How to Make the World’s Best Paper Airplanes

world's best paper airplane instructions

There are many skills fathers should pass on to their children: how to ride a bike, how to skip a stone, and of course, how to make a paper airplane. When it’s time to show your kids how to fold a humble piece of paper into a soaring jet, don’t stumble around and hastily construct one from the poor memory of your youth — one that takes a disappointing nosedive as soon as it leaves your fingertips. Instead, teach them the art of making a plane that can truly go the distance.

The three designs below are tried and true (you wouldn’t believe some of the science behind paper airplanes) and are perfect beginner, moderate, and expert level models to play with. They go in order from easiest to hardest, so there’s something for every age level — including adult; don’t act like you’re not going to try these out in the break room.

The Bulldog Dart

This paper airplane is a warm-up of sorts. It’s simple, requires few folds, and flies well. It’s just not going to win you any contests or style points. If it’s your kid’s first time making a real paper airplane, this is a good place to start.

world's best paper airplane instructions

world's best paper airplane instructions

world's best paper airplane instructions

world's best paper airplane instructions

world's best paper airplane instructions

world's best paper airplane instructions

world's best paper airplane instructions

paper airplane bulldog dart

The Harrier

This is a slightly more advanced paper airplane. There are a few more folds, and it flies a bit better than the above Bulldog Dart. This is the perfect middle ground between simple and complex recreational paper aircraft.

paper airplane harrier folding instructions








The Hammer

While there are far more advanced paper airplanes, this one, in my opinion, is the perfect balance of complexity and accessibility for the Average Paper Airplane Joe. It has far more folds than the previous two models, and also flies the best and farthest. Pay attention with this one, folks, and the payoff is well worth it.

paper airplane hammer folding instructions


















The remote device or resource won’t accept the connection

When your Internet connection is not working properly, you may run the Windows Network Diagnostics Troubleshooter to fix the issue. While it usually ends up fixing your problem it may at times throw up a message – The remote device or resource won’t accept the connection. If you receive this error message, this post may help you resolve the issue.


This particular error occurs when your LAN settings may have been changed and incorrectly set. A malware may also change these settings automatically. When you receive this error, the ping may work as usual, but you would not be able to access any website in any browser.

 Way 1:

Scan your Pc with an antivirus program.

You can use Hitman pro and Malware bytes to scan for any virus that might have caused this error.

Way 2:

You may check your LAN settings and see if you need to change them.

To change LAN settings, open type inetcpl.cpl in Start Search and hit Enter to open Internet Options.

After opening the window, switch to the Connections tab and click on the LAN settings button.

Now, if the Use a proxy server for your LAN option is checked, uncheck it and save your changes.


Alternatively, you can go to advance option and reset your settings.

This is expected to help.

If it does not help, also uncheck the Automatically detect settings check box, click Apply, and see.

Let us know if this helped.

The genius of Stephen Hawking

“We are just an advanced breed of monkeys on a minor planet of a very average star. But we can understand the Universe. That makes us something very special.”

– Stephen hawking

Stephen William Hawking (8 January 1942 – 14 March 2018) was an English theoretical physicist, cosmologist, author, and Director of Research at the Centre for Theoretical Cosmology within the University of Cambridge. His scientific works included a collaboration with Roger Penrose on gravitational singularity theorems in the framework of general relativity and the theoretical prediction that black holes emit radiation, often called Hawking radiation. Hawking was the first to set out a theory of cosmology explained by a union of the general theory of relativity and quantum mechanics. He was a vigorous supporter of the many-worlds interpretation of quantum mechanics

He died at the age of 76.

He died peacefully at his home in Cambridge in the early hours of Wednesday, his family said.

Hawking had a rare early-onset slow-progressing form of motor neuron disease, that gradually paralyzed him over the decades. Even after the loss of his speech, he was still able to communicate through a speech-generating device, initially through the use of a hand-held switch, and eventually by using a single cheek muscle.

Hawking was famed for his work with black holes and relativity and wrote several popular science books including A Brief History of Time.

At the age of 22, Prof Hawking was given only a few years to live after being diagnosed with a rare form of motor neuron disease. He was told he had only a brief time on Earth, but spent half a century captivating audiences in lecture halls, on TV and in the pages of his books

Stephen Hawking always had something to say. He shook up the world of cosmology with more than 150 papers, dozens of which became renowned.

Hawking warned about the threats of nuclear war, genetically modified viruses, artificial intelligence and marauding aliens. He pronounced on the human condition and once dismissed the role of God in creating the universe. The statement caused a fuss, as the denial of invisible superbeings still can in the 21st century.

At his best Hawking was spectacular: he made intuitive leaps that will keep scientists busy for decades.


A different self-driving car built by Two ex-Google engineers

A new startup that proposes a different spin on autonomous transportation came out of stealth today. The company, called Nuro, was founded by two former lead Google engineers who worked on the famed self-driving car project. Unlike the plethora of self-driving startups out there, Nuro isn’t focused on re-configuring robot taxis or autonomous trucks, but on designing a new type of vehicle altogether.

Nuro  isn’t trying to dominate this industry, and it’s not settling for a role as a component supplier. The Silicon Valley startup did develop its own self-driving system, from scratch, but where its competitors talk about ride sharing, trucking, deliveries, and any other use case they can think of, Nuro is focused. The company, which came out of stealth mode today and just raised $92 million, is going after commercial deliveries, and it has designed a vehicle that—unless things go terribly—no human will ever sit inside.

Dave Ferguson and Jiajun Zhu have devoted their careers to robotics and machine learning, most recently as Principal Engineers at Google’s self-driving car project (now Waymo). They founded Nuro in 2016 to harness the power of robotics and artificial intelligence to solve new challenges at a global scale.



Ferguson says they settled on commercial deliveries for three reasons: It was a project that could reach a lot of people, it offered a technical challenge and a sustainable business model, and it could be executed within three to five years. A year later, they had built the vehicle they’re now revealing to the world: the R-1. Nuro’s debut vehicle is the height of a sedan but about half as wide, and as long as a Smart car. It navigates using the usual suite of self-driving sensors—cameras, radars, and a spinning lidar unit perched up top. It’s fully electric and has two cargo compartments that can be specialized to fit all sorts of things you’d pay money to send whizzing around town: bags of groceries flowers, pizzas. It looks like a cross between a picnic basket, a toaster, and an MSE-6-series repair droid.

“We’ve built the full software stack from scratch. There are a lot of components that are shared with general self-driving, and some things that are a bit different,” said Dave Ferguson who, along with Jiajun Zhu, co-founded Nuro. “We’ve been able to architecture this thing from scratch, geared toward this passenger-less, goods-only transportation.”

Ferguson said they considered building the R1 to drive on sidewalks but ultimately decided to make it road-worthy instead. The vehicle is about as tall as a Toyota Highlander but only about half the width, which Ferguson said is one of its standout features. This skinniness translates into a 3 to 4-foot “buffer” around the R1 so other vehicles and pedestrians can maneuver safely around it.

“Even if you have the perfect self-driving vehicle, if someone pops out between two parked cars and it’s within your stopping distance, you can’t prevent that accident,” he said. “Whereas if you have a vehicle that’s half the width, and you’ve got an extra three or four feet of clearance, you can avoid it… and you have room to maneuver around them. You can better design the vehicle to mitigate the severity of any accident.”

Nuro’s founders have plenty of work left to do, like convincing regulators to certify vehicles that aren’t built for humans (today’s rules require that all vehicles have things like seat belts and airbags), and finding a profitable business model, whether that’s contracting with specific restaurants or businesses, or running packages the proverbial last mile between distribution centers and their final destination.

For me I would just say that Nuro is so adorable I wouldn’t mind being run over by it when a glitch in the autonomous self driving software system occurs. It looks like it would make hit and runs pleasant for pedestrians.

How to Block Promoted Tweets on Twitter on PC or Mac

10 Second Summary

1. Open Google Chrome.
2. Go to the Chrome web store.
3. Find or search the Hide Twitter Guff extension.
4. Click + ADD TO CHROME.
5. Click Add extension.

  1. Open Google Chrome on your computer. The Chrome icon looks like a colored ball with a blue dot at the center. You can find it in your Applications folder on a Mac, or on the Start menu on Windows.

  2. Go to the Chrome web store. Type in your browser’s address bar, and hit  Enter on your keyboard. The Chrome Web store will open up to the Extensions category.

  3. Find the Hide Twitter Guff extension on the web store. You can use the search bar in the top-left corner, or browse the extensions library and manually find this extension on the store.

    • If you prefer Firefox over Chrome, Hide Twitter Guff is also available as a Mozilla add-on.

  4. Click the blue + ADD TO CHROME button. You will have to confirm your action in a new pop-up window.



5. Click Add extension in the pop-up. This will install the Hide Twitter Guff extension, and add it to your browser. A bird icon will appear in the upper-right corner of your browser.

  • Hide My Guff automatically blocks all ads and promoted Tweets whenever you’re viewing your Twitter feed on Chrome.
  • If you switch to a different browser, you will see promoted Tweets on your feed again.


6. Right-click the bird icon. This button is located next to the address bar in the upper-right corner of your screen. It will open a drop-down menu.

  • If you currently have Twitter open in your browser, clicking this button will automatically open Hide My Guff’s settings page in a new tab.



7. Click Options on the drop-down menu. It will open Hide My Guff’s settings page in a new tab.

8. Select if you want to Hide or Show the Who To Follow section. In addition to promoted tweets, Hide My Guff also allows you to prevent Twitter from suggesting you accounts to follow. Click the selector next to Who To Follow, and select whether you want to Show or Hide it.

  • Hiding it will remove the Who To Follow box from the top-right corner of your feed.


9. Select if you want to Hide or Show the Trends section. The Trends box shows you a list of popular topics in Tweets around you. Click the selector next to Trends, and select whether you want to Show or Hide it.

  • Hiding it will remove the Trends box from the left-hand side of your feed.


10. Click Save my preferences. It will save your settings, and apply them to your Twitter Home feed.

  • You may have to refresh Twitter after saving your settings to see the changes.

Was Mars a war ground? Mysterious object resembling a ‘cannonball’ sparks debate – Watch

The Martian terrain has always been the center of attention for UFO hunters for possible alien sightings.

Those involved in alien hunting or UFO hunting have on many occasions, come close enough to provide evidence justifying extraterrestrial presence.

Since scientists are monitoring the planet’s surface fervently with the help of rovers, which will aid them in deep space exploration missions, the images sent in by NASA’s rovers are thoroughly scrutinized by these UFO hunters, who claim to have unearthed several evidences of alien presence on the Red Planet in numerous incidences.

Now, the keen eye of UFO hunters has spotted another ‘indisputable’ evidence of a potential war that may have taken place on Mars triggering a full-fledged debate on the existence of life on the Red Planet.

A video has surfaced showing what looks uncannily like a cannonball on the surface of the Red Planet, which has been seized as proof of life.

The clip was posted on YouTube, where stargazers have been guessing what it could be.

The ball appears to be surrounded by ‘the fragments of a once civilisation’, Scott C Waring, founder of UFO Sightings Daily, wrote on his website.

He speculated that this ‘civilisation’ could have been wiped out by weapons fired down from space.

He stated: “I do believe these balls and millions of others were deliberately shot at Mars from space all at once to destroy their atmosphere, burn it away.

“What I mean is a large enough man made meteor shower could strip Mars of its atmosphere and thus, destroy all or most life on the planet surface.”

Check out the video below:

(Video courtesy: ModernGalaxy)

Many believe that the object is not a natural occurrence since it is a perfect sphere and is actually surrounded with red and brown rocks.

How to Sync Your Phone With Windows 10

At Build 2017, Microsoft CEO Satya Nadella said, “The user experience is going to span all of your devices. That multi-device experience is what now needs platform capability.”

A big part of this is connecting your smartphone to your PC. Not only does this let you seamlessly move from web browsing on the phone to the Windows 10 PC, but it also enables the Cloud Clipboard, which will let you copy from one device and paste to another.

Since Windows 10 is considered a service rather than a set software products, more cross-device capabilities will be added on the fly. The first to appear is Continue On PC. How does it work? Simple. You’re browsing on your smartphone—on any browser and on either Android or iOS—and you just send the current page to your Windows 10 PC, where it opens automatically to that same page.

Continue on PC is just a taste of the multi-device cloud services promised by what Redmond terms the Microsoft Graph, which EVP for Windows and Devices Terry Myerson describes as “…an intelligent fabric that helps connect dots between people, conversations, projects, and content within the Microsoft Cloud–ensuring experiences flow seamlessly between Windows, iOS, and Android devices.”

Read through the slides to see how you get started with this new world of interconnection. The process is basically identical on Android phones, though I used an iPhone to test the process.

1. Start at Settings

Starting with Windows 10 Fall Creators Update, the Settings app gets a new Phone section. Begin by opening the Settings app and clicking on this icon.




2. Phone Settings in Windows 10 Fall Creators Update


Here’s the Phone settings dialog. Note that you’ll be able to continue more than just browsing from phone to PC. In particular, email and other apps will also be able to make the jump from phone to PC. To get going, click on the Add Phone button. Of course, before you can do that, your PC needs to be signed into a Microsoft account.

3. Link Your Phone


The add phone dialog, as you might expect, asks for your smartphone number. Fear not, though, the number isn’t saved and is just used to send you an SMS with a link.

4. SMS Message


Here’s how the message sent to my iPhone looked, before and after previewing the iTunes App Store entry.

5. Continue on PC App



Connect to PC is the app that makes it all happen. A four-screen tutorial shows you how to complete setup.

6. Add to Share Sheet


Open the Share sheet from any app, press the More … button. Then find Continue on PC and slide its slider so that it’s green.

7. Sign In


When you first try to share to Continue on PC, you see this page for signing into the same Microsoft account that you use with your PC. You’ll only have to do this once.

 8. Send!


Now you can send the current web page (or other app) to the linked PC. Note that you get a choice to open the item immediately or to send a notification to the PC’s Action Center. A lot of apps don’t work with Continue on PC, including Apple native apps like Photos. But any browser works, as do the Flickr and the Soundcloud apps, for example.

9. Ta-Da!

It’s pretty cool to launch something remotely from your phone on your PC!

MacOS High Sierra ‘Root’ Bug Can Reactivate

Last week, Apple was left red-faced after it was discovered a bug in macOS High Sierraallowed anyone to gain root access to the system without a password. The company quickly released a security patch to fix the problem, but it also needed updating with an advisory because it could prevent file-sharing on the Mac. Now another problem has been identified, and it allows the root bug to be reactivated.

As Betanews reports, it turns out when Apple released the security patch it assumed Mac owners would apply everything in the correct order. Assuming never ends well and so further clarification was required from Apple as to how to go about applying the patch.

The patch assumed your Mac is already running macOS 10.13.1, but that isn’t the case for everyone. Some users applied the patch while running 10.13.0. Everything seems fine afterwards, but then the 10.13.1 update gets installed and the root bug is reintroduced. User wouldn’t realize this and Apple didn’t state that would happen.

Another oversight from Apple is assuming everyone would reboot their Mac after applying the security patch. If you don’t, apparently the patch isn’t applied properly and your Mac is still vulnerable.

In order to ensure your Mac is fully protected, be sure to upgrade to macOS 10.13.1 first, apply the security patch, and reboot your machine. if you have already gone through the update process and now aren’t sure if it worked or not, there’s an easy way to check. Simply visit the Apple support page for the update and follow the steps there using the Terminal app to confirm you are secure.

This simple AirPods hack can dramatically improve the sound quality

Apple’s AirPods have always struck me as peculiar. Not just because of the shape, which is definitely odd, but the fact that so many owners rave about their $159 earbuds, despite admitting to mediocre sound. Surely the most important feature of any headphones sold for that price is the quality of the audio?

Nevertheless, I bought a pair at the urging of several of my colleagues. Now I get it. The AirPods experience is simply delightful in ways that fiddly Bluetooth headphones have yet to achieve. They’re so lightweight that I forget I’m wearing them and they make Siri surprisingly useful. The battery also lasts forever (in wireless terms), thanks to the clever charging case that also doubles as an iPhone stand.

But the sound… I had to do something about the sound.

Vlad Savov, our resident headphone expert, will be the first person to tell you how important fit is when it comes to audio. Remember, he’s the guy that unlocked the sound of an $1,800 pair of earphones using nothing more than some tips he scavenged from the bottom of a drawer. Since the AirPods are notoriously leaky due to their open-air design, that got me to thinking: what if I could close the air gap to simultaneously block ambient noises while increasing the bass response? That’s when I found this video on the PoltergeistWorksYouTube channel:

Looks easy, doesn’t it? So I tried it. The surgery lasted about 20 minutes, but the result… the result would have been worth two hours of work. My AirPods now have bass!

I wasn’t able to find white foam covers that could be delivered to my home in Amsterdam, so I settled for black which cost me just a few bucks per dozen. They look fine as the foam disappears into the ear — not that you could really make the AirPods look any worse. The black foam is also transparent enough under direct LED lighting that I could still mark the sensor locations using my daughter’s pink sparkly nail polish. I then used a disposable lighter to heat the business-end of a tiny screwdriver meant for eyeglass repair (about 60 seconds for each hole). I wasn’t able to burn the sensor holes as cleanly as the video, having to repeat the process a few times on all but one of the holes, but I was ultimately able to achieve the desired result without my fingers getting too burnt (though the tip of my thumb used to ignite the lighter is still numb 12 hours later).

The AirPods after foam cover hack.
 Photo by Thomas Ricker / The Verge

The better sound, especially at the low end, is remarkable. And the better seal in my ear makes my hacked AirPods far more enjoyable in the gym where my aggressive music tastes have to compete with music playing on the loudspeakers, and the grunts and clanking of the human machinery all around. My colleague Dan Seifert who runs The Verge reviews program hacked his AirPods last week as well. Now he says that he doesn’t have to crank his AirPods as loudly on the train.

Sure, there are plenty of aftermarket tips you can buy for just a few dollars that achieve similar results. However, none of those products — usually made from a flexible silicone — fit inside the AirPods case. That means they have to be constantly taken on and off in order to charge the buds. The hacked foam covers, however, fit inside the charger case with only a slight resistance felt when closing the lid.

Like most hacks, the results aren’t flawless. Both Dan and I have experienced times when the foam slips to obscure the sensor openings, thus defeating functions like auto pause when removing an AirPod from an ear. Features like double-tap for Siri or to advance tracks are unaffected by the hack.

All this makes me wonder why, nearly a year after the AirPods went on sale, we still can’t buy a retail version of these foam covers with precision cutouts for the AirPods’ sensors. “I’d buy a four-pack in a heartbeat instead of dealing with this DIY crap,” said Seifert in his adorable surly style. And you know what? As satisfying as do-it-yourself is, I’d have to agree.

How to use a Bitcoin Tumbler

The Bitcoin (BTC) cryptocurrency is designed for trustless, pseudonymous transactions. While it’s often touted as a way to move money anonymously, this is difficult to achieve in practice. Most Bitcoin Exchanges require you to provide ID and use a bank account in your own name to purchase coins.

All transactions are also publicly recorded in the Bitcoin Blockchain meaning the movement of your coins can be traced from the initial purchase to other payment addresses. Even if you buy Bitcoins for cash or mine them yourself, your Bitcoin wallet software may be associated with your computer’s IP address.

In this guide, we’ll explore how to disassociate any Bitcoins you purchase from your identity by using a Bitcoin mixer (sometimes known as a ‘tumbler’). A person who wants to protect their privacy first sends their Bitcoins to the mixing service, who will then swap their coins for someone else’s of equivalent value, less a small commission. The user can then withdraw these new Bitcoins from the mixing service to a new wallet. This makes it extremely difficult to link your Bitcoins to your identity by examining transactions along the Blockchain.

The Bitcoin mixer we’ve chosen for this guide, BitCoinFog, is one of the oldest and most reputable. The service charges a randomized commission of 1-3% on Bitcoins it processes.

Bear in mind that if you send your virtual coins to a mixing service which is unreliable or operated by a scammer, you’ll lose your Bitcoins. We encourage you to do your own research to find a trustworthy service.

1. Boot TAILS

TAILS (The Amnesiac Incognito Live System) is a version of the Linux operating system. It can boot from a DVD or USB stick on your machine. After you’ve finished using it, no trace of your activity will be left on the target machine. This makes TAILS perfect for privacy-related tasks like Bitcoin mixing.

TAILS also shunts all internet connections through the anonymizing Tor network. In this guide, you’ll use this to make sure your IP address isn’t linked to your Bitcoins.


2. Create transition wallet

If you already have some Bitcoins, you will most likely already have a virtual wallet to store them in, either on your computer, or online such as with a Bitcoin Exchange like Bitstamp. As your IP address can be linked to these, first you’ll use TAILS to create a temporary holding wallet for your coins before mixing them.

Click ‘Applications’ > ‘Internet’ then ‘Electrum Bitcoin Wallet’. The program will first display a warning saying that your Bitcoins will be lost if the machine restarts. Click ‘Launch’. (You’ll learn how to back up your wallet in the next step).

3. Back up transition wallet

In Electrum choose ‘Create a new seed’, then click ‘Next’. Electrum will now display 12 random words, for instance:

trade excite decide pink squeeze flight crazy diary pope five torch map

This is known as your ‘wallet seed’. Anyone with a copy of this can access the Bitcoins you send to this wallet. Write down the wallet seed (word order is important) on a piece of paper, then click ‘Next”’

Retype the wallet seed on the ‘Confirm Seed’ screen to make sure you have it written correctly, then click ‘Next’ again. Electrum will prompt you to set a password but there’s no need – just click ‘Next’.

4. Send funds to transition wallet

Electrum will now generate your wallet addresses using the seed from the previous step. Click on the ‘Receive’ tab to see your current payment address for Bitcoin and be sure to write it down (for example: 1FABUc4xvyCYYWBqiX3aKBs4YVkW31azi).

Next, use your existing Bitcoin wallet to withdraw the amount of BTC you want to mix to this address. The steps to do this will vary. If you bought your BTC via Bitstamp, visit to send funds to your new wallet address.

Electrum will show this amount as an unconfirmed balance until funds are confirmed. Minimize the Electrum window for now.

5. Register with BitCoinFog

Click ‘Applications’ and then ‘Tor Browser’. The current deep web address for our mixer of choice, BitCoinFog, is http://foggeddriztrcar2.onion. Enter this into your browser and press return. (Note you can check if the address is still correct by following the official thread on BitcoinTalk here). Domains ending .onion are specific to the Tor network and are designed to anonymize your location.

Click on ‘Register’ at the top right and enter your chosen username and password. (We recommend using Diceware to create these). Note these down on a piece of paper. Once you’ve registered successfully, enter your details to log in.

6. Deposit funds to the mixer

From the BitCoinFog page click ‘Deposit’. The website will automatically generate a deposit address for you.

Highlight this address with your mouse, right click and choose ‘Copy’. Reopen your Electrum Bitcoin Wallet and click on the ‘Send’ tab.

Right click on the ‘Pay To’ field and paste in the BitCoinFog deposit address. Click ‘Max’ under Amount, then ‘Send’. Electrum will confirm that the funds have been sent and will show you a transaction ID.

Reopen the Tor Browser and visit https://blockchainbdgpzk.onion. This is the dark net version of Paste the payment address in the field at the top right to check the status of your funds. The transaction must be confirmed 6 times.

7. Generate storage wallet

Restart your machine and load TAILS once again. Click ‘Applications’ > ‘Internet’ then ‘Electrum Bitcoin Wallet’.

Ignore the warning and click ‘Launch’. In Electrum choose ‘Create a new seed’, then click ‘Next’. Electrum will now display 12 new random words. Write these down on paper in their precise order, so you can access your new, mixed coins in future. Electrum will also ask you to retype the seed.

To avoid confusion you may want to put a line through the wallet seed you generated earlier after writing this new one down. Remember that anyone with access to this seed can control your BTC so keep it safe.

8. Set up withdrawal

Click ‘Next’ to skip past the Electrum password screen, then click on the ‘Receive’ tab to see your new payment address. Make a note of this (for example: 1vjB1PyehWn5jRPkLV7RYFKvNmk1HEcPr).

Click ‘Applications’, ‘Tor Browser’, revisit BitCoinFog and sign in.

Click on the ‘Withdraw’ tab from the main page. Paste in your Electrum payment address in the box below.

Under ‘Time Span’, you can choose the period of time over which the coins will be withdrawn. Generally, the longer this period is, the less likely it is the coins can be traced back to you. The default is six hours, but you can choose up to 96 hours.

9. Mix your BTC

After you’ve set the ‘Time Span’ for withdrawals under ‘Delay’, you can vary the number of hours before starting withdrawal. Make sure to set this to at least one hour so no one can match the time of the transaction to when you were using the Tor network.

Finally click ‘Submit Withdrawal’. You’ll be asked to complete a small Captcha to continue. Carefully check the destination address, time span and delay before clicking ‘Submit Withdrawal’ once again.

If you set a delay for withdrawal, be sure to shut down your machine before the funds are processed. BitCoinFog will deduct a randomized fee (1-3%) for mixing the coins.

10. Restore your wallet

If you want to check on your newly mixed Bitcoins (or spend them!), reboot TAILS from your machine and return to ‘Applications’ > ‘Internet’ then ‘Electrum Bitcoin Wallet’.

Choose ‘Launch’ to start Electrum, then click ‘Next’. On the Keystore screen choose ‘I already have a seed’, then click ‘Next’ again.

On the ‘Enter Seed’ screen type in the seed of your storage wallet, click ‘Next’, then ‘Next’ again to skip past the password screen. Electrum will restore your wallet along with its balance.

Make sure you only access your wallet via TAILS in the future. This will ensure there’s no connection between your real IP address and these Bitcoins.