Logo
    Search

    Ep 9: The Rise and Fall of Mt. Gox

    en-usDecember 15, 2017

    Podcast Summary

    • The Rise and Fall of Mt. Gox: The Importance of Securing Digital Assets in BitcoinWhile Bitcoin offers a decentralized digital currency alternative, the Mt. Gox incident emphasizes the need for secure storage and monitoring of digital assets, as the cryptocurrency gains mainstream attention.

      Bitcoin is a decentralized digital currency that operates via crowdsourcing transactions, enabling anonymous but transparent payments without the need for physical cash. Mt. Gox, the first Bitcoin exchange, dominated the market, processing over 70% of all Bitcoin transactions. However, in 2014, Mt. Gox shut down, announcing that 750,000 Bitcoins worth over $450 million were stolen. The nature of Bitcoin's complicated technological architecture has made it challenging for authorities to track down the stolen funds. While Bitcoin has numerous features that make it an attractive alternative to traditional currencies, the Mt. Gox incident highlights the importance of secure storage and monitoring of digital assets, especially as Bitcoin and other cryptocurrencies continue to gain mainstream attention.

    • Investigating the Downfall of Mt. Gox.Despite the transparency of the blockchain, poor implementation can still lead to issues and hacking attempts. In-depth analysis and efficient searching methods can help in determining the causes of a system failure.

      The blockchain is a public record that stores every Bitcoin transaction and is anonymous, while virtual wallets store Bitcoins. Mt. Gox, a Bitcoin exchange, had issues with Liberty Reserve withdrawals due to poorly implemented code allowing hackers to withdraw more than they should. The founder of Mt. Gox, Jed McCaleb, personally created the site. Kim Nilsson, a software consultant, investigated Mt. Gox's downfall and spent three years piecing together the almost 40 gigabytes of transaction data. It was hard to determine a single satisfying answer, as there were a lot of things that went wrong. Kim's technical analysis helped him to investigate the data with efficient searching methods and additional information from the CEO of Mt. Gox.

    • Vulnerabilities and Insolvency in Cryptocurrency ExchangesStrong security protocols and proper management are crucial for preventing thefts and insolvencies in cryptocurrency exchanges. Failing to do so can have disastrous consequences for both the exchange and its customers.

      The vulnerabilities in Liberty Reserve led Jed McCaleb to sell Mt. Gox to Mark Karpel's at a favorable price, but things started to go downhill with the loss of 80,000 bitcoins from the hot wallet. When Mark took over, he was faced with a lot of missing money and insolvency issues due to inadequate management. Later, Mark stored 300,000 bitcoins on his unsecured personal computer, which was stolen by a thief, who later returned 297,000 bitcoins for a small keeper's fee. This incident shows the importance of strong security protocols and better management in cryptocurrency exchanges to prevent thefts and insolvencies.

    • Mt. Gox and the Importance of Cybersecurity for Cryptocurrency PlatformsStrong cybersecurity measures are vital for any online platform dealing with valuable assets. A proactive approach towards cybersecurity, constant monitoring, and upgrading of security measures is crucial to prevent breaches and protect users and the market.

      Mt. Gox faced multiple breaches that resulted in loss of Bitcoins and compromised user data. These breaches led to the crash of Bitcoin's price that impacted users and the market. The incidents highlight the importance of strong cybersecurity measures, especially for platforms dealing with cryptocurrencies. Despite facing setbacks, Mark Karpel believed in turning around Mt. Gox and expanding its reach to Europe. However, the breaches continued, and the attackers aggressively altered account balances and wiped accounts, making it challenging to track the evidence. Mt. Gox's experiences underline the need for a proactive approach towards cybersecurity and the importance of constant monitoring and upgrading of security measures for any online platforms dealing with valuable assets.

    • Security Breaches and Bitcoin TheftLack of secure codebase and encryption techniques in Mt. Gox led to the siphoning off of Bitcoins, incentivizing hacking. Amateur codebase and patchy security protocols were major reasons leading to loss and theft of Bitcoins.

      The security breaches in Mt. Gox led to the siphoning off of 650,000 Bitcoins, mainly due to the lack of a secure codebase and encryption techniques. Bitcoin incentivized hacking by making it easier for hackers to steal actual money just by hacking computers. Amateur codebase and patchy security protocols were the main reasons behind the technical errors that led to the loss of 45,000 Bitcoins and destruction of 2,500 Bitcoins. Though Mt. Gox pioneered the online cryptocurrency market, it was never a professional exchange, and its lack of secure software and systems made it easy for hackers to breach the system and steal Bitcoins.

    • The downfall of Mt. Gox and its ongoing legal battles.Transparency and following regulations are essential for businesses to maintain credibility and prevent financial loss.

      Mt. Gox, once the largest Bitcoin exchange, faced security breaches and thefts causing them to become insolvent, and ultimately shut down. The owner, Mark, tried to keep these breaches hidden and keep the reputation of Mt. Gox intact. He also ran a trading bot called the Willy Bot, which resulted in losing an additional $50 million and 22,000 Bitcoins. Mt. Gox gave $5 million to a company called CoinLab to handle all North American transactions, but the deal went bad and CoinLab filed a lawsuit against Mt. Gox seeking $75 million. Mt. Gox was also in violation of acting as an unregistered money transmitter in the US and had $5 million seized by the US Department of Homeland Security.

    • Lessons learned from the Mt. Gox bankruptcyKeep Bitcoin on your own computer and use reliable exchanges with good reputations. Keep technology up to date and actively trade rather than leaving Bitcoin on an exchange.

      The Mt. Gox bankruptcy taught the industry and community important lessons about Bitcoin security. It's best to keep a Bitcoin wallet on your own computer that you control for long-term storage, and to choose reliable exchanges that adhere to strict audits and have a good reputation. Leaving Bitcoin on an exchange is not a good idea unless you're actively trading it. Mt. Gox's losses also highlight the need for best practices and keeping technology up to date within the industry. Mark Karpeles, who still has 200,000 Bitcoins from the bankruptcy, is currently undergoing legal proceedings and owes his creditors $450 million, while his Bitcoins are now worth $2 billion.

    Recent Episodes from Darknet Diaries

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    137: Predator

    137: Predator
    A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Insights from Neil Singh: Crypto, Virtual Reality, and the Future of Tech

    Insights from Neil Singh: Crypto, Virtual Reality, and the Future of Tech
    Dive into the world of crypto, virtual reality, and the future of tech with Neil Singh, a tech expert and thought leader based in Ohio.

    Originally from New Zealand, Neil has spent over 5 years contributing significantly to Northeast Ohio's technology sector, playing a key role in economic development and bridging the gaps in IT workforce development.

    Join Sandra and Neil as they discuss the challenges and opportunities in the crypto space, Neil's fascinating experience with virtual reality, and his insights into the ever-evolving tech landscape. Discover Neil's wins in mentoring entrepreneurship, advocating for 'Women in Technology,' and showcasing thought leadership in emerging technology.

    This episode offers a unique blend of expertise and personal experiences, providing valuable insights for tech enthusiasts and business leaders alike. Don't miss out on Neil's proactive approach and his vision for the future of the Northeast Ohio Tech Sector.

    Learn more about Neil on his website, and follow him on X @neilsinghtweets and LinkedIn Neil Singh

    Sandra Estok is the founder of Way2Protect™, author of the international bestselling "Happily Ever Cyber!™" book, and the Cyber Literacy series for children. With over 25 years of experience in Cybersecurity, IT, and Data Privacy, Sandra is a Keynote Speaker and Corporate Trainer. Her mission is to empower women to take charge of their cyber safety and have Peace of Mind Online.

    Connect with Sandra:
    Website SandraEstok.com
    Social media handle: @Way2Protect

    Watch Sandra Estok's TEDx talk "What an identity theft victim can teach about cybercrime": here. Or copy this link directly into your browser: https://www.ted.com/talks/sandra_estok_what_an_identity_theft_victim_can_teach_us_about_cybercrime

    Jonathan Chester of BitWage and Dave Ripley of Glidera

    Jonathan Chester of BitWage and Dave Ripley of Glidera

    YouTube video here!

    Topics include:
    - User-friendly challenges to spread BitCoin
    -  Buying and selling cryptos

    About the Guest:
    - Jonathan Chesteris the co-founder of BitWage, a payroll payment processor.

    - Dave Ripleyis the CEO of Glidera, providing a safe and easy way to obtain Bitcoin while using the Bitcoin wallet of their choice.

    If you like this content, please send a tip with BTC to: 1444meJi7YjgQGNg3U8Z6qYZFA5cgz4Gmj

    More Info:
    CryptoMediaHub.com
    Vaultoro.com
    Bitwage.com
    Glidera.com

    Friends and Sponsors of the Show:
    TheBitcoinCPA.com
    CryptoCompare.com
    FreeRoss.org
    ThirdKey.Solutions
    SovrynTech.com
    SexAndScienceHour.com

    Love, Trust & Crypto

    Love, Trust & Crypto

    The crypto movement began as a reaction to the concentration of economic power in the traditional financial system (and associated financial crises). It involved the creation of a new type of financial recording system, that did not depend on any one individual keeping records, did not allow falsification, and prevented fraud and double spending.

    Crypto is underpinned by public-private key encryption, hashing and mining and allows a completely decentralised system to write enforceable contracts that cannot be altered once written. But how does the technology actually work? How would the tragedy of Romeo and Juliet have played out had crypto been around in the sixteenth century?


    A lecture by Raghavendra Rau

    The transcript and downloadable versions of the lecture are available from the Gresham College website: https://www.gresham.ac.uk/watch-now/trust-crypto

    Gresham College has offered free public lectures for over 400 years, thanks to the generosity of our supporters. There are currently over 2,500 lectures free to access. We believe that everyone should have the opportunity to learn from some of the greatest minds. To support Gresham's mission, please consider making a donation: https://gresham.ac.uk/support/

    Website:  https://gresham.ac.uk
    Twitter:  https://twitter.com/greshamcollege
    Facebook: https://facebook.com/greshamcollege
    Instagram: https://instagram.com/greshamcollege

    Support the show

    Wallstreet vs Mom & Pop | TGoC

    Wallstreet vs Mom & Pop | TGoC

    The Gentlemen of Crypto EP - 649

    Wild N Out Comedian Doboy Bitcoin Interview:
    https://www.youtube.com/watch?v=yBUuS9XBev0

    SPACs, Stocks, and Crypto Trading Mastermind on 1/28 11am PST:
    https://us02web.zoom.us/webinar/register/4116109463250/WN_C1r1JF4fQtW0UK1Ct6zNXg

    Cool Crypto Gear: https://www.adesignuk.com/

    The Gentleman of Crypto is a daily live broadcast that explores Bitcoin and cryptocurrency market. We discuss international topics, news updates, and future innovations in blockchain, digital currencies and assets, The Gentleman of Crypto is a daily live broadcast that explores Bitcoin and cryptocurrency market. We discuss international topics, news updates, and future innovations in blockchain, digital currencies and assets, fintech, and more.

    #bitcoin #cryptocurrency #altcoins #cryptonews

    Support "The Gentlemen of Crypto" by using our referral link to download the Brave Browser.

    https://brave.com/krb666

    We are Ambassadors for Cryptic Coin and will be giving away free coins to everyone who downloads the wallet!! Post your address and you will receive free coins!!

    https://crypticcoin.io/
    **********************************
    Connect with us online at the following places:

    KRBE Digital Assets Group
    • Website: https://thegentlemenofcrypto.com
    • TGoC Podcast: http://pca.st/hdVR

    SOCIAL
    • KRBE Twitter: https://twitter.com/krbecrypto
    • KRBE Facebook: https://www.facebook.com/krbecrypto/
    • KRBE Instagram: https://www.instagram.com/krbecrypto/
    • King Twitter: https://twitter.com/KingBlessDotCom
    • Bitcoin Zay Twitter: https://twitter.com/bitcoinzay

    Business Inquiries: krbe@krbecrypto.com

    Donations welcome, but not necessary!
    ------------------------------------------------------------------------------------------------------------

    **This is not financial advice. The expressed opinions in the video are of the speakers. You can lose all your money in the cryptocurrency market, so be sure to do your own research before investing.**The Gentleman of Crypto is a daily live broadcast that explores Bitcoin and cryptocurrency market. We discuss international topics, news updates, and future innovations in blockchain, digital currencies and assets, fintech, and more.fintech, and more.