Difference between revisions of "Bitcoins"

From thelinuxwiki
Jump to: navigation, search
(Pushed from Themanclub.)
 
 
Line 2: Line 2:
 
== How to purchase bitcoins ==
 
== How to purchase bitcoins ==
 
  dwolla
 
  dwolla
 +
coinbase.com (U.S. only)
  
 
== Disclosure Laws Can Be Used To Confiscate Bitcoin Assets ==
 
== Disclosure Laws Can Be Used To Confiscate Bitcoin Assets ==
Line 10: Line 11:
 
observers have suggested defensive techniques that deploy TrueCrypt disk encryption with hidden volume partitions or PGP Whole Disk Encryption rendering the entire computer unbootable thereby making even file time and date stamps unavailable. Another legal strategy to complicate matters could be to split the passphrase with another person and claim that you are never in possession of the entire real passphrase. Then, at least there would be “plausible deniability” as to who provided the invalid portion of the passphrase or you would have a cellmate if held in contempt.
 
observers have suggested defensive techniques that deploy TrueCrypt disk encryption with hidden volume partitions or PGP Whole Disk Encryption rendering the entire computer unbootable thereby making even file time and date stamps unavailable. Another legal strategy to complicate matters could be to split the passphrase with another person and claim that you are never in possession of the entire real passphrase. Then, at least there would be “plausible deniability” as to who provided the invalid portion of the passphrase or you would have a cellmate if held in contempt.
  
[[category:finance]]
+
[[category:bitcoin]]

Latest revision as of 22:28, 25 February 2013

How to purchase bitcoins

dwolla
coinbase.com (U.S. only)

Disclosure Laws Can Be Used To Confiscate Bitcoin Assets

(by demanding you give up encryption passwords)
http://www.forbes.com/sites/jonmatonis/2012/09/12/key-disclosure-laws-can-be-used-to-confiscate-bitcoin-assets/

observers have suggested defensive techniques that deploy TrueCrypt disk encryption with hidden volume partitions or PGP Whole Disk Encryption rendering the entire computer unbootable thereby making even file time and date stamps unavailable. Another legal strategy to complicate matters could be to split the passphrase with another person and claim that you are never in possession of the entire real passphrase. Then, at least there would be “plausible deniability” as to who provided the invalid portion of the passphrase or you would have a cellmate if held in contempt.