VOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS100.00%
REPUTATION PROGRESS34.12%
Net Worth
0.586USD
STEEM
1.116STEEM
SBD
0.084SBD
Own SP
9.037SP
Detailed Balance
| STEEM | ||
| balance | 1.115STEEM | STEEM |
| market_balance | 0.000STEEM | STEEM |
| savings_balance | 0.001STEEM | STEEM |
| reward_steem_balance | 0.000STEEM | STEEM |
| STEEM POWER | ||
| Own SP | 9.037SP | SP |
| Delegated Out | 0.000SP | SP |
| Delegation In | 0.000SP | SP |
| Effective Power | 9.037SP | SP |
| Reward SP (pending) | 0.000SP | SP |
| SBD | ||
| sbd_balance | 0.084SBD | SBD |
| sbd_conversions | 0.000SBD | SBD |
| sbd_market_balance | 0.000SBD | SBD |
| savings_sbd_balance | 0.000SBD | SBD |
| reward_sbd_balance | 0.000SBD | SBD |
{
"balance": "1.115 STEEM",
"savings_balance": "0.001 STEEM",
"reward_steem_balance": "0.000 STEEM",
"vesting_shares": "14715.698710 VESTS",
"delegated_vesting_shares": "0.000000 VESTS",
"received_vesting_shares": "0.000000 VESTS",
"sbd_balance": "0.084 SBD",
"savings_sbd_balance": "0.000 SBD",
"reward_sbd_balance": "0.000 SBD",
"conversions": []
}Account Info
| name | vtce |
| id | 418912 |
| rank | 140,046 |
| reputation | 140937591725 |
| created | 2017-10-23T02:33:33 |
| recovery_account | steem |
| proxy | None |
| post_count | 116 |
| comment_count | 0 |
| lifetime_vote_count | 0 |
| witnesses_voted_for | 0 |
| last_post | 2019-02-24T05:07:45 |
| last_root_post | 2019-02-24T05:07:45 |
| last_vote_time | 2019-01-05T17:48:00 |
| proxied_vsf_votes | 0, 0, 0, 0 |
| can_vote | 1 |
| voting_power | 0 |
| delayed_votes | 0 |
| balance | 1.115 STEEM |
| savings_balance | 0.001 STEEM |
| sbd_balance | 0.084 SBD |
| savings_sbd_balance | 0.000 SBD |
| vesting_shares | 14715.698710 VESTS |
| delegated_vesting_shares | 0.000000 VESTS |
| received_vesting_shares | 0.000000 VESTS |
| reward_vesting_balance | 0.000000 VESTS |
| vesting_balance | 0.000 STEEM |
| vesting_withdraw_rate | 0.000000 VESTS |
| next_vesting_withdrawal | 1969-12-31T23:59:59 |
| withdrawn | 0 |
| to_withdraw | 0 |
| withdraw_routes | 0 |
| savings_withdraw_requests | 0 |
| last_account_recovery | 1970-01-01T00:00:00 |
| reset_account | null |
| last_owner_update | 1970-01-01T00:00:00 |
| last_account_update | 2018-05-25T12:50:39 |
| mined | No |
| sbd_seconds | 0 |
| sbd_last_interest_payment | 2018-08-20T20:12:09 |
| savings_sbd_last_interest_payment | 2017-12-30T18:15:42 |
{
"id": 418912,
"name": "vtce",
"owner": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM6WiMupyNf1MSkcvK3nW3u3HzCeJL32ZMz6r1CbsYMoViBis55R",
1
]
]
},
"active": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5J4j5EuyUzy4GnjjpPVsBvuMCSahMz8auvjutz7TKbmXZPNZKe",
1
]
]
},
"posting": {
"weight_threshold": 1,
"account_auths": [
[
"dtube.app",
1
]
],
"key_auths": [
[
"STM6FyFAUQqa3qFF11d1omzd5AGrBhxya7R6kvf8pbgr12iBShgdH",
1
]
]
},
"memo_key": "STM8LnKxUn5H5oSnac8ZGghU3AD3zGEkFmkc4mz5dMYZLjassJW62",
"json_metadata": "{\"profile\":{\"name\":\"VTCE\",\"about\":\"Cryptocurrency, Computing, Technology, History - \\\"Decentralize The Net\\\"\"}}",
"posting_json_metadata": "{\"profile\":{\"name\":\"VTCE\",\"about\":\"Cryptocurrency, Computing, Technology, History - \\\"Decentralize The Net\\\"\"}}",
"proxy": "",
"last_owner_update": "1970-01-01T00:00:00",
"last_account_update": "2018-05-25T12:50:39",
"created": "2017-10-23T02:33:33",
"mined": false,
"recovery_account": "steem",
"last_account_recovery": "1970-01-01T00:00:00",
"reset_account": "null",
"comment_count": 0,
"lifetime_vote_count": 0,
"post_count": 116,
"can_vote": true,
"voting_manabar": {
"current_mana": "14715698710",
"last_update_time": 1588958340
},
"downvote_manabar": {
"current_mana": 3678924677,
"last_update_time": 1588958340
},
"voting_power": 0,
"balance": "1.115 STEEM",
"savings_balance": "0.001 STEEM",
"sbd_balance": "0.084 SBD",
"sbd_seconds": "0",
"sbd_seconds_last_update": "2019-03-09T00:43:06",
"sbd_last_interest_payment": "2018-08-20T20:12:09",
"savings_sbd_balance": "0.000 SBD",
"savings_sbd_seconds": "7300694970",
"savings_sbd_seconds_last_update": "2018-01-27T13:30:09",
"savings_sbd_last_interest_payment": "2017-12-30T18:15:42",
"savings_withdraw_requests": 0,
"reward_sbd_balance": "0.000 SBD",
"reward_steem_balance": "0.000 STEEM",
"reward_vesting_balance": "0.000000 VESTS",
"reward_vesting_steem": "0.000 STEEM",
"vesting_shares": "14715.698710 VESTS",
"delegated_vesting_shares": "0.000000 VESTS",
"received_vesting_shares": "0.000000 VESTS",
"vesting_withdraw_rate": "0.000000 VESTS",
"next_vesting_withdrawal": "1969-12-31T23:59:59",
"withdrawn": 0,
"to_withdraw": 0,
"withdraw_routes": 0,
"curation_rewards": 0,
"posting_rewards": 13376,
"proxied_vsf_votes": [
0,
0,
0,
0
],
"witnesses_voted_for": 0,
"last_post": "2019-02-24T05:07:45",
"last_root_post": "2019-02-24T05:07:45",
"last_vote_time": "2019-01-05T17:48:00",
"post_bandwidth": 0,
"pending_claimed_accounts": 0,
"vesting_balance": "0.000 STEEM",
"reputation": "140937591725",
"transfer_history": [],
"market_history": [],
"post_history": [],
"vote_history": [],
"other_history": [],
"witness_votes": [],
"tags_usage": [],
"guest_bloggers": [],
"rank": 140046
}Withdraw Routes
| Incoming | Outgoing |
|---|---|
Empty | Empty |
{
"incoming": [],
"outgoing": []
}From Date
To Date
2023/04/06 13:52:39
2023/04/06 13:52:39
| parent author | vtce |
| parent permlink | payment-systems-credit-card-vs-p2p |
| author | southcide |
| permlink | rsp57p |
| title | |
| body | Speaking of credit cards, I recently had an interesting experience with my Tractor Supply Company credit card. I needed to make a payment but was having trouble accessing my account online. After some frustration, I decided to search for a solution and came across [click here](https://www.allaboutcareers.com/student-finance/credit-card/tractor-supply-company-credit-card-payment/). Their article on Tractor Supply Company credit card payments was a lifesaver, providing step-by-step instructions on how to make a payment over the phone. |
| json metadata | {"links":["https://www.allaboutcareers.com/student-finance/credit-card/tractor-supply-company-credit-card-payment/"],"app":"steemit/0.2"} |
| Transaction Info | Block #73527160/Trx 11f4363aed93d2a7d9881087289d2c78cccf94b8 |
View Raw JSON Data
{
"trx_id": "11f4363aed93d2a7d9881087289d2c78cccf94b8",
"block": 73527160,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-04-06T13:52:39",
"op": [
"comment",
{
"parent_author": "vtce",
"parent_permlink": "payment-systems-credit-card-vs-p2p",
"author": "southcide",
"permlink": "rsp57p",
"title": "",
"body": "Speaking of credit cards, I recently had an interesting experience with my Tractor Supply Company credit card. I needed to make a payment but was having trouble accessing my account online. After some frustration, I decided to search for a solution and came across [click here](https://www.allaboutcareers.com/student-finance/credit-card/tractor-supply-company-credit-card-payment/). Their article on Tractor Supply Company credit card payments was a lifesaver, providing step-by-step instructions on how to make a payment over the phone.",
"json_metadata": "{\"links\":[\"https://www.allaboutcareers.com/student-finance/credit-card/tractor-supply-company-credit-card-payment/\"],\"app\":\"steemit/0.2\"}"
}
]
}vtcecustom json: notify2022/09/13 03:46:00
vtcecustom json: notify
2022/09/13 03:46:00
| required auths | [] |
| required posting auths | ["vtce"] |
| id | notify |
| json | ["setLastRead",{"date":"2022-09-13T03:45:58"}] |
| Transaction Info | Block #67642452/Trx b964c93de71b93c77d9fca3fef37f3e90308520b |
View Raw JSON Data
{
"trx_id": "b964c93de71b93c77d9fca3fef37f3e90308520b",
"block": 67642452,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-09-13T03:46:00",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"vtce"
],
"id": "notify",
"json": "[\"setLastRead\",{\"date\":\"2022-09-13T03:45:58\"}]"
}
]
}squbeupvoted (2.50%) @vtce / 4dtzrj-5-advantages-of-electric-cars-ev2021/10/13 06:48:15
squbeupvoted (2.50%) @vtce / 4dtzrj-5-advantages-of-electric-cars-ev
2021/10/13 06:48:15
| voter | sqube |
| author | vtce |
| permlink | 4dtzrj-5-advantages-of-electric-cars-ev |
| weight | 250 (2.50%) |
| Transaction Info | Block #58067109/Trx 846a16f416b1ab0f5bf88fbe863664bac7e4944a |
View Raw JSON Data
{
"trx_id": "846a16f416b1ab0f5bf88fbe863664bac7e4944a",
"block": 58067109,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-10-13T06:48:15",
"op": [
"vote",
{
"voter": "sqube",
"author": "vtce",
"permlink": "4dtzrj-5-advantages-of-electric-cars-ev",
"weight": 250
}
]
}vtcepublished a new post: 4dtzrj-5-advantages-of-electric-cars-ev2021/10/13 06:48:09
vtcepublished a new post: 4dtzrj-5-advantages-of-electric-cars-ev
2021/10/13 06:48:09
| parent author | |
| parent permlink | ev |
| author | vtce |
| permlink | 4dtzrj-5-advantages-of-electric-cars-ev |
| title | The State of Security in the IoT Age |
| body |  Digital technology and Mooreβs Law have moved us along from the Computer Age to the Information Age. Now we are living in the IoT (Internet of Things) Age and itβs other counterpart or successor the Internet-of-Everything Age. It is a world where devices are interconnected via the Internet. Connecting electronic devices from home or the office requires an Internet connection and you can access it from anywhere using another computer or smartphone/mobile device. The more devices you connectβββbaby monitors, Internet cameras, DVR, lighting switches, security and alarm systems, wearables, fitness trackers, smart home appliances, HVAC systemsβ the more convenient it is to control your life. It is data driven with embedded sensors that gather information which can be accessed from the Internet. There is a tradeoff with security however. It is also the easiest way for hackers to gain entry to your home system so that is becoming an issue. The fact that you can access your devices from anywhere means it also allows others to access your devices from anywhere. As IoT devices develop with more advanced capabilities and features, hackers are going to look into exploiting their vulnerabilities. The need for securing your access to these devices becomes more necessary due to the threats the βInsecureNet-of-Thingsβ imposes. The Internet has no built in security or privacy for that matter. It has no built-in encryption to safeguard the data being transmitted. It is an open network that provides the pipeline to connect millions of users via their computers. Now itβs also connecting other devices that can be critical to daily life. Certain medical devices use IoT to interconnect patients with medical professionals. Without any guaranteed secure connection, if a hacker or bad actor were to gain access to letβs say a patientβs syringe injector there could be malicious intent. For home consumers here are ways to address security of your IoT devices: -Do not use a blank password, the devices default password or common password to access your IoT device. -Use a strong and reasonably not easily guessable password. Password protection is the most basic form of security. -Change the default username of the deviceβs management console. -Use the latest software provided by the vendor. Updating the software makes sure it is compliant to the product. -Make sure you update the latest firmware from the productβs vendor since these often patch vulnerabilities and plugs security holes. -If you access your device via a web interface over the Internet your URL connection uses HTTPS for end to end encryption. If not, then ask the vendor technical support how to secure the connection. If accessing locally, HTTP should be fine, so long as it is not shared over the Internet and only your computer can access it using a non-routable IP address. -There are third party IoT Security Devices that can be used to protect your IoT devices at home. Do your research before buying one. -When accessing your IoT device from public WiFi use a VPN connection since most public WiFi are not secure. Use WPA2 for WiFi security when connecting your IoT devices at home. If your IoT device comes with other security features, enable them to provide more layers. -Ask for professional help if you do not understand how to implement security for your IoT device. There are so many ways IoT devices are implemented, we can go on and on with further discussions. The convenience IoT provides us to connecting our devices is a benefit, just donβt ignore the threat to your security, privacy and safety. |
| json metadata | {"app":"steemit/0.2","format":"markdown","image":["https://steemitimages.com/DQmeYsDnqs2ZmJ89oSgsH7PvvZX9DdJ1bK4m57vwWsSZM4W/IOT-Steem.jpg"],"tags":["iot","internet","cybersecurity","smarthomes"]} |
| Transaction Info | Block #58067107/Trx b81e55f9f7813432e68973dbd24fc2a349a6f2ce |
View Raw JSON Data
{
"trx_id": "b81e55f9f7813432e68973dbd24fc2a349a6f2ce",
"block": 58067107,
"trx_in_block": 7,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-10-13T06:48:09",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "ev",
"author": "vtce",
"permlink": "4dtzrj-5-advantages-of-electric-cars-ev",
"title": "The State of Security in the IoT Age",
"body": "\n\nDigital technology and Mooreβs Law have moved us along from the Computer Age to the Information Age. Now we are living in the IoT (Internet of Things) Age and itβs other counterpart or successor the Internet-of-Everything Age. It is a world where devices are interconnected via the Internet. Connecting electronic devices from home or the office requires an Internet connection and you can access it from anywhere using another computer or smartphone/mobile device. The more devices you connectβββbaby monitors, Internet cameras, DVR, lighting switches, security and alarm systems, wearables, fitness trackers, smart home appliances, HVAC systemsβ the more convenient it is to control your life. It is data driven with embedded sensors that gather information which can be accessed from the Internet. There is a tradeoff with security however. It is also the easiest way for hackers to gain entry to your home system so that is becoming an issue. The fact that you can access your devices from anywhere means it also allows others to access your devices from anywhere. As IoT devices develop with more advanced capabilities and features, hackers are going to look into exploiting their vulnerabilities. The need for securing your access to these devices becomes more necessary due to the threats the βInsecureNet-of-Thingsβ imposes.\n\nThe Internet has no built in security or privacy for that matter. It has no built-in encryption to safeguard the data being transmitted. It is an open network that provides the pipeline to connect millions of users via their computers. Now itβs also connecting other devices that can be critical to daily life. Certain medical devices use IoT to interconnect patients with medical professionals. Without any guaranteed secure connection, if a hacker or bad actor were to gain access to letβs say a patientβs syringe injector there could be malicious intent. \n\nFor home consumers here are ways to address security of your IoT devices:\n\n-Do not use a blank password, the devices default password or common password to access your IoT device. -Use a strong and reasonably not easily guessable password. Password protection is the most basic form of security.\n-Change the default username of the deviceβs management console.\n-Use the latest software provided by the vendor. Updating the software makes sure it is compliant to the product.\n-Make sure you update the latest firmware from the productβs vendor since these often patch vulnerabilities and plugs security holes.\n-If you access your device via a web interface over the Internet your URL connection uses HTTPS for end to end encryption. If not, then ask the vendor technical support how to secure the connection. If accessing locally, HTTP should be fine, so long as it is not shared over the Internet and only your computer can access it using a non-routable IP address.\n-There are third party IoT Security Devices that can be used to protect your IoT devices at home. Do your research before buying one.\n-When accessing your IoT device from public WiFi use a VPN connection since most public WiFi are not secure. Use WPA2 for WiFi security when connecting your IoT devices at home.\nIf your IoT device comes with other security features, enable them to provide more layers.\n-Ask for professional help if you do not understand how to implement security for your IoT device.\n\nThere are so many ways IoT devices are implemented, we can go on and on with further discussions. The convenience IoT provides us to connecting our devices is a benefit, just donβt ignore the threat to your security, privacy and safety.",
"json_metadata": "{\"app\":\"steemit/0.2\",\"format\":\"markdown\",\"image\":[\"https://steemitimages.com/DQmeYsDnqs2ZmJ89oSgsH7PvvZX9DdJ1bK4m57vwWsSZM4W/IOT-Steem.jpg\"],\"tags\":[\"iot\",\"internet\",\"cybersecurity\",\"smarthomes\"]}"
}
]
}executive-boardsent 0.001 STEEM to @vtce- "β Hello vtce, great that you are using the STEEM blockchain. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just fo..."2021/10/13 06:46:03
executive-boardsent 0.001 STEEM to @vtce- "β Hello vtce, great that you are using the STEEM blockchain. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just fo..."
2021/10/13 06:46:03
| from | executive-board |
| to | vtce |
| amount | 0.001 STEEM |
| memo | β Hello vtce, great that you are using the STEEM blockchain. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just follow the instructions. THE 1000X BOOSTER KEY is already waiting for you over there too. π Warm regards, The Executive Board. |
| Transaction Info | Block #58067065/Trx cb2de7bb6e47670dd5e083fc10d8f4dbb00bacf4 |
View Raw JSON Data
{
"trx_id": "cb2de7bb6e47670dd5e083fc10d8f4dbb00bacf4",
"block": 58067065,
"trx_in_block": 7,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-10-13T06:46:03",
"op": [
"transfer",
{
"from": "executive-board",
"to": "vtce",
"amount": "0.001 STEEM",
"memo": "β Hello vtce, great that you are using the STEEM blockchain. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just follow the instructions. THE 1000X BOOSTER KEY is already waiting for you over there too. π Warm regards, The Executive Board."
}
]
}squbeupvoted (2.50%) @vtce / 4dtzrj-5-advantages-of-electric-cars-ev2021/10/13 06:44:45
squbeupvoted (2.50%) @vtce / 4dtzrj-5-advantages-of-electric-cars-ev
2021/10/13 06:44:45
| voter | sqube |
| author | vtce |
| permlink | 4dtzrj-5-advantages-of-electric-cars-ev |
| weight | 250 (2.50%) |
| Transaction Info | Block #58067039/Trx 9edbd7b848b11deb73d3d3134c8da089e5f03076 |
View Raw JSON Data
{
"trx_id": "9edbd7b848b11deb73d3d3134c8da089e5f03076",
"block": 58067039,
"trx_in_block": 14,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-10-13T06:44:45",
"op": [
"vote",
{
"voter": "sqube",
"author": "vtce",
"permlink": "4dtzrj-5-advantages-of-electric-cars-ev",
"weight": 250
}
]
}vtcepublished a new post: 4dtzrj-5-advantages-of-electric-cars-ev2021/10/13 06:44:39
vtcepublished a new post: 4dtzrj-5-advantages-of-electric-cars-ev
2021/10/13 06:44:39
| parent author | |
| parent permlink | ev |
| author | vtce |
| permlink | 4dtzrj-5-advantages-of-electric-cars-ev |
| title | The State of Security in the IoT Age |
| body |  Digital technology and Mooreβs Law have moved us along from the Computer Age to the Information Age. Now we are living in the IoT (Internet of Things) Age and itβs other counterpart or successor the Internet-of-Everything Age. It is a world where devices are interconnected via the Internet. Connecting electronic devices from home or the office requires an Internet connection and you can access it from anywhere using another computer or smartphone/mobile device. The more devices you connectβββbaby monitors, Internet cameras, DVR, lighting switches, security and alarm systems, wearables, fitness trackers, smart home appliances, HVAC systemsβ the more convenient it is to control your life. It is data driven with embedded sensors that gather information which can be accessed from the Internet. There is a tradeoff with security however. It is also the easiest way for hackers to gain entry to your home system so that is becoming an issue. The fact that you can access your devices from anywhere means it also allows others to access your devices from anywhere. As IoT devices develop with more advanced capabilities and features, hackers are going to look into exploiting their vulnerabilities. The need for securing your access to these devices becomes more necessary due to the threats the βInsecureNet-of-Thingsβ imposes. The Internet has no built in security or privacy for that matter. It has no built-in encryption to safeguard the data being transmitted. It is an open network that provides the pipeline to connect millions of users via their computers. Now itβs also connecting other devices that can be critical to daily life. Certain medical devices use IoT to interconnect patients with medical professionals. Without any guaranteed secure connection, if a hacker or bad actor were to gain access to letβs say a patientβs syringe injector there could be mal intent. Other medical devices monitor vital signs which can be accessed remotely. HIPAA regulations protect this type of information for patientβs privacy. It will be violated if a hacker is able to gather information from these devices and use it illegally. Some early IoT devices that used passwords to allow remote access did not provide encryption so it would be easy for hackers with software like packet sniffers to capture the password encoded in a data frame. Another thing that is critical are systems that are connected to the Internet that require physical operation, like autonomous cars, remote controlled vehicles and drones. If a hacker were to gain access to these systems that can be a huge safety risk. There have been exploits shown that allowed hackers to gain access to a carβs braking system and affect it while the car was on the road. Chrysler recalled 1.4 million vehicles after a pair of hackers showed that they could remotely hijack a Jeepβs digital systems over the Internet. A carβs ECU (Electronic Control Unit) can be compromised if it is IoT enabled without any security in place. This type of exploit is serious since it can affect public safety if this leads to accidents. The best way to secure the βInsecureNet-of-Thingsβ can be to follow the example corporate IT has put in place to secure remote access for their employees. Placing a security device between the remote user and the IoT device adds a layer of protection. Typically a firewall behind a router, or a Layer 7 appliance that provides intrusion detection and prevention with an AV solution. A router itself is not a full on security device, it just provides the network path to the Internet. For home users the router has become synonymous with the firewall as well since vendors can bundle the features together. In the corporate setting the setup is more complex, requiring more than 1 layer of protection. The router allows incoming/outgoing traffic but does not filter the data stream. The data would have to pass through the router and is then filtered at the gateway level which is the firewall itself. Vendors have also developed new security appliances called a UTM (Unified Threat Management) that bundle many features together inside a firewall which includes AV, IPS/IDS, antispam filter and even VPN access. Highly secure VPN tunnels create an encrypted link to an IoT device with end to end encryption which makes it highly secured. Most home consumers do not have these systems in place for their IoT and there is the problem. Using a web interface, home users can access port forwarding features to open up ports on their router to allow remote access of IoT devices. Other IoT devices just require a WiFi connection and can be accessed directly via a web interface. Documentation should be available on how you can further secure your access, and it is worth going over before putting a device on the Internet. Certain Internet cameras with DVR require users to open ports on their home router to access the device. If the access to the camera is via a smartphone app, it should create a secure connection which can be verified with the vendor. If it is a web interface, that is another story. The IoT deviceβs vendor in this case programmed the device to connect to their server via the Internet using the WiFi connection and just requires the user to access it via a web interface. The good news is that most vendors now provide a secure access to their web interface using HTTPS, which encrypts your end to end connection. Make sure that the URL you access to your IoT devices web interface has a digital certificate using HTTPS. Another more secure way to access this would be via a VPN service or browser VPN to create a more secure connection. If the web interface is local to the device, without a digital certificate, that can be a red flag. There is no encryption at all when you access the URL using HTTP. The S in HTTPS stands for βSecureβ and that is the type of connection your IoT deviceβs web interface should be using. Vendors who just provide simplicity for the sake of convenience could be held accountable if they release IoT devices that donβt comply with security and home consumers need to be aware of this. According to Craig Young of Tripwire: βMany vendors in the IoT space seem to have little or no concern regarding the safety and security of their customers.β There is not much IoT regulation or standards. So some industry professionals and vendors have gathered to try to make IoT more secure. ICSA Labs now offers a security testing program for IoT products, following the βCyberULβ security certification program. These standards are continuing to develop, but in 2017 there are no IoT certified device specifications that have become industry standards on products. The lack of technical standards and proprietary systems really makes IoT security standards a complex issue. The IoT Cybersecurity Improvement Act of 2017 was meant for government use of IoT devices. The bill would require vendors of Internet-connected devices purchased by the federal government to make sure the devices can be patched when security updates are available; that the devices do not use hard-coded (unchangeable) passwords; and that vendors ensure the devices are free from known vulnerabilities when sold. For home consumers there is no bill to guarantee their security from IoT devices. Due to the increasing concerns over security, the Internet of Things Security Foundation (IoTSF) was launched on September 23, 2015. The IoTSFβs aim is to promote best practice and knowledge about Internet security. Right now companies are putting together their own solutions for IoT, while home consumers donβt have much in place. That is why the FTC (Federal Trade Commission) has urged companies to adopt best practice for IoT and there are also guidelines for IoT security on the FTC website (http://ftc.gov) which users can search. Network security vendors are also addressing these issues with new appliances and software that cover the most recent cybersecurity threats to the enterprise and IoT has become an important topic. For home consumers here are ways to address security of your IoT devices: -Do not use a blank password, the devices default password or common password to access your IoT device. -Use a strong and reasonably not easily guessable password. Password protection is the most basic form of security. -Change the default username of the deviceβs management console. -Use the latest software provided by the vendor. Updating the software makes sure it is compliant to the product. -Make sure you update the latest firmware from the productβs vendor since these often patch vulnerabilities and plugs security holes. -If you access your device via a web interface over the Internet your URL connection uses HTTPS for end to end encryption. If not, then ask the vendor technical support how to secure the connection. If accessing locally, HTTP should be fine, so long as it is not shared over the Internet and only your computer can access it using a non-routable IP address. -There are third party IoT Security Devices that can be used to protect your IoT devices at home. Do your research before buying one. -When accessing your IoT device from public WiFi use a VPN connection since most public WiFi are not secure. Use WPA2 for WiFi security when connecting your IoT devices at home. If your IoT device comes with other security features, enable them to provide more layers. -Ask for professional help if you do not understand how to implement security for your IoT device. There are so many ways IoT devices are implemented, we can go on and on with further discussions. The convenience IoT provides us to connecting our devices is a benefit, just donβt ignore the threat to your security, privacy and safety. |
| json metadata | {"app":"steemit/0.2","format":"markdown","image":["https://steemitimages.com/DQmeYsDnqs2ZmJ89oSgsH7PvvZX9DdJ1bK4m57vwWsSZM4W/IOT-Steem.jpg"],"links":["http://ftc.gov"],"tags":["iot","internet","cybersecurity","smarthomes"]} |
| Transaction Info | Block #58067037/Trx 6edac172b2ac5b0e29c77092525b97c012262adb |
View Raw JSON Data
{
"trx_id": "6edac172b2ac5b0e29c77092525b97c012262adb",
"block": 58067037,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-10-13T06:44:39",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "ev",
"author": "vtce",
"permlink": "4dtzrj-5-advantages-of-electric-cars-ev",
"title": "The State of Security in the IoT Age",
"body": "\n\nDigital technology and Mooreβs Law have moved us along from the Computer Age to the Information Age. Now we are living in the IoT (Internet of Things) Age and itβs other counterpart or successor the Internet-of-Everything Age. It is a world where devices are interconnected via the Internet. Connecting electronic devices from home or the office requires an Internet connection and you can access it from anywhere using another computer or smartphone/mobile device. The more devices you connectβββbaby monitors, Internet cameras, DVR, lighting switches, security and alarm systems, wearables, fitness trackers, smart home appliances, HVAC systemsβ the more convenient it is to control your life. It is data driven with embedded sensors that gather information which can be accessed from the Internet. There is a tradeoff with security however. It is also the easiest way for hackers to gain entry to your home system so that is becoming an issue. The fact that you can access your devices from anywhere means it also allows others to access your devices from anywhere. As IoT devices develop with more advanced capabilities and features, hackers are going to look into exploiting their vulnerabilities. The need for securing your access to these devices becomes more necessary due to the threats the βInsecureNet-of-Thingsβ imposes.\n\nThe Internet has no built in security or privacy for that matter. It has no built-in encryption to safeguard the data being transmitted. It is an open network that provides the pipeline to connect millions of users via their computers. Now itβs also connecting other devices that can be critical to daily life. Certain medical devices use IoT to interconnect patients with medical professionals. Without any guaranteed secure connection, if a hacker or bad actor were to gain access to letβs say a patientβs syringe injector there could be mal intent. Other medical devices monitor vital signs which can be accessed remotely. HIPAA regulations protect this type of information for patientβs privacy. It will be violated if a hacker is able to gather information from these devices and use it illegally. Some early IoT devices that used passwords to allow remote access did not provide encryption so it would be easy for hackers with software like packet sniffers to capture the password encoded in a data frame. Another thing that is critical are systems that are connected to the Internet that require physical operation, like autonomous cars, remote controlled vehicles and drones. If a hacker were to gain access to these systems that can be a huge safety risk. There have been exploits shown that allowed hackers to gain access to a carβs braking system and affect it while the car was on the road. Chrysler recalled 1.4 million vehicles after a pair of hackers showed that they could remotely hijack a Jeepβs digital systems over the Internet. A carβs ECU (Electronic Control Unit) can be compromised if it is IoT enabled without any security in place. This type of exploit is serious since it can affect public safety if this leads to accidents.\nThe best way to secure the βInsecureNet-of-Thingsβ can be to follow the example corporate IT has put in place to secure remote access for their employees. Placing a security device between the remote user and the IoT device adds a layer of protection. Typically a firewall behind a router, or a Layer 7 appliance that provides intrusion detection and prevention with an AV solution. A router itself is not a full on security device, it just provides the network path to the Internet. For home users the router has become synonymous with the firewall as well since vendors can bundle the features together. In the corporate setting the setup is more complex, requiring more than 1 layer of protection. The router allows incoming/outgoing traffic but does not filter the data stream. The data would have to pass through the router and is then filtered at the gateway level which is the firewall itself. Vendors have also developed new security appliances called a UTM (Unified Threat Management) that bundle many features together inside a firewall which includes AV, IPS/IDS, antispam filter and even VPN access. Highly secure VPN tunnels create an encrypted link to an IoT device with end to end encryption which makes it highly secured. Most home consumers do not have these systems in place for their IoT and there is the problem.\n\nUsing a web interface, home users can access port forwarding features to open up ports on their router to allow remote access of IoT devices. Other IoT devices just require a WiFi connection and can be accessed directly via a web interface. Documentation should be available on how you can further secure your access, and it is worth going over before putting a device on the Internet. Certain Internet cameras with DVR require users to open ports on their home router to access the device. If the access to the camera is via a smartphone app, it should create a secure connection which can be verified with the vendor. If it is a web interface, that is another story. The IoT deviceβs vendor in this case programmed the device to connect to their server via the Internet using the WiFi connection and just requires the user to access it via a web interface. The good news is that most vendors now provide a secure access to their web interface using HTTPS, which encrypts your end to end connection. Make sure that the URL you access to your IoT devices web interface has a digital certificate using HTTPS. Another more secure way to access this would be via a VPN service or browser VPN to create a more secure connection. If the web interface is local to the device, without a digital certificate, that can be a red flag. There is no encryption at all when you access the URL using HTTP. The S in HTTPS stands for βSecureβ and that is the type of connection your IoT deviceβs web interface should be using. Vendors who just provide simplicity for the sake of convenience could be held accountable if they release IoT devices that donβt comply with security and home consumers need to be aware of this. According to Craig Young of Tripwire: \n\nβMany vendors in the IoT space seem to have little or no concern regarding the safety and security of their customers.β\n\nThere is not much IoT regulation or standards. So some industry professionals and vendors have gathered to try to make IoT more secure. ICSA Labs now offers a security testing program for IoT products, following the βCyberULβ security certification program. These standards are continuing to develop, but in 2017 there are no IoT certified device specifications that have become industry standards on products. The lack of technical standards and proprietary systems really makes IoT security standards a complex issue. The IoT Cybersecurity Improvement Act of 2017 was meant for government use of IoT devices. The bill would require vendors of Internet-connected devices purchased by the federal government to make sure the devices can be patched when security updates are available; that the devices do not use hard-coded (unchangeable) passwords; and that vendors ensure the devices are free from known vulnerabilities when sold. For home consumers there is no bill to guarantee their security from IoT devices. Due to the increasing concerns over security, the Internet of Things Security Foundation (IoTSF) was launched on September 23, 2015. The IoTSFβs aim is to promote best practice and knowledge about Internet security. Right now companies are putting together their own solutions for IoT, while home consumers donβt have much in place. That is why the FTC (Federal Trade Commission) has urged companies to adopt best practice for IoT and there are also guidelines for IoT security on the FTC website (http://ftc.gov) which users can search. Network security vendors are also addressing these issues with new appliances and software that cover the most recent cybersecurity threats to the enterprise and IoT has become an important topic.\n\nFor home consumers here are ways to address security of your IoT devices:\n\n-Do not use a blank password, the devices default password or common password to access your IoT device. -Use a strong and reasonably not easily guessable password. Password protection is the most basic form of security.\n-Change the default username of the deviceβs management console.\n-Use the latest software provided by the vendor. Updating the software makes sure it is compliant to the product.\n-Make sure you update the latest firmware from the productβs vendor since these often patch vulnerabilities and plugs security holes.\n-If you access your device via a web interface over the Internet your URL connection uses HTTPS for end to end encryption. If not, then ask the vendor technical support how to secure the connection. If accessing locally, HTTP should be fine, so long as it is not shared over the Internet and only your computer can access it using a non-routable IP address.\n-There are third party IoT Security Devices that can be used to protect your IoT devices at home. Do your research before buying one.\n-When accessing your IoT device from public WiFi use a VPN connection since most public WiFi are not secure. Use WPA2 for WiFi security when connecting your IoT devices at home.\nIf your IoT device comes with other security features, enable them to provide more layers.\n-Ask for professional help if you do not understand how to implement security for your IoT device.\n\nThere are so many ways IoT devices are implemented, we can go on and on with further discussions. The convenience IoT provides us to connecting our devices is a benefit, just donβt ignore the threat to your security, privacy and safety.",
"json_metadata": "{\"app\":\"steemit/0.2\",\"format\":\"markdown\",\"image\":[\"https://steemitimages.com/DQmeYsDnqs2ZmJ89oSgsH7PvvZX9DdJ1bK4m57vwWsSZM4W/IOT-Steem.jpg\"],\"links\":[\"http://ftc.gov\"],\"tags\":[\"iot\",\"internet\",\"cybersecurity\",\"smarthomes\"]}"
}
]
}2020/05/08 17:19:00
2020/05/08 17:19:00
| delegator | steem |
| delegatee | vtce |
| vesting shares | 0.000000 VESTS |
| Transaction Info | Block #43202475/Trx 5d4626878acd3221a8709c3598cbccd2f8b5475d |
View Raw JSON Data
{
"trx_id": "5d4626878acd3221a8709c3598cbccd2f8b5475d",
"block": 43202475,
"trx_in_block": 13,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2020-05-08T17:19:00",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "vtce",
"vesting_shares": "0.000000 VESTS"
}
]
}flyskyupvoted (1.00%) @vtce / thumb-drive-network-deployments2019/10/24 06:19:12
flyskyupvoted (1.00%) @vtce / thumb-drive-network-deployments
2019/10/24 06:19:12
| voter | flysky |
| author | vtce |
| permlink | thumb-drive-network-deployments |
| weight | 100 (1.00%) |
| Transaction Info | Block #37556425/Trx 8240bcdb2cc167209b8cbd1aaedf2a4102b13882 |
View Raw JSON Data
{
"trx_id": "8240bcdb2cc167209b8cbd1aaedf2a4102b13882",
"block": 37556425,
"trx_in_block": 11,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-10-24T06:19:12",
"op": [
"vote",
{
"voter": "flysky",
"author": "vtce",
"permlink": "thumb-drive-network-deployments",
"weight": 100
}
]
}2019/10/23 03:53:57
2019/10/23 03:53:57
| parent author | vtce |
| parent permlink | ethereum-2-0-constatinople-upgrade |
| author | steemitboard |
| permlink | steemitboard-notify-vtce-20191023t035356000z |
| title | |
| body | Congratulations @vtce! You received a personal award! <table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@vtce/birthday2.png</td><td>Happy Birthday! - You are on the Steem blockchain for 2 years!</td></tr></table> <sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@vtce) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=vtce)_</sub> **Do not miss the last post from @steemitboard:** <table><tr><td><a href="https://steemit.com/steemfest/@steemitboard/steemfest-commemorative-badge-refactored"><img src="https://steemitimages.com/64x128/https://files.steempeak.com/file/steempeak/arcange/YqQV5Tbj-image.png"></a></td><td><a href="https://steemit.com/steemfest/@steemitboard/steemfest-commemorative-badge-refactored">SteemFestβ΄ commemorative badge refactored</a></td></tr></table> ###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes! |
| json metadata | {"image":["https://steemitboard.com/img/notify.png"]} |
| Transaction Info | Block #37524781/Trx d484cceab821851ca788abd74ff4b94a0ebb5daf |
View Raw JSON Data
{
"trx_id": "d484cceab821851ca788abd74ff4b94a0ebb5daf",
"block": 37524781,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-10-23T03:53:57",
"op": [
"comment",
{
"parent_author": "vtce",
"parent_permlink": "ethereum-2-0-constatinople-upgrade",
"author": "steemitboard",
"permlink": "steemitboard-notify-vtce-20191023t035356000z",
"title": "",
"body": "Congratulations @vtce! You received a personal award!\n\n<table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@vtce/birthday2.png</td><td>Happy Birthday! - You are on the Steem blockchain for 2 years!</td></tr></table>\n\n<sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@vtce) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=vtce)_</sub>\n\n\n**Do not miss the last post from @steemitboard:**\n<table><tr><td><a href=\"https://steemit.com/steemfest/@steemitboard/steemfest-commemorative-badge-refactored\"><img src=\"https://steemitimages.com/64x128/https://files.steempeak.com/file/steempeak/arcange/YqQV5Tbj-image.png\"></a></td><td><a href=\"https://steemit.com/steemfest/@steemitboard/steemfest-commemorative-badge-refactored\">SteemFestβ΄ commemorative badge refactored</a></td></tr></table>\n\n###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes!",
"json_metadata": "{\"image\":[\"https://steemitboard.com/img/notify.png\"]}"
}
]
}2019/08/22 16:31:06
2019/08/22 16:31:06
| from | dtube |
| to | vtce |
| amount | 0.001 STEEM |
| memo | Time is running out, claim your DTube account now before anyone else can! Login at https://d.tube |
| Transaction Info | Block #35779831/Trx 65f3e7eab4b9beb84fce4954943b2d8b5b70bf13 |
View Raw JSON Data
{
"trx_id": "65f3e7eab4b9beb84fce4954943b2d8b5b70bf13",
"block": 35779831,
"trx_in_block": 23,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-08-22T16:31:06",
"op": [
"transfer",
{
"from": "dtube",
"to": "vtce",
"amount": "0.001 STEEM",
"memo": "Time is running out, claim your DTube account now before anyone else can! Login at https://d.tube"
}
]
}2019/05/26 05:39:27
2019/05/26 05:39:27
| delegator | steem |
| delegatee | vtce |
| vesting shares | 1993.331493 VESTS |
| Transaction Info | Block #33237325/Trx 7060dd7e374be498ae1f3b7bcf21ae7de6e5a0ef |
View Raw JSON Data
{
"trx_id": "7060dd7e374be498ae1f3b7bcf21ae7de6e5a0ef",
"block": 33237325,
"trx_in_block": 7,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-05-26T05:39:27",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "vtce",
"vesting_shares": "1993.331493 VESTS"
}
]
}2019/03/18 10:41:33
2019/03/18 10:41:33
| from | dlease |
| to | vtce |
| amount | 0.001 STEEM |
| memo | BuildTeam is proud to announce the release of DLease.io - our flagship P2P leasing marketplace app, aimed at assisting Steemians in leasing and delegating STEEM POWER for daily passive returns, with recent yields as high as 20% APR. DLease.io is a professional grade app , designed to replace the current MinnowBooster.net leasing market which has to date facilitated nearly 20 Million STEEM POWER in lease value to happy BuildTeam customers. View the new app at https://dlease.io/ or read the announcement post on https://steemit.com/@dlease. |
| Transaction Info | Block #31258925/Trx f539d8f4387cef8effb6542490b817e05fd9181d |
View Raw JSON Data
{
"trx_id": "f539d8f4387cef8effb6542490b817e05fd9181d",
"block": 31258925,
"trx_in_block": 34,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-03-18T10:41:33",
"op": [
"transfer",
{
"from": "dlease",
"to": "vtce",
"amount": "0.001 STEEM",
"memo": "BuildTeam is proud to announce the release of DLease.io - our flagship P2P leasing marketplace app, aimed at assisting Steemians in leasing and delegating STEEM POWER for daily passive returns, with recent yields as high as 20% APR. DLease.io is a professional grade app , designed to replace the current MinnowBooster.net leasing market which has to date facilitated nearly 20 Million STEEM POWER in lease value to happy BuildTeam customers. View the new app at https://dlease.io/ or read the announcement post on https://steemit.com/@dlease."
}
]
}vtceupvoted (100.00%) @vtce / ethereum-2-0-constatinople-upgrade2019/03/11 17:53:24
vtceupvoted (100.00%) @vtce / ethereum-2-0-constatinople-upgrade
2019/03/11 17:53:24
| voter | vtce |
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| weight | 10000 (100.00%) |
| Transaction Info | Block #31066120/Trx 2c74c39129b2af1d8313e7f04bef79aeb7b5304e |
View Raw JSON Data
{
"trx_id": "2c74c39129b2af1d8313e7f04bef79aeb7b5304e",
"block": 31066120,
"trx_in_block": 12,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-03-11T17:53:24",
"op": [
"vote",
{
"voter": "vtce",
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"weight": 10000
}
]
}2019/03/09 01:39:18
2019/03/09 01:39:18
| delegator | steem |
| delegatee | vtce |
| vesting shares | 15319.719739 VESTS |
| Transaction Info | Block #30989100/Trx 9098903d9cde4133e22fbd362c57846997080e4a |
View Raw JSON Data
{
"trx_id": "9098903d9cde4133e22fbd362c57846997080e4a",
"block": 30989100,
"trx_in_block": 41,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-03-09T01:39:18",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "vtce",
"vesting_shares": "15319.719739 VESTS"
}
]
}vtceupvoted (100.00%) @steemitboard / steemitboard-notify-vtce-20190224t114408000z2019/03/09 00:44:06
vtceupvoted (100.00%) @steemitboard / steemitboard-notify-vtce-20190224t114408000z
2019/03/09 00:44:06
| voter | vtce |
| author | steemitboard |
| permlink | steemitboard-notify-vtce-20190224t114408000z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #30987996/Trx 2de2b4a1b9a17ca80506e902f8b5ac39cc4f6608 |
View Raw JSON Data
{
"trx_id": "2de2b4a1b9a17ca80506e902f8b5ac39cc4f6608",
"block": 30987996,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-03-09T00:44:06",
"op": [
"vote",
{
"voter": "vtce",
"author": "steemitboard",
"permlink": "steemitboard-notify-vtce-20190224t114408000z",
"weight": 10000
}
]
}vtceclaimed reward balance: 0.084 SBD, 0.267 SP2019/03/09 00:43:06
vtceclaimed reward balance: 0.084 SBD, 0.267 SP
2019/03/09 00:43:06
| account | vtce |
| reward steem | 0.000 STEEM |
| reward sbd | 0.084 SBD |
| reward vests | 434.665420 VESTS |
| Transaction Info | Block #30987976/Trx b4be39ee11ac4c6943e570ef52fc92ee6fdaa6e3 |
View Raw JSON Data
{
"trx_id": "b4be39ee11ac4c6943e570ef52fc92ee6fdaa6e3",
"block": 30987976,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-03-09T00:43:06",
"op": [
"claim_reward_balance",
{
"account": "vtce",
"reward_steem": "0.000 STEEM",
"reward_sbd": "0.084 SBD",
"reward_vests": "434.665420 VESTS"
}
]
}vtcereceived 0.084 SBD, 0.267 SP author reward for @vtce / ethereum-2-0-constatinople-upgrade2019/03/03 05:07:45
vtcereceived 0.084 SBD, 0.267 SP author reward for @vtce / ethereum-2-0-constatinople-upgrade
2019/03/03 05:07:45
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| sbd payout | 0.084 SBD |
| steem payout | 0.000 STEEM |
| vesting payout | 434.665420 VESTS |
| Transaction Info | Block #30820578/Virtual Operation #9 |
View Raw JSON Data
{
"trx_id": "0000000000000000000000000000000000000000",
"block": 30820578,
"trx_in_block": 4294967295,
"op_in_trx": 0,
"virtual_op": 9,
"timestamp": "2019-03-03T05:07:45",
"op": [
"author_reward",
{
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"sbd_payout": "0.084 SBD",
"steem_payout": "0.000 STEEM",
"vesting_payout": "434.665420 VESTS"
}
]
}2019/02/25 21:20:30
2019/02/25 21:20:30
| parent author | vtce |
| parent permlink | ethereum-2-0-constatinople-upgrade |
| author | partiko |
| permlink | partiko-re-vtce-ethereum-2-0-constatinople-upgrade-20190225t212030226z |
| title | |
| body | Hello @vtce! This is a friendly reminder that you have 3000 Partiko Points unclaimed in your Partiko account! Partiko is a fast and beautiful mobile app for Steem, and itβs the most popular Steem mobile app out there! Download Partiko using the link below and login using SteemConnect to claim your 3000 Partiko points! You can easily convert them into Steem token! https://partiko.app/referral/partiko |
| json metadata | {"app":"partiko"} |
| Transaction Info | Block #30667335/Trx cc3a7c7b72cd0b06b6d8a22f13c54e3360bb50f6 |
View Raw JSON Data
{
"trx_id": "cc3a7c7b72cd0b06b6d8a22f13c54e3360bb50f6",
"block": 30667335,
"trx_in_block": 28,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-25T21:20:30",
"op": [
"comment",
{
"parent_author": "vtce",
"parent_permlink": "ethereum-2-0-constatinople-upgrade",
"author": "partiko",
"permlink": "partiko-re-vtce-ethereum-2-0-constatinople-upgrade-20190225t212030226z",
"title": "",
"body": "Hello @vtce! This is a friendly reminder that you have 3000 Partiko Points unclaimed in your Partiko account!\n\nPartiko is a fast and beautiful mobile app for Steem, and itβs the most popular Steem mobile app out there! Download Partiko using the link below and login using SteemConnect to claim your 3000 Partiko points! You can easily convert them into Steem token!\n\nhttps://partiko.app/referral/partiko",
"json_metadata": "{\"app\":\"partiko\"}"
}
]
}roy2016upvoted (53.00%) @vtce / ethereum-2-0-constatinople-upgrade2019/02/24 14:22:48
roy2016upvoted (53.00%) @vtce / ethereum-2-0-constatinople-upgrade
2019/02/24 14:22:48
| voter | roy2016 |
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| weight | 5300 (53.00%) |
| Transaction Info | Block #30630228/Trx ebcfa660038d100007dccacc5ed3782137c9a841 |
View Raw JSON Data
{
"trx_id": "ebcfa660038d100007dccacc5ed3782137c9a841",
"block": 30630228,
"trx_in_block": 17,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-24T14:22:48",
"op": [
"vote",
{
"voter": "roy2016",
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"weight": 5300
}
]
}steemitboardupvoted (1.00%) @vtce / ethereum-2-0-constatinople-upgrade2019/02/24 11:44:09
steemitboardupvoted (1.00%) @vtce / ethereum-2-0-constatinople-upgrade
2019/02/24 11:44:09
| voter | steemitboard |
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| weight | 100 (1.00%) |
| Transaction Info | Block #30627057/Trx a28d0c80a41a5f21b4bb75e706c6460bfcb17894 |
View Raw JSON Data
{
"trx_id": "a28d0c80a41a5f21b4bb75e706c6460bfcb17894",
"block": 30627057,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-24T11:44:09",
"op": [
"vote",
{
"voter": "steemitboard",
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"weight": 100
}
]
}2019/02/24 11:44:06
2019/02/24 11:44:06
| parent author | vtce |
| parent permlink | ethereum-2-0-constatinople-upgrade |
| author | steemitboard |
| permlink | steemitboard-notify-vtce-20190224t114408000z |
| title | |
| body | Congratulations @vtce! You have completed the following achievement on the Steem blockchain and have been rewarded with new badge(s) : <table><tr><td>https://steemitimages.com/60x70/http://steemitboard.com/@vtce/posts.png?201902241102</td><td>You published more than 90 posts. Your next target is to reach 100 posts.</td></tr> </table> <sub>_[Click here to view your Board](https://steemitboard.com/@vtce)_</sub> <sub>_If you no longer want to receive notifications, reply to this comment with the word_ `STOP`</sub> To support your work, I also upvoted your post! > Support [SteemitBoard's project](https://steemit.com/@steemitboard)! **[Vote for its witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1)** and **get one more award**! |
| json metadata | {"image":["https://steemitboard.com/img/notify.png"]} |
| Transaction Info | Block #30627056/Trx a587255496844151ba3e48980720f248713f41c1 |
View Raw JSON Data
{
"trx_id": "a587255496844151ba3e48980720f248713f41c1",
"block": 30627056,
"trx_in_block": 40,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-24T11:44:06",
"op": [
"comment",
{
"parent_author": "vtce",
"parent_permlink": "ethereum-2-0-constatinople-upgrade",
"author": "steemitboard",
"permlink": "steemitboard-notify-vtce-20190224t114408000z",
"title": "",
"body": "Congratulations @vtce! You have completed the following achievement on the Steem blockchain and have been rewarded with new badge(s) :\n\n<table><tr><td>https://steemitimages.com/60x70/http://steemitboard.com/@vtce/posts.png?201902241102</td><td>You published more than 90 posts. Your next target is to reach 100 posts.</td></tr>\n</table>\n\n<sub>_[Click here to view your Board](https://steemitboard.com/@vtce)_</sub>\n<sub>_If you no longer want to receive notifications, reply to this comment with the word_ `STOP`</sub>\n\n\nTo support your work, I also upvoted your post!\n\n\n> Support [SteemitBoard's project](https://steemit.com/@steemitboard)! **[Vote for its witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1)** and **get one more award**!",
"json_metadata": "{\"image\":[\"https://steemitboard.com/img/notify.png\"]}"
}
]
}tonyb1663upvoted (100.00%) @vtce / ethereum-2-0-constatinople-upgrade2019/02/24 05:20:33
tonyb1663upvoted (100.00%) @vtce / ethereum-2-0-constatinople-upgrade
2019/02/24 05:20:33
| voter | tonyb1663 |
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| weight | 10000 (100.00%) |
| Transaction Info | Block #30619388/Trx 867122cf83dbeb39ee6283ad3546bed0b645d4e7 |
View Raw JSON Data
{
"trx_id": "867122cf83dbeb39ee6283ad3546bed0b645d4e7",
"block": 30619388,
"trx_in_block": 17,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-24T05:20:33",
"op": [
"vote",
{
"voter": "tonyb1663",
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"weight": 10000
}
]
}acceleratorupvoted (0.53%) @vtce / ethereum-2-0-constatinople-upgrade2019/02/24 05:17:06
acceleratorupvoted (0.53%) @vtce / ethereum-2-0-constatinople-upgrade
2019/02/24 05:17:06
| voter | accelerator |
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| weight | 53 (0.53%) |
| Transaction Info | Block #30619319/Trx 4db2a7328de97ee340b76e905d8f17a6a4511669 |
View Raw JSON Data
{
"trx_id": "4db2a7328de97ee340b76e905d8f17a6a4511669",
"block": 30619319,
"trx_in_block": 8,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-24T05:17:06",
"op": [
"vote",
{
"voter": "accelerator",
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"weight": 53
}
]
}steem.createupvoted (2.12%) @vtce / ethereum-2-0-constatinople-upgrade2019/02/24 05:17:03
steem.createupvoted (2.12%) @vtce / ethereum-2-0-constatinople-upgrade
2019/02/24 05:17:03
| voter | steem.create |
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| weight | 212 (2.12%) |
| Transaction Info | Block #30619318/Trx 8cc489a685f42292691018d6e3af54226368f273 |
View Raw JSON Data
{
"trx_id": "8cc489a685f42292691018d6e3af54226368f273",
"block": 30619318,
"trx_in_block": 18,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-24T05:17:03",
"op": [
"vote",
{
"voter": "steem.create",
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"weight": 212
}
]
}hamsa.qualityupvoted (1.10%) @vtce / ethereum-2-0-constatinople-upgrade2019/02/24 05:16:03
hamsa.qualityupvoted (1.10%) @vtce / ethereum-2-0-constatinople-upgrade
2019/02/24 05:16:03
| voter | hamsa.quality |
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| weight | 110 (1.10%) |
| Transaction Info | Block #30619298/Trx 566ad4d1a6693043be76172ec9d0b2fef35389f9 |
View Raw JSON Data
{
"trx_id": "566ad4d1a6693043be76172ec9d0b2fef35389f9",
"block": 30619298,
"trx_in_block": 13,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-24T05:16:03",
"op": [
"vote",
{
"voter": "hamsa.quality",
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"weight": 110
}
]
}bukilandupvoted (1.00%) @vtce / ethereum-2-0-constatinople-upgrade2019/02/24 05:15:03
bukilandupvoted (1.00%) @vtce / ethereum-2-0-constatinople-upgrade
2019/02/24 05:15:03
| voter | bukiland |
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| weight | 100 (1.00%) |
| Transaction Info | Block #30619278/Trx 394f5918b57ce6b9425c1ea0603799d1852836d0 |
View Raw JSON Data
{
"trx_id": "394f5918b57ce6b9425c1ea0603799d1852836d0",
"block": 30619278,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-24T05:15:03",
"op": [
"vote",
{
"voter": "bukiland",
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"weight": 100
}
]
}steeming-hotupvoted (0.05%) @vtce / ethereum-2-0-constatinople-upgrade2019/02/24 05:09:42
steeming-hotupvoted (0.05%) @vtce / ethereum-2-0-constatinople-upgrade
2019/02/24 05:09:42
| voter | steeming-hot |
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| weight | 5 (0.05%) |
| Transaction Info | Block #30619171/Trx de23ee0b2b9881355af5085f868a2a262122bbdd |
View Raw JSON Data
{
"trx_id": "de23ee0b2b9881355af5085f868a2a262122bbdd",
"block": 30619171,
"trx_in_block": 17,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-24T05:09:42",
"op": [
"vote",
{
"voter": "steeming-hot",
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"weight": 5
}
]
}vtcepublished a new post: ethereum-2-0-constatinople-upgrade2019/02/24 05:07:45
vtcepublished a new post: ethereum-2-0-constatinople-upgrade
2019/02/24 05:07:45
| parent author | |
| parent permlink | ethereum |
| author | vtce |
| permlink | ethereum-2-0-constatinople-upgrade |
| title | Ethereum 2.0 Constatinople Upgrade |
| body | <center></center> The planned hard fork for the Ethereum network back in January was delayed due to a bug in EIP1283. The network was not hacked, but a vulnerability was discovered by auditors during pre-deployment testing. This exposed a "Re-entrancy Attack" in smart contracts updated to EIP1283, which would allow a bad actor to recall a function multiple times to withdraw funds. Core devs have reset the deployment to block height #7280000 and will deploy the hard fork as 2 upgrades. Phase1 : C1 = i[(EIP145)(EIP1052)(EIP1014)(EIP1234)(EIP1283)] Phase2: C2 =i[(EIP145)(EIP1052)(EIP1014)(EIP1234)] - EIP1283 Phase1 will roll in order to support those who have already upgraded. Phase2 will roll back EIP1283. The anticipated Ethereum upgrade to "Ethereum 2.0" is expected at the end of February 2019. |
| json metadata | {"tags":["ethereum","cryptocurrency","blockchain","constantinople","fork"],"image":["https://cdn.steemitimages.com/DQmTA5HooxDhrhX2fhbnFm4cGDzz5mciCymWomSQ3evmNHD/Screen%20Shot%202019-02-24%20at%201.01.00%20PM.png"],"app":"steemit/0.1","format":"markdown"} |
| Transaction Info | Block #30619132/Trx 974290e056e832d525c731cb20e3a50afe72d9b9 |
View Raw JSON Data
{
"trx_id": "974290e056e832d525c731cb20e3a50afe72d9b9",
"block": 30619132,
"trx_in_block": 34,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-02-24T05:07:45",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "ethereum",
"author": "vtce",
"permlink": "ethereum-2-0-constatinople-upgrade",
"title": "Ethereum 2.0 Constatinople Upgrade",
"body": "<center></center>\n\nThe planned hard fork for the Ethereum network back in January was delayed due to a bug in EIP1283. The network was not hacked, but a vulnerability was discovered by auditors during pre-deployment testing. This exposed a \"Re-entrancy Attack\" in smart contracts updated to EIP1283, which would allow a bad actor to recall a function multiple times to withdraw funds.\n\nCore devs have reset the deployment to block height #7280000 and will deploy the hard fork as 2 upgrades.\n\nPhase1 : \nC1 = i[(EIP145)(EIP1052)(EIP1014)(EIP1234)(EIP1283)]\n\nPhase2:\nC2 =i[(EIP145)(EIP1052)(EIP1014)(EIP1234)] - EIP1283\n\nPhase1 will roll in order to support those who have already upgraded. Phase2 will roll back EIP1283.\n\nThe anticipated Ethereum upgrade to \"Ethereum 2.0\" is expected at the end of February 2019.",
"json_metadata": "{\"tags\":[\"ethereum\",\"cryptocurrency\",\"blockchain\",\"constantinople\",\"fork\"],\"image\":[\"https://cdn.steemitimages.com/DQmTA5HooxDhrhX2fhbnFm4cGDzz5mciCymWomSQ3evmNHD/Screen%20Shot%202019-02-24%20at%201.01.00%20PM.png\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
}
]
}2019/01/14 01:02:12
2019/01/14 01:02:12
| delegator | steem |
| delegatee | vtce |
| vesting shares | 15847.554184 VESTS |
| Transaction Info | Block #29434489/Trx 5921592825e294dcb55bc86e25a27dfa8cbeac5c |
View Raw JSON Data
{
"trx_id": "5921592825e294dcb55bc86e25a27dfa8cbeac5c",
"block": 29434489,
"trx_in_block": 8,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-14T01:02:12",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "vtce",
"vesting_shares": "15847.554184 VESTS"
}
]
}vtceclaimed reward balance: 0.132 STEEM, 0.165 SP2019/01/13 20:00:24
vtceclaimed reward balance: 0.132 STEEM, 0.165 SP
2019/01/13 20:00:24
| account | vtce |
| reward steem | 0.132 STEEM |
| reward sbd | 0.000 SBD |
| reward vests | 269.172567 VESTS |
| Transaction Info | Block #29428454/Trx 243140a4014695245d27ed520209886700858981 |
View Raw JSON Data
{
"trx_id": "243140a4014695245d27ed520209886700858981",
"block": 29428454,
"trx_in_block": 33,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-13T20:00:24",
"op": [
"claim_reward_balance",
{
"account": "vtce",
"reward_steem": "0.132 STEEM",
"reward_sbd": "0.000 SBD",
"reward_vests": "269.172567 VESTS"
}
]
}vtcereceived 0.132 STEEM, 0.165 SP author reward for @vtce / apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices2019/01/12 17:17:15
vtcereceived 0.132 STEEM, 0.165 SP author reward for @vtce / apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices
2019/01/12 17:17:15
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| sbd payout | 0.000 SBD |
| steem payout | 0.132 STEEM |
| vesting payout | 269.172567 VESTS |
| Transaction Info | Block #29396412/Virtual Operation #5 |
View Raw JSON Data
{
"trx_id": "0000000000000000000000000000000000000000",
"block": 29396412,
"trx_in_block": 4294967295,
"op_in_trx": 0,
"virtual_op": 5,
"timestamp": "2019-01-12T17:17:15",
"op": [
"author_reward",
{
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"sbd_payout": "0.000 SBD",
"steem_payout": "0.132 STEEM",
"vesting_payout": "269.172567 VESTS"
}
]
}vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices2019/01/07 13:48:45
vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices
2019/01/07 13:48:45
| parent author | |
| parent permlink | apple |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| title | Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices |
| body | @@ -2199,16 +2199,1018 @@ ales. %0A%0A +Apple's new strategy is to move some, if not all, of their production from China to another country. One market Apple wants to break into but is having plenty of problems with is India. This market is virtually non-existent to Apple products. In order to open a retail store in India, a company must source 30%25 of its materials from the local businesses. Apple will want to go ahead to tap into a booming Indian population with potential to increase revenues in the next few years as it delivers the iPhone to an already diverse smartphone market. Indians, for the most part, are a sophisticated and highly educated group that would benefit from the features of the iPhone. The majority of the Indian market is for cheaper and more practical cellular phones, not necessarily a smartphone. Simpler style phones like the Xiaomi Poco have found a huge market in India because it provides the basic features that most Indians need at an affordable price. Nothing like a $1000 flagship like the iPhone XS.%0A%0A So here |
| json metadata | {"tags":["apple","business","technology","investment","iphone"],"image":["https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png"],"app":"steemit/0.1","format":"markdown"} |
| Transaction Info | Block #29248323/Trx 73779536dda6d5f975de9a26ba4e209141678c15 |
View Raw JSON Data
{
"trx_id": "73779536dda6d5f975de9a26ba4e209141678c15",
"block": 29248323,
"trx_in_block": 22,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-07T13:48:45",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "apple",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"title": "Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices",
"body": "@@ -2199,16 +2199,1018 @@\n ales. %0A%0A\n+Apple's new strategy is to move some, if not all, of their production from China to another country. One market Apple wants to break into but is having plenty of problems with is India. This market is virtually non-existent to Apple products. In order to open a retail store in India, a company must source 30%25 of its materials from the local businesses. Apple will want to go ahead to tap into a booming Indian population with potential to increase revenues in the next few years as it delivers the iPhone to an already diverse smartphone market. Indians, for the most part, are a sophisticated and highly educated group that would benefit from the features of the iPhone. The majority of the Indian market is for cheaper and more practical cellular phones, not necessarily a smartphone. Simpler style phones like the Xiaomi Poco have found a huge market in India because it provides the basic features that most Indians need at an affordable price. Nothing like a $1000 flagship like the iPhone XS.%0A%0A\n So here \n",
"json_metadata": "{\"tags\":[\"apple\",\"business\",\"technology\",\"investment\",\"iphone\"],\"image\":[\"https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
}
]
}2019/01/06 19:14:57
2019/01/06 19:14:57
| voter | trailreward |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 5000 (50.00%) |
| Transaction Info | Block #29226059/Trx c0552df0206d6288ecb3102dadc5f65970a8f628 |
View Raw JSON Data
{
"trx_id": "c0552df0206d6288ecb3102dadc5f65970a8f628",
"block": 29226059,
"trx_in_block": 35,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-06T19:14:57",
"op": [
"vote",
{
"voter": "trailreward",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 5000
}
]
}2019/01/06 18:44:42
2019/01/06 18:44:42
| voter | lastditch |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 5000 (50.00%) |
| Transaction Info | Block #29225458/Trx c8436cb0df4233096318044cc1a12b745465dc46 |
View Raw JSON Data
{
"trx_id": "c8436cb0df4233096318044cc1a12b745465dc46",
"block": 29225458,
"trx_in_block": 34,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-06T18:44:42",
"op": [
"vote",
{
"voter": "lastditch",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 5000
}
]
}2019/01/06 18:44:36
2019/01/06 18:44:36
| voter | social |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 5000 (50.00%) |
| Transaction Info | Block #29225456/Trx 599ae9a23d0274a3dd6606271205a5fb276dd70d |
View Raw JSON Data
{
"trx_id": "599ae9a23d0274a3dd6606271205a5fb276dd70d",
"block": 29225456,
"trx_in_block": 15,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-06T18:44:36",
"op": [
"vote",
{
"voter": "social",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 5000
}
]
}2019/01/05 23:52:09
2019/01/05 23:52:09
| voter | zuerich |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 4900 (49.00%) |
| Transaction Info | Block #29202837/Trx 1b89b48047cf748303d5d9694c543e860e6f13ec |
View Raw JSON Data
{
"trx_id": "1b89b48047cf748303d5d9694c543e860e6f13ec",
"block": 29202837,
"trx_in_block": 13,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T23:52:09",
"op": [
"vote",
{
"voter": "zuerich",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 4900
}
]
}vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices2019/01/05 20:38:57
vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices
2019/01/05 20:38:57
| parent author | |
| parent permlink | apple |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| title | Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices |
| body | @@ -3098,20 +3098,20 @@ ple has -full +more vertica @@ -3133,32 +3133,31 @@ rom -manufacturing to production +the development standpoint . |
| json metadata | {"tags":["apple","business","technology","investment","iphone"],"image":["https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png"],"app":"steemit/0.1","format":"markdown"} |
| Transaction Info | Block #29198975/Trx 3a689ff95789e3d25199327adc7a3608bed40e4c |
View Raw JSON Data
{
"trx_id": "3a689ff95789e3d25199327adc7a3608bed40e4c",
"block": 29198975,
"trx_in_block": 15,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T20:38:57",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "apple",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"title": "Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices",
"body": "@@ -3098,20 +3098,20 @@\n ple has \n-full\n+more\n vertica\n@@ -3133,32 +3133,31 @@\n rom \n-manufacturing to production\n+the development standpoint\n .\n",
"json_metadata": "{\"tags\":[\"apple\",\"business\",\"technology\",\"investment\",\"iphone\"],\"image\":[\"https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
}
]
}vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices2019/01/05 18:15:36
vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices
2019/01/05 18:15:36
| parent author | |
| parent permlink | apple |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| title | Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices |
| body | @@ -205,17 +205,16 @@ Tim Cook -e 's excus |
| json metadata | {"tags":["apple","business","technology","investment","iphone"],"image":["https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png"],"app":"steemit/0.1","format":"markdown"} |
| Transaction Info | Block #29196111/Trx 7924f3130af6d47a07fd3b868475ef5ce63cf908 |
View Raw JSON Data
{
"trx_id": "7924f3130af6d47a07fd3b868475ef5ce63cf908",
"block": 29196111,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T18:15:36",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "apple",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"title": "Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices",
"body": "@@ -205,17 +205,16 @@\n Tim Cook\n-e\n 's excus\n",
"json_metadata": "{\"tags\":[\"apple\",\"business\",\"technology\",\"investment\",\"iphone\"],\"image\":[\"https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
}
]
}vtceupvoted (100.00%) @vtce / apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices2019/01/05 17:48:00
vtceupvoted (100.00%) @vtce / apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices
2019/01/05 17:48:00
| voter | vtce |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195559/Trx 91d42e7008832137e881ea32181f49895769903a |
View Raw JSON Data
{
"trx_id": "91d42e7008832137e881ea32181f49895769903a",
"block": 29195559,
"trx_in_block": 33,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:48:00",
"op": [
"vote",
{
"voter": "vtce",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices2019/01/05 17:42:57
vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices
2019/01/05 17:42:57
| parent author | |
| parent permlink | apple |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| title | Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices |
| body | @@ -2286,62 +2286,8 @@ cle. - Apple does have a competitive advantage in many ways. Wha |
| json metadata | {"tags":["apple","business","technology","investment","iphone"],"image":["https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png"],"app":"steemit/0.1","format":"markdown"} |
| Transaction Info | Block #29195458/Trx 7ef6b6685ffaeb0db5dbe7d5f25bd7950ed3143f |
View Raw JSON Data
{
"trx_id": "7ef6b6685ffaeb0db5dbe7d5f25bd7950ed3143f",
"block": 29195458,
"trx_in_block": 18,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:42:57",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "apple",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"title": "Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices",
"body": "@@ -2286,62 +2286,8 @@\n cle.\n- Apple does have a competitive advantage in many ways.\n Wha\n",
"json_metadata": "{\"tags\":[\"apple\",\"business\",\"technology\",\"investment\",\"iphone\"],\"image\":[\"https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
}
]
}2019/01/05 17:37:18
2019/01/05 17:37:18
| voter | fyrstikken |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 100 (1.00%) |
| Transaction Info | Block #29195345/Trx 848f31402add1cea81de09f9711d3c629f3ef035 |
View Raw JSON Data
{
"trx_id": "848f31402add1cea81de09f9711d3c629f3ef035",
"block": 29195345,
"trx_in_block": 27,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:37:18",
"op": [
"vote",
{
"voter": "fyrstikken",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 100
}
]
}2019/01/05 17:33:27
2019/01/05 17:33:27
| voter | intrusionpunish |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195269/Trx 1c7f7807bcb6a9f226298b98185c4d0bfaf83c15 |
View Raw JSON Data
{
"trx_id": "1c7f7807bcb6a9f226298b98185c4d0bfaf83c15",
"block": 29195269,
"trx_in_block": 17,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:33:27",
"op": [
"vote",
{
"voter": "intrusionpunish",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}2019/01/05 17:33:27
2019/01/05 17:33:27
| voter | fourosprey |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195269/Trx d50130ca50eccef38202f4e031b347dbb285a84b |
View Raw JSON Data
{
"trx_id": "d50130ca50eccef38202f4e031b347dbb285a84b",
"block": 29195269,
"trx_in_block": 14,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:33:27",
"op": [
"vote",
{
"voter": "fourosprey",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}neanvupvoted (100.00%) @vtce / apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices2019/01/05 17:33:27
neanvupvoted (100.00%) @vtce / apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices
2019/01/05 17:33:27
| voter | neanv |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195269/Trx b7fe127d1f8b3f52c1b8dc74919efeea60acde04 |
View Raw JSON Data
{
"trx_id": "b7fe127d1f8b3f52c1b8dc74919efeea60acde04",
"block": 29195269,
"trx_in_block": 13,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:33:27",
"op": [
"vote",
{
"voter": "neanv",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}2019/01/05 17:31:27
2019/01/05 17:31:27
| voter | xlibanti |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195229/Trx a3e657ba4156f5b7bfad211b1a11379f213b3653 |
View Raw JSON Data
{
"trx_id": "a3e657ba4156f5b7bfad211b1a11379f213b3653",
"block": 29195229,
"trx_in_block": 18,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:31:27",
"op": [
"vote",
{
"voter": "xlibanti",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}2019/01/05 17:31:27
2019/01/05 17:31:27
| voter | officialex |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195229/Trx b98e08a083f4a1fd3558dbd58f85f5e5d80debd9 |
View Raw JSON Data
{
"trx_id": "b98e08a083f4a1fd3558dbd58f85f5e5d80debd9",
"block": 29195229,
"trx_in_block": 17,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:31:27",
"op": [
"vote",
{
"voter": "officialex",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}2019/01/05 17:31:27
2019/01/05 17:31:27
| voter | limitingexmoor |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195229/Trx fbc08f4edff575c61c52950f18a3cdceafdfaf39 |
View Raw JSON Data
{
"trx_id": "fbc08f4edff575c61c52950f18a3cdceafdfaf39",
"block": 29195229,
"trx_in_block": 14,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:31:27",
"op": [
"vote",
{
"voter": "limitingexmoor",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}2019/01/05 17:30:03
2019/01/05 17:30:03
| delegator | steem |
| delegatee | vtce |
| vesting shares | 16130.669553 VESTS |
| Transaction Info | Block #29195201/Trx ef981effbca09aa2d5516398545c3b9953f968d3 |
View Raw JSON Data
{
"trx_id": "ef981effbca09aa2d5516398545c3b9953f968d3",
"block": 29195201,
"trx_in_block": 12,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:30:03",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "vtce",
"vesting_shares": "16130.669553 VESTS"
}
]
}2019/01/05 17:29:27
2019/01/05 17:29:27
| voter | praporvaler |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195189/Trx a640013f5f46e9695bea8560562051c23cd8a143 |
View Raw JSON Data
{
"trx_id": "a640013f5f46e9695bea8560562051c23cd8a143",
"block": 29195189,
"trx_in_block": 16,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:29:27",
"op": [
"vote",
{
"voter": "praporvaler",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}2019/01/05 17:29:27
2019/01/05 17:29:27
| voter | korob1218 |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195189/Trx 4d6732b1b203b71d21ce51464dea25176cdaeb94 |
View Raw JSON Data
{
"trx_id": "4d6732b1b203b71d21ce51464dea25176cdaeb94",
"block": 29195189,
"trx_in_block": 14,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:29:27",
"op": [
"vote",
{
"voter": "korob1218",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}2019/01/05 17:29:06
2019/01/05 17:29:06
| voter | raise-me-up |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 1 (0.01%) |
| Transaction Info | Block #29195182/Trx 665c07203ddd6b1aaee7c7bed2cd69e018f93cf3 |
View Raw JSON Data
{
"trx_id": "665c07203ddd6b1aaee7c7bed2cd69e018f93cf3",
"block": 29195182,
"trx_in_block": 12,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:29:06",
"op": [
"vote",
{
"voter": "raise-me-up",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 1
}
]
}2019/01/05 17:27:27
2019/01/05 17:27:27
| voter | djane860 |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195149/Trx c5830f1a88b2df61e7d26338d8ef9cef91cfa313 |
View Raw JSON Data
{
"trx_id": "c5830f1a88b2df61e7d26338d8ef9cef91cfa313",
"block": 29195149,
"trx_in_block": 36,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:27:27",
"op": [
"vote",
{
"voter": "djane860",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}2019/01/05 17:27:27
2019/01/05 17:27:27
| voter | davidisaevv |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195149/Trx d51c6f4a4d3beac9014dc5b25d97f7d49552fa91 |
View Raw JSON Data
{
"trx_id": "d51c6f4a4d3beac9014dc5b25d97f7d49552fa91",
"block": 29195149,
"trx_in_block": 32,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:27:27",
"op": [
"vote",
{
"voter": "davidisaevv",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices2019/01/05 17:27:00
vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices
2019/01/05 17:27:00
| parent author | |
| parent permlink | apple |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| title | Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices |
| body | @@ -2591,16 +2591,56 @@ Mac Pro + or even delve into a blockchain project . They a @@ -2719,22 +2719,25 @@ zon -are dominating +have a big market .%0A%0AN |
| json metadata | {"tags":["apple","business","technology","investment","iphone"],"image":["https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png"],"app":"steemit/0.1","format":"markdown"} |
| Transaction Info | Block #29195140/Trx 93d73640d2bed0900d4c22bd0f6566916a029251 |
View Raw JSON Data
{
"trx_id": "93d73640d2bed0900d4c22bd0f6566916a029251",
"block": 29195140,
"trx_in_block": 22,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:27:00",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "apple",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"title": "Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices",
"body": "@@ -2591,16 +2591,56 @@\n Mac Pro\n+ or even delve into a blockchain project\n . They a\n@@ -2719,22 +2719,25 @@\n zon \n-are dominating\n+have a big market\n .%0A%0AN\n",
"json_metadata": "{\"tags\":[\"apple\",\"business\",\"technology\",\"investment\",\"iphone\"],\"image\":[\"https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
}
]
}2019/01/05 17:25:27
2019/01/05 17:25:27
| voter | groovylarge |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #29195109/Trx f87d3af7c7f6408dc4fbb3f22162e7c27f587dcd |
View Raw JSON Data
{
"trx_id": "f87d3af7c7f6408dc4fbb3f22162e7c27f587dcd",
"block": 29195109,
"trx_in_block": 8,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:25:27",
"op": [
"vote",
{
"voter": "groovylarge",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10000
}
]
}2019/01/05 17:21:06
2019/01/05 17:21:06
| voter | abcor |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| weight | 10 (0.10%) |
| Transaction Info | Block #29195022/Trx aeb49fadf7bf116770b32c227adc6b68867a4aad |
View Raw JSON Data
{
"trx_id": "aeb49fadf7bf116770b32c227adc6b68867a4aad",
"block": 29195022,
"trx_in_block": 17,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:21:06",
"op": [
"vote",
{
"voter": "abcor",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"weight": 10
}
]
}vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices2019/01/05 17:17:15
vtcepublished a new post: apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices
2019/01/05 17:17:15
| parent author | |
| parent permlink | apple |
| author | vtce |
| permlink | apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices |
| title | Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices |
| body | <center></center> I don't buy Tim Cooke's excuse for slow Apple sales due to a slumping Chinese economy or the US-China Trade War. Since 2016, the signs were emerging that Apple was in danger and I pointed this out several times before. They are lacking in the wow factor that previous products enjoyed, no new innovation that has been a game changer and they are pricing their products at a premium at a time few people can afford them. The shelf life and inventory of iPhones has also increased from before, when Apple always usually sells out their products from pre-order sales. I do think Apple has actually become a victim of its own success. They are making better iPhones than ever, with faster processors e.g. A12X and more AI features e.g. Face ID and Portrait Mode. People don't need to buy newer iPhones when the one they have is working fine. The only problem is that the competition has gotten better too, with fancier designs and high-end features. That leads to new customers who buy those products since they are also more affordable plus they get the same or similar features like that on a flagship iPhone. Samsung and Huawei now lead the world in smartphone sales, and it has been plateauing not increasing. That cuts into Apple's profit margins significantly, that for every iPhone sold, more S9 and P20 are sold as well. The expectations from Apple are also so high, it leaves very little room for failure. Even though they have performed well, they did not meet the targets set for sales figures. Apple has already reached the trillion dollar market cap in 2018, and in early 2018 made $88.3 Billion in revenue. The main cash cow for Apple has been the iPhone, and that is where things seem disappointing in late 2018. China's economy maybe in a cyclical slump, but the market there has changed in the last 2 years. Does Apple know they have competition from top Chinese smartphone companies like Huawei, Oppo, OnePlus, etc. More Chinese consumers are buying local and that will hurt Apple's iPhone sales. So here is an idea. I think Apple is going through a decline in its product cycle. Apple does have a competitive advantage in many ways. What consumers need are not newer iPhones, but products that are affordable and useful. They should improve the HomePod, upgrade Siri to Alexa level, utilize their processors for more advanced apps for the iPhone, iPad and Apple TV, release a new Mac Pro. They also could release a new product line for IoT devices that Google and Amazon are dominating. Now I hear Apple has built a new engineering team that will concentrate fully on processor design. This is where I think Apple can reclaim some technical advantage. Apple will no longer need to use x86 based processors from intel for the MacBooks, iMacs or Mac Pros when they can develop their own CPU using ARM designs. This can also lead to a new line of products that have never been made before now that Apple has full vertical integration from manufacturing to production. |
| json metadata | {"tags":["apple","business","technology","investment","iphone"],"image":["https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png"],"app":"steemit/0.1","format":"markdown"} |
| Transaction Info | Block #29194945/Trx 96737f603872d486d41c1cb662aad9d9cb53f19c |
View Raw JSON Data
{
"trx_id": "96737f603872d486d41c1cb662aad9d9cb53f19c",
"block": 29194945,
"trx_in_block": 16,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-01-05T17:17:15",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "apple",
"author": "vtce",
"permlink": "apple-had-signs-of-trouble-before-a-lack-of-innovation-and-premium-prices",
"title": "Apple Had Signs Of Trouble Before: A Lack Of Innovation & Premium Prices",
"body": "<center></center>\n\nI don't buy Tim Cooke's excuse for slow Apple sales due to a slumping Chinese economy or the US-China Trade War. Since 2016, the signs were emerging that Apple was in danger and I pointed this out several times before. They are lacking in the wow factor that previous products enjoyed, no new innovation that has been a game changer and they are pricing their products at a premium at a time few people can afford them. The shelf life and inventory of iPhones has also increased from before, when Apple always usually sells out their products from pre-order sales.\n\nI do think Apple has actually become a victim of its own success. They are making better iPhones than ever, with faster processors e.g. A12X and more AI features e.g. Face ID and Portrait Mode. People don't need to buy newer iPhones when the one they have is working fine. The only problem is that the competition has gotten better too, with fancier designs and high-end features. That leads to new customers who buy those products since they are also more affordable plus they get the same or similar features like that on a flagship iPhone. Samsung and Huawei now lead the world in smartphone sales, and it has been plateauing not increasing. That cuts into Apple's profit margins significantly, that for every iPhone sold, more S9 and P20 are sold as well.\n\nThe expectations from Apple are also so high, it leaves very little room for failure. Even though they have performed well, they did not meet the targets set for sales figures. Apple has already reached the trillion dollar market cap in 2018, and in early 2018 made $88.3 Billion in revenue. The main cash cow for Apple has been the iPhone, and that is where things seem disappointing in late 2018. China's economy maybe in a cyclical slump, but the market there has changed in the last 2 years. Does Apple know they have competition from top Chinese smartphone companies like Huawei, Oppo, OnePlus, etc. More Chinese consumers are buying local and that will hurt Apple's iPhone sales. \n\nSo here is an idea. I think Apple is going through a decline in its product cycle. Apple does have a competitive advantage in many ways. What consumers need are not newer iPhones, but products that are affordable and useful. They should improve the HomePod, upgrade Siri to Alexa level, utilize their processors for more advanced apps for the iPhone, iPad and Apple TV, release a new Mac Pro. They also could release a new product line for IoT devices that Google and Amazon are dominating.\n\nNow I hear Apple has built a new engineering team that will concentrate fully on processor design. This is where I think Apple can reclaim some technical advantage. Apple will no longer need to use x86 based processors from intel for the MacBooks, iMacs or Mac Pros when they can develop their own CPU using ARM designs. This can also lead to a new line of products that have never been made before now that Apple has full vertical integration from manufacturing to production.",
"json_metadata": "{\"tags\":[\"apple\",\"business\",\"technology\",\"investment\",\"iphone\"],\"image\":[\"https://cdn.steemitimages.com/DQmdSSkaU38AUtmMfAXUgRykz2iwaHiF22gUZUD7p1yvY7W/Screen%20Shot%202019-01-06%20at%201.00.18%20AM.png\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
}
]
}2018/11/26 19:58:30
2018/11/26 19:58:30
| delegator | steem |
| delegatee | vtce |
| vesting shares | 2013.984142 VESTS |
| Transaction Info | Block #28046910/Trx 27c04d96ae0a6e0f2c26a54b913556eb04e34168 |
View Raw JSON Data
{
"trx_id": "27c04d96ae0a6e0f2c26a54b913556eb04e34168",
"block": 28046910,
"trx_in_block": 9,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-11-26T19:58:30",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "vtce",
"vesting_shares": "2013.984142 VESTS"
}
]
}2018/10/23 09:27:57
2018/10/23 09:27:57
| parent author | vtce |
| parent permlink | tips-to-survive-hacker-week-in-las-vegas |
| author | steemitboard |
| permlink | steemitboard-notify-vtce-20181023t092758000z |
| title | |
| body | Congratulations @vtce! You have received a personal award! [](http://steemitboard.com/@vtce) 1 Year on Steemit <sub>_Click on the badge to view your Board of Honor._</sub> **Do not miss the last post from @steemitboard:** <table><tr><td><a href="https://steemit.com/steemitboard/@steemitboard/steemitboard-ranking-update-resteem-and-resteemed-added"><img src="https://steemitimages.com/64x128/https://cdn.steemitimages.com/DQmfRVpHQhLDhnjDtqck8GPv9NPvNKPfMsDaAFDE1D9Er2Z/header_ranking.png"></a></td><td><a href="https://steemit.com/steemitboard/@steemitboard/steemitboard-ranking-update-resteem-and-resteemed-added">SteemitBoard Ranking update - Resteem and Resteemed added</a></td></tr></table> > Support [SteemitBoard's project](https://steemit.com/@steemitboard)! **[Vote for its witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1)** and **get one more award**! |
| json metadata | {"image":["https://steemitboard.com/img/notify.png"]} |
| Transaction Info | Block #27055773/Trx 5d2ce91a01bb97144c5f037ce092c5878d51ea90 |
View Raw JSON Data
{
"trx_id": "5d2ce91a01bb97144c5f037ce092c5878d51ea90",
"block": 27055773,
"trx_in_block": 28,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-10-23T09:27:57",
"op": [
"comment",
{
"parent_author": "vtce",
"parent_permlink": "tips-to-survive-hacker-week-in-las-vegas",
"author": "steemitboard",
"permlink": "steemitboard-notify-vtce-20181023t092758000z",
"title": "",
"body": "Congratulations @vtce! You have received a personal award!\n\n[](http://steemitboard.com/@vtce) 1 Year on Steemit\n<sub>_Click on the badge to view your Board of Honor._</sub>\n\n\n**Do not miss the last post from @steemitboard:**\n<table><tr><td><a href=\"https://steemit.com/steemitboard/@steemitboard/steemitboard-ranking-update-resteem-and-resteemed-added\"><img src=\"https://steemitimages.com/64x128/https://cdn.steemitimages.com/DQmfRVpHQhLDhnjDtqck8GPv9NPvNKPfMsDaAFDE1D9Er2Z/header_ranking.png\"></a></td><td><a href=\"https://steemit.com/steemitboard/@steemitboard/steemitboard-ranking-update-resteem-and-resteemed-added\">SteemitBoard Ranking update - Resteem and Resteemed added</a></td></tr></table>\n\n> Support [SteemitBoard's project](https://steemit.com/@steemitboard)! **[Vote for its witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1)** and **get one more award**!",
"json_metadata": "{\"image\":[\"https://steemitboard.com/img/notify.png\"]}"
}
]
}2018/10/08 19:42:30
2018/10/08 19:42:30
| delegator | steem |
| delegatee | vtce |
| vesting shares | 16278.184049 VESTS |
| Transaction Info | Block #26636373/Trx e77d00a91d19e9095d529fd8662c571021daf4c5 |
View Raw JSON Data
{
"trx_id": "e77d00a91d19e9095d529fd8662c571021daf4c5",
"block": 26636373,
"trx_in_block": 11,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-10-08T19:42:30",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "vtce",
"vesting_shares": "16278.184049 VESTS"
}
]
}a12345upvoted (100.00%) @vtce / understanding-the-basics-of-ev-charging2018/09/22 03:55:45
a12345upvoted (100.00%) @vtce / understanding-the-basics-of-ev-charging
2018/09/22 03:55:45
| voter | a12345 |
| author | vtce |
| permlink | understanding-the-basics-of-ev-charging |
| weight | 10000 (100.00%) |
| Transaction Info | Block #26157156/Trx c3577bbb5ac909b8c172054c662f6606d77d9973 |
View Raw JSON Data
{
"trx_id": "c3577bbb5ac909b8c172054c662f6606d77d9973",
"block": 26157156,
"trx_in_block": 10,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-09-22T03:55:45",
"op": [
"vote",
{
"voter": "a12345",
"author": "vtce",
"permlink": "understanding-the-basics-of-ev-charging",
"weight": 10000
}
]
}2018/09/22 03:55:24
2018/09/22 03:55:24
| parent author | vtce |
| parent permlink | understanding-the-basics-of-ev-charging |
| author | a12345 |
| permlink | re-vtce-understanding-the-basics-of-ev-charging-20180922t035527234z |
| title | |
| body | nice summary, thanks |
| json metadata | {"tags":["technology"],"app":"steemit/0.1"} |
| Transaction Info | Block #26157149/Trx 6d95d64166530140c9996ab34e50f581a44feb4a |
View Raw JSON Data
{
"trx_id": "6d95d64166530140c9996ab34e50f581a44feb4a",
"block": 26157149,
"trx_in_block": 41,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-09-22T03:55:24",
"op": [
"comment",
{
"parent_author": "vtce",
"parent_permlink": "understanding-the-basics-of-ev-charging",
"author": "a12345",
"permlink": "re-vtce-understanding-the-basics-of-ev-charging-20180922t035527234z",
"title": "",
"body": "nice summary, thanks",
"json_metadata": "{\"tags\":[\"technology\"],\"app\":\"steemit/0.1\"}"
}
]
}vtcesent 6.503 SBD to @blocktrades- "4f91f468-b9b0-4114-b3d2-72f38cb2d810"2018/08/20 20:12:09
vtcesent 6.503 SBD to @blocktrades- "4f91f468-b9b0-4114-b3d2-72f38cb2d810"
2018/08/20 20:12:09
| from | vtce |
| to | blocktrades |
| amount | 6.503 SBD |
| memo | 4f91f468-b9b0-4114-b3d2-72f38cb2d810 |
| Transaction Info | Block #25242298/Trx 30630c4a5094678afe88b32851c8e1b01a14e460 |
View Raw JSON Data
{
"trx_id": "30630c4a5094678afe88b32851c8e1b01a14e460",
"block": 25242298,
"trx_in_block": 11,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-08-20T20:12:09",
"op": [
"transfer",
{
"from": "vtce",
"to": "blocktrades",
"amount": "6.503 SBD",
"memo": "4f91f468-b9b0-4114-b3d2-72f38cb2d810"
}
]
}vtceclaimed reward balance: 0.064 STEEM, 0.081 SP2018/08/14 17:36:12
vtceclaimed reward balance: 0.064 STEEM, 0.081 SP
2018/08/14 17:36:12
| account | vtce |
| reward steem | 0.064 STEEM |
| reward sbd | 0.000 SBD |
| reward vests | 131.649971 VESTS |
| Transaction Info | Block #25066441/Trx 253cfd9d94a1cedfd2a35e605de18024dabb5004 |
View Raw JSON Data
{
"trx_id": "253cfd9d94a1cedfd2a35e605de18024dabb5004",
"block": 25066441,
"trx_in_block": 34,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-08-14T17:36:12",
"op": [
"claim_reward_balance",
{
"account": "vtce",
"reward_steem": "0.064 STEEM",
"reward_sbd": "0.000 SBD",
"reward_vests": "131.649971 VESTS"
}
]
}vtcereceived 0.064 STEEM, 0.081 SP author reward for @vtce / thumb-drive-network-deployments2018/08/13 16:40:15
vtcereceived 0.064 STEEM, 0.081 SP author reward for @vtce / thumb-drive-network-deployments
2018/08/13 16:40:15
| author | vtce |
| permlink | thumb-drive-network-deployments |
| sbd payout | 0.000 SBD |
| steem payout | 0.064 STEEM |
| vesting payout | 131.649971 VESTS |
| Transaction Info | Block #25036531/Virtual Operation #5 |
View Raw JSON Data
{
"trx_id": "0000000000000000000000000000000000000000",
"block": 25036531,
"trx_in_block": 4294967295,
"op_in_trx": 0,
"virtual_op": 5,
"timestamp": "2018-08-13T16:40:15",
"op": [
"author_reward",
{
"author": "vtce",
"permlink": "thumb-drive-network-deployments",
"sbd_payout": "0.000 SBD",
"steem_payout": "0.064 STEEM",
"vesting_payout": "131.649971 VESTS"
}
]
}2018/08/13 15:29:36
2018/08/13 15:29:36
| delegator | steem |
| delegatee | vtce |
| vesting shares | 16500.366766 VESTS |
| Transaction Info | Block #25035120/Trx 0f6a3f05bba9586ed66d3535bfd2c7d661c9e754 |
View Raw JSON Data
{
"trx_id": "0f6a3f05bba9586ed66d3535bfd2c7d661c9e754",
"block": 25035120,
"trx_in_block": 8,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-08-13T15:29:36",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "vtce",
"vesting_shares": "16500.366766 VESTS"
}
]
}vtceclaimed reward balance: 0.160 STEEM, 0.199 SP2018/08/13 13:32:06
vtceclaimed reward balance: 0.160 STEEM, 0.199 SP
2018/08/13 13:32:06
| account | vtce |
| reward steem | 0.160 STEEM |
| reward sbd | 0.000 SBD |
| reward vests | 324.099889 VESTS |
| Transaction Info | Block #25032772/Trx 1d84259be0939de8c22fef6c54c4f630f1072bd0 |
View Raw JSON Data
{
"trx_id": "1d84259be0939de8c22fef6c54c4f630f1072bd0",
"block": 25032772,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-08-13T13:32:06",
"op": [
"claim_reward_balance",
{
"account": "vtce",
"reward_steem": "0.160 STEEM",
"reward_sbd": "0.000 SBD",
"reward_vests": "324.099889 VESTS"
}
]
}vtcereceived 0.160 STEEM, 0.199 SP author reward for @vtce / apple-hits-usd1-trillion-market-cap-august-2-20182018/08/11 11:37:57
vtcereceived 0.160 STEEM, 0.199 SP author reward for @vtce / apple-hits-usd1-trillion-market-cap-august-2-2018
2018/08/11 11:37:57
| author | vtce |
| permlink | apple-hits-usd1-trillion-market-cap-august-2-2018 |
| sbd payout | 0.000 SBD |
| steem payout | 0.160 STEEM |
| vesting payout | 324.099889 VESTS |
| Transaction Info | Block #24972903/Virtual Operation #5 |
View Raw JSON Data
{
"trx_id": "0000000000000000000000000000000000000000",
"block": 24972903,
"trx_in_block": 4294967295,
"op_in_trx": 0,
"virtual_op": 5,
"timestamp": "2018-08-11T11:37:57",
"op": [
"author_reward",
{
"author": "vtce",
"permlink": "apple-hits-usd1-trillion-market-cap-august-2-2018",
"sbd_payout": "0.000 SBD",
"steem_payout": "0.160 STEEM",
"vesting_payout": "324.099889 VESTS"
}
]
}vtceupvoted (100.00%) @tomask-de / re-vtce-audio-analysis-grunge-rock-20180731t004056364z2018/08/08 11:40:12
vtceupvoted (100.00%) @tomask-de / re-vtce-audio-analysis-grunge-rock-20180731t004056364z
2018/08/08 11:40:12
| voter | vtce |
| author | tomask-de |
| permlink | re-vtce-audio-analysis-grunge-rock-20180731t004056364z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #24886593/Trx 207ca089997a9efd2e8600fd93cdba36ca7322ee |
View Raw JSON Data
{
"trx_id": "207ca089997a9efd2e8600fd93cdba36ca7322ee",
"block": 24886593,
"trx_in_block": 31,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-08-08T11:40:12",
"op": [
"vote",
{
"voter": "vtce",
"author": "tomask-de",
"permlink": "re-vtce-audio-analysis-grunge-rock-20180731t004056364z",
"weight": 10000
}
]
}vtceupvoted (100.00%) @vtce / thumb-drive-network-deployments2018/08/08 09:05:27
vtceupvoted (100.00%) @vtce / thumb-drive-network-deployments
2018/08/08 09:05:27
| voter | vtce |
| author | vtce |
| permlink | thumb-drive-network-deployments |
| weight | 10000 (100.00%) |
| Transaction Info | Block #24883503/Trx 39324e15b92355007b9aaa1fa813dceeb1f1c290 |
View Raw JSON Data
{
"trx_id": "39324e15b92355007b9aaa1fa813dceeb1f1c290",
"block": 24883503,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-08-08T09:05:27",
"op": [
"vote",
{
"voter": "vtce",
"author": "vtce",
"permlink": "thumb-drive-network-deployments",
"weight": 10000
}
]
}vtceupvoted (100.00%) @vtce / tips-to-survive-hacker-week-in-las-vegas2018/08/08 09:05:15
vtceupvoted (100.00%) @vtce / tips-to-survive-hacker-week-in-las-vegas
2018/08/08 09:05:15
| voter | vtce |
| author | vtce |
| permlink | tips-to-survive-hacker-week-in-las-vegas |
| weight | 10000 (100.00%) |
| Transaction Info | Block #24883499/Trx 9bc55a11ffd81744495aa84ffa57a06af8fd4255 |
View Raw JSON Data
{
"trx_id": "9bc55a11ffd81744495aa84ffa57a06af8fd4255",
"block": 24883499,
"trx_in_block": 22,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-08-08T09:05:15",
"op": [
"vote",
{
"voter": "vtce",
"author": "vtce",
"permlink": "tips-to-survive-hacker-week-in-las-vegas",
"weight": 10000
}
]
}vtcepublished a new post: tips-to-survive-hacker-week-in-las-vegas2018/08/08 09:05:03
vtcepublished a new post: tips-to-survive-hacker-week-in-las-vegas
2018/08/08 09:05:03
| parent author | |
| parent permlink | cybersecurity |
| author | vtce |
| permlink | tips-to-survive-hacker-week-in-las-vegas |
| title | Tips To Survive Hacker Week In Las Vegas |
| body | <center></center> If you are coming to attend DEFCON, BSidesLV or the Black Hat Conference, always be alert and prepared. Thousands of hackers will be around, it's like swimming in the kiddie pool with sharks. During the last week of July or first week of August, it is usually "Hacker Week" in Las Vegas. It is summer, the city is full of tourists and people just getting out and enjoying the attractions on the "strip". Unsuspectingly not knowing that there are "hackers" all around at this time of the year. There is no need to spread fear, but more about awareness. These are some things to watch out for during the most "dangerous" week in Vegas. Common sense is mostly needed of course and these tips might help. <i>It starts at the parking lot</i> Watch out for "SARA", she may be a beauty but looks can be deceiving. SARA is the "Signal Amplification Relay Attack". The signal from a car key fob can be intercepted without the car owner being aware. The signal is then copied to a special device that will then use that signal to break into the owner's car. This exploit seems easy enough to carry out, but it only affects certain car models. Here are some car models affected: https://www.forbes.com/sites/thomasbrewster/2016/03/21/audi-bmw-ford-thief-car-hacking/#2cccd9514f1e Best defense against this is to shield the key fob with a special pouch called an anti-theft Faraday Cage (like wrapping it in foil). Most car key fobs are now protected by encrypted signals which will foil any attempt to copy the signal unless your car model is on the list of vulnerable cars. Another way is to attend the conferences by bus, taxi or ride sharing service. That way you don't have to worry about paid parking or even finding a spot to park at. <i>Watch or lock your valuables in your hotel room, always</i> So you check into your hotel room. First thing to do is use the hotel provided safe or vault if there is one available inside the room. Put all personal belongings you will not bring with you inside the safe. Avoid the "Evil Maid" exploit, which can actually happen. If you have plenty of personal items of value, this can attract thieves, not just hackers. For mobile and electronic devices, best to keep them or store in a safe place with a pad lock. If your devices contain sensitive information, use tracking on them like with Apple's Find My iPhone app. Another way to prevent information theft is encrypting your storage device. It is best to use strong passwords on these devices too in order to prevent easy access should they end up in the wrong hands. <i>If you don't need to use your smartphone, shut it off</i> You may have heard stories of an Android or iOS smartphone getting hacked. It is possible when the smartphone uses WiFi. During hacker week, hundreds of WiFi access points will be available, but some will be for malicious purposes. How to spot them, well, it is suspicious if the access point is not encrypted and there is no password to join. Some WiFi access points will pretend to be legit by using a common name. Problem is if your devices, smartphone or laptop are set to automatically connect to the network they may just access that rogue WiFi access point. Another new trick discovered is the "IMSI Catcher". This is a fake cellular tower that gathers IMSI signals from smartphones and other connected devices. If your IMSI information is compromised, this allows hackers to eavesdrop on your calls and capture data coming from your smartphone. If you are not on a call or checking important things on your smartphone, just put it in airplane mode. This shuts off all access to your smartphone, lessening the attack vectors. The NFC, bluetooth, LTE and WiFi are all disabled. This means your smartphone will not be accessible to others. To make sure it is probably best to just turn it off. <i>Use a VPN or Tor when browsing </i> So you got the guest WiFi access from the legit conference organizers, assuming that they are. Who knows though, right? It is best to use a VPN or Tor browser to hide your tracks. If your WiFi access goes through a rogue system, they can track all your whereabouts like websites you visit and even attempt to capture your encrypted data traffic and brute force it to get your data. The benefits of a VPN is that you are going through a more private network which is not only encrypted but hides where you are going. <i>Keep an eye out for "social engineers"</i> These are not friendly "White Hats" who come in peace to greet you. These are more likely "Black Hats" who will work on your emotions to get what they want ... which is your information. They may be after identity, valuables or digital data. One of the oldest tricks in the book is someone pretending that their smartphone battery died and they will ask to borrow your phone to make an emergency call. Couldn't they just go to the hotel lobby to do that? The person could use your phone for more devious purposes. Other times it is fake brand ambassadors who may try to phish information. Be careful about signing forms that ask for really personal information, like social security. Why would they need your social for a 3 day room special package offer? Those are the questions to ask. So don't be too kind a stranger if you can help it. <i>Pity the fool who leaves their stuff laying around</i> There is no excuse for leaving a laptop unattended while going to the rest room. This gives hackers an opportunity to get on your system directly. They can also plant malware by sticking a thumb drive into your USB port. Even worse a bad actor can use a USB Killer to destroy your laptop's USB port. If not, then they can open your unprotected screen and browse your documents while you are away. If you do plan to go to the rest room quickly, then lock your screen and make sure it is password protected. The most obvious reason why to not leave your laptop is because someone can just walk up and steal it. It is best to use the kensington lock if available to chain your laptop to a table or chair. Take your laptop with you always. <i>Cashless is not a good idea</i> Using an ATM in hacker infested territory may not be a good idea. As precaution, bring cash. Some credit cards also emit an RFID signal. Keep cards using a shielded wallet or use an unorthodox trick like wrapping your wallet with aluminum foil. This helps to prevent RFID signals from leaking which hackers can intercept and use. It won't look stylish, though you can start the trend, but it does help to block signals. Wrapping a smartphone with foil also works, but it is probably best to just shut it off. <i>Finally, avoid the Wall Of Sheep, AMAP</i> If your e-mail gets posted on the "Wall of Sheep", "congratulations". Disclaimer: This information is given as reference only. Always do your own research to verify facts. |
| json metadata | {"tags":["cybersecurity","lasvegas","hackers","defcon","blackhat"],"image":["https://cdn.steemitimages.com/DQmbEasjAjkTQqvmt3gWnoUYf1y2b9HBHLUezASJ9yi7mZi/Screen%20Shot%202018-08-07%20at%209.47.12%20AM.png"],"links":["https://www.forbes.com/sites/thomasbrewster/2016/03/21/audi-bmw-ford-thief-car-hacking/#2cccd9514f1e"],"app":"steemit/0.1","format":"markdown"} |
| Transaction Info | Block #24883495/Trx 1c6f6e164c322eda3318023208d13ef83394ac40 |
View Raw JSON Data
{
"trx_id": "1c6f6e164c322eda3318023208d13ef83394ac40",
"block": 24883495,
"trx_in_block": 32,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-08-08T09:05:03",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "cybersecurity",
"author": "vtce",
"permlink": "tips-to-survive-hacker-week-in-las-vegas",
"title": "Tips To Survive Hacker Week In Las Vegas",
"body": "<center></center>\n\nIf you are coming to attend DEFCON, BSidesLV or the Black Hat Conference, always be alert and prepared. Thousands of hackers will be around, it's like swimming in the kiddie pool with sharks. During the last week of July or first week of August, it is usually \"Hacker Week\" in Las Vegas. It is summer, the city is full of tourists and people just getting out and enjoying the attractions on the \"strip\". Unsuspectingly not knowing that there are \"hackers\" all around at this time of the year. There is no need to spread fear, but more about awareness. These are some things to watch out for during the most \"dangerous\" week in Vegas. Common sense is mostly needed of course and these tips might help.\n\n<i>It starts at the parking lot</i>\n\nWatch out for \"SARA\", she may be a beauty but looks can be deceiving. SARA is the \"Signal Amplification Relay Attack\". The signal from a car key fob can be intercepted without the car owner being aware. The signal is then copied to a special device that will then use that signal to break into the owner's car. This exploit seems easy enough to carry out, but it only affects certain car models. Here are some car models affected:\n\nhttps://www.forbes.com/sites/thomasbrewster/2016/03/21/audi-bmw-ford-thief-car-hacking/#2cccd9514f1e\n\nBest defense against this is to shield the key fob with a special pouch called an anti-theft Faraday Cage (like wrapping it in foil). Most car key fobs are now protected by encrypted signals which will foil any attempt to copy the signal unless your car model is on the list of vulnerable cars. Another way is to attend the conferences by bus, taxi or ride sharing service. That way you don't have to worry about paid parking or even finding a spot to park at.\n\n<i>Watch or lock your valuables in your hotel room, always</i>\n\nSo you check into your hotel room. First thing to do is use the hotel provided safe or vault if there is one available inside the room. Put all personal belongings you will not bring with you inside the safe. Avoid the \"Evil Maid\" exploit, which can actually happen. If you have plenty of personal items of value, this can attract thieves, not just hackers. For mobile and electronic devices, best to keep them or store in a safe place with a pad lock. If your devices contain sensitive information, use tracking on them like with Apple's Find My iPhone app. Another way to prevent information theft is encrypting your storage device. It is best to use strong passwords on these devices too in order to prevent easy access should they end up in the wrong hands.\n\n<i>If you don't need to use your smartphone, shut it off</i>\n\nYou may have heard stories of an Android or iOS smartphone getting hacked. It is possible when the smartphone uses WiFi. During hacker week, hundreds of WiFi access points will be available, but some will be for malicious purposes. How to spot them, well, it is suspicious if the access point is not encrypted and there is no password to join. Some WiFi access points will pretend to be legit by using a common name. Problem is if your devices, smartphone or laptop are set to automatically connect to the network they may just access that rogue WiFi access point.\n\nAnother new trick discovered is the \"IMSI Catcher\". This is a fake cellular tower that gathers IMSI signals from smartphones and other connected devices. If your IMSI information is compromised, this allows hackers to eavesdrop on your calls and capture data coming from your smartphone.\n\nIf you are not on a call or checking important things on your smartphone, just put it in airplane mode. This shuts off all access to your smartphone, lessening the attack vectors. The NFC, bluetooth, LTE and WiFi are all disabled. This means your smartphone will not be accessible to others. To make sure it is probably best to just turn it off.\n\n<i>Use a VPN or Tor when browsing </i>\n\nSo you got the guest WiFi access from the legit conference organizers, assuming that they are. Who knows though, right? It is best to use a VPN or Tor browser to hide your tracks. If your WiFi access goes through a rogue system, they can track all your whereabouts like websites you visit and even attempt to capture your encrypted data traffic and brute force it to get your data. The benefits of a VPN is that you are going through a more private network which is not only encrypted but hides where you are going. \n\n<i>Keep an eye out for \"social engineers\"</i>\n\nThese are not friendly \"White Hats\" who come in peace to greet you. These are more likely \"Black Hats\" who will work on your emotions to get what they want ... which is your information. They may be after identity, valuables or digital data. One of the oldest tricks in the book is someone pretending that their smartphone battery died and they will ask to borrow your phone to make an emergency call. Couldn't they just go to the hotel lobby to do that? The person could use your phone for more devious purposes. Other times it is fake brand ambassadors who may try to phish information. Be careful about signing forms that ask for really personal information, like social security. Why would they need your social for a 3 day room special package offer? Those are the questions to ask. So don't be too kind a stranger if you can help it. \n\n<i>Pity the fool who leaves their stuff laying around</i>\n\nThere is no excuse for leaving a laptop unattended while going to the rest room. This gives hackers an opportunity to get on your system directly. They can also plant malware by sticking a thumb drive into your USB port. Even worse a bad actor can use a USB Killer to destroy your laptop's USB port. If not, then they can open your unprotected screen and browse your documents while you are away. If you do plan to go to the rest room quickly, then lock your screen and make sure it is password protected. The most obvious reason why to not leave your laptop is because someone can just walk up and steal it. It is best to use the kensington lock if available to chain your laptop to a table or chair. Take your laptop with you always.\n\n<i>Cashless is not a good idea</i>\n\nUsing an ATM in hacker infested territory may not be a good idea. As precaution, bring cash. Some credit cards also emit an RFID signal. Keep cards using a shielded wallet or use an unorthodox trick like wrapping your wallet with aluminum foil. This helps to prevent RFID signals from leaking which hackers can intercept and use. It won't look stylish, though you can start the trend, but it does help to block signals. Wrapping a smartphone with foil also works, but it is probably best to just shut it off.\n\n<i>Finally, avoid the Wall Of Sheep, AMAP</i>\n\nIf your e-mail gets posted on the \"Wall of Sheep\", \"congratulations\". \n\nDisclaimer: This information is given as reference only. Always do your own research to verify facts.",
"json_metadata": "{\"tags\":[\"cybersecurity\",\"lasvegas\",\"hackers\",\"defcon\",\"blackhat\"],\"image\":[\"https://cdn.steemitimages.com/DQmbEasjAjkTQqvmt3gWnoUYf1y2b9HBHLUezASJ9yi7mZi/Screen%20Shot%202018-08-07%20at%209.47.12%20AM.png\"],\"links\":[\"https://www.forbes.com/sites/thomasbrewster/2016/03/21/audi-bmw-ford-thief-car-hacking/#2cccd9514f1e\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
}
]
}2018/08/08 06:26:39
2018/08/08 06:26:39
| delegator | steem |
| delegatee | vtce |
| vesting shares | 16833.225775 VESTS |
| Transaction Info | Block #24880329/Trx 5eddedd417cff1531e2a647b20332da3c1e637fe |
View Raw JSON Data
{
"trx_id": "5eddedd417cff1531e2a647b20332da3c1e637fe",
"block": 24880329,
"trx_in_block": 13,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-08-08T06:26:39",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "vtce",
"vesting_shares": "16833.225775 VESTS"
}
]
}vtcepublished a new post: tips-to-survive-hacker-week-in-las-vegas2018/08/07 17:55:33
vtcepublished a new post: tips-to-survive-hacker-week-in-las-vegas
2018/08/07 17:55:33
| parent author | |
| parent permlink | cybersecurity |
| author | vtce |
| permlink | tips-to-survive-hacker-week-in-las-vegas |
| title | Tips To Survive Hacker Week In Las Vegas |
| body | @@ -1563,16 +1563,43 @@ day Cage + (like wrapping it in foil) . Most c |
| json metadata | {"tags":["cybersecurity","infosec","hackers","defcon","blackhat"],"image":["https://cdn.steemitimages.com/DQmbEasjAjkTQqvmt3gWnoUYf1y2b9HBHLUezASJ9yi7mZi/Screen%20Shot%202018-08-07%20at%209.47.12%20AM.png"],"links":["https://www.forbes.com/sites/thomasbrewster/2016/03/21/audi-bmw-ford-thief-car-hacking/#2cccd9514f1e"],"app":"steemit/0.1","format":"markdown"} |
| Transaction Info | Block #24865310/Trx 4397808a2f3fc6eae304a100bfea0120bf9f6c2c |
View Raw JSON Data
{
"trx_id": "4397808a2f3fc6eae304a100bfea0120bf9f6c2c",
"block": 24865310,
"trx_in_block": 10,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2018-08-07T17:55:33",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "cybersecurity",
"author": "vtce",
"permlink": "tips-to-survive-hacker-week-in-las-vegas",
"title": "Tips To Survive Hacker Week In Las Vegas",
"body": "@@ -1563,16 +1563,43 @@\n day Cage\n+ (like wrapping it in foil)\n . Most c\n",
"json_metadata": "{\"tags\":[\"cybersecurity\",\"infosec\",\"hackers\",\"defcon\",\"blackhat\"],\"image\":[\"https://cdn.steemitimages.com/DQmbEasjAjkTQqvmt3gWnoUYf1y2b9HBHLUezASJ9yi7mZi/Screen%20Shot%202018-08-07%20at%209.47.12%20AM.png\"],\"links\":[\"https://www.forbes.com/sites/thomasbrewster/2016/03/21/audi-bmw-ford-thief-car-hacking/#2cccd9514f1e\"],\"app\":\"steemit/0.1\",\"format\":\"markdown\"}"
}
]
}Manabar
Voting Power100.00%
Downvote Power100.00%
Resource Credits100.00%
Reputation Progress34.12%
{
"voting_manabar": {
"current_mana": "14715698710",
"last_update_time": 1588958340
},
"downvote_manabar": {
"current_mana": 3678924677,
"last_update_time": 1588958340
},
"rc_account": {
"account": "vtce",
"rc_manabar": {
"current_mana": "16683143900",
"last_update_time": 1663040760
},
"max_rc_creation_adjustment": {
"amount": "2020748973",
"precision": 6,
"nai": "@@000000037"
},
"max_rc": "16736447683"
}
}Account Metadata
| POSTING JSON METADATA | |
| profile | {"name":"VTCE","about":"Cryptocurrency, Computing, Technology, History - \"Decentralize The Net\""} |
| JSON METADATA | |
| profile | {"name":"VTCE","about":"Cryptocurrency, Computing, Technology, History - \"Decentralize The Net\""} |
{
"posting_json_metadata": {
"profile": {
"name": "VTCE",
"about": "Cryptocurrency, Computing, Technology, History - \"Decentralize The Net\""
}
},
"json_metadata": {
"profile": {
"name": "VTCE",
"about": "Cryptocurrency, Computing, Technology, History - \"Decentralize The Net\""
}
}
}Auth Keys
Owner
Single Signature
Public Keys
STM6WiMupyNf1MSkcvK3nW3u3HzCeJL32ZMz6r1CbsYMoViBis55R1/1
Active
Single Signature
Public Keys
STM5J4j5EuyUzy4GnjjpPVsBvuMCSahMz8auvjutz7TKbmXZPNZKe1/1
Posting
Single Signature
Public Keys
STM6FyFAUQqa3qFF11d1omzd5AGrBhxya7R6kvf8pbgr12iBShgdH1/1
App Permissions
@dtube.app1/1
Memo
STM8LnKxUn5H5oSnac8ZGghU3AD3zGEkFmkc4mz5dMYZLjassJW62
{
"owner": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM6WiMupyNf1MSkcvK3nW3u3HzCeJL32ZMz6r1CbsYMoViBis55R",
1
]
]
},
"active": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5J4j5EuyUzy4GnjjpPVsBvuMCSahMz8auvjutz7TKbmXZPNZKe",
1
]
]
},
"posting": {
"weight_threshold": 1,
"account_auths": [
[
"dtube.app",
1
]
],
"key_auths": [
[
"STM6FyFAUQqa3qFF11d1omzd5AGrBhxya7R6kvf8pbgr12iBShgdH",
1
]
]
},
"memo": "STM8LnKxUn5H5oSnac8ZGghU3AD3zGEkFmkc4mz5dMYZLjassJW62"
}Witness Votes
0 / 30
No active witness votes.
[]