for this to happen you will have to wait for a long tie because the UtopiaP2P team are communicating with us the way they can and if you want to somehow talk to them on this forum I will advise you to visit the Official 1984 Group Information section.
Wait but no user can make a single in the "Official 1984 Group Information section" of this forum or there's something I don't know which you as an old user of this forum?
Yes, there's no user of the forum that can post, and the section is only meant for the UtopiaP2P developer team post but I suggest the section since that's the only place the developer team communicates with us here.
So much has been added to the ecosystem, Utopia p2p has shown that they actually have the interest of the community at heart but I would like to see better communication between the team and community here in the forum.
If you're waiting for this to happen you will have to wait for a long tie because the UtopiaP2P team are communicating with us the way they can and if you want to somehow talk to them on this forum I will advise you to visit the Official 1984 Group Information section.
As part of a highly-targeted campaign that started in mid-2022 and continued into the first quarter of 2023, a new hacking group has begun to target the government, aviation, education, and telecom sectors in South and Southeast Asia.
Under the insect-themed alias Lancefly, Broadcom Software's Symantec is monitoring the activity. The attacks make use of a "powerful" backdoor called Merdoor.
The evidence so far gathered suggests that the custom implant was used as early as 2018. Based on the available tools and the victimology pattern, it is determined that gathering intelligence is the campaign's main objective.
According to Symantec, who shared their analysis with The Hacker News, "the backdoor is used very selectively, appearing on just a few networks and a small number of machines over the years, with its use appearing to be highly targeted.".
The ZXShell rootkit has been updated, and it is available to the attackers in this campaign. ".
Although the precise initial intrusion vector used is currently unknown, it is believed to have involved the use of phishing lures, SSH brute-forcing, or the exploitation of servers that were left open to the internet.
Attack chains ultimately result in the deployment of ZXShell and Merdoor, fully functional malware that can communicate with an actor-controlled server for additional commands and log keystrokes.
ZXShell is a rootkit that has several features to harvest sensitive data from infected hosts. It was first identified by Cisco in October 2014. Various Chinese actors, including APT17 (Aurora Panda) and APT27 (also known as Budworm or Emissary Panda), have previously been connected to the use of ZXShell.
The rootkit's source code is openly accessible, so many different groups could use it, according to Symantec. "While it has more features and targets more antivirus software to disable, the new version of the rootkit used by Lancefly appears to be smaller in size. ".
The ZXShell rootkit is signed with the certificate "Wemade Entertainment Co.," which provides another Chinese connection. Ltd," which was previously identified as being connected to APT41 (also known as Winnti) by Mandiant in August 2019.
Additionally, it has been determined that Lancefly's intrusions make use of PlugX and ShadowPad, a modular malware platform that has been secretly used by numerous Chinese state-sponsored actors since 2015.
Despite this, it is also well known that Chinese state-sponsored groups frequently share certificates and other resources, which makes it challenging to attribute an attack crew to a specific known member.
Symantec stated that even though the Merdoor backdoor seems to have been around for a while, it only seems to have been used in a handful of attacks during that time. "This prudent use of the tool may be a sign that Lancefly wants to keep its activities hidden. ".
joanna;8487 wrote:oba;8486 wrote:In addition to implementing advanced cryptographic hashing techniques, it is advised that better regulation and secure blockchain networks be in place to thwart these attacks.
Despite everything you guys said. Let us hope the miners are not greedy because greed can result in corruption when people use their position of authority to use dishonest or illegal means by joining forces to manipulate the network.
Well said, i guess this is the reason why the utopiaP2P ecosystem want the mining setting of CRP coin to be healthy by introduce rules that will chase out miners that are not enthusiasts.
That's the point if such rules are not introduced to prevent environmental harm caused by greedy miners exploiting and destroying ecosystems for their financial gain, it will results in to dump in the price of CRP coin
oba;8482 wrote:Vastextension;8481 wrote:Greed can cause people and businesses to take advantage of others for financial gain, using their resources and influence without regard for morality to maximize profits. Meanwhile this is what causes 51% attack in the cryptocurrency market.
Wait but a 51% attack is a situation where a group of miners or a single miner get gain to control more than 50% of the computing power of a blockchain network and when this happened it literally allows them to manipulate the network's functions, thwart consensus algorithms, double-spend cryptocurrencies and impose changes without consensus across the network. That has nothing to do with what you said.
Yes, you're right but when a miners or a group have access to the 51% computing power of blockchain and they are also greed they can manipulate the network's functions just to earn more for their own selfish gain.
You have a point. For a project to defend against 51% of attacks. They have to continue upgrading their blockchain network protocols to make mining more decentralized and resistant to such attacks.
PEACEMAKER;8461 wrote:Is there any hodden charges on Utopia p2p web proxy server? If non what's the benefit for Utopia p2p for creating the server.
The UtopiaP2P web proxy browser is totally free now and in the future. The benefit of the UtopiaP2P ecosystem creating it is that they keep the promises made to the privacy enthusiast and make privacy easier.
I believe he ask this question because he never believes there will be a project that provides an innovative and unique features for free. Let me shock you, the aim of the UtopiaP2P ecosystem was the protection of all human rights in regard to the privacy of communication and freedom of self-expression.
KingCRP;8001 wrote:Camavinga;7997 wrote:Any individual can fall into any trap or scam in cryptocurrency. It is just a matter of time. Also, you need to be very careful. I have seen someone who has been in cryptocurrency for a very long time who fell for a very cheap scam.
To be safe in cryptocurrency is not complicated all you have to do is don’t be greedy, avoid things that can cause your device harm and protect yourself at all time.
You are also right. Greed sometimes can get the better part of an individual. Though sometimes greed is good because it makes you strive hard to get more out of life but excess of it is deadly.
Greed is never something that good buddy no matter sweet and good it may look like because every greed is a product of destruction. You can strive hard in a normal way without greed but when greed is added, destruction and vast loss step in.
Vastextension;7579 wrote:thrive;7578 wrote:The demand for a given NFT, its uniqueness, the reputation of the artist or creator, and the overall acceptance of NFTs as a form of investment are just a few of the variables that affect how profitable NFTs are.
Despite the fact that NFTs have the potential to become a new asset class, investors should exercise caution when using funds they cannot afford to lose, and they should only invest in NFTs after carefully weighing the risks and rewards.
I don't think the developers have anything to lose when it comes to NFTs. The utopia ecosystem has everything to gain from NFT. This will also help to boost the traffic on this forum and the utopia community at large.
Yes, the UtopiaP2P ecosystem appears to have everything to traffic but the ecosystem still lacks the needed traffic cause it a privacy focus project and most people in the cryptocurrency market don't see privacy as something that's much needed.
Lanistergame2;8025 wrote:Camavinga;8009 wrote:I am not talking about the normal ads. I am talking about those that contain viruses and malware which are deposited in strategic places to force you to click on them.
People need to be seriously careful when clicking on websites or links. The can contain bugs or viruses which are created to spy on you and destroy your device.
At this point and stage of our lives whoever falls fit any cheap scam or invite bugs into their system should not be pitied. Because they brought it to themselves
Hmm. I believe you make this statement because you're never a victim of online theft because their attack on the user are strategically created so that even a smart person can easily be a victim of them.
full;8134 wrote:Lanistergame2;8030 wrote:Running a cryptocurrency project us not like running a school project. It takes a very long time for it to be functional. Sometimes you think that us all you need and then all f a sudden you need more.
Cryptocurrency investors that are close to a project team won't dare join the league of people complaining about project performance especially if the project is organic price based and it is easy for memecoin to get some traffic since the team involve always hype the project.
On a personal note I have never judged a project or anything coin but hype? I always wait till I get involved and then I can actually be able to assess the project properly.
Judging a project without knowing the true intention is not right but I also don't believe in meme coins because they are always the most manipulated cryptocurrency in the market.
Why is it that silicon valley bank keeps on getting into the news for all the negative reasons with all this if I were to be their customer I would have backed out .
The Silicon bank keeps getting in the news for negative reasons because its issue affects both the traditional and cryptocurrency market and people won't easily forget such a situation.
Kelechi;8381 wrote:IyaJJJ;8353 wrote:Having a conflict in idea will only being a drawback to the organization or project and one of the best ways to move a project forward is having a good idea and working together with the project team and community.
Well i also think you are right and all this can be achieved when the community and the team work in accordance with one another, I think the project should seek the advice of the team more often.
Yes, the project developer working in accordance with the community will push the project forward and will also make the investors have a sense of belonging in the community but the project seeking advice from the team as you said is what I don't understand.
I guess right or understand what he was trying to say is that the project developer team should seek advice from the community more often which I don't agree cause what the team needs is what the community suggests and what they believe is needed.
Being on Utopia p2p gives an incredible amount of safety and anonymity, I don’t think any one from this ecosystem is lacking in that regards.
There are many benefits to the UtopiaP2P ecosystem than just the ordinary safety and anonymity you mentioned because there's also ChatGPT and passive income earning on the Utopia application client.
Due to a significant number of weak nodes running Utopia, the Utopia Airdrop program will be suspended today at 16:00 UTC because the network problems may lead to the Utopia airdrop less effectively overall due to dishonest participation.
thrive;8429 wrote:Kelechi;8402 wrote:I doubt if UtopiaP2P would actually like this to happen, also everyone would go for Manchester City and there is a high chance that Manchester city would win the league.
Everything that's a good concept is always welcome in the UtopiaP2P ecosystem and the only concept that is not welcome is the concept that is not needed for the ecosystem to gain more traffic.
According to what i know about the UtopiaP2P ecosystem its a community-driven project where the user best experience is the top priority of the developer team.
Yes, the UtopiaP2P ecosystem is indeed a community-driven project and I believe every user's idea is welcome but that doesn't mean the idea will be granted or integrated into the ecosystem.
Dozie;8397 wrote:Can we please have a prediction on the UEFA champions league it would be very awesome where we would predict the winner of the champions league, although many people would go for Manchester city.
I doubt if UtopiaP2P would actually like this to happen, also everyone would go for Manchester City and there is a high chance that Manchester city would win the league.
Everything that's a good concept is always welcome in the UtopiaP2P ecosystem and the only concept that is not welcome is the concept that is not needed for the ecosystem to gain more traffic.
IyaJJJ;8347 wrote:thrive;8346 wrote:Anything is possible when it come to online activity like this and this is the reason why people are advised never to safe their cryptocurrency wallet private information online.
Apart from the possible back doors. Centralized messaging platform cant be trusted if they can sell the private information of people online to make billions every year there's nothing stoping from doing the same through email.
I guess this is the reason why most privacy enthusiast never use Gmail service when security and privacy is the best priority. Apart from Gmail i think we should be more careful online and use something like Utopia.
Yes, that's the reason why privacy focus services is used by most privacy enthusiasts because of the mode the whole Google platform are operated.
IyaJJJ;8344 wrote:full;8342 wrote:Your point is really genuine cause I have a friend who safe is cryptocurrency wallet information on Gmail and he was surprised that the fund in the wallet was moved which only be done by someone who has access to the wallet information.
If his wallet is not hacked then it's indeed the person that has access to the cryptocurrency wallet information through the email that's responsible for moving the crypto.
Can we say that there's the possibility that GMail has a backdoor operation that give them access to the information and their user email messages
Anything is possible when it come to online activity like this and this is the reason why people are advised never to safe their cryptocurrency wallet private information online.
full;8338 wrote:thrive;8329 wrote:I also believe the information shared will help some people who want to mine the CRP coin but I don't think it will be helpful in the future since the UtopiaP2P ecosystem is always working on upgrading of the some features and tools.
You do have a point because the current information about the CRP coin mining maybe outdated next year not to talk about the future and the best way to mine any cryptocurrency profitably is using the latest equipment.
What you guys said here reminds me of the early days when this project started, the CRP coin is mine with normal computer and to mine CRP coin profitably now you'll need UAM bot, etc.
I also hear such things from some users who are early on this project and that's something that's normal cause change is always constant in the cryptocurrency space for a project to be on top of its game.
Hey guys I just read a comment where someone was encouraging us to try taking responsibility for our mistakes so I was just wondering what are some of our biggest risk.
The biggest I know is not having adequate knowledge about online security, saving private important information especially things that have to do with cryptocurrency wallet online and believe in false information.
thrive;8327 wrote:Camavinga;8308 wrote:Decentralization remains the best form of banking or keeping your money. Centralized entities have done some much damage over the years and it has be stopped.
Decentralized struture remain the best because its the most secure and fair in every settings.
I dont think there's will be a way to stop the existence of centralization because the government never wanted it to stop and that's the reason why they sees cryptocurrency as a threat in the first place.You have a point because the government will never like the concept of something they can not influence or intervene in and decentralization is something that didn't give them what they wanted.
For this reason, we should never expect the government to say yes to decentralization entities unless they regulate the market or support only centralized entities.
Detroit;8316 wrote:Lanistergame2;6363 wrote:Tax fund are probably going into the money being used to repay those that were involved in the loss, so it is only fitting that only tax payers are involved in the repayment.
And about tax being mandatory, it is not really necessary for a society to function and it can be structured better than it is now.
Taxation in general is shit especially here in the united kingdom. It's unnecessarily expensive. As usual the poor gets poorer and the rich continue getting richer.
I will never consider taxation as shit if I were so far it's being spent in the right way and it's also another means of giving back to the community and helping the little man to survive.
I agree with you since the tax was introduced as an essential source of government revenue that enables the government to finance essential public goods and services that support economic growth and development.
Since at least mid-2022, cybercriminals have been using a new phishing-as-a-service (PhaaS or PaaS) platform called Greatness to target business users of the Microsoft 365 cloud service, effectively lowering the barrier to entry for phishing attacks.
"Greatness, for now, is only focused on Microsoft 365 phishing pages, providing its affiliates with an attachment and link builder that creates extremely convincing decoy and login pages," said Cisco Talos researcher Tiago Pereira.
It has elements like pre-filling the victim's email address and showing their appropriate company logo and background image, which were taken from the target organization's actual Microsoft 365 login page, among other things. ".
Manufacturing, healthcare, and technology companies with U.S. locations predominately participate in campaigns for Greatness. S. , the U. K. , Australia, South Africa, Canada, and Australia, with a December 2022 and March 2023 activity peak.
Phishing kits like Greatness provide threat actors—whether experienced or inexperienced—with a convenient one-stop shop that is affordable and scalable, enabling them to create convincing login pages for a variety of online services and get around two-factor authentication (2FA) security measures.
The decoy pages, in particular, act as a reverse proxy to collect login information and time-based one-time passwords (TOTPs) supplied by the victims.
Attack chains start with malicious emails that include an HTML attachment. When opened, the HTML file executes obfuscated JavaScript code that directs the user to a landing page with the recipient's email address pre-filled and requests their password and MFA code.
In order to gain unauthorized access to the accounts in question, the entered credentials and tokens are then sent to the affiliate's Telegram channel.
Additionally, the AiTM phishing kit includes an administration panel that enables the affiliate to customize the Telegram bot, monitor data breaches, and even create malicious attachments and links.
Additionally, in order to load the phishing page, each affiliate is required to have a current API key. The API key also enables behind-the-scenes communication with the genuine Microsoft 365 login page by posing as the victim and preventing unwanted IP addresses from viewing the phishing page.
Together, the phishing kit and the API carry out a "man-in-the-middle" attack by asking the victim for information, which the API will then transmit in real time to the authentic login page, according to Pereira.
"If the victim employs MFA, this enables the PaaS affiliate to steal both the victim's username and password as well as the authenticated session cookies. ".
The findings coincide with Microsoft's implementation of number matching in Microsoft Authenticator push notifications starting on May 8, 2023, in order to strengthen 2FA security and thwart prompt bombing attacks.
full;8132 wrote:Detroit;7854 wrote:Very good point mate. You stand the chance of getting little to nothing at the end of the day if you don't follow these cheap basic rules that govern mining.
To prevent people from getting little or nothing when mining CRP coin is the exact reason I listed some of the things that determine the level of every cryptocurrency ming profitability and it will be nice for those that want to make a profit in cryptocurrency mining to follow my advice.
Nice thread mate. These will help a lot of people even though it's not now but in the nearest future. This forum needs people like you to boost and help develop young minds like yours.
I also believe the information shared will help some people who want to mine the CRP coin but I don't think it will be helpful in the future since the UtopiaP2P ecosystem is always working on upgrading of the some features and tools.
According to a technical report released this week by cybersecurity company Deep Instinct, a previously unreported and largely undetected variation of a Linux backdoor known as BPFDoor has been discovered in the wild.
With this most recent version, security researchers Shaul Vilkomir-Preisman and Eliran Nissan said that BPFDoor "retains its reputation as an extremely stealthy and difficult-to-detect malware.".
The Chinese threat actor Red Menshen (also known as DecisiveArchitect or Red Dev 18), who has been known to target telecom providers in the Middle East and Asia since at least 2021, is linked to the passive Linux backdoor known as BPFDoor (also known as JustForFun), which was first discovered by PwC and Elastic Security Labs in May 2022.
Evidence suggests that the hacking group operated the backdoor undetected for years. The malware is specifically designed to establish persistent remote access to compromised target environments for extended periods of time.
Berkeley Packet Filters (BPF), a technology that allows Linux systems to analyze and filter network traffic, are used by BPFDoor to process incoming commands and conduct network communications.
Threat actors are able to enter a victim's system in this way, filter out unnecessary data, and execute arbitrary code without being noticed by firewalls.
The information from Deep Instinct is based on a BPFDoor artifact that was published on VirusTotal on February 8, 2023. Only three security vendors have labeled the ELF binary as malicious as of this writing.
The removal of many hard-coded indicators and the replacement of them with a static encryption library (libtomcrypt) and a reverse shell for command-and-control (C2) communication are two important features that make the new version of BPFDoor even more evasive.
backdoor for Linux.
To avoid being terminated, BPFDoor is set up at launch to disregard a number of operating system signals. Then, after allocating a memory buffer, it creates a special socket for packet sniffing that attaches a BPF filter to the raw socket and watches for incoming traffic with a particular Magic Byte sequence.
According to the researchers, "BPFdoor will treat a packet containing its Magic Bytes in the filtered traffic as a message from its operator, parse out two fields, and fork itself once more.".
The child process will attempt to contact the parent process by treating the previously parsed fields as a command-and-control IP-Port combination while the parent process will continue to monitor the filtered traffic passing through the socket. ".