Burst4All concerns
-
using an operating system as an app in a virtual machine is the best way to open suspicious files because it cannot latch onto networks or clipboards when explicitly disabled in the virtual machine settings. That it cannot infect bare bones. I wouldn't touch it myself though :)
-
@haitch said in Burst4All concerns:
Yesterday Adam Guerbuez offered to transfer to me full control of the ownership of the Burst4All asset. After some initial scepticism, why would Adam who has been slamming me over and over give me this asset?, I agreed last night. Today he emailed me an encrypted zip of the passphrases, and separately the passphrase for the zip, and initiated a domain transfer of Burst4all.com. The zip that contained half a dozen zipped passphrases was 185MB in size. I did not open that zip file over security concerns - 6 passphrases are 185MB ????, Adam has been convicted for using rootkits and bots to spam Facebook, for an $863 million fine - did not accept the domain transfer. I then looked at the burst4all.com pools and payments - and I'm now pretty sure that burst4all is a ponzi - there is no way those pools are earning those payments.
Adam is now saying I must accept responsibility for Burst4All - this is not the case. I do not have the domain name, and refused acceptance of whatever Adam sent me - Burst4All is still a 100% Adam, Crow, Focus owned asset.
If you see any posts that Burst4All is my asset, it's simply not true - there was no transfer.
Thank you for sharing. However, what you are saying is VERY serious ...somehow everyone needs clarification an answer to this.
-
I got a B4A token, what is that?
-
@bandarfjb on nation focus said the token was how they are going to keep track of Burst4all shares and the asset was going to be restructured.
-
@haitch Sounds funny Haitch. Why not Crow, focus or lex? I am personally happy I got pushed out of that asset. I sold every asset I owned that he was a part of. When I first met him I was excited since I found Burst by watching his YouTube video, I've unsubscribed now though.
-
suposed to be some news announced about it shortly
-
185MB is too big for anything unless he had a miner going and has log files inside of it. Is the file encrypted? If not then simply run a av on it. Any software that is included upload to virus total. Just my 2 cents.
-
Run it in a sandbox mode so that if there is something you can simply delete it without affecting your computer. Do you think we should sell? Have about 200k worth of burst invested into it
-
not sure how Burst4all earns all its burst i know it's via miners / pool fee's but have no idea of number of TB's ect taking an average share price of 40 per share witch is what it was last night , last night's ROI was around 1.3 burst per share.......... a nice payout but never thought to question it . in comparison the top ROI asset i own BurstCombo also going for an average of 40 per share payout was 2.5 Burst per share yesterday.
-
@newsense2004 yeah... why not me! i would of been honored to take over an asset.
personally i wouldnt sell just yet. mainly because burst4all has had a good ROI of 20 weeks
-
I never had this asset if I'm correct, I've read sometime here that they were doing some changes to that asset, but never got news of what it was.
-
Sure i get what your saying. My only issue with this is, alot of malware or viruses will not unpack and execute if in a sandbox or vm enviroment. They can also "Breakout" of sandboxes and vm enviroments and attack other devices on the same network. They are very smart. They look for these types of systems and either unpack or not. Escape or not. Its a gamble. When i do malware testing i use a custom system that i have created to track and monitor it. When i produce malware payloads i use custom packers and embed shell code into applications and files. I wrap them in ruby and python because av and anti-malware cannot read these languages in most cases.
I'm not saying anyone is right or wrong. Im not saying anyone sent anyone any infected files. I'm just sharing my exp here and giving some resources that might give light or help. But i know for sure. I would NOT execute anything in a sandbox on my network, unless the whole system was isolated onto another subnet, with very strong ingress and egress rules. Again. Just my two cents.
If your inteterested.. read this...
http://digitalizedwarfare.com/2016/03/24/sandbox-stories-flight-of-the-great-cuckoo-bird/
http://digitalizedwarfare.com/category/shellcode/
-
@AnotherDeadBody < take this guys word for things security wise. hes pretty clued up and has shown me this over a good few months
-
@Gibsalot BurstCombo has been trading for around 40 lately but the mass of shares that have been sold were purchased at 50. I think when you consider ROI's for Combo you must think of the price per shares as 50.
As for payment legitimacy... All the time these guys add bonuses and stuff to the payouts.
-
@kmaxkmax true , regardless of share price the Div payout yesterday was 2.5 burst per share witch is big amount
-
guys maybe that file contains a music video he post them alot we should check it out first before blaming we dont know whats there but should get checked it out on any other network pc and then come to any decision not before he did alot for burst and he gave a big clue is that all for good of community or good for himself check it out i m too excited for that surprize !!
-
or just send it to me.. lol ive already lost all my burst :')
im joking by the way
-
Perhaps it got caught in a shower on the way over and is full of water making it look bigger than it really is?
Rich
-
@haitch said in Burst4All concerns:
Yesterday Adam Guerbuez offered to transfer to me full control of the ownership of the Burst4All asset. After some initial scepticism, why would Adam who has been slamming me over and over give me this asset?, I agreed last night. Today he emailed me an encrypted zip of the passphrases, and separately the passphrase for the zip, and initiated a domain transfer of Burst4all.com. The zip that contained half a dozen zipped passphrases was 185MB in size. I did not open that zip file over security concerns - 6 passphrases are 185MB ????, Adam has been convicted for using rootkits and bots to spam Facebook, for an $863 million fine - did not accept the domain transfer. I then looked at the burst4all.com pools and payments - and I'm now pretty sure that burst4all is a ponzi - there is no way those pools are earning those payments.
Adam is now saying I must accept responsibility for Burst4All - this is not the case. I do not have the domain name, and refused acceptance of whatever Adam sent me - Burst4All is still a 100% Adam, Crow, Focus owned asset.
If you see any posts that Burst4All is my asset, it's simply not true - there was no transfer.
is it possible its a sign of them wanting to make a mends? im probably speaking out of line but the way I see it it can be 1 of three things.. good, bad or inbetween. Thats 33% odds in any direction.
I wouldnt take the risk on an important machine.. im sure you know someone who can open it though.. GL
-
Not entirely sure where you got 2.5 burst per share from... Look at my divies:
12000, BURST-WNQE-ALSP-SNE7-87UX2, 4800.66261483More like 0.4 burst per share. 12000*0.4 = 4800



