Difference between revisions of "Bitcoins"
From thelinuxwiki
(Pushed from Themanclub.) |
|||
Line 2: | Line 2: | ||
== How to purchase bitcoins == | == How to purchase bitcoins == | ||
dwolla | dwolla | ||
+ | coinbase.com (U.S. only) | ||
== Disclosure Laws Can Be Used To Confiscate Bitcoin Assets == | == Disclosure Laws Can Be Used To Confiscate Bitcoin Assets == | ||
Line 10: | Line 11: | ||
observers have suggested defensive techniques that deploy TrueCrypt disk encryption with hidden volume partitions or PGP Whole Disk Encryption rendering the entire computer unbootable thereby making even file time and date stamps unavailable. Another legal strategy to complicate matters could be to split the passphrase with another person and claim that you are never in possession of the entire real passphrase. Then, at least there would be “plausible deniability” as to who provided the invalid portion of the passphrase or you would have a cellmate if held in contempt. | observers have suggested defensive techniques that deploy TrueCrypt disk encryption with hidden volume partitions or PGP Whole Disk Encryption rendering the entire computer unbootable thereby making even file time and date stamps unavailable. Another legal strategy to complicate matters could be to split the passphrase with another person and claim that you are never in possession of the entire real passphrase. Then, at least there would be “plausible deniability” as to who provided the invalid portion of the passphrase or you would have a cellmate if held in contempt. | ||
− | [[category: | + | [[category:bitcoin]] |
Latest revision as of 22:28, 25 February 2013
How to purchase bitcoins
dwolla coinbase.com (U.S. only)
Disclosure Laws Can Be Used To Confiscate Bitcoin Assets
(by demanding you give up encryption passwords)
http://www.forbes.com/sites/jonmatonis/2012/09/12/key-disclosure-laws-can-be-used-to-confiscate-bitcoin-assets/
observers have suggested defensive techniques that deploy TrueCrypt disk encryption with hidden volume partitions or PGP Whole Disk Encryption rendering the entire computer unbootable thereby making even file time and date stamps unavailable. Another legal strategy to complicate matters could be to split the passphrase with another person and claim that you are never in possession of the entire real passphrase. Then, at least there would be “plausible deniability” as to who provided the invalid portion of the passphrase or you would have a cellmate if held in contempt.