Monero
From the Twitter Hackers to Not Your Keyser, Not Your Coins – Cointelegraph Magazine
Published
4 Monaten agoon
By
The high-profile Twitter hack — which saw malicious actors take over 130 verified accounts including Bill Gates and Elon Musk — managed to be both technically brilliant and incomprehensibly stupid at the same time.
It was a multi-person attack, deep inside the company’s infrastructure, using sophisticated social engineering to defeat 2FA-protected accounts.
But while the hackers were smart enough to defeat Twitter’s security, trawling through the internal Slack messaging system to unlock ever greater levels of access, they ultimately failed. Miserably.
Instead of, say, using Musk’s account to send Tesla market FUD to tank the stock price (and make millions shorting it) the hackers instead sold access to various accounts on the darknet for a few magic beans to some vanity-handle clowns, and then spammed out a two-for-one Bitcoin giveaway scam, netting a paltry $117,000.
And then they got caught.
“It doesn’t make sense as far as the sophistication of the attack,” says Dave Jevans, CEO of CipherTrace. “The actual scam was ridiculous.”
Rather than an elite group of high-level professionals, the ringleaders were a bunch of teenagers and 20-somethings who’d stumbled upon Twitter’s God Mode but had no idea what to do with it. The FBI tracked them down thanks to a series of total noob mistakes, including using their home WiFi without a VPN, and trying to cash out stolen Bitcoin using Coinbase accounts verified with their real drivers licenses.
It turns out that just like ordinary criminals, some technically adept cyber criminals can act like bumbling goons too.
Cleverness not required
Alex Lazarenko, Group-IB’s Head of R&D says that being clever is not a prerequisite of hacking into many crypto exchanges, which can have worse cybersecurity than non-finance companies.
“From our experience with our clients they are pretty bad with security,” Lazarenko explains in his thick Russian accent.
“There are not so many sophisticated attacks because the industry is not very much secure in terms of cyber security. A lot of people are getting into trouble with cryptocurrency because of simple mistakes.”
Most cryptocurrency scams don’t involve a crack team of hackers pulling off some ingenious and unique multi-level con — instead they just dust off hoary old scams and dress them up with a thin veneer of technobabble about ‘high yield investments’ and ‘sophisticated trading algorithms’.
“There’s nothing much new under the sun,” says Michael Cohen, Vice President of Operations at MyChargeBack, an American company that deals with retail crypto crimes. “You don’t have to be Dr Evil to scam someone via cryptocurrency. You can be a Mini Me.”
Scammers and thieves love crypto because there’s a perception that there’s no central authority to complain to, no way to reverse transactions, and the funds are difficult to trace. (In truth, most on-chain transactions are far from anonymous, and their traceability is often a boon to law enforcement.)
But cryptocurrency’s complexity means that even some of the smartest people can fall victim to their dumb tricks.
“The common denominator of all of them is a tremendous amount of inexperience on the side of the consumer,” says Cohen.
“You could have doctors, lawyers, investment CFOs, government officials. We see there’s no delineation between someone’s professionalism and education and the susceptibility to these types of scams.”
So how smart do you have to be to pull off various types of crypto crimes?
The Scam: Say Hello To My Little Friend
Criminal sophistication level: Grunts and goons.
Crypto extortion is a crude and unpleasant crime. At its most basic this involves a man with a shotgun bursting into your apartment demanding the passcode to your Bitcoin wallet.
Crude attacks can be defeated with similarly crude countermeasures however, and when this exact situation happened to a Norwegian crypto millionaire last year, he vaulted over the balcony of his second-floor apartment and escaped.
In a bizarre spin on the practice, The New York Times reported a group of men had ransacked the New York apartment of a man named Nicholas Truglia, and held his head underwater demanding his crypto logins. But it turned out that Truglia had made up the story, and in doing so he’d sparked an investigation by the police into his unexplained crypto wealth.
He was unmasked as The Bitcoin Bandit, the ringleader of a 25-person SIM swap gang, and ordered to pay $74.8 million in compensation to Michael Terpin, an investor in multiple ICOs and head of a blockchain marketing group.
The Scam: Show Me The Money
Criminal sophistication level: Dumb as a stump.
The oldest scam in the world is convincing people to hand over money now, with the promise of getting more money later.
‘Bitcoin giveaways’ on Twitter trade on this principle and have been at plague proportions for years. For a slightly more sophisticated example, head on over to YouTube on any given day and you’ll find tens of thousands of people watching a ‘live broadcast’ from someone posing as Ripple or SpaceX to promote the scam.
It’s lent credibility by screening on what appears to be a verified channel with hundreds of thousands of followers. Scammers typically use phishing emails to get a password to take over a gaming nerd’s verified channel. They then change the name from ‘Bob’s Gaming Channel’ to ‘Ripple’, and start screening old footage as ‘live’ to attract viewers. Both Ripple and Steve Wozniak have launched lawsuits against YouTube over the practice.
The Scam: We’re Not In Kansas Anymore
Criminal sophistication level: basic comprehension of Rock, Paper, Scissors
Moving up the scale, we begin to find crimes that require a modicum of technical ability. One method scammers use to steal passwords is to clone exchange websites to fool victims into entering their details.
The trick here is to use a domain name that looks identical to the real one, but isn’t, thanks to a ‘homograph attack’. This takes advantage of the fact that various letters in alphabets like Cyrillic and Greek look virtually identical to English.
In 2018, scammers set up a fake Binance site, complete with a reassuring looking padlock next to the address denoting an SSL certificate. But the letter ‘n’ had been replaced with a version that included an underdot (ṇ). Scammers pulled a similar trick by replacing the ‘r’ in Bittrex with one that included a cedilla (ŗ) which looks like a comma.
Once every couple of months Ledger is forced to put out another warning of a malicious browser extension pretending to be Ledger, seeking to trick users into entering their seed phrase. At one crypto conference in 2017 scammers went so far as to distribute fake Trezor and Ledger hardware wallets so they could later steal funds users deposited.
There are also simple malware programs devoted to diverting your funds to scammers — one Trojan called CryptoShuffler affects the cut and paste function, so that each time you ‘cut’ a wallet address, it pastes in the scammer’s destination address instead.
The Scam: I Know What You Did Last Summer
Criminal sophistication level: knows not to iron a shirt while wearing it.
Sextortion is where victims receive a personally addressed email from attackers who claim to have hacked their webcam and recorded them masturbating, demanding payment not to release the footage.
“They’re not spamming,” says Jevans. “They actually do have your name and they do have your email address. That’s why they’re convincing.”
SIM swapping involves a social engineering attack, whereby criminals contact a victim’s telecom provider purporting to be them in order to trick support staff to forward the victim’s number to a phone the hacker controls. This allows attackers to intercept two factor authentication text messages to steal crypto.
While phone providers have protocols to stop this happening, these are often easily circumvented, as hacker ‘Daniel’ told the online publication Trijo last year: “There are always ways to convince. For example, that you call and pretend to work at Tele2 (a Swedish telecom company) and ask them to help you forward a number. It does not take many calls before you have learned to pretend.”
The Scam: You Had Me At Hello
Criminal sophistication level: smarter than the average bear.
Tricking people into handing over money can be as easy as sending a few emails. In 2014, a hacker gained access to the email of an executive at BTC Media, which was in business negotiations at the time with Bitpay Exchange, and tricked Bitpay’s CFO Bryan Krohn into filling out his corporate email information on a Google doc.
This gave the attacker access to Bitpay’s internal systems, where they discovered that the exchange would provide Bitcoin upfront to SecondMarket with an agreement to pay later. The attacker then emailed Bitpay’s CEO from Krohn’s account, instructing him to send 5000 Bitcoin to ‘SecondMarket’… which was of course just the hacker’s wallet.
Bitpay lost $1.8 million and their insurance wouldn’t cover the loss as there technically was never a ‘hack’.
“The simplest attack is the best one you can do,” says Jevans. “There are still very simple attacks that can make you hundreds of millions of dollars a year by sending the right email to the right person at the right time.”
Cohen has noticed a big uptick this year in crypto scammers contacting victims via Tinder on dating sites.
“They enter into a quasi-relationship and show a screenshot ‘oh, this is my account, I do day trading,’ he says. “It’s kind of a honeypot, they bring them in that way. They log into their trading account and see $100,000.”
“Suddenly the person has forked over $50,000 via cryptocurrency after being baited into this online ‘trading’ enterprise.”
The Scam: Always Be Closing
Criminal sophistication level: Ties own laces, buttons own shirt… but thinks Fibonacci is one of the Three Tenors
Many crypto investment schemes turn out to be dressed up Ponzi schemes – named after Charles Ponzi, who came up with a legitimate arbitrage scheme initially, but then started to use the funds from new investors to pay ‘returns’ to existing investors and himself.
Cryptocurrency is the perfect disguise for Ponzis because a) it’s complicated and b) people really do get rich from crypto. Right now three of the top five biggest gas guzzlers on Ethereum are suspected Ponzi schemes.
“Back in the day before Bitcoin and other things were big, these scams were making a few hundred or thousand million dollars,” explains Jevans. “Now you look at things like Plus Token. These things have escalated with the ability to transfer money globally.
The PlusToken scammers made off with $3 billion by offering high returns to investors who thought they were funding the ‘development’ of an exchange and wallet. OneCoin brought in $4 billion with crypto mining and selling trader training material. Bitconnect was a ‘lending platform’ offering 1% interest per day for Bitcoin that hit a $2.6 billion market cap.
Even QuadrigaCX – whose founder famously died* suddenly with the only passcode to the exchange’s crypto wallet – turned out to be a collapsed Ponzi.
Off the shelf Ponzis
Despite the vast sums involved, Ponzis aren’t hard to set up. You can buy software to run a professional looking Ponzi scheme for a couple of thousand dollars on the web, hire a handful of people to do marketing, social media and answer the odd customer enquiries, and you’re up and running.
“(For) a billion-dollar scam, you don’t need that many people,” says Jevans. “You could probably do the whole thing with 10 people and a million dollars. Laundering the money however requires the services of professionals. “Behind the scenes they are very intelligent, you have to be very savvy, there’s no question about that,” he says.
“Here’s the thing I was once told,” says Jevans. “There’s no point stealing $10,000 and there’s no point stealing $10 million dollars.”
“Steal $100 million dollars because then you can afford the best lawyers and you’ll only do five years in jail and you walk out with $90 million. You only have to do it once and then you’re done.”
Ransomware is another game that anyone can play using software bought on the darknet.
“Ransomware isn’t a highly innovative field,” explains Fabian Wosar, the Chief Technology Officer for Emsisoft, which provides anti-ransomware tools. “The vast majority, if not all, of the attacks, use off-the-shelf attack toolkits.”
The Scam: I’m Gonna Make Him An Offer He Can’t Refuse
Criminal sophistication level: solves Rubik’s Cube with their eyes closed.
But while ransomware attacks can be carried out by bored high school kids, most of the real money is made by sophisticated, well-funded ransomware gangs. A gang called REvil came to mainstream attention this year after crippling Travelex for weeks with an attack on New Year’s Eve. The company eventually paid 285 Bitcoin.
The latest twist involves stealing confidential files during the attack and threatening to release them in order to ramp up the pressure to pay the ransom. When REvil stole the private legal secrets of celebs including Elton John, Robert DeNiro, Madonna from a New York law firm, they released 2GB of Lady Gaga’s file The firm still refused to pay, so REvil made their money auctioning off 756 GB of celebrities’ data on the darknet for Monero.
“They are technically sophisticated and where you can see just looking at the code that the people behind them have a great deal of software engineering experience and attention to detail,” says Wosar.
State-sponsored cybercriminals
Sitting near the top of the tree are North Korea’s hacking gangs. Crypto is the perfect way to evade crippling financial sanctions, and these hackers are state-backed professionals who face significant penalties for failure. There are tertiary-education training courses for DPRK hackers at Kim Chaek University of Technology and Kim Il-sung University. In 2018, it was estimated that North Korean hackers are responsible for more than 65% of all stolen crypto: They’re believed to have stolen at least $2 billion of cryptocurrency.
“Guys like the North Koreans — state sponsored cybercriminal gangs — they are the most well-resourced and sophisticated,” says Lazarenko. “Regular cyber-criminal gangs are just stealing money but those guys have other things to do than just stealing money.”
Jevans says North Korean gangs are the most sophisticated in terms of target choice, techniques and surveillance.
“We’ve seen them steal $250 million from one exchange in a swoop,” he says. “They’re attacking inside, targeting the employees and IT systems, breaking in, looking for vulnerabilities, figuring how the hot wallets work, the cold wallets, and then using those private keys to move large amounts out. We have evidence they’re doing infiltration into exchanges and sitting there waiting to do surveillance.”
Building a bot
The Lazarus Group’s March 2019 attack on the DragonEx exchange that netted $7 million is a good example of the lengths they’ll go to. The hackers set up a fake LinkedIn profile for ‘Gabe Frank’, the supposed CTO of a wallet company called WFC Proof and used the account to connect with DragonEx executives.
To lend the ruse legitimacy, they created a slick website for WFC and a social media presence for the company’s non-existent employees. They even built a working crypto trading bot for the DragonEx executives to play with. Of course, the bot was really just the delivery vector for malware to steal the private keys from users and the exchange’s cold wallet.

The Scam: And Like That… He’s Gone.
Criminal sophistication level: the greatest trick the Devil ever pulled…
But the cleverest and most ingenious crypto crimes are so technical and complex they sail over the heads of many people.
Even the experts are scratching their heads over an incident in June when two small value Ethereum transactions were sent with a combined gas fee of $5.2 million. Various people including Ethereum co-founder Vitalik Buterin have suggested that hackers had gained partial control of an exchange’s funds, and were wasting millions on gas fees as leverage to force the exchange to pay a ransom. But Jevans isn’t so sure about that. “A technical attack is finding, for example, a smart contract that has vulnerabilities and exploiting them,” he says. “So that to me looked like the fallout of a technical attack.”
Lazarenko divides this category of crime into smart contract vulnerabilities, and source code vulnerabilities — where a flaw is exploited in software that runs the front end, or the server. An example of the latter saw Poloniex lose more than 12.3% of its Bitcoin in 2014. Owner Tristan D’Agosta explained at the time:
“The hacker discovered that if you place several withdrawals all in practically the same instant, they will get processed at more or less the same time. This will result in a negative balance, but valid insertions into the database, which then get picked up by the withdrawal daemon.”
But even source code exploits are old hat to Lazarneko, who reserves his admiration for blockchain specific smart contract exploits.
“A lot of old-fashioned ways of hacking into something works pretty well with cryptocurrency exchanges, like phishing, social engineering attacks. Nothing really new,” Lazerenko explains. “But with smart contracts vulnerabilities we can see a lot of new things going on because you have to use specific features of blockchains.”
DAO to DeFi
The most famous example of a smart contract exploit was the 2016 DAO hack. One of the creators of the DAO Stephan Tual actually identified the ‘recursive call bug’ a few days before it was used to drain 3.6 million Ether.
There have been a wave of attacks this year on DeFi projects including dForce/LendF.me, Uniswap, Maker and Opyn — which exploited a similar bug to The DAO attack. With some of the incidents it’s debatable whether these are even thefts or hacks, because the attacker is still playing by the (albeit badly drafted) rules. For example, in the bZx exploit in February, a very clever person was able to leverage the complexities in the ways DeFi protocols interact to make $318,000 in ETH. The person:
- Took out a loan for 10,000 ETH from dYdX.
- Used 5,500 ETH to collateralize a 112 wrapped Bitcoin loan on Compound.
- Used 1,300 ETH to open a 5x leveraged position on the ETH/BTC pair on bZx’s Fulcrum trading platform.
- Borrowed 5,637 ETH through Kyber’s Uniswap and swapped them for 51 WBTC, causing large slippage.
- Swapped the 112 WBTC from Compound to 6,671 ETH, resulting in a profit of 1,193 ETH.
- Repaid the 10,000 ETH loan on dYdX.
“It’s also a philosophical question: is that a vulnerability or not,” asks Lazarenko, “because … source code is the law and if the source code allows you to do something then you can do that.”
The biggest hack that will ever happen
Lazarenko says the example of the DAO – where even Buterin missed the bug when auditing the code — means that it’s conceivable that in future hackers could take down the ultimate target: an entire blockchain platform. While blockchain itself can’t be hacked he explains, “You have source code which is managing this, which manages the operations of miners which manages the operation of the peer to peer network,” he says.
“The biggest hack that will happen is when somebody can bring down a blockchain platform like Ethereum.”
You may like
-
Bitcoin, Bank Coins and Bonds, feat. George Goncalves
-
Exmo hackers withdraw part of stolen funds via Poloniex, exchange confirms
-
Crypto Twitter is celebrating Christmas with a new Bitcoin milestone
-
Launching crypto into orbit – Cointelegraph Magazine
-
Twitter loses its mind over rapper’s ‘$1M Bitcoin giveaway’ … worth $11 each
-
Former CEOs grapple with DAO governance – Cointelegraph Magazine
December is proving to be another blockbuster month for Bitcoin as the flow of institutional investors injecting funds into Bitcoin continues to increase.
Business intelligence firm MicroStrategy announced that it had raised $650 million worth of convertible bonds at a rate of 0.75% due in 2025. The company now plans to invest the net proceeds in Bitcoin after identifying its “working capital needs and other general corporate purposes.”
When institutional investors show such a large appetite to buy Bitcoin (BTC) near the all-time high, it is no surprise that the corrections have been shallow.
Tyler Winklevoss said in a recent interview with CNBC that institutional investors are worried about the “oncoming inflation and the scourge of inflation with all the money printing and the stimulus from the COVID pandemic lockdowns.” Hence, they have been putting money into Bitcoin.
Today, Bitcoin price surged back above the $19,000 level and it may challenge the psychological $20,000 resistance. If this level is broken out with conviction, it may create FOMO among retail traders as many have not participated in the current rally.
If money from retail investors also starts gushing in, then Bitcoin could pick up momentum and start the next leg of the up-move.
Along with Bitcoin, there are a few altcoins that may participate in the up-move next week. Let’s study the charts of the top-5 cryptocurrencies in order to spot the critical support and resistance levels to watch out for.
BTC/USD
Bitcoin closed below the 20-day exponential moving average ($18,435) on Dec. 10 and 11. However, the long tail on the Dec. 11 candlestick shows that the bulls purchased the dip instead of panicking and dumping their positions.

The price rose above the 20-day EMA on Dec. 12 and this could have trapped some aggressive bears who went short in the past few days expecting a sharp fall. This short covering and buying by the bulls pushed the price above the descending channel today.
The price has again reached the $19,500 to $20,000 overhead resistance zone. If the bulls can thrust the price above this zone, the next leg of the uptrend could begin.
Conversely, if the price again turns down sharply from the current levels and plummets below $17,500, it could signal that a short-term top is in place. Such a move could pull the price down to the next support at $16,191.02.
The 20-day EMA has started to turn up and the relative strength index (RSI) has rebounded off the 50 level, which suggests that bulls have the upper hand.

The 4-hour chart shows an ascending triangle formation, which will complete on a breakout and close above the overhead resistance zone. This setup has a target objective of $23,576.
However, the bears are currently attempting to stall the up-move at the $19,500 resistance. If the price turns down from the current levels, the bulls are likely to buy on any dip to the 20-EMA. A strong rebound off this support will improve the prospects of a breakout above $19,500.
This bullish view will be invalidated if the BTC/USD pair turns down from the current levels and breaks below the trend line of the triangle.
A breakdown of a bullish setup traps several aggressive bulls and that could result in panic selling. If that happens, a drop to $16,191.02 may be on the cards.
ETH/USD
Ether (ETH) has broken out of the descending channel, which suggests advantage to the bulls. The price can now move up to the $622.807 to $635.456 overhead resistance zone.

The RSI has bounced off the midpoint and broken out of the downtrend line, which suggests that bulls have the upper hand.
If the bulls can push the price above the resistance zone, the next leg of the uptrend could begin. Although there could be some pit stops in between, the next target is $800.
On the other hand, if the ETH/USD pair turns down from the overhead resistance but does not give much ground, it will be a positive sign and will increase the likelihood of a breakout of the resistance zone.
This bullish view will be invalidated if the price turns down from the current levels and re-enters the channel. Such a move will suggest that the current breakout was a bull trap.

The 4-hour chart shows an ascending triangle formation, which will complete on a breakout and close above $622.807. The moving averages on the verge of a bullish crossover and the RSI is in the positive territory indicate that bulls have the upper hand.
This positive view will be invalidated if the price turns down from the current levels or the overhead resistance and breaks below the triangle. Such a move could result in a drop to $488.134.
XMR/USD
Monero (XMR) completed an inverse head and shoulders pattern on Dec. 7 but the bears quickly dragged the price back below the neckline on Dec. 9. However, the bulls again purchased the dip to the 20-day EMA ($133) and propelled the price back above $135.50 on Dec. 11. This suggests aggressive buying at lower levels.

The upsloping moving averages and the RSI above 66 suggest advantage to the bulls. The target objective of the breakout from the bullish setup is $167.
However, the bears may have other plans. They are likely to defend the psychological level at $150. If the price turns down from this resistance but rebounds off the $135.50 support, it will suggest that bulls are accumulating at lower levels.
On the contrary, if the price drops below the $135.50 support and the 50-day SMA ($124), it will suggest that the bears are back in the driver’s seat.

The 4-hour chart shows the formation of an ascending triangle pattern that completed on a breakout and close above $142.50. However, the XMR/USD pair has not picked up momentum and the price is stuck inside the $142.50 to $150 range.
If the bulls can thrust the price above $150, the uptrend could resume with the next target at $162.50. The upsloping moving averages and the RSI in the positive zone suggest that the path of least resistance is to the upside.
XEM/USD
NEM (XEM) soared on Dec. 12 and the price reached the $0.27688 overhead resistance today. The bears are currently attempting to stall the up-move at this resistance.

However, if the bulls do not give up much ground from the current levels, it will suggest that traders are not booking profits in a hurry. That could keep the price range-bound near the overhead resistance.
The upsloping 20-day EMA ($0.209) and the RSI near the overhead resistance suggest that the path of least resistance is to the upside. If the bulls can propel the price above $0.27688, the XEM/USD pair could move up to $0.3564607.

The bears are aggressively defending the overhead resistance. If the price rebounds off the 20-EMA, it will enhance the prospects of a breakout of $0.27688. The upsloping 20-EMA and the RSI in the positive zone suggest bulls have the upper hand.
Contrary to this assumption, if the price breaks below the moving averages, a drop to the trendline is possible. A break below this support will suggest that the bulls have lost their grip.
AAVE/USD
AAVE is trading inside an ascending channel. The price turned down from the $95 overhead resistance on Dec. 8, but the positive sign is that the bulls have purchased the dip to the 20-day EMA ($77).

The RSI has once again bounced off the midpoint and the 20-day EMA has started to turn up. This suggests that the correction may be over and the bulls are back in control. The first target on the upside is a retest of the $95.
If the bulls can push the price above $95, the next leg of the up-move could begin. The $100 psychological level may act as a resistance but if the bulls can drive the price through it, the AAVE/USD pair could rise to the resistance line of the channel at $112.
This bullish view will be invalidated if the price turns down from the current levels and plummets below the support line of the channel. Such a move will suggest that the trend has turned in favor of the bears.

The price turned up from $70.564, just above the support line of the ascending channel but the bears are attempting to stall the relief rally at $86.14.
If the bulls can push the price above this resistance, the pair could rise to $95. A break above $95 could start the next leg of the uptrend.
On the other hand, if the price turns down from $86.14, the pair may form the right shoulder of a possible inverse head and shoulders pattern. This view will be negated if the price dips below the $70.50 support.
The views and opinions expressed here are solely those of the author and do not necessarily reflect the views of Cointelegraph. Every investment and trading move involves risk, you should conduct your own research when making a decision.
Monero
19-year-old Ukrainian politician reports crypto holdings of $24M in Monero
Published
3 Wochen agoon
Dezember 9, 2020By
A newly appointed official in Ukraine has officially declared his cryptocurrency holdings, including a significant amount of privacy-focused cryptocurrency Monero (XMR).
Rostyslav Solod, a 19-year-old deputy of the Kramatorsk regional department and the son of Ukrainian politicians Natalia Korolevska and Yuriy Solod, reported holdings of 185,000 XMR, worth about $24.5 million at publishing time.
According to a declaration published on Dec. 2, Solod became the owner of this Monero fortune back in March 2015, when he was 14 years old.
At the time, Monero was trading at around $0.50 per coin, meaning that the market price for this acquisition was around $90,000. According to the declaration, this acquisition cost Solod’s family 1.6 million hryvnias (about $65,000, according to the exchange rate in March 2015). The declaration indicates Solod’s Monero holdings as property.
In March 2020, the Ukrainian National Agency on Corruption Prevention released a set of guidelines for officials to report their crypto holdings. Public officials should disclose the name of the assets, the purchase date, the quantity and the overall value of the crypto on the last day of the reporting period.
However, according to Michael Chobanian, a major crypto advocate in Ukraine, these recent requirements are poorly enforced. He told Cointelegraph:
“Right now there is no penalty for not providing the correct information in the declaration and […] they can just write anything. And no official government organization has the tools or skills or ability to check how much crypto you have or whether you actually have it.”
Chobanian further suggested that some officials could claim to own crypto in order to hide illegal assets. “You can even probably declare 100 million BTC, because no one would understand and check,” he said.
Monero
Bulls eye the $19.5K resistance but low volume keeps Bitcoin price sideways
Published
3 Wochen agoon
Dezember 8, 2020By
Today was a relatively uneventful day for Bitcoin (BTC) as the price continues to consolidate into a tighter range.
As mentioned by Cointelegraph contributor Rakesh Upadhyay, Bitcoin price spent the weekend consolidating within a bull pennant and the breakout to $19,418 was quickly stamped out by overhead resistance.
After retouching the pennant trendline, the price gave way, falling below the 20-MA on the 4-hour time frame and briefly losing the $19,000 mark.
Generally, most traders seem to agree that after a raging 93% rally from $10,300 to $19,888, a period of consolidation is necessary. Cointelegraph analyst Micheal van de Poppe said:
“On the higher timeframe, Bitcoin is still acting as it was last week. We are still acting in the all-time high resistance zone. I still have my eyes on $16K, which we bounced from, and $14K as these areas still could be retested as support. Holding $19K is important and if we have a daily close below $18.9K I think we’ll fall through.”
On the daily and 4-hour timeframe traders will note that the price is still notching lower highs and higher lows, a sign that the price range is beginning to narrow.

Currently the price is still holding within the pennant trendline as support but a breakthrough the structure will require a high volume move as there is persistent overhead resistance at $19,500.
As mentioned in previous analysis, a drop below the $18,800 level will see BTC search for support at $17,900, and below that the $16,000 to $15,750 range.
For the short term, risk-averse traders are likely to keep a close eye on the 4-hour chart to see if the price can again find support above the 20-MA in order to burst through the pennant. It is imporant to note that this move will require signifanct volume to avoid rejection in the $19,400-$19,500 resistance zone.

Typically, during Bitcoin’s consolidation phases altcoins pump higher but that has not been the case this time.
While a selection of DeFi tokens and other obscure altcoins have moved higher, the majority of the top-20 coins are in the red today.
This is possibly due to the fact that investors are reluctant to shift funds into altcoins while the Bitcoin price is in such an indecisive position.
Experienced crypto investors know that a strong bullish breakout from BTC could result in altcoin-to-BTC pairs being crushed, whereas a bearish breakdown in BTC price tends to result in BTC and USD altcoin pairs receiving an equally catastrophic pummeling.
A few standouts of the day are, AAVE with a 8.54% gain, Monero (XMR) which moved 5.19% higher and Waves (WAVES) which has rallied 6.23%.
According to CoinMarketCap, the overall cryptocurrency market cap now stands at $566.5 billion and Bitcoin’s dominance index currently at 62.6%.
‘Bullish year ahead’ — Bitcoin primed for Q1 2021 gains, strength index suggests
The new ‘Bank of England’ is ‘no bank at all’
New York authorizes first Yen stablecoin operator in the US
Trending
-
Bitcoin4 Monaten agoBitcoin and cryptocurrency are no hedge for inflation
-
Regulation3 Monaten agoCongress weighs crypto payments and fintech lending in hearing today
-
Bitcoin3 Monaten agoMicroStrategy CEO seems to embrace Bitcoin maximalism
-
Altcoin3 Monaten agoDfinance: Layer 2 Blockchain Network
-
Cryptocurrency4 Monaten agoBank of England is Planing to Adopt Digital Currency
-
Monero9 Monaten agoSophisticated Mining Botnet Identified After 2 Years
-
Market4 Monaten ago
The request could not be satisfied
-
Blockchain3 Monaten agoThe US is number one…in blockchain patents

