Pages:
Author

Topic: Digitalcoin Dev ROBBED! - page 8. (Read 25999 times)

legendary
Activity: 1526
Merit: 1001
April 13, 2014, 07:38:48 AM


Whether he sold the coins or they were actually stolen by an employee has been done to death. If he hasn't said anymore on it by now he probably isn't going to or HAS actually told the truth. He has not run away and is still actively moving forward as planned with DGC as usual so why do you even care other than to  bignote yourself as some kind of Sherlock Holmes or to try and drive the price further down. The stranger thing in all this is you admitted in the past you mine dgc (Why would you do that and spread FUD unless you are trying to accumulate more dgc at super low prices??).

It makes no difference to the current price of DGC if he sold the coins himself or not. He was entitled to do so even if it would have been a dumb trading move. The DGC price went down along with all other alts in line with the Bitcoin price drop so its no big 'mystery'

My problem I have is with you threatening CryptoAve and threatening/attacking other websites which is just plain wrong and is why I am proceeding to file a report to CERT and following up with other relevant authorities in the interests of protecting hardworking coin communities from idiots like yourself who have nothing better to do than disrupt the livelihood of other people.


Translation:

Please be distracted from the obvious, pay no attention to any inkling of common sense.

Yes it matters greatly if he simply sold the coins as it speaks directly to his credibility in more ways than one. One he claims they were stolen, so if he sold them....hopefully I don't have to spell that out for you. Another is the outright lack of ethics in selling off personal coins while at the same soliciting donations. Hence the whole "stolen" farce.

As stated by  a few of the people that invested in CryptoAve, they too are wondering why Baritus will not provide even the simplest of details related to the $30,000 USD theft.

It didn't happen,that is why and I am sure the people that invested are a little pissed about making it possible for Baritus to sell of $30K of Digitalcoin and pocket the proceeds.

I can hardly await your next diatribe trying to veer off the subject.


~BCX~

Unlike you, Baritus has credibility for his work in the past and the present. And you speaking of ethics makes this even more ridiculous. So, spare us with your endless moralising. Even the most reputable exchanges have been hacked and coins were stolen worth millions of Dollars recently -Gox, Vircurex and so on- and you are worrying for our funds in CryptoAve. That's really sweet. How generous of you. Good luck with your quest, Ahab.
legendary
Activity: 2097
Merit: 1070
April 13, 2014, 07:30:37 AM
If he wanted to sell 500k DGC then he could have done so at any point, there would be no reason to lie about it.

People buy and sell coins all the time and they're in no way accountable to you or anyone else for that matter.
legendary
Activity: 2097
Merit: 1070
April 13, 2014, 07:11:06 AM
Baritus has claimed that CryptoAve was attacked with the Heartbleed vulnerability roughly one month prior to the vulnerability being uncovered and made public. If an individual had knowledge of this flaw before the the entire world, why would that individual choose to attack CryptoAve of all places? Why not go after a much larger website? Why not sell the knowledge of this vulnerability to the highest bidder?

This does not make any rational sense.

Sources:
http://digitalcoin.co/forums/index.php/topic,951.0.html
http://heartbleed.com/
http://digitalcoin.co/forums/index.php/topic,1010.0.html

The heartbleed bug existed in the wild for months before it was made public.


It has been in the code for roughly two years. The point to all of this is why CryptoAve? If one has knowledge of this flaw, why would one attack a brand new exchange with few users and no potential to profit for doing so?

If you look back to the first weeks of March there were a lot of different sites being hacked every other day.

Gox had gone and I suspect they were coming for the leftovers.

I've posted the basic facts. I see that CloudFlare claims to have been notified prior to 03 April, but the facts I provided are not incorrect according to the sources. It is entirely possible, and probable, that individuals knew of Heartbleed before these recent weeks. I know that you are a supporter of Digitalcoin and will defend it in all instances, but you cannot deny that it seems odd CryptoAve would have been attacked with this flaw. The volume on the exchange was minimal, and the deposit amount was no doubt minimal as well.

To me, the order of events seems suspicious and convenient. If someone can prove to me otherwise, I will concede. I hope for your sake and the sake of others that Baritus is more than confident with the security of CryptoAve when it launches again. BCX will be relentless.

BCX may well be relentless. Anyone attacking an exchange will be reported to the relevant authorities.

Having made lots of public threats in this forum really won't help anyone apart from the federal police should anyone manage to hack this site once it's relaunched.
newbie
Activity: 56
Merit: 0
April 13, 2014, 06:03:15 AM
@justice4all

Hopefully you and Disclaimer201 (Baritus) realize that every time you side step the very relevant questions, you simply condemn him more?


Baritus sold half of the coins that was invested and claimed it was stolen.

The reason Baritus will not post the addresses himself is because it would tie him to a trail that will not only show he cashed in the coins but has been milking the DGC supply since inception. He knows I can prove this. If he never publicly post the addresses, he can always claim that any addresses associated with the "theft" are not the correct ones.

Side step all you want, it doesn't change the obvious, Baritus is busted plain and simple.


~BCX~




Whether he sold the coins or they were actually stolen by an employee has been done to death. If he hasn't said anymore on it by now he probably isn't going to or HAS actually told the truth. He has not run away and is still actively moving forward as planned with DGC as usual so why do you even care other than to  bignote yourself as some kind of Sherlock Holmes or to try and drive the price further down. The stranger thing in all this is you admitted in the past you mine dgc (Why would you do that and spread FUD unless you are trying to accumulate more dgc at super low prices??).

It makes no difference to the current price of DGC if he sold the coins himself or not. He was entitled to do so even if it would have been a dumb trading move. The DGC price went down along with all other alts in line with the Bitcoin price drop so its no big 'mystery'

My problem I have is with you threatening CryptoAve and threatening/attacking other websites which is just plain wrong and is why I am proceeding to file a report to CERT and following up with other relevant authorities in the interests of protecting hardworking coin communities from idiots like yourself who have nothing better to do than disrupt the livelihood of other people.
newbie
Activity: 56
Merit: 0
April 13, 2014, 04:22:55 AM
There are two separate things that happened here, so better don't mix them up.

1 - Dev was robbed and this incident is unrelated to CrptoAve and happened much earlier.

2 - CryptoAve was attacked and shutdown before users' funds were compromised. All users received back their deposits. CryptoAve will be reopened soon.




1) Dev wasn't robbed he sold them for about $30,000 but couldn't very well admit to it because he was soliciting investors at the same time, hence the "mysterious employee stole them" line of bs. You're setting up the stage to admit that here https://bitcointalksearch.org/topic/m.6187281

2) That story changes every time you post it. First it was just a few that compromised, then none. If you will look at your post above it makes no sense. If the exchange was shutdown prior to any funds being compromised, then why did they have to "receive their funds back".

Oh I am so looking forward to CryptoAve reopening as I have a special reopening celebration planned. I called in a few favors from some top notch "security testers" and it better be rock solid, maybe even Realsolid LOL....



This isn't going to stop till Baritus does one of two things.

1) Post the address of the "stolen" wallets himself, that's all it takes and nothing more.

2) Publicly admits he sold the coins


There's a reason he won't post them himself because he knows I can track them right to him and this way he can always deny any wallet identified as the "stolen" ones, are not them.


Maybe I should start turning up the heat on everything Baritus related.



~BCX~






Once and for all do everyone a favour and shut your piehole. No one here cares about your script kiddy botnets and fantasy land stories that never amount to anything. Baritus nor the DGC community deserves the BS and muckraking that you are continually trying to spread about them. Did you lose any coins? Did anyone lose any coins? Has anyone been ripped off? Is DGC expensive for new or old to invest in at the moment? NO, so STFU. Meanwhile DGC continues to gather momentum with new development and services which will speak louder than any words ever will.

  Maybe the Australian federal police will be ready for you once CryptoAve starts back up. No doubt they have a strong presence in the Melbourne area. Actually I may just give my father a call and ask him to contact his good friend who was a recent chief of Victorian police to assist. He would certainly be able to make a few calls to expedite the process. There is quite a file list on you that can easily be passed to them.

A starting point would be to report BCX to Cert Australia which I will be doing before I call in the favour from my fathers friend. I would encourage anyone else who's site he as attacked or threatened to file a report.

https://www.cert.gov.au/report

"We work in the Cyber Security Operations Centre, sharing information with other key cyber security agencies and our international counterparts. This means we are very well connected and informed, which is a great asset in helping businesses protect themselves from cyber attacks.

CERT Australia (the CERT) is the national computer emergency response team.  The CERT is part of the Federal Attorney-General’s Department, with offices in Canberra and Brisbane. We also work in the Cyber Security Operations Centre, sharing information and working closely with the Australian Security Intelligence Organisation (ASIO), the Australian Federal Police (AFP) and the Australian Signals Directorate (ASD). In addition, we work closely and share information with our international counterparts. "
legendary
Activity: 1526
Merit: 1001
April 13, 2014, 03:21:17 AM
BCX is not here to help anyone but himself. Your knight in shining armor.
legendary
Activity: 1540
Merit: 1011
FUD Philanthropist™
April 12, 2014, 11:00:38 PM

This isn't going to stop till Baritus does one of two things.

1) Post the address of the "stolen" wallets himself, that's all it takes and nothing more.

2) Publicly admits he sold the coins




I have to agree with BCX on this one (which is rare Cheesy).

I am a long time supporter of DGC and hold a fair chunk.

In the interest of those who have invested in Digitalcoin why not just resolve this once and for all. I don't even care if Baritus sold the coins to be honest, if they were his he can do what he wants with them as far as I am concerned. The longer this goes on the more the reputation of Digitalcoin gets damaged.

If the coins were stolen, post the address. If not admit you sold the coins (everyone needs cash now and then - nothing wrong with that). End of story, and we can all move on.

Secondly, I hate to say it but, the level of personal attacks on BCX does not reflect well on Digitalcoin supporters. Ad hominem attacks on BCX really show there is no sound argument for not disclosing the addresses which is all BCX is asking.

It would take Baritus all of a few minutes to post those addresses.

The question is this: Does the arguably severe level of damage this is doing to Digitalcoin not warrant Baritus spending 5 minutes to come and address this issue once and for all?  I can find no reason why Baritus or someone else in the know will not do this, even if it is public information, not everyone is a block chain detective!

Lastly, I actually believe Baritus is telling the truth, which makes it even harder for me to understand why he won't personally post the adresses.

i got half way through what you said and had to reply asap !
YES thank you !
If simply posting the attackers address who you claim stole your coins will shut people up then why not do it ? what is there to hide ?
Hell if he was honest about the theft he knows BCX could help him track the guy down maybe or at least vindicate Baritus and be able to back up and verify his claim.
This is like the Carbon coin crap i went through recently guys bend over backwards to hide what that their left hand is doing while screaming look at my right hand.

This ain't Facebook and i don't care who wants to be my BFF lol
A discussion about financial activity is fair..

And to the other guy bad mouthing me about web design etc..
I had coded from scratch web site systems using straight HTML and PHP etc way back like 10 years ago roughly
I made a system for an Auction house that wanted inexperienced users to be able to upload a lot of pictures to their site etc all the time
so i wrote them a system tailored to what they asked me for.. it stayed in operation for ages until they sold the business.
Another example is 10 years ago i wrote a PHP shopping carts system from scratch and integrated Paypal into it and i used that
to set up my own web site and sell a collection of thousands of vintage Playboy magazines i got at an auction cheap.
First one that sold was the Madonna cover one from the 80's lol
I actually have a lot of web design experience so i will repeat back to you word for word "You might want to check some facts before talking complete horseshit"

And hashing algo's ? like what ? how i reverse engineered the hashing algo's used on my Windows Firewall and made a keygen by writing hashing algo's for it ?
Want to see some keygen source code ? I got plenty of experience in my PC gaming cracking group days 10 years ago Wink and yeah my work was pre'd and VERY popular.
every played a cracked version of Half life 2 or Counter Strike or Steam ? most likely half of you out there have had my code on your machines lol
I have been paid for contracting from my CAN Government before too and a major international corp has had me on called for a decade as their emergency does everything computer guy..
Want to hear more bragging ? How about some of the biggest hacking new stories that have happened in the last 10 years have been by old buddies of mine ?
How about i made my own file sharing program that used various "algo's" lol
How about all the free software and cracks i have coded and put online almost always open source want me to list them ?
For example i coded the worlds only crack (jailbreak) for a line of LG cell phones that came out some years ago that allowed users to add unlimited games and apps
even when the so called experts said it was impossible because of the drm protection employed.. they were wrong and i coded an extensive GUI app to hack the phone.
Want More bragging ? i can go and on and on Wink
legendary
Activity: 2097
Merit: 1070
April 12, 2014, 09:43:15 PM
I feel sorry for him but I am also wondering about his security awareness. If he can't secure his own funds I doubt he is able to guarantee the safety of funds on CryptoAve. This guy could also have stolen the admin login details or accessed the cold storage (if there is cs???).

If you had physical access to the computer where I store all my coins you could steal them all if you got a keylogger on there, however nobody apart from me has physical access to my coin storage computer.

It's been made clear that the computer where these coins were stored had nothing to do with CryptoAve - remember not all people operate out of a basement with a single computer.
full member
Activity: 182
Merit: 100
April 12, 2014, 09:36:58 PM
I feel sorry for him but I am also wondering about his security awareness. If he can't secure his own funds I doubt he is able to guarantee the safety of funds on CryptoAve. This guy could also have stolen the admin login details or accessed the cold storage (if there is cs???).
legendary
Activity: 2097
Merit: 1070
April 12, 2014, 09:31:42 PM
Baritus has claimed that CryptoAve was attacked with the Heartbleed vulnerability roughly one month prior to the vulnerability being uncovered and made public. If an individual had knowledge of this flaw before the the entire world, why would that individual choose to attack CryptoAve of all places? Why not go after a much larger website? Why not sell the knowledge of this vulnerability to the highest bidder?

This does not make any rational sense.

Sources:
http://digitalcoin.co/forums/index.php/topic,951.0.html
http://heartbleed.com/
http://digitalcoin.co/forums/index.php/topic,1010.0.html

The heartbleed bug existed in the wild for months before it was made public.


It has been in the code for roughly two years. The point to all of this is why CryptoAve? If one has knowledge of this flaw, why would one attack a brand new exchange with few users and no potential to profit for doing so?

If you look back to the first weeks of March there were a lot of different sites being hacked every other day.

Gox had gone and I suspect they were coming for the leftovers.

I've posted the basic facts. I see that CloudFlare claims to have been notified prior to 03 April, but the facts I provided are not incorrect according to the sources. It is entirely possible, and probable, that individuals knew of Heartbleed before these recent weeks. I know that you are a supporter of Digitalcoin and will defend it in all instances, but you cannot deny that it seems odd CryptoAve would have been attacked with this flaw. The volume on the exchange was minimal, and the deposit amount was no doubt minimal as well.

To me, the order of events seems suspicious and convenient. If someone can prove to me otherwise, I will concede. I hope for your sake and the sake of others that Baritus is more than confident with the security of CryptoAve when it launches again. BCX will be relentless.

I had 100's of thousands of various coins on CryptoAve prior to the attempted hack.

The true timeline of the heartbleed story is only starting to emerge now, I'm sure we will all learn more about this extraordinary incident in the coming weeks and months.

I wouldn't be surprised if this exploit was used against Gox.
member
Activity: 308
Merit: 10
★YoBit.Net★ 1400+ Coins Exchange
April 12, 2014, 09:26:48 PM
Baritus has claimed that CryptoAve was attacked with the Heartbleed vulnerability roughly one month prior to the vulnerability being uncovered and made public. If an individual had knowledge of this flaw before the the entire world, why would that individual choose to attack CryptoAve of all places? Why not go after a much larger website? Why not sell the knowledge of this vulnerability to the highest bidder?

This does not make any rational sense.

Sources:
http://digitalcoin.co/forums/index.php/topic,951.0.html
http://heartbleed.com/
http://digitalcoin.co/forums/index.php/topic,1010.0.html

The heartbleed bug existed in the wild for months before it was made public.


It has been in the code for roughly two years. The point to all of this is why CryptoAve? If one has knowledge of this flaw, why would one attack a brand new exchange with few users and no potential to profit for doing so?

If you look back to the first weeks of March there were a lot of different sites being hacked every other day.

Gox had gone and I suspect they were coming for the leftovers.

I've posted the basic facts. I see that CloudFlare claims to have been notified prior to 03 April, but the facts I provided are not incorrect according to the sources. It is entirely possible, and probable, that individuals knew of Heartbleed before these recent weeks. I know that you are a supporter of Digitalcoin and will defend it in all instances, but you cannot deny that it seems odd CryptoAve would have been attacked with this flaw. The volume on the exchange was minimal, and the deposit amount was no doubt minimal as well.

To me, the order of events seems suspicious and convenient. If someone can prove to me otherwise, I will concede. I hope for your sake and the sake of others that Baritus is more than confident with the security of CryptoAve when it launches again. BCX will be relentless.
legendary
Activity: 2097
Merit: 1070
April 12, 2014, 09:01:56 PM
Baritus has claimed that CryptoAve was attacked with the Heartbleed vulnerability roughly one month prior to the vulnerability being uncovered and made public. If an individual had knowledge of this flaw before the the entire world, why would that individual choose to attack CryptoAve of all places? Why not go after a much larger website? Why not sell the knowledge of this vulnerability to the highest bidder?

This does not make any rational sense.

Sources:
http://digitalcoin.co/forums/index.php/topic,951.0.html
http://heartbleed.com/
http://digitalcoin.co/forums/index.php/topic,1010.0.html

The heartbleed bug existed in the wild for months before it was made public.


It has been in the code for roughly two years. The point to all of this is why CryptoAve? If one has knowledge of this flaw, why would one attack a brand new exchange with few users and no potential to profit for doing so?

If you look back to the first weeks of March there were a lot of different sites being hacked every other day.

Gox had gone and I suspect they were coming for the leftovers.
legendary
Activity: 2097
Merit: 1070
April 12, 2014, 09:00:06 PM
This timeline doesn't make sense:
  • 16 March 2014: Baritus announces closure of CryptoAve citing security concerns.
  • 03 April 2014: OpenSSL vulnerability (dubbed Heartbleed) is uncovered by team of security engineers.
  • 07 April 2014: Knowledge of Heartbleed is made public.
  • 09 April 2014: Baritus makes the claim that Heartbleed was exploited to attack CryptoAve.

Baritus has claimed that CryptoAve was attacked with the Heartbleed vulnerability roughly one month prior to the vulnerability being uncovered and made public. If an individual had knowledge of this flaw before the the entire world, why would that individual choose to attack CryptoAve of all places? Why not go after a much larger website? Why not sell the knowledge of this vulnerability to the highest bidder?

This does not make any rational sense.

Sources:
http://digitalcoin.co/forums/index.php/topic,951.0.html
http://heartbleed.com/
http://digitalcoin.co/forums/index.php/topic,1010.0.html

Things are a lot more complicated than the above simplicity and we know for sure that Heartbleed was known before April 3rd.

Did you know that CloudFlare were notified of the Heartbleed bug at the end of March ? I'm going to assume you didn't know this due to the incorrect information in your above post.

So what could have happened with Heartbleed and how come some people knew about it way before others ?

Why did Cloudflare and who knows who else receive advance warnings when pretty much most of the rest of the world didn't ?

I believe I know the answer to this question and it's all to do with who found it. They're a commercial security company with paying customers.

I'll bet this company (Codenomicon, google them) found the issue at some point over the last few months and have been 'hawking' it to their existing customers and maybe picking up a few new customers along the way - quite probably Cloudflare is one of these customers.

Codenomicon are a commercial entity so this is exactly how anyone would expect them to operate.

The golden question to which nobody knows the answer is when was it first discovered ? Who knew about it and when did they know ? It was definitely before March 30th but this information has not been published anywhere, not yet anyway.

I hope one day we find out when the vuln was first discovered, I'm sure it was way before it was made public.
full member
Activity: 203
Merit: 100
April 12, 2014, 08:56:33 PM
It has been in the code for roughly two years. The point to all of this is why CryptoAve? If one has knowledge of this flaw, why would one attack a brand new exchange with few users and no potential to profit for doing so?

While cryptoave was small, it still had a good amount of money on it worth stealing.  I'm not at all saying it did or didn't happen, as I'm neutral on it until real proof of what happened comes out.
member
Activity: 308
Merit: 10
★YoBit.Net★ 1400+ Coins Exchange
April 12, 2014, 08:53:59 PM
Baritus has claimed that CryptoAve was attacked with the Heartbleed vulnerability roughly one month prior to the vulnerability being uncovered and made public. If an individual had knowledge of this flaw before the the entire world, why would that individual choose to attack CryptoAve of all places? Why not go after a much larger website? Why not sell the knowledge of this vulnerability to the highest bidder?

This does not make any rational sense.

Sources:
http://digitalcoin.co/forums/index.php/topic,951.0.html
http://heartbleed.com/
http://digitalcoin.co/forums/index.php/topic,1010.0.html

The heartbleed bug existed in the wild for months before it was made public.


It has been in the code for roughly two years. The point to all of this is why CryptoAve? If one has knowledge of this flaw, why would one attack a brand new exchange with few users and no potential to profit for doing so?
full member
Activity: 203
Merit: 100
April 12, 2014, 08:43:44 PM
Baritus has claimed that CryptoAve was attacked with the Heartbleed vulnerability roughly one month prior to the vulnerability being uncovered and made public. If an individual had knowledge of this flaw before the the entire world, why would that individual choose to attack CryptoAve of all places? Why not go after a much larger website? Why not sell the knowledge of this vulnerability to the highest bidder?

This does not make any rational sense.

Sources:
http://digitalcoin.co/forums/index.php/topic,951.0.html
http://heartbleed.com/
http://digitalcoin.co/forums/index.php/topic,1010.0.html

The heartbleed bug existed in the wild for months before it was made public.
member
Activity: 308
Merit: 10
★YoBit.Net★ 1400+ Coins Exchange
April 12, 2014, 08:38:03 PM
This timeline doesn't make sense:
  • 16 March 2014: Baritus announces closure of CryptoAve citing security concerns.
  • 03 April 2014: OpenSSL vulnerability (dubbed Heartbleed) is uncovered by team of security engineers.
  • 07 April 2014: Knowledge of Heartbleed is made public.
  • 09 April 2014: Baritus makes the claim that Heartbleed was exploited to attack CryptoAve.

Baritus has claimed that CryptoAve was attacked with the Heartbleed vulnerability roughly one month prior to the vulnerability being uncovered and made public. If an individual had knowledge of this flaw before the the entire world, why would that individual choose to attack CryptoAve of all places? Why not go after a much larger website? Why not sell the knowledge of this vulnerability to the highest bidder?

This does not make any rational sense.

Sources:
http://digitalcoin.co/forums/index.php/topic,951.0.html
http://heartbleed.com/
http://digitalcoin.co/forums/index.php/topic,1010.0.html
legendary
Activity: 1526
Merit: 1001
April 12, 2014, 07:37:55 PM


The chart actually shows that what I say is correct. You could buy thousands of coins for cheap for a sustained period of time. That's what I did, and I'm not the only one. And if you are clever you will see this altcoin and bitcoin low as the perfect chance to get in.

Yes it is theoretically possible if you were the sole buyer that day.

Give it up, you're outted.

Time to move on to the next sockie.


~BCX~

Do you want to inform me about my DGC holdings? Now, you are funny. DGC rocks and I will hold on to the coin and continue to support it. Whoever stole Baritus' coins and dumped them in the middle of a price depression is an idiot. You are so convinced that he took his own coins and dumped them that you even rule out the possibility someone might have actually stolen them from him.
legendary
Activity: 1526
Merit: 1001
April 12, 2014, 07:18:59 PM
.... I have over 100k myself, most which I bought at 3000 satoshis before the price rise to 60000 satoshi last fall. It's nothing, if you were a Bitcoin and Litecoin early adopter.

BS. Why do you have to lie so hard? The lowest DGC was EVER TRADED in history is 3,000 Satoshi on 11/18/13 probably a few minutes or low volume not even 100k in DGC. Chances of you being the person who bought them at that price are almost certainly zero. Why the F do you brag about something you actually have not done?

Its funny that you act all HUMBLE too, saying "It's nothing" [for you], [no big deal] like that 70 BTC you "almost" had for a few minutes on Dec 15th, 2013,  is NOTHING to you.

I bet the greedy you didnt even cash out.

This kind of bragging language with a mountain of BS behind it seriously bugs me on this forum.



I did buy all the way down to 3000 satoshis. The price was a bargain for such a well maintained coin. Then I sold some again for 25-30k. I also mined DGC since last summer. 70 Bitcoins is indeed a lot of money. But I mined Litecoin from June 2012, and Bitcoin from June 2011. Having a much harder time getting over selling 500 Bitcoins for 5-10 Dollars. That hurt a bit, but who could have known back then. Also, I never put a single dollar in Bitcoin besides mining.

It was and it is very easy to buy 100k DGC then and now.


You have to be a sock puppet of Baritus', you're both so bad at out right lying.

The charts clearly show you are full of shit, are they wrong?

Brooklynite just busted your lies wide open.

Do what you do best, change the story and try again LOL


~BCX~

The chart actually shows that what I say is correct. You could buy thousands of coins for cheap for a sustained period of time. That's what I did, and I'm not the only one. And if you are clever you will see this altcoin and bitcoin low as the perfect chance to get in.
legendary
Activity: 1526
Merit: 1001
April 12, 2014, 06:48:42 PM
.... I have over 100k myself, most which I bought at 3000 satoshis before the price rise to 60000 satoshi last fall. It's nothing, if you were a Bitcoin and Litecoin early adopter.

BS. Why do you have to lie so hard? The lowest DGC was EVER TRADED in history is 3,000 Satoshi on 11/18/13 probably a few minutes or low volume not even 100k in DGC. Chances of you being the person who bought them at that price are almost certainly zero. Why the F do you brag about something you actually have not done?

Its funny that you act all HUMBLE too, saying "It's nothing" [for you], [no big deal] like that 70 BTC you "almost" had for a few minutes on Dec 15th, 2013,  is NOTHING to you.

I bet the greedy you didnt even cash out.

This kind of bragging language with a mountain of BS behind it seriously bugs me on this forum.



I did buy all the way down to 3000 satoshis. The price was a bargain for such a well maintained coin. Then I sold some again for 25-30k. I also mined DGC since last summer. 70 Bitcoins is indeed a lot of money. But I mined Litecoin from June 2012, and Bitcoin from June 2011. Having a much harder time getting over selling 500 Bitcoins for 5-10 Dollars. That hurt a bit, but who could have known back then. Also, I never put a single dollar in Bitcoin besides mining.

It was and it is very easy to buy 100k DGC then and now.
Pages:
Jump to: