Benfica Lisbon: Portuguese top club introduces Bitcoin in fan store

So far it was criticized at the crypto currencies such as Bitcoin again and again that they are often not accepted as means of payment. Gradually the crypto currencies can be used in ever more on-line Shops, in order to order thereby articles. So now also in the online store of the Portuguese soccer team SL Benfica Lisbon, where, among other things, jerseys of the team can be purchased.

Partnership with Utrust

In order to make the payment process as smooth as possible, a partnership has been established with Utrust, a company specialized in crypto-transactions. Fans who are looking for a bitcoin exchange for Portugal have a great variety to choose from.

Ether, Bitcoin and UTK tokens

Benfica products can now be purchased using Utrust’s Ether, Bitcoin and UTK tokens.

With the help of Utrust, crypto amounts paid for products are converted directly into cash, so that the association itself does not need to convert the crypto currency. Blockchain technology is used for secure transactions and payments. Thus the association wants to avoid problems with volatility.

The employment of crypto currencies is to be according to the association management an important component for the further success of the association. The payment with the digital currencies is to lead by the simple and fast completion to the fact that still more humans use the Fanshop and so more money is to the association at the disposal. With seven million followers on the social networks and an estimated more than twice as large fan community worldwide, Benfica Lisbon is already one of the best-known soccer clubs in the world and wants to expand its fan community.

Other Clubs Use Crypto Currency Too

In addition to the Portuguese club, the English club West Ham United, among others, has already dealt with crypto-currencies and developed a reward system for fans based on crypto-tokens.

BTC still hardly used as payment

For daily payment the crypto currency remains a marginal phenomenon. Meanwhile it becomes more and more popular with investors. Bitcoin started as alternative means of payment. In Switzerland the crypto currency is used also as such, remains however in the everyday life as purchase currency a peripheral phenomenon. The block chain currency is becoming increasingly popular as a value investment. A payment system independent of central banks and states, based on a network of computers secured by computing power. This was the basic idea of Bitcoin, which was created in the wake of the financial crisis. Over a decade later, it has become clear that Bitcoins are used less as money and more as an investment.

Hoarding instead of spending

The original idea of a non-governmental means of payment has changed. The reasons for this: despite enormous fluctuations, the value of a Bitcoin has been rising for several years in the long term. To pay for goods or services in this way seems to make little sense to many Bitcoin holders with the prospect of further rising prices. Besides the possibilities to pay with Bitcoin remain limited also in Switzerland, which is rather open-minded towards crypto currencies, and presuppose a certain technical know-how. Partly the rare use as means of payment is probably also due to the fact that often high fees and bad exchange rates must be accepted.

New ways of using the crypto currency as a means of payment are celebrated in the crypto industry as a major step towards the broad use of Bitcoin. Thus the waves hit in the Zuger “Crypto Valley” highly, when the city of Zug announced four years ago to accept in the future Bitcoins as means of payment.

Apparently, however, the option of paying taxes with the Blockchain currency is very rarely used: “So far, about 50 transactions have taken place in the city of Zug,” says city clerk Martin Würmli upon request. Nevertheless, the tourist community of Zermatt also announced at the end of January that it would accept Bitcoins as payment for local taxes and counter transactions.

In the everyday purchase behavior the crypto currency plays in addition, with on-line dealer Digitec Galaxus only a small role. At the largest Internet store in Switzerland, which has been accepting various crypto currencies since March 2019, the share of purchases with crypto currencies is below one percent, according to media spokesperson Rico Schüpbach. Nevertheless, the Migros subsidiary is satisfied with the development: “We didn’t expect more than that,” admits Schüpbach. And after all, the number of orders per week is still “several hundred”, with an upward trend.

Popular as an investment

  • As a currency for paying for goods and services, Bitcoin remains more of a marginal phenomenon. To buy the crypto currency and keep it as an investment seems a far more popular form of application.
  • A recently published analysis of the Fintech digital assets data shows that in the past year well 10 million Bitcoins of the so far over 18 million Bitcoins in circulation were not moved. In Switzerland, too, much more is likely to be earned from the sale of Bitcoins than from transaction fees.
  • Thus for instance also the SBB looks according to own statements on a successful development back, if it concerns the sales of Bitcoins. After a test phase of 18 months, the Swiss Federal Railways introduced a definitive Bitcoin purchase offer in spring 2018: “Around 400 customers per month use the service,” it says on request. Of the total of around 6,000 customers who have already purchased Bitcoins from an SBB ticket vending machine, about half regularly use the offer.

Bitcoin and Gold weigh in the balance

Bitcoin and Co. can therefore now be seen as a valid investment, as a survey published last Thursday by Migros Bank also shows. Above all in the younger Swiss population crypto currencies are already more popular than gold. Thus over 7 per cent of the 18 to 29-Jährigen invested in Bitcoin or in other Kryptowährungen, while it is with physical gold only 5 per cent. Over all age groups away scarcely 5 per cent are engaged in crypto currencies, exactly the same as with gold. For comparison: According to a further inquiry of the Migros bank the portion of the population, which possess shares directly or over funds indirectly, amounts to well 25 per cent. Meanwhile also the SBB wants to leave it with the sales of Bitcoins. And also a payment possibility with crypto currencies is still not planned.

You May Soon Only Be Able To Access Online Casinos Through VPN

arcade with slot machines

Many countries are relying on geo-blocking to deprive unlicensed online casinos of their customers and thus the breeding ground. According to media reports, the conference of prime ministers responsible for gambling is also examining this possibility. An EU study is now questioning the success of such measures.

Switzerland as a role model? Regulatory authority prevails

One of the countries that has already taken the fight against the proliferation of online casinos seriously is Switzerland:

As part of the new Money Gaming Act that came into force at the beginning of this year, international operators of online casinos that had not previously received any of the much sought-after Swiss licences were asked to make their sites inaccessible to Swiss customers.

In the event of non-compliance, the providers are threatened with severe penalties and the prospect of never being allowed to operate in the lucrative Swiss market. Industry heavyweights such as NetBet, Mr. Green, and a range of crypto-based slot gambling sites complied with the requirements: Their sites are no longer accessible to the Swiss or offer no possibility for Swiss to register.

Allegedly, a working group of the Prime Minister’s Conference is considering similar steps for the German market. If the heads of government of the federal states remain in line with the current State Treaty on Gambling and continue to ban the operation of online casinos, the introduction of blocks could theoretically lead to the end of online casino and poker sites in Germany.

In practice, however, the measures, as popular as they are with regulators, appear to be much less effective than many a law enforcement agency would like, as a report by the European Commission suggests.

EU Report: Sobering Findings

The recently published English-language report “Evaluation of Regulatory Tools for Enforcing Online Gambling Rules and Channeling Demand towards Controlled Offers” shows on 165 pages how European states use technical instruments to deny users access to certain gambling offers on the Internet.

Currently there are three types of blocking, which are mostly used to prevent users from accessing unlicensed online casinos:

In the case of geoblocking casinos, the site operator himself blocks his offer for calls from certain regions. The location of the Internet user can normally be determined on the basis of his or her IP address and is transmitted to the site operator. The site operator has the option of preventing IP addresses with characteristics determined by him from visiting his site.

DNS blocks are particularly widespread. A DNS (Domain Name Service) server translates the names of websites into network addresses readable by computers. When a site is blocked, the DNS servers of Internet service providers no longer translate certain entries, so the site cannot be accessed in the normal way.

IP blocking means that all access to the IP address of the server that hosts the page being blocked is blocked. This means that all pages registered under the IP address of the server are blocked, regardless of their content.

According to the EU report, 18 states of the European Economic Area currently use blocking of gambling sites, four countries are considering such measures, 12 members completely refrain from blocking gambling sites, including Germany. Of the states that have set up Internet blocking, twelve use DNS blocking exclusively, two rely on IP blocking, the others vary the measures.

Online gamblers should also know this about privacy with online casinos.

Blacklist with more than 7000 Entries

The study also found that of the domains on the blacklists of the states, a total of 19% are no longer active. The authors pay particular attention to the figures for Italy:

With over 7000 domains, this EU member not only has the most extensive list of blocked sites, but a full 63% of them are idle or have already been deleted. The opposite pole is Slovenia, whose blacklist contains only nine Internet gambling sites. The country sets high legal hurdles for blocking sites.

Apart from blocking sites, seven countries use tools to block financial transactions from online casinos. In most of the cases the measures are directed against credit card companies and banks.

Payment service providers such as PayPal or Skrill are also prosecuted if they work with non-licensed online casinos. This is often the accounts of the operators blocked or certain transactions are prevented.

Where a Will, there a Way

It is striking that only four of the states examined in the report seem to have examined their blocking measures retrospectively for success. And their findings may also have caused disillusionment. For example, the Estonian Gaming Authority found that at least one third of the users who were informed on the site of an online casino that this offer was not available to them immediately tried to circumvent the block.

Somewhat more promising were landing pages that would have provided users with information on legal alternatives. Here it was partly possible to redirect the visitors, the report says.

According to the current state of knowledge, the success of Internet blocking in the fight against illegal online casinos is more than questionable. For apart from legal and moral questions about consumer protection and freedom on the Internet, it is now also possible for users who are not very well versed in technology to gain access to officially blocked sites after a short search.

If the reports about a planned introduction of internet blocking of online casinos in Germany are correct, it is to be hoped that this will be accompanied by a sensible regulation for dealing with gambling on the internet.

Otherwise, it is to be feared that the problem will only shift further into the depths of the net, where the protection of players and young people can be controlled even less than in today’s unregulated market.

3 Bitcoin Trading Strategies You Should Know

A 1000€ investment in crypto currencies in early 2017 could have made you a millionaire.

A year later, however, buying Bitcoin cost some investors more than 90% of their investment.

So how do you arm yourself against the high volatility of the crypto market?

Contents:

We explain how to set up a profitable trading plan, which strategies professional traders use and how a solid crypto portfolio should be structured.

Which Bitcoin trading strategies do professional traders use?

People are naturally subject to extreme emotional fluctuations when trading investments.

Unfortunately, these emotions can easily lead you to make irrational decisions that you may regret later.

Therefore, it is essential to have a fixed plan for every (crypto-) investment from the beginning.

The 3 most important trading strategies are:

Day Trading

In day trading, several purchases and sales are concluded by the trader every day.

Through these “intraday trades” the trader hopes to take advantage of even small price fluctuations and thus increase his profit compared to longer-term strategies.

Experienced traders can actually maximize their profit expectations with this strategy.

However, the style is characterized by the high stress and time factor, among other things, by the fact that the many individual trades on some exchanges also require proportionally higher fees to be paid.

Furthermore, unpredictable price jumps can often occur in these small time intervals.

For example, if a Bitcoin whale decides to sell a part of its Bitcoins, this can sometimes shift the price in one direction by more than 5% for a few minutes, which can have fatal consequences for day traders.

Here you find a review of the most popular bitcoin broker for day traders:
http://www.sleepyant.com/bitmex-trading-guide/

Swing Trading

In swing trading, the time horizon increases.

In comparison to day trading, intraday trades are carried out only very rarely.

Swing Traders usually trade several cryptocurrencies at the same time. Always keeping an eye on possible trends, so that they can adjust their coin positions and set them as profitable as possible.

For successful Bitcoin Swing Traders, the year 2018 probably looked like this:

bitcoin 2018 swings

As soon as a swing trader suspects a local high, he changes his strategy to so-called shorts. So he bets against the price and sells his Bitcoin Holdings.

If he thinks that Bitcoin is “oversold”, he goes long again and buys Bitcoins again.

It is important to note that you don’t have to get the absolute top or the absolute low in price every time!

Often it is a wiser decision to wait and see and make sure that the price has really caught up.

In early March 2018, for example, it looked as if the Bitcoin price had caught on and would rise again.

Would…

The price failed to print a higher high at €11,500 and the downward trend continued. Even more so, in the weeks that followed, the price dropped by over 30% to below 7,000€.

Investing

The last strategy we would like to present to you is traditional investing.

To anticipate it:

We think that pure investing in cryptocurrencies is the best option for many investors. We too have invested the majority of our own portfolio on a long-term horizon.

Why?

Well, the 3 most important points for us are as follows:

Enormous time saving

Sure, at the beginning you have to put a lot of work into researching the different crypto currencies. After all, you want to invest in solid projects with competent teams and good future prospects. But once you have found your 5-6 coins, you can sit back and wait for the prices to rise.

Reduced risk

We probably agree that cryptography has a similar potential as the Internet did back then. So it is only a matter of time before large banks, institutions and hedge funds start to invest their money in this new asset class as well. Why expose your capital to risk every day with hundreds of trades, when enormously high returns can be possible simply by holding them?

Kraken and Bitstamp are among the best platforms to buy Bitcoin, but you should hold it at home on a private hardware wallet and not leave the coins on the exchange. Your coins are only yours if your control the private keys!

What is to “hodl”?

The crypto community has developed its own language jargon over time.

“Hodl” was first used in 2013 on the BitcoinTalk Forum, the then focal point for crypto enthusiasts. The original thread is here: https://bitcointalk.org/index.php?topic=375643.0

Incredibly funny!

Since then, the witty spelling mistake has become synonymous with staying strong in downward trends.

Technical analysis – does that really work?

We had already briefly touched on it above.

Technical analysis (TA) describes the analysis of chart behavior.

Day traders in particular, but also swing traders use the chart to try to find zones where they can buy their positions cheaply.

One thing is clear:

There are only very few people who can really read charts successfully.

But there are all the more dilettantes who allegedly predict every price fluctuation and thus lure new investors into their fee-based trading groups.

We always guess:

Who is really so good in chart reading, it is certainly not necessary to waste its valuable time in telegram or Whatsapp groups. 😉

Nevertheless, we would like to list and briefly explain the most important Bitcoin trading tools:

Trend Lines

Trendlines are among the simpler, yet extremely useful trading tools.

Anyone who has analysed charts on a regular basis will find that prices very often move in trends.

This means that up to a certain point, prices move up or down along a trend line.

If this trend line is broken, a “trend reversal” often takes place.

So the breaking of the trend line of a downward trend can be understood as an indication that a possible upward trend is following.

At Ripple this happened several times in 2018. After breaking the trendline, an explosive price breakout to the upside often followed:

xrp chart

Fibonacci Retracements

Fibonacci sequences are a sequence of natural numbers, where each sequence member consists of the two previous members.

So the sequence is 0, 1, 1, 2, 3, 5, 8, 13, and so on.

This sequence can be used to calculate ratios that occur very frequently in nature. Be it the arrangement of the leaves of different plants, the spiral of snail shells, or the golden section in the history of art (you can learn more about it on Wikipedia).

It cannot be explained why, but Fibonacci ratios can be found in many areas of our lives. Among other things also in the chart behaviour of cryptocurrencies.

Have a look at the following graph of XRP:

Fibonacci

Crazy, right?

Why don’t you try it for yourself?

You can open a demo account for free on the Plus500 exchange and use all the professional trading tools.

You can access the drawing tools window by clicking on the pencil icon in the top right-hand corner.

Fibonacci sequences are always drawn from a local maximum to a local minimum of a price swing.

I know many traders who trade at these levels.

This explains to me why this method can produce such frighteningly accurate results:

The more traders place their orders after Fibonacci levels, the more active the trading behavior around these zones.

And this naturally leads to the creation of support and resistance zones around these levels.

Fractals

Fractal traders assume that markets always move in cycles that repeat themselves over and over again and on all time frames.

So no matter if you watch a daily chart or a 1-minute chart, you will find the same kind of patterns price forms repeatedly.

Shockwave Pattern (chart pattern)

Fractals are directed more towards Bitcoin Swing Trader.

However, there are also chart patterns in smaller time intervals, which repeat themselves constantly:

The above patterns describe the natural behaviour of price corrections in an upward or downward trend.

If, for example, the Bitcoin price falls by several percentage points at once, this does not automatically mean that a free fall follows.

Often the price is temporarily caught by daytraders at certain levels, which drives the price up again a bit. A natural correction.

But watch out!

Chart patterns in the bull and bear market can be very similar, but the outcome of the formations is determined by the macro trend!

Regardless of your crypto trading strategy, you should think about how you want to structure your crypto portfolio.

There are two ways to do this:

  • Diversification
  • Concentrated investment

Diversification means that in addition to Bitcoin and perhaps Ethereum, you also invest in other cryptocurrencies.

You spread your investment across different projects, so to speak, and thus reduce the risk of loss if a project is not successful.

In contrast, when you invest in a concentrated way, you choose a few projects that you give your full attention to – and also your full trust.

If the prices of one of these projects collapse, you will lose a larger percentage of your total portfolio.

On the other hand, if you are sure of the great future of a coin, you will of course benefit a lot more from price increases.

We have chosen a medium for our portfolio.

Projects, where we expect a huge development and applications in the economy, take a larger part of our portfolio.

Even the big coins such as Bitcoin and Ethereum are considered a calm rock in the surf for us, as they are less volatile than smaller crypto currencies.

Often it can also make sense to imitate an index or that of a professional fund.

The trading platform eToro offers this feature for its users.

Is Crypto just a big Bubble?

With our previous knowledge of market psychology we can now take a more differentiated look at this question.

Markets run in cycles driven by human emotions like fear, greed and hope.

This means that even the fundamentally best projects are subject to these cycles.

We have seen something similar before, namely after the dotcom bubble in the early 2000s.

Amazon fell a whopping 95% from $113 to less than $6.

It took some time for the price to catch up, but from the absolute low, investors were rewarded with juicy returns.

Some could increase their investment more than 300 times!

So we see that traditional asset classes are also struggling with high volatility.

Pessimists might call it a bubble. On top of that some may also still think that Bitcoin is just for crypto gambling sites and other shady stuff.

But we prefer the term market cycles, where it is important to get in early and ride the big wave! And what this is all for will be decided by humanity in the long run.

What is it about Bitcoin Trading Bots?

Trading Bots are software programs that directly create buy or sell orders for you via the API interfaces of the stock exchanges.

In doing so, they observe current price jumps, trading volumes and other technical indicators.

Furthermore, trading bots allow you to follow the following Bitcoin trading strategies:

Arbitrage

Arbitrage is an attempt to exploit possible price differences on different stock exchanges.
For example, if a Bitcoin on stock exchange A costs €8,000, but the selling price on stock exchange B is currently €8,100, the bot recognizes this price difference, sells Bitcoins on stock exchange B and buys them for the lower price on stock exchange A.

Market Making

A strategy that many stock exchanges also use to finance themselves. The Trading Bot can dynamically place buy and sell orders at the current Bitcoin price to make the best possible use of the spread. When the Bitcoin price moves in one direction, the bot automatically adjusts its order.

In the past, trading bots were out of reach for the average investor.

The widely used Bloomberg terminal, for example, costs $24,000 a year. A sum that often only large companies or hedge funds can afford.

In the meantime, these tools are also available to a wider, informed audience.

However, this leads to the fact that the profit margins are getting smaller and smaller as the number of trading bot users increases.

Especially in this hotly contested field, funds naturally invest large sums of money to get every possible advantage out of their private bots.

Images: tradingview.com.

How Secure Is Online Banking Abroad

Especially In Public WiFi Networks Data Can Be Easily Intercepted

If you are travelling abroad with your smartphone, you should take some security precautions.

Public WiFi access without encryption should be avoided when it comes to online banking. Because in unencrypted WiFi networks abroad you never know who is reading the data streams. Unauthorised persons could gain access to user names or passwords by monitoring traffic. That’s why travellers in such open networks should avoid online banking or shopping.

In general, functions such as Bluetooth and WLAN should only be switched on when you really need them. In this way, users can protect themselves from unwanted access.

If the phone is stolen unnoticed, for example from the table of the beach café, PIN code and a display lock protect against misuse. Security experts recommend using a combination of numbers or a password, as the pattern lock popular with Android phones can often be recognized by wipe marks on the display. Protecting photos, contacts, and music files from theft or damage is a good idea when using online storage services such as OneDrive, Google Drive, iCloud or other third-party services.

It is also a good idea to install tracking software. This allows the device to be tracked in the event of loss. Such security packages often also have a remote deletion function. With this function, personal data can be deleted remotely. However, this requires a connection to the Internet.

Is Money Transfer Via The Internet Safe?

– Even on the road? – Even in an Internet café?

To anticipate the quintessence for the hurried reader:

Yes, Internet banking abroad is safe if you follow a few important safety instructions yourself!

All the following security tips for online banking and online payment by credit card are logically understandable. You only need to briefly consider the principle of electronic money transfer via the Internet – and the tricks used by Internet criminals who want to exploit security weaknesses in banking transactions to enrich themselves unlawfully.

Dear reader in a hurry, take a minimum of time – it is more effective to read on here systematically than to try to piece together the various aspects of online banking when travelling abroad or payments by credit card number incompletely from many sources…

Goodbyebanks shows the top digital banking apps for people staying abroad for a while such as students or expat workers.

Secure Online Banking

The term “online banking” refers to the processing of banking transactions via PC, laptop or smartphone – in a broader sense, this includes payment by entering one’s credit card number on a website.

Serious online banking always takes place via a “secure Internet connection”:

Unsecure vs. Secure Internet Connection:

Information can be sent on the Internet either easily “listenable” (e.g. normal e-mail!) or “securely encrypted” (e.g. SSL-128 bit).

Filling out sensitive forms (e.g. credit card numbers, password or TAN requests) is done at all reputable financial institutions via secure https connections.

With the appropriate settings, browsers (e.g. Internet Explorer = I.E.) also announce the change to a secure connection and show, for example, a small lock symbol in the lower status bar.

Important: Check The Exact Browser Address!

When using a secure connection, the address line of your browser will show “https://…” instead of the usual “http://…”.

SSL-encrypted bank details are almost impossible to crack, which is why criminals usually try to get your PIN (personal identification number), TANs (transaction numbers) and credit card number by other means, e.g. by :

  • Phishing (= password fishing e.g. through fake bank e-mails or websites)
  • Trojans (= programs which, like the Trojan horse, contain hidden dangers)
  • Keylogger (= programs that spy on entries made via keyboard for the stealer)

Tip Before Reading On:

These are security rules that you should always observe at home when banking over the Internet. No one is more qualified to give online banking security tips than official addresses such as the national Banking Association or the Federal Office for Information Security.

We will discuss further below with solid basic knowledge about online banking security especially when travelling

Some of these security rules for Internet banking cannot (always) be implemented when traveling (see below) – nevertheless, you can already feel much safer now and no longer fall for by far the most successful fraud methods in online banking – like millions before you!

To realize the travel-critical security rules on the road and in Internet cafes:

Security Rules:

– Use latest program versions:
– Make sure that on the computer of the cybercafé all applications except the browser are closed and the virus protection is up to date!
– Refrain from attempting Internet banking if the browser used does not have an encryption strength of at least 128 bits. (Versions: ) At I.E. the window shows its encryption strength via Help -> Info.
– In general, however, you can assume that the operator of the Internet café also wants to protect his computers from security risks and therefore has updated operating systems running.
– “Perform a security check on your PC” – and
– “Activate the security settings of your browser”

Just ask the (seemingly trustworthy!) operator of the Internet café about his security measures or which of his Internet computers you should use for your banking transactions!

You are the customer who might come more often now – and reliable telecommunication is his business.

But even without asking, you can set the security settings of your Internet cafe browser to “high” for your bank visit (at the I.E.: Tools -> Internet Options -> Security), have Java Applets run only on demand and switch off Active-X Controls completely.

Additional Tips For Transferring Money Electronically From An Internet Café:

– Limit the number of virtual bank visits you need to make and the number of transfers you need to make while on the road (change to standing orders, direct debit, etc.) months before departure)
– Always check that you have entered the address of your bank (URL) correctly and in the address line “https://…”. (see above) appears in the address line.
– Remember the normal procedure of an online transfer and be alerted if you notice any irregularities.
– After entering your TAN and executing your transfer, either a “BEN” or the TAN number you have just used will appear. Compare them!
– Some key loggers can be tricked by using the backspace key several times, e.g. when entering the PIN. Unfortunately, using a virtual keyboard does not (any longer) protect you from listening to a keylogger.
Caution:
Windows’ auto-complete option is also a keylogger, so switch off the automatic storage of passwords when banking online!
– If possible, only visit Internet cafés that you consider trustworthy and whose computers use the operating system (Windows, Apple) that you are familiar with from home.
– Log off properly after each session, so that those who follow you cannot trace your Internet path by using the Page Back button.

Online Banking By PIN/TAN Or iTAN System With Your Bank On The Road:

– Generally speaking, financial transactions via online banking are as secure as keeping your TANs secret, because the TAN number required for a transaction expires immediately after it is used.
By knowing your user name and PIN alone, your online account can be viewed but not looted.
– One advantage of the PIN-TAN system for long-term travellers is that you can give a trusted person at home limited control over your account without any red tape and thus not always be dependent on online banking from Internet cafes.
– More and more banks are currently switching to the so-called iTAN procedure because it is supposed to be more secure: The special feature of the iTAN procedure is that a fixed TAN from the numbered TAN list is required for authentication of a bank transaction. Therefore, you should not forget to note down not only the TANs themselves but also their index numbers for the trip.

At least for travelers, I don’t think the new iTAN procedure is any safer.

Limiting The Risk Of Electronic Money Transfer:

If you want to be on the safe side, you can limit the residual risk of online banking by using the following
– Reducing the credit limit of your online account or credit card.
– Opening a special online account for travel at your bank (which can be replenished from home as needed)
– Opening a purely electronic brokerage account, e.g. with PayPal, as we have done: The PayPal account has no access to our bank account and that it is only fed by sponsors was the most effective risk reduction strategy ever!

What Is The Risk?

Electronic money transfer risk with online banking:

Online banking via bank accounts is quite safe because no cash is spent, but money is only transferred to a different account with a traceable recipient.

The exact liability conditions (e.g. in case of technical errors, negligent TAN theft etc.) vary, you can ask your bank for details.

The same is with all banks:

If you make a typing error while transferring money and therefore transfer too much, you cannot hold your bank responsible for this! (But of course you can still claim back the money you paid too much from the recipient).

credit cardPlastic money risk when paying by credit card over the Internet:

Online transfers via online banking are usually and for reasons of cost limited to national, at most European money transfers.

“Correct” international bills paid directly by credit card is cheaper than transfers and is not riskier:

Credit card payments over the Internet are safer than their reputation, because the obligation to prove that a credit card debit was made correctly lies with the recipient of the funds.

The recipient must actually provide the account-holding bank with the PIN or the signature of the credit card holder as proof of his/her authorization to receive the funds.

However, neither of these is transmitted when paying by credit card over the Internet, so that the credit card holder is in the fortunate position of being able to reclaim from his bank a charge made to the credit card via the Internet. This is even sufficient at first (remotely) verbally!

The bank then has to deal with the unlawful payee of the money debited from the credit card, not you as the holder of the bank card.

Because we don’t imagine this to be very funny from the different foreigners, we have – with the exception of booking a flight with plastic money – been able to do without credit card payments via internet in more than 5 years of world travel.

And in Case of Emergency?

If you notice irregularities in your online account management while on the move, you should contact your bank’s customer advisor quickly.

You should report any unlawful credit card debits or the loss of your credit card as soon as possible using the toll-free international emergency number of your bank card issuer.

What does the end of net neutrality mean for crypto currencies?

The Senate has voted to annul the annulment of net neutrality by the Federal Communications Commission (FCC). Unfortunately, this was only a symbolic victory, because in order to actually implement it, the House of Representatives and the President would have to agree, which is unlikely.

Net neutrality affects every aspect of the Internet

Net neutrality is a President Barack Obama policy that prevents ISPs from arbitrarily controlling access to certain websites and applications. Click at donthatethegeek.com for a cool explanation of what net neutrality is.

The Trump campaign had net neutrality on its agenda during the election campaign and made the repeal one of the only election promises to have been kept so far.

Although the Senate vote to annul the repeal will be media effective, it remains questionable, if not unlikely, that the vote will be followed. Even Burger King has taken up the topic of Whopper Neutrality and its absurdity in an advertising spot.

Net neutrality and crypto currency

Bitcoin and crypto currencies may be decentralized, but most get their coins from crypto exchanges hosted by Internet service providers. BTC is here to stay and it is booming all over the world, as you can also read at http://www.rosarionet.com.ar/rnetw/nota209161.

An ISP that owns a conglomerate can charge users additional fees and slow down access speeds to crypto exchanges without net neutrality. This would mean that it might be more difficult to access crypto currencies.

This could hamper the growth of the industry and the development of technology, as new exchanges may not have a chance to compete in the market. The impact could be even worse for Miner as ISPs (Internet Service Providers) could decide to charge higher fees for nodes or even block them completely.

Most claim that the crypto currency market is too small to be relevant to ISPs. The most interesting areas will be Netflix, Amazon, Youtube and Spotify. However, the crypto currency space is growing. Since hedge funds and big banks are already storming the crypto market, strong growth can definitely be expected.

Vulnerability ERP security – the underestimated danger

The ERP system is becoming more and more like a technological node. Because it collects and analyzes data that is indispensable for business progress. Despite this great importance, the security of such solutions hardly plays a role.

Cyber security is a central issue for company decision-makers. This is also shown by the current CISO study. According to this study, German companies see cyber attacks as the greatest risk for their own IT. 74 percent of the nearly 800 IT and IT security managers surveyed rate the extent of the threat as high or very high. No wonder, since there are enough weak points that hackers can use. An often underestimated and neglected Achilles heel is the ERP system. What can happen if protection is lacking here was already demonstrated at the end of 2015 at the Black Hat Europe conference: Experts have attacked ERP applications of an oil company in order to manipulate pipeline pressure.

This drastic scenario raises some questions for many companies. For example, where are the weak points and what can companies do to arm themselves? First answers to these questions are given in the following article, which is based on an expert survey by ERP News.

ERP software: What are the weak points?

The following applies to any software: the more complex, the more error-prone. ERP systems are no exception. Despite extensive tests, not all vulnerabilities are usually detected – some of them are even found outside the software:

VPN

Not using a VPN or frequent updates is one of the worst things you can do, to keep your ERP system safe. A VPN is not only used for unblocking geo restricted websites, it is mostly used for security concerns in any IT architecture.

Vulnerability Age

Especially in medium-sized businesses, many companies have been using the same ERP system for decades. Those who do not maintain their software here for cost reasons often work with an outdated technology that facilitates an attack.

Diskettes

Even though the floppy disk age is long gone, many companies use outdated software and make it easier for hackers to infiltrate the system.

Vulnerability Encryption

Another sore point is the increasing networking with other companies. In e-commerce in particular, interfaces are needed inside and outside the customer network that bridge the gap between the company and marketplaces such as Amazon and Ebay. “These interfaces are always critical points of attack,” says Axel Krämer, Head of Central Services at All for One Steeb AG. “One example is access to ERP systems via SSL-encrypted communication interfaces. If the latest encryption technology is not used here, the system has a serious weakness and offers room for data theft.”

Encryption

The latest encryption technology is mandatory. SSL 3.0 was the latest version. The further development took place under the designation TLS, whereby the current version is TLS 1.2. In 2017 the successor TLS 1.3 will follow.

Human vulnerability

According to a study by the German Federal Office for the Protection of the Constitution, more than 30 percent of public attacks were triggered by internal perpetrators. The reasons for such attacks are multifaceted, as Dirk Bingler, spokesman for the management of GUS Deutschland GmbH, reports: “They range from disappointment, frustration at the workplace and private problems to simple ignorance of sensitive weak points in work processes. The lack of awareness of potential dangers is great, since visiting insecure websites at the workplace, a thoughtless click on e-mail attachments or using a private smartphone for company purposes via unencrypted connections is enough to grant access to harmful software.

Employees

It is precisely ignorance that opens the door to internal systems for many hackers. One wrong click and the malware can be used for espionage, for example.

As with any software, there is no absolute security with ERP systems. However, a few tips can minimize some risks:

  • Status quo: In order to get an initial overview, the actual situation of the entire IT – and thus also of security – should be recorded. The first weak points or fields of action can then be identified from this. The definition of goals is also important here. Only then can concrete measures be developed.
  • Updates: Regular updates and security updates are mandatory. This applies not only to the application itself, but also to all accompanying programs such as the corresponding firewall and the operating system on which the ERP solution runs.
  • Employees: Since many employees are not fully aware of the dangers, companies should hold regular training sessions and raise awareness of the topic of IT security – among all employees, including the executive floor. In addition, system access should only be permitted to users who need it. Preventive and monitoring rights specifications in the form of access controls increase the security standard here.

ERP security: being comprehensively prepared for the future

ERP security is becoming an important building block in IT security. However, not many companies are aware of this. Most assume that the IT department is already taking care of the security of the ERP system – behind the company’s firewall. But that is careless. What is needed is the firm anchoring of this business-critical application in a well thought-out security concept.

Are BTC worth it for small investors?

As far as currencies are concerned, Bitcoins occupies a special position. In Europe, the digital means of payment is recognised as a means of payment and therefore exempt from VAT, but it is not a legal means of payment or a currency or variety. Moreover, unlike other currencies, there are no physical Bitcoins in the form of coins or notes.

Nevertheless, Bitcoins are also on the advance here in Germany. In the meantime even the European Central Bank (ECB) has expressed its interest. Recently, the ECB had not promised the Bitcoins a great chance of survival.

So it’s no wonder that many small investors are now wondering whether it’s worth getting involved with Bitcoins. Especially since the ECB’s low interest rate ensures falling returns on classic investments. Profits in the two-digit range provide naturally for large interest. Investors should always remember, however, that Bitcoins also carry a large risk due to their special features.

How are Bitcoins produced and managed?

The digital currency is managed via a decentralised computer network with its own software. Unlike central banks, which print physical money, Bitcoins are produced using computer-based algorithms. What sounds very simple in theory, requires a lot of time and computer capacity in practice.

The payment process with Bitcoins

All transactions with Bitcoins are recorded in a database. If you want to pay with Bitcoins, you can register with one of the numerous service providers. Subsequently, a virtual wallet is set up for the customer. This does not initially include any credit. The virtual account can then be topped up with any amount, similar to a prepaid credit card. In the USA, there are already numerous terminals for this, which make a particularly simple top-up process possible. The first terminals have also been installed in Germany.

The payment participant remains completely anonymous at Bitcoins. Critics criticize this and associate the currency with illegal activities such as money laundering. Meanwhile Bitcoins are accepted with ever more dealers. This includes both the local coffee shop and shops on the Internet.

What should investors know before investing in Bitcoins?

In recent years, the Bitcoin rate has been characterised by extreme downward and upward swings. Even experts do not always find an explanation for the high volatility. You will also need a reliable exchange like Monfex. Read more about them in this Monfex review.

Where can market analyses be found?

Bitcoins are a virtual currency and are therefore not traded as a currency pair with USD or EUR. In addition, they are not linked to any government, key interest rate or other factors in the financial markets. Economic or political decisions therefore only have a limited influence on the Bitcoin and its price.

Detailed market information can therefore only be found on the relevant websites of the online Bitcoin exchanges and on specialised news sites. The well-known financial portals, on the other hand, tend to keep a low profile. All in all, the established financial service providers still seem to have difficulty with the digital currency.

Chart analyses are problematic

  • Since the Bitcoin exchange rate does not develop in line with or contrary to other currencies, technical chart analyses are very difficult. Historical price developments do not indicate a repetition of the crypto currency.
  • Investors therefore have no choice but to keep a constant eye on the price and develop their own feeling for the right time to buy or sell.
  • It should also be noted that online exchanges are not regulated for Bitcoins. Although the price depends to a certain extent on supply and demand, an exact forecast cannot be made.

How do experts see the price development?

Financial experts primarily blame the threatening Brexit for the upswing in the Bitcoin share price. Uncertain developments in other currencies such as the pound are increasingly bringing more investors to Bitcoin.

High demand

On the one hand there is a high demand, on the other hardly any Bitcoins are sold. As with all goods that are not sufficiently available, this inevitably leads to rising prices. Demand has risen above all in China. This is partly due to the economic uncertainty in the Middle Kingdom. In addition, the country has been experiencing a flight of capital for quite some time.

Commercial sector shows growing interest

Bitcoins uses the so-called blockchain technology. A data block chain is extended by a miniature data block for each transaction. The technology has aroused the interest of commercial providers and central banks. They are hoping for high revenues through the granting of digital rights to the technology.

Difficult market environment for small investors

Due to the numerous special features and characteristics, Bitcoin Investment represents a major challenge for small investors. Extremely high yield opportunities are offset by an above-average risk. If you are not an insider, you can hardly understand the fluctuating price developments. Realistic forecasts are therefore not possible.

In view of the current high market value, it is not advisable for investors to enter the market at this time anyway. Whether the value for Bitcoins will rise still further, cannot be foreseen at present. It is very possible that there will soon be a strong downward movement in the price. At the moment there is simply too little experience to make a statement about the continuation of the trend. Therefore, speculation with Bitcoins is mainly reserved for gamblers.

Are there alternatives to Bitcoin with less risk?

If you are interested in Bitcoin trading but don’t want to invest directly in the digital currency, there are some alternatives such as binary options. The currency can also be traded through Forex & CFD brokers. Here no Bitcoin is acquired, but only speculated on the development of the price. This is already possible with small investment amounts.

How are Bitcoin traded as binary options?

Trading with binary options is becoming increasingly popular in Germany as well. This is due in particular to the fact that even small amounts can be traded. In addition, trading is very simple. The possible returns of up to 85 percent should also not go unmentioned. Of course, this investment is also associated with a risk. If the price does not develop as predicted, a total loss of the invested capital threatens.

The advantage of binary options is that you can bet on both rising and falling prices. The easiest way to trade Bitcoins is with classic call/put options. Here the trader only has to decide whether the price is above or below the current value at the time of expiration. If the assessment is correct, the stake is paid out plus an impressive return.

Trading Bitcoins via Forex & CFD Brokers

  1. Another alternative is Bitcoin CFDs, which are offered by brokers such as AvaTrade and IG Markets. You can trade around the clock, five days a week. Depending upon broker a lever of up to 1:20 can be used.
  2. CFDs also speculate on a rising or falling price. Since these are leverage products, a high profit can be achieved even with a small investment. The stronger the price movements, the higher the returns possible. However, the leverage used also ensures a greater risk.

Conclusion on the Bitcoin trade

Bitcoin is a digital currency that can be used as a virtual means of payment. Bitcoins are not subject to the same market conditions as traditional currencies. Due to the special features, reliable market analyses are not possible. For private investors, trading is therefore only recommended to a limited extent. As an alternative, trading with binary options or CFDs is possible.

Live Chat Software & CRM

Customer relationship management has changed in the course of digitization. That much is clear. Because even if customer needs remain unchanged, there are many new points of contact between the customer and a provider. Strong customer orientation alone is no longer enough today. A change of perspective is now necessary for successful customer relationship management. In this article, you will learn how to anchor this new type of customer orientation successfully and, above all, sustainably in your company.

Good customer service has always been an important success factor in companies and begins before the purchase. Genuine customer orientation has the goal of fulfilling the customer’s expectations of the company’s services. These expectations often relate to material values such as product quality or price. However, immaterial values must not be disregarded here. Adherence to delivery dates, open communication or simply the right information at the right time can be decisive sales factors because they ultimately influence customer satisfaction.

1. satisfied employees = extraordinary customer service

When it comes to strong customer relationships, it should not be forgotten that a basic prerequisite for customer satisfaction is employee satisfaction. Because only a satisfied employee can offer interested parties and customers extraordinarily good customer service. Satisfied employees have more motivation, a better mood and value their customers. This can be seen, for example, in the quick confirmation of a customer enquiry, the natural offer of various contact options such as telephone, chat or e-mail, and the aim to solve problems immediately.

The customer satisfaction is an important yardstick for the quality of the customer orientation. Because only the evaluation of the customer by the comparison of the expected achievement with the experienced – subjectively noticed – achievement brings reference points for the own customer orientation.

2. winning and retaining customers

Countless books have already been written about the term customer relationship management in the past. Probably because this term describes the core of what is necessary to win customers, retain customers and develop customers. Customer Relationship Management (CRM) describes the consistent orientation of a company towards its customers. This also includes a systematic presentation of all customer relationship processes. The most efficient way to manage and document customer contacts is to use CRM software.

3. systematically approach customer relationship management

The knowledge of the legitimate wishes and requirements of customers and the corresponding focusing of all customer-oriented measures (product quality, pricing, communication and much more) can be simplified to the management of customer relationships (Customer Relationship Management, CRM).

The goals of defining and systematizing business and communication processes, for example, are manifold. It is highly recommended to clarify these goals and to make them clear in advance of any conceptual definition.

4. real customer relations instead of mass marketing

We can still copy professional CRM from Aunt Emma in the small shop around the corner today: Aunt Emma knew her customers personally, their preferences and idiosyncrasies. In this way she could respond to each customer individually and ultimately knew that it wasn’t far from shining children’s eyes to satisfied customers. The result: customer loyalty from childhood on, resale included and sophisticated recommendation marketing. Today, the customer must first be filtered out of an anonymous, fast-moving crowd. And sometimes companies even have to stand up to the competition on the other side of the globe.

But this is precisely why CRM is still the key to (satisfied) customers today. In any case, CRM is the key to a real (relevant) customer dialogue – and the fundamental basis for integrated communication, i.e. the optimal coordination of all measures in advertising, PR and communication.

5. maintain individuality despite mass processing

For example, today a mailing no longer has to be sent to the customer thousands of times identically. Rather, the qualification features of a well-maintained database lead to an optimized, target-oriented approach. Letters, postcards and e-mails now transport the relevant information or the appropriate offer to the customer at the right time. This means individuality despite mass processing. Of course, this goes beyond the task of “sales” or at least “qualification for active sales”.

The loyalty of a customer to the company, the brand and the products or services has many positive aspects. Some are listed here:

  • Confirmation of purchase: A communication after the purchase is often necessary, in order to support the satisfaction with the purchase decision. The easiest way to do this is to certify the right decision to the customer and continue to be there for him.
  • Repurchase: After the purchase is before the purchase. And this is always the case if the customer is satisfied with the product and the communication and service support him in this opinion.
  • Recommendation: A recommendation can rarely be expected in the case of “only” expected satisfaction. In addition it needs already surprising after Sales measures. But often it needs less than you think. And the CRM-driven activities are always worth it. Because with the real recommendation, half the way to the new customer is usually already taken.

Read the second part of this article to find out which business relationships are particularly relevant to customer retention.

6. The best Live Chat Software

JivoChat is a website live chat solution that provides customizable web and mobile chat widgets with features such as real-time visitor monitoring, page view history, email chat transcripts, file transfers, predefined responses, customer service quality ratings, performance reports and more. It has been rated very well on a lot of reviews, for example at WebsiteToolTest (WebsiteToolTest.com/jivochat/). With browser-based, desktop, Android and iOS agent apps, users can recruit and respond to website visitors from anywhere, anytime.

Mac security: VPN – a protected gateway to the Internet

With a VPN connection, surfing the Internet becomes massively more secure. However, the setup is considered complicated. No, it is not. At least not on the Mac.

A few days ago, a serious gap was discovered in WLANs. The WLAN protocol WPA2, which was previously considered secure, became an insecure loophole overnight. Scholars are still in their wits as to how critical this security hole actually is. Many manufacturers have reacted quickly and have meanwhile plugged the hole (e.g. Apple with Tuesday’s updates). The average consumer or user, however, once again realized that one cannot always rely on experts, manufacturers, hardware and software. Sometimes you have to help yourself.

A virtual tunnel

VPN stands for Virtual Private Network. With this technology, all network traffic is bundled and sent encrypted through a kind of tunnel. A private tube through the otherwise quite open networks.

The nice thing about VPN is that you can open and close the tunnel as you need it. In a familiar network at home or in the office, VPN is normally not needed. On the way via the hotspot on your own iPhone probably not either. But in the public WLAN of the SBB, the Migros or a café… just one click and the VPN tunnel is activated.

Setting up VPN

The VPN function is already built into iOS and OSX. But it won’t do you any good if you don’t have a partner to build and offer you the tunnel. Swisscom, for example, can be such a partner. It offers VPN services.

Or you can laugh at one of the various providers worldwide that offer VPN services for little money (more about that). No matter which choice you make: the VPN provider gives me the settings for my private network and I then enter this in the appropriate place in the network settings.

  • I add a new service (1), select the VPN service (2), set the protocol (3) and give the whole thing a name (4). When I then click OK, OS X queries all the settings I received from the provider.
  • From now on I can start and stop the VPN from the menu bar. Or I just leave it on for simplicity, then I don’t have to worry anymore.

VPN is a matter of trust

Now there’s another catch. A VPN tunnel like this is still a matter of trust. Because I have to be sure that my VPN provider doesn’t install a back door somewhere to read out the data that I deliver to him exclusively at the push of a button. And that’s where it gets tricky for me. Ok, I trust Swisscom. But to any VPN provider that has set up its servers in Bermuda?

I was skeptical. And so it took a while until I found a partner who seems to me to be trustworthy. This is Golden Frog, a company that has been in business for years and has built up its business here in Switzerland because it has some of the strictest data protection guidelines in the world. Golden Frog offers a VPN service called “vyprvpn” which I can recommend. It doesn’t cost too much and works perfectly on all devices. The installation is even a bit easier than with on-board devices, because the settings are made directly by the app. Also here I can switch VPN on and off in the menu if necessary.

Anonymous & safe Internet surfing

Most people stay on the Internet every day and send or receive data. These data can be very sensitive and should not be seen or tapped by strangers or thieves. It is also important to remain unknown on the Internet so that your data cannot be used for fraudulent activities. This article is intended to be a small guide explaining how and why it makes sense to remain unknown on the Internet.

  • Why is it at all possible to be identified on the Internet?
  • How can you hide your IP address when surfing?
  • How can one surf anonymously in the browser (keyword Privacy Mode)?
  • What data do you reveal about yourself if you surf without protection?
  • What are the free ways to surf anonymously?
  • What are the options for anonymous surfing that are subject to a fee?
  • When should you surf anonymously?
  • Is disguising the IP address illegal?

Why is it even possible to identify oneself on the Internet?

Every user who is on the Internet can usually be identified by his IP address. Of course, the name or address of a user cannot be found immediately through this address. The address can, however, be stored in order to personalise advertising or create individual offers, for example. The exact location of the user can also be identified by the authorities on the basis of the IP address. And for everyone there are already free websites with which one can locate an IP address. In order not to allow other people unauthorized access to their own data, the IP address should therefore not be shown while surfing.

How can you hide your IP address when surfing?

It is usually not easy to hide your IP address or not show it to a server and other users. For this reason, the only solution is to change the IP address. This is done by connecting to a so-called VPN server. The data is first sent to the server and then forwarded from the server to the user. This makes it appear to the sender that the recipient is in another country if the VPN server has an IP address from another country.

The sender does not know the real IP address of the recipient, so that the actual user is very difficult to identify. This connection can be made by special software, whereby there are also different add-ons for the different browsers, with which such a server can be accessed. Using a special browser (e.g. the Tor browser) can also hide your IP address.

But there are also enhancements for all common browsers, such as Zenmate, which can redirect the Internet connection with a click via an alternative route to enjoy additional privacy on the Internet.

How to surf anonymously in your browser (keyword Privacy Mode)

As a rule, almost every browser supports a so-called private mode. In this mode, the browser does not store any data, i.e. no cookies and no browser history. By activating the private mode, the provider of the website receives the usual data about the visitor. So the private mode only prevents curious eyes using the same PC from revealing data about the user and his surfing behaviour.

What data do you reveal about yourself when surfing without protection?

The website first and foremost learns the IP address and thus inevitably the approximate location of the user. The website also learns which browser and which operating system the user has installed on his computer. This data is usually necessary to display the website correctly and is therefore also transmitted. This data makes it relatively easy to identify a computer and thus also a user if he or she frequently visits different websites and always reveals the same information.

As a rule, websites can very easily access the following information of the visitor:

  • operating system
  • Device type (Laptop / Smartphone / Tablet)
  • IP address
  • Social media login status
  • Browser and installed plugins
  • Hardware information such as CPU and GPU

With which free possibilities can you surf anonymously?

The completely anonymous surfing can be made possible by a so-called TOR-Browser. This is completely free of charge and can be downloaded and installed easily. The browser conceals the IP address of the user so that the server cannot receive any information about the user. Using a VPN connection can also hide the user’s IP address. Some VPN servers are free of charge, but do not offer a particularly high Internet speed.

Which paid options are available for anonymous surfing?

If you want to surf the Internet quickly despite a VPN connection, you can access the paid VPN servers. A small contribution must be paid so that the user can connect to the server. As a rule, the speed of the connection does not suffer as a result.

When should I surf anonymously?

All data collected from outside can be used in case of doubt or for fraudulent activity against a user. Therefore you should always surf anonymously to prevent such attempts. Fraudsters can also detect relatively easily, for example, when the user is on holiday and his home is unoccupied. Particularly in public WLAN networks, such as train stations and airports, a high value should be placed on anonymity. In such networks, data can be accessed very easily.

Therefore, no important data should be sent in such a network if the connection is completely unprotected. This allows thieves to pick up passwords or credentials and gain access to a bank account or other important account.

Is disguising the IP address illegal?

No, using a TOR browser or a VPN server is not illegal and is not punishable in Germany. This is of course different if the procedure was used for fraud. However, the usual surfing and use of the Internet can still be carried out without breaking the law, even if one’s own IP address remains hidden.