NEW PRODUCTS FOR THE CRYPTOCURRENCY WORLD POWERED BY ($S4F)
Hello Crypto World! There is news: We are getting closer and closer to the official date of the S4FE launch: Saturday, November 14th, 2020 What will happen on that date? S4FE can proudly look back on three years of product development and announce that the S4FE rockets will start on November 14th, 2020. The following products are published and made available to the public: Launch of the S4FE search engine, available online from November 14th, 2020, at www.s4fe.io. https://preview.redd.it/lmyvnvoyzms51.png?width=1916&format=png&auto=webp&s=763f5a00cf51148a7e4cf76e354e43ba308ee533 The S4FE search engine is a public and free search engine for objects of all kinds and will be the link between private customers, producers, law enforcement agencies, and insurance companies. Private and corporate customers will be able to create a kind of "cloud" (we call it "S4FE"). In this S4FE, valuables can be linked or managed with the digital world.
PoO - Proof of Ownership is being revolutionized.
From November 14th, it will be possible to digitally map an object's ownership and transfer items digitally from "User A" to "User B" via mouse clicks. The lost and stolen function will also be fully available and usable, which means that objects can be tracked in real-time and reported as stolen in real-time in the event of theft, for example. For stolen goods, the transport and sale of stolen property is made much more complicated for thieves and can involve some complexities. During a spontaneous police check, stolen things can appear in the system that was stolen a few minutes ago and have not yet been reported in the police system— the risk of being caught red-handed increases. The S4FE app contains the same functions as the S4FE search engine, only optimized for IOS and Android devices. The S4FE app will be available from November 14th, 2020 in the Apple Store and the Google Play Store. The S4FE ST!CKER is a product that we developed to connect physical objects with the digital world. https://preview.redd.it/dfumfnh30ns51.jpg?width=1280&format=pjpg&auto=webp&s=103b73cd9dd6d766fd2018b3e431a2b89c688b20 https://preview.redd.it/sgtg7oh30ns51.jpg?width=853&format=pjpg&auto=webp&s=aab044e022b9f522fba8e6ecbca059f8611d2b22 https://preview.redd.it/40ktpph30ns51.jpg?width=1030&format=pjpg&auto=webp&s=5d278261ae14b4aeaa0d15de63ca768e58b892d2 https://preview.redd.it/4oul1ph30ns51.jpg?width=1280&format=pjpg&auto=webp&s=c437bac621d77b00424dee9abcf1da1065142e06 https://preview.redd.it/7qhyirh30ns51.jpg?width=781&format=pjpg&auto=webp&s=c284852afb8cb19e05e4c64edd0787c5d9b72465 https://preview.redd.it/u057h1i30ns51.jpg?width=852&format=pjpg&auto=webp&s=8399eb6f9b10e9a9250126c26040524442945b24 https://preview.redd.it/v3r1jrh30ns51.jpg?width=1280&format=pjpg&auto=webp&s=4c55e0ec95b119f2e80dbfa68e916bef746fc81f https://preview.redd.it/smwbmoh30ns51.jpg?width=1024&format=pjpg&auto=webp&s=d02a7a3fd80cd82bc1bd74a1d03f18cb7c073038 https://preview.redd.it/1lx695i30ns51.jpg?width=1280&format=pjpg&auto=webp&s=0113ec3afd8a0b962fb3a67f94fc9fb3a642729b https://preview.redd.it/6avpqmh30ns51.jpg?width=1280&format=pjpg&auto=webp&s=0ecbd85cf06b1f3799cc9548656c1aa2185ab6a0 Do you often lose your iPhone? Have you ever accidentally left your laptop at the airport? Then the S4FE ST! CKER is the perfect product for you. People who find an object, e.g., your laptop, can scan the S4FE ST! CKER via smartphone and contact you directly via the S4FE app. Updates on prices for the S4FE ST! CKER will be available soon. Launch of the S4FE online shop: Our customers will have the opportunity to purchase the S4FE ST! CKER via the S4FE shop. Price updates will follow shortly. In the online shop, it will be possible to pay via cryptocurrencies or conveniently via credit card. S4FE Transactions: S4FE is a blockchain/crypto company. We attach great importance to transparency, which is why all transactions on the S4FE network are publicly displayed. So you can watch the S4FE network grow in real-time. Similar to the Bitcoin Explorer, but not for Bitcoins, but objects. More information will follow shortly. ---------------------------------------------------------------------------------------------------- Es gibt Neuigkeiten: Wir rücken immer wie näher an das offizielle Datum vom S4FE Launch: Samstag, 14. NOVEMBER 2020 Was passiert an diesem Datum? S4FE darf stolz auf 3 Jahre Produktentwicklung zurückblicken und verkünden, dass am 14. November die S4FE Raketen gezündet werden. Folgende Produkte werden veröffentlicht und der Öffentlichkeit zugänglich gemacht: Launch der S4FE Suchmaschine, ab dem 14. November 2020 Online abrufbar unter www.s4fe.io. Die S4FE Suchmaschine ist eine öffentliche und kostenlose Suchmaschine für Gegenstände jeder Art und wird das Bindeglied zwischen Privatkunden, Produzenten, Strafverfolgungsbehörde und Versicherungen darstellen. Privat und Firmenkunden werden eine Art “Cloud” (wir nennen es “S4FE”) anlegen können. In diesem S4FE können Wertgegenstände mit der digitalen Welt verknüpft bzw. verwaltet werden. PoO - Proof of Ownership wird revolutioniert, da es ab dem 14. November möglich sein wird, den Besitztum eines Gegenstandes digital abzubilden und Items digital von “User A” zu “User B” zu transferieren via Mausklicks. Die Lost und Stolen Funktion wird ebenfalls vollumfänglich verfügbar und nutzbar sein, das bedeutet, Gegenstände können in Echtzeit getrackt werden und bei bspw. einem Diebstahl in Echtzeit als gestohlen gemeldet werden. Für Hehler wird somit der Transport und die Veräußerung von Diebesgut wesentlich schwieriger gestaltet und mit einigen Komplikationen verbunden. Bei einer spontanen Polizeikontrolle können so beispielsweise gestohlene Dinge im System auftauchen, die vor ein paar Minuten frisch geklaut wurden und noch nicht im Polizeisystem erfasst sind. Die Gefahr steigt in flagranti erwischt zu werden. Die S4FE App beinhaltet dieselben Funktionen wie die S4FE Suchmaschine nur optimiert für IOS und Android-Geräte. Die S4FE App wird ab dem 14. November 2020 im Apple Store sowie im Google Play Store verfügbar sein. Der S4FE ST!CKER ist ein Produkt, welches wir entwickelt haben, um physische Gegenstände mit der digitalen Welt zu verknüpfen. Verlierst du häufig dein Iphone? Hast du schon einmal am Flughafen aus Versehen deinen Laptop liegen lassen? Dann ist der S4FE ST!CKER das perfekte Produkt für dich. Personen die einen Gegenstand finden, bspw. deinen Laptop, können den S4FE ST!CKER abscannen via Smartphone und über die S4FE App sich direkt mit dir in Verbindung setzen. Updates über Preise vom S4FE ST!CKER wird es in Kürze geben. Launch vom S4FE Online-Shop: Über den S4FE Shop werden unsere Kunden die Möglichkeit haben, den S4FE ST!CKER zu beziehen. Preisupdates folgen in Kürze. Im Online-Shop wird es die Möglichkeit geben via Kryptowährungen oder bequem via Kreditkarte zu bezahlen. S4FE Transactions: S4FE ist ein Blockchain / Krypto Unternehmen. Wir legen enormen Wert auf Transparenz, deshalb werden sämtliche Transaktionen auf dem S4FE Netzwerk öffentlich angezeigt. Du kannst also in Echtzeit beobachten, wie das S4FE Netzwerk wächst. Ähnlich dem Bitcoin Explorer, aber nicht für Bitcoins, sondern für Gegenstände. Mehr Informationen folgen in Kürze.
New to this forum so id like to share some of my experience with one of the things that made me a lot, ewhoring. 1) first of your going to want to create a snapchat account, this account must have a high enough snapscore of a couple of thousand to make it look legit as possible, you can boost the snapscore of the account by sending tons of snaps to a bunch of celebrity accounts on snapchat. You can easily find these buy just searching any letter in the search bar and subscribing to all the accounts. add a bitmoji that looks like your girl, you can find a ton of mega links on the internet if you look, try find something not saturated and you should be fine. A good way to look legit on snapchat is of course to send live snaps. To send live snaps uploaded through your camera roll. On iPhone you can use the app prequel. on android you can use chicken cam. Other ways to look legit is to fake your location of the person you’re talking to. My way of doing this was jailbreaking my phone and using snapbreak. you can find tutorials on how to jailbreak everywhere and downloading snapbreak you’ll have to downgrade snapchat first. keep in mind recently snapchat has been banning accounts that have downgraded there snapchat so a way to get around this is to create the account on the downgraded version of snapchat and NEVER update. if you update you won’t be able to use snapbreak without a ban. snapbreak is an amazing tool for all sorts of stuff. Uploading to live snap. faking location. quick switching between accounts, sending snaps to everyone on your snapchat (more than 200 people) 2) one of the first ways i used to get traffic to my account was POF. POF you can create an account with a phone number, with your girl’s pics of course. (do not put add my snap in the bio or you’ll be flagged on the system), just swipe right on everyone and ask everyone to add your snap, "hey add my snap ____ ", people who won’t add you will not buy shit so don’t waste your time. if you do get banned on POF you can use the same phone number a few more times till your perma banned. it’s all about high quality traffic. If you get shit traffic you’ll have a bunch of time wasters on your snap that’s never going to buy. Refrain from doing sfs with other snap chatters unless you want shit traffic. Tinder is also a good source for high quality traffic. all tough once your banned on iPhone you will be mac banned. Changing your ip won’t work and even on a jailbroken iPhone you can’t change your mac. On android devices you can change your mac with rooted devices. I personally wouldn’t go through the effort and I would just make tinder accounts through pc. You can download tmac v6, and any proxy VPN will work. Always remember to clear cookies before creating a new account. Eventually you will run out of phone numbers to use once you get banned but we will get into that in the next step. 3) Smspva.com and smspool are great tools to get disposable phone numbers to create new accounts. For a small payment of like 50c to $1 per phone number. This can be paid through bitcoin. Hopefully you’ve made enough money at this stage through the traffic you got from your own number. (Yes using your own number is fine if you don’t care about getting banned from TindePOF) anyways. We will talk about how to get your ewhoring money into bitcoin in the next step. 4) Once your money is in bitcoin you can do whatever you want with it, in PayPal if you keep the money in your account to long it can be risked getting locked since you’ll be creating a PayPal account with your girls name/email. PayPal will constantly ask you to verify your account by adding a credit card or sometimes locking your account until you send proof of id. You can only get a maximum of 2500 per unverified PayPal account before they ask for verification (proof of id) you can create new PayPal accounts with new phone numbers through smspva/smspool. Paxful is a great tool to transfer your PayPal money to bitcoin. all tough ive heard you can trade PayPal to bitcoin on multiple other sites. Paxful was the one to work best for me. As I wouldn’t recommend keeping money in your PayPal account to long I suggest getting it into bitcoin asap. After a while paxful will ask for verification on your account. At this point you can just create a new account with a new email/phone number using smspool. I don’t think smspva has paxful verification phone numbers. Personally I traded about 300 at a time on paxful. And id be very wary of scammers. Once the bitcoin is in your paxful wallet. Transfer it to a third party wallet like Blockchain. 5) Let’s get back to the snapchat, remember it’s all about social engineering, get rid of the time wasters, all you want to do is create a private story to post a bunch of nude videos in and put on your main story and try advertise to everyone that your selling a premium snapchat, my prices were 20 monthly 30 lifetime to be a premium member. I charged 40 an hour for video calls. Yes I just blocked them after I received the payment. I charged 150 an hour 400 a night for meetups. With meetup scams I would ask them to pay a 75 deposit through PayPal and id send them the address, they can pay rest cash in hand or in PayPal. Once they would arrive at the address I’ve sent, (this would be a random for sale or address where no one lives in) I would tell them to pay the rest in PayPal and I’ll let them into the house. Even if they said they’d pay the rest in cash id still try tricking them into sending the rest of the payment in PayPal. I’ve made 750 of one guy using this method. Tips:
Do not transfer money over to a friend’s account to take it out through the bank its linked to, sometimes PayPal will ban all the accounts you’ve sent money to, I’ve no idea why this is a thing but I’ve had multiple peoples PayPal accounts get banned just because I’ve sent money to it.
Get rid of time wasters, if someone makes it clear they won’t pay block them or ignore. Don’t give away previews. The previews are on your story.
With big money transfers it must be your number one priority to get rid of that money from your PayPal account ASAP, remember that PayPal are always tracking you, they always have their eye on this sort of thing. Once a report has been made about your account it could be locked and you will not get your money back.
Make sure all your customers know to send money through PayPal using friends and family only. Business transfers can be reversed easily and it gets put on hold much more.
Don’t do anything stupid. Such as sign into the PayPal account on an iPhone. Phones have all your data on it; you can easily be traced on. Manage as many accounts on your pc/laptop and use the same name for everything, clear your cookies and don’t sign into your PayPal account multiple different times under different ip addresses, this will trigger 2fa and you won’t be able to verify your account with a disposable number
If your account does get locked under 2fa and you don’t have the original phone number. You can contact PayPal through live chat and just tell them it’s an old number you no longer have access to. They’ll ask for info such as your email full name and home address linked to the account. (Btw the home address can be set to any address just remember it) once you clarify this with the PayPal live support person they will unlock the account. I don’t know if this works 100 percent of the time but I speak from experience.
To download snapbreak you will have to downgrade using a tweak called Appstore++ snapbreak was a paid tweak that is no longer in development because it got cracked. It was originally 50 but now you can get it for free on some repos. ALWAYS remember to stay on the same version of snap per account.
any feed back on this method would be greatly appreciated, tell me what you think :)
IF YOU KNOW, PLEASE TELL :) [Money Reward for Solution] .. Cannot Access Iphone7+ Disabled .. I HAVE the Valid PIN / APPLE ID Login Info .. I'm about to lose hope and wipe everything, last attempt of mine to reaccess this phone.. Thank you
I HAVE the Valid PIN / APPLE ID Login Info Background: The iPhone7+ locked itself after the screen broke, stayed on, and I kept it charging to use a messaging app which I had linked to my computer previously. My theory is that it was ghost-typing the PIN and failed too many time. Situation: "iPhone Disabled .. Connect to Itunes" Details:
I have the PIN of the phone itself + the Apple ID used. The info is valid/working.
The iPhone was a pass-down gift, I restored it to factory settings, but never connected it to a computer from since it was reset.
I have logged into the AppleID on icloud.com, in my itunes, everywhere place possible.
I reached a point after following the "update first" option to unlock.
THE PHONE SAID TRY AGAIN in 59 MINUTES
I could enter the PIN .. which I did .. several times it said "attempting to recover"
Never worked, it kept coming back to the screen saying "click home button to attempt recovery" (which lets me enter PIN).
!! NOTE !! THIS IS LONGER AVAILABLE, after my phone switched off, it is now updated so it's not letting me try this again ?!?!
Still no profit :(
SIM CARD that I used originally is in the phone.
(I will comment an Imgur link later today for the relevant screens I have already cycled through. Itunes recognises it and even bluetooth is connecting to my headphones .. it's trolling me .. -_- why can't this work ahhh...) Is there a way the phone will bloody give me a chance to TELL IT I AM REALLY ITS OWNER DAMMIT! ?? Ready to pay whoever can help me solve this -- Bitcoin or PayPal. (Something like 20bucks if whatever you suggest works). Thank you all so much, if you can share this with anyone who might know - all the better and highly appreciated. Thank you.
Popcorn Time takes its inspiration from Netflix, boasting a clean outlook with thumbnails and categories - And streams pirated copies of movies and shows to your computer or smartphone
Editors note: There are many fake versions of Popcorn Time. This article primarily use Reddit as its source to recommend and link to the official, well regarded, version of the app. When you think of movie streaming, services like Hulu, Disney+, and Netflix usually come to mind. However, there is another streaming platform that is particularly popular for streaming pirated movies: Popcorn Time. This streaming platform allows you to watch torrented and pirated movies without paying anything. All you need to do is install it on your PC/smartphone/tablet, search for a film, and click play. However, there are piracy and safety concerns when it comes to using Popcorn Time. This is how it works.
What Exactly is Popcorn Time?
How it Works
How to Install Popcorn Time
Which version is legit?
Where does popcorn time store movies?
Popcorn Time APK for Android
Is Popcorn Time available on iOS?
Is it Illegal to Use Popcorn Time?
How does the developers make money?
Popcorn Time alternatives
What Exactly is Popcorn Time?
Popcorn Time is an open-source, multi-platform BitTorrent software application with a stylish and attractive media player. It was initially released in March 2014 by a team of developers in Argentina. They wanted to create a software that allows users to stream video content from torrent. Popcorn Time takes its inspiration from Netflix, boasting a clean outlook with thumbnails and categories. It uses sequential downloading and uploading to play movies, hence allowing you to stream pirated movies instantly. Popcorn Time on the Mac
How it Works
Popcorn Time is a torrent based streaming tool and the way it works is simple enough. Let’s say you want to watch Tenet (it's not out as of this writing). You use the interface provided by the platform to find and click that title, and the tool then navigates through existing BitTorrent titles automatically from come from two well known torrent sites. YTS for movies and eztv for tv-shows. Then, Tenet is streamed directly to your computer from that pre-existing BitTorrent source. So, while you watch the film, Popcorn Times acts as a torrent client and continues to leech and seed it from other people. That means you'll be forced to share the content you watch.
How to Install Popcorn Time?
In order to use Popcorn Time to stream pirated movies, you will need to download and install the software on your computer or smartphone. The app is available for variety of operating systems, including Android, Linux, Windows, Mac, etc.
Download Popcorn Time from popcorntime.app which hosts Mac, Windows and Android.
There are no specific installation requirements as it is installed just like any other app.
However, keep in mind that its usage has been banned in many regions. So, you cannot download it from Apple’s Apple Store or Google Play Store. In some countries popcorntime.app has been blocked and you need a VPN to hide your real IP. You might want to use VPN software to keep your own information private and anonymous when running the app as well.
Which version is legit, and real?
There are many clones out there, some of which will install other apps, using your computer as a bitcoin miner. The legit, and most supported version according to Reddit, is popcorntime.app (formerly known as popcorntime.sh)
Where does popcorn time store movies?
On your computer or device. Using torrents the app stream the files, while they are being downloaded. So it's just like when you download a torrent, except it starts the video during the download.
Yes. But it's not as easy as downloading an app from the App store.The iPhone version of Popcorn Time is unstable and requires a jailbroken iPhone. Since jailbreaking your iPhone in 2020 is difficult and time consuming, it isn't an option for most. If you still want to try, there is Antique's version. You can follow his updates and links on Twitter. There is also a version which allegedly works with the alternative, non-jailbreak required, but much debated, altstore. For more information, see its Github home.
Is it Illegal to Use Popcorn Time?
In most cases, yes. Most, if not all, TV shows and movies which appear on Popcorn Time are pirated, and you may be wondering about the legality of it all. First of all, downloading any copyrighted file is illegal in most countries. However, torrents themselves are a valid means to share and download files. So without sounding too confusing, it is typically not illegal to download Popcorn Time. It's when you stream or download the movies and tv-shows themselves it gets risky. But depending on where you live this might not be the case. Copyright infringement is illegal in Germany while in India, there are no restrictions of using Popcorn Time to steam movies as long as you don’t redistribute them. Of course, laws change. That’s why it is recommended that you do your research to understand the risks.
How does the developers make money?
The Popcorn time version we recommend has affiliate links to VPN services. How much money this actually is, or if its funding hardware costs, is unknown. But it proves that money is being generated from the app.
Are there any alternatives?
There are a lot of alternatives, most of which are unstable or shady. However, here are a few alternatives recommended on Reddit. Note that they all come with their own positive and negatives aspects when compared to Popcorn Time.
Stremio - Open source project which lets you add your own sources, such as 1337 or Pirate Bay. It also uses official streams from YouTube, HBO and more. Has been reported as unstable but still the best Popcorn alternative.
Media Box HD - A MacOS app with 4K streams. Is known to be unstable for some.
Leonfix - A Popcorn Time Windows app which doesn't use torrents. Currently in beta.
ShowBox - Android alternative which doesn't use torrents. Unstable and currently in beta.
Radarr - Which automatically downloads shows and films.
Despite the concerns about whether or not using Popcorn Time is illegal, there is no denying that the tool is very impressive. The ability to download and stream torrent content in a seamless and hassle-free way is quite brilliant. Not to mention the platform has a much larger library of content with no restrictions whatsoever. So, it’s not surprising why many consider it a better alternative to regular torrents or a Disney+ subscription. Feedback and corrections are more than welcome! Originally written for Where You Watch.
Hunting Scammers... 8/16/20 If you don’t care about the background skip to: [************************************************] So... I am in a unique position where I am aware of new and old scams daily. I often help those that are wronged and I frequently pass this information along to family so they don’t fall prey... Recently my mother told me that she was a victim of a scam, but not just a few hundred dollars, not a few thousand... She got taken for around $125,000, 401k cleaned out, retirement gone, second mortgage, credit cards opened and maxed out, sold her car, loans taken out and emptied... How did they do it? They hacked a Facebook account of one of her cousins and that compromised account blasted out the message: “Hey I just got a grant from the IDA (Independent Development Association) I saw your name on the list, did you get your $150,000 check yet?” That spiral led into her texting an “agent” who got all of her information and told her that she needed to pay for the secure courier which was $1,000... Months go by with regular contact, always a new “problem” like “the check got delayed here for a customs check and you need to pay $500”. They told her that she was bound to secrecy as if she told anyone beyond my step dad, they would be disqualified. They told her that they needed to monitor her phone calls to make sure she didn’t tell anyone, they provided her with a “court order subpoena” which was obviously fake, but she didn’t know. They logged into her cell account and ordered 20+ new iPhone 11 Pro Max from her cell provider on her credit. Then they actually paid her account for 2 months before ghosting her... They hacked her Facebook and tried to recruit more people into their scam... It was always a promise of more money if you do this or that... $150,000 then $250,000 all the way to $750,000... [************************************************] Preface: Always be safe when scam hunting/baiting Use an encrypted email (ProtonMail is free) Use a good proxy/VPN (pay for it, it’s worth it) NEVER give out your personal details I got all the information from my mother about: The phone number she texted. The person she talked to. Where/who she shipped the cell phones to. Where/who she sent cash to. (1) First contact/a little payback From that I started by contacting the scammer... My Facebook is already locked down so the information you get from my profile is very little, I reached out to my mother’s compromised FB through messenger and got a bite. They told me to text a number from the US to which I happily obliged. I used a texting app in conjunction with a VPN on my computer running a VM (virtual machine) I can control all the information released like OS, browser and such if they know how to look it’ll all be spoofed. I spoke with the scammer who had me “fill out a form” and he was working from a script, which is hard to break them from... This form he sent me, he accidentally forgot to clear it off from the last person he scammed so I had all of the information from the victim *I immediately call this guy and saved him before he sent any money luckily. So I digress, I occupy the scammers time for about 6 hours, giving him issues and excuses finally getting him off script. He directs me to a “local” bitcoin ATM to send a deposit of $1,500. I go through a host of issues while he gave me his first BTC address. I google a good picture of a bitcoin ATM and began photoshopping error messages until I had an epiphany... I told the scammer that the machine was giving me an error that his account was unverified and that he needed to “mirror” the transaction by first sending me $1,500 to unlock the transfer and it would be immediately refunded and my “$1,500” would be sent too. Unfortunately it didn’t work, so he gives me the second BTC address. What do ya know, same error lol... After a back and forth for about an hour, I couldn’t believe it, he agreed to “mirror” the transaction... So I scrambled to get a clean BTC address and sent it to him. He agreed to send $200 to see if it worked... Low and behold I just received $200... So what do I do next? Give in? No. I just changed the photoshop to say “Pending $1,300” now lol... He bit, hard. After more talking and pretending to be a helpless 64 year old guy with $20,000 ready to give him the scammer saw green and got greedy... More debate, more discussion, he sent another $500. Give in now? No... Back to photoshop... “Pending $800” To cut it short, he sure as hell sent the other $800... After a back and forth I sent him doctored up transaction receipts saying it was all transferred back to him. Getting him off script and getting him to pay a fraction of what he stole, is that enough? No. I promptly withdrew the money and gave it to my mom, it wasn’t much but just a little victory for now... (2) Finding the mules The next day the scammer cuts all contact with me, so I spoof a new number and call him. It rings and goes to voicemail and I hear his voice, sounds distorted with a British accent but broken English, I assume African. I leave only my telephone number on the recording saying “call me back” (we’ll come back to this) I move on to the places the phones were sent, first up, an apartment complex about an hour from me. But I’m not looking for a direct contact situation as I don’t know who or what they’re capable of... So I get the shipping details and find a very unique name but for Reddit we’ll call her Mrs. “E”. I begin tearing into her life, public records, credit report info, and phone records, I get it all... Time to make contact, I send an unassuming text to her number, asking for help. Surprisingly she responded, I began by asking her about a shipment she got in and the name of the shipping company she was receiving packages for. Radio silence for a few hours, then the denial began... I hit her with the hard facts, and just enough information so she knows I know everything about her... Mrs. E breaks and gives me the info I need. She was contacted by a friend who owns a shipping company in Lagos, Nigeria, they asked her to take the package of iPhones and forward them to him via another courier service. Mrs. E gave me everything. Next is Mrs. R who my mother sent actual cash to... I looked up the address and find it’s a duplex in Midwest. So I do a quick search of the name and nothing comes up... I then use the County Assessment District to get the public tax records and owner information. I contact the owner and give him the name I have and explain why I’m looking for her information. He gave me all the details he could as Mrs. R is the girlfriend of his tenant and the name I had was wrong. Waiting to get Mrs. R’s records right now I’ll get everything on her just like Mrs. E, she’ll bend to my will. (3) International Phone Calls So while I was searching for Mrs. R’s records I get a phone call... It’s a Nigerian number... I answered and find out it’s my scammer that I left a message for... This genius calls me from his actual cell number, which is not the number I called and left a message for. Currently working on getting his subscriber information but it’s proving hard (if anyone can help reply). I call up the owner of the shipping company in Nigeria and tell him that I’m looking for shipping details and quotes, I’m still working on his information... He’s a pleasant person to talk to, I will ruin him... So that’s where I’m at for now, but I definitely will keep you all updated. Mini-update 8/16/20: The owner of the shipping company apologized that his courier service had anything to do with the transactions. I’m not sure if I believe that but he did give me a name and 2 phone numbers he had on file for the customer. I’m really needing someone who can check these numbers out... If I can get a carrier identified I can work my magic on them to get the info I need. Update #1: 8/17/2020 Today I got all of Mrs. “R”s info minus good contact information... Pitty... But I’ll find it. The number on her file with her last loan didn’t pan out... I’ll come back to this tomorrow... I back traced the scammers cell phones with a little help from a friend, both phones are confirmed cell phones with active service with 2 different cell phone providers in Nigeria. I’m still lacking on the subscriber information, but I know where to look now... I reached out to the Nigerian Police Force to see if they can help, I doubt they can but you never know what you can get without asking... The scammer himself reached out to another dummy account I set up. I gave him a little scare, he asked who referred me to him... I gave him his own name, he hasn’t responded yet... https://imgur.com/gallery/EvfLcgy Update #2: 8/31/2020 So after name dropping the scammer I got dead silence. Luckily I was able to capture his IP address. I worked with a few contacts I made and found he was using the “Text Now” app, did a little magic and found out the “main scammer” actually is working in a call center. But interestingly enough I found that the workers there on average make like $500usd a month... (more on that later) So I have numerous fake Facebook accounts optimized for international connections, even though they look and are set up American, with them connected to the profiles from Africa or Russia, you can set your profile up to show up to them first, and you’ll be flooded with friends and messages... Another scammer reached out to me and I played along and made friends with them. I ran a game on him for a little bit and just came out and told him what I was trying to do. I asked him to help me, but it was off how he was replying, I called him on the phone and he told me that he was “busy in the office”. So he ghosted me, or so I thought... I get a text message from a Nigerian number that I did not know a few hours later. He tells me that he was the one I was talking to, he went on to explain that everything they do is monitored, there are about 20 of them in this room with computers, and several cell phones at their station. This guy goes on to explain that he controls about 15 different profiles, as many phone numbers as he can, and several emails, all of which are for scamming. So I think I’ve just developed an asset in Nigeria........ He has agreed to help me for money. He explained to me that he pulls on average $40,000 usd a month, I don’t know if that figure is true, but it’s believable... Mr. Asset goes on to tell me that if they hit their goal they make $250 a month, and for every so many $$$’s above their goal they get bonuses. So ladies and gents’ I’ve got boots on the ground. (Hopefully) I’ll keep you all updated. Not officially an update but figured I’d share it anyway! https://www.reddit.com/SuicideWatch/comments/ikfno1/went_looking_to_ruin_a_life_ended_up_saving_one/?utm_source=share&utm_medium=ios_app&utm_name=iossmf
Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!
If you know of a scam that is not covered here, write a comment and it will be added to the next edition.
Caller ID spoofing It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you. Email spoofing The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created. SMS spoofing SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.
The most common scams
The fake check scam (Credit to nimble2 for this part) The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
The scammer sends you a very real looking, but fake, check. Sometimes they'll call it a "cashier's check", a "certified check", or a "verified check".
You deposit the check into your bank account, and within a couple of days your bank makes some or all of the funds available to you. This makes you think that the check is real and the funds have cleared. However, the money appearing in your account is not the same as the check actually clearing. The bank must make the funds available to you before they have cleared the check because that is the law.
For various and often complicated reasons, depending on the specific story line of the scam, the scammer will ask you to send someone some of the money, using services like MoneyGram, Western Union, and Walmart-2-Walmart. Sometimes the scammer will ask for you to purchase gift cards (iTunes, Amazon, Steam, etc) and give them the codes to redeem the gift cards. Some scammers may also give you instructions on how to buy and send them bitcoins.
Within a couple of weeks, though it can take as long as a month, your bank will realize that the check you deposited was fake, and your bank will remove the funds that you deposited into your account and charge you a bounced check fee. If you withdrew any of the money from the fake check, that money will be gone and you will owe that money to the bank. Some posters have even had their bank accounts closed and have been blocked from having another account for 5 years using ChexSystems.
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent. Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it. Bitcoin job scams Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins. Email flooding If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere. Cartel scam You will be threatened by scammers who claim to be affiliated with a cartel. They may send you gory pictures and threaten your life and the lives of your family. Usually the victim will have attempted to contact an escort prior to the scam, but sometimes the scammers target people randomly. If you are targeted by a cartel scam all you need to do is ignore the scammers as their threats are clearly empty. Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse. Employment certification scams You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist. Craigslist fake payment scams Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule. Craigslist Carfax/vehicle history scam You'll encounter a scammer on Craigslist who wants to buy the vehicle you have listed, but they will ask for a VIN report from a random site that they have created and they will expect you to pay for it. Double dip/recovery scammers This is a scam aimed at people who have already fallen for a scam previously. Scammers will reach out to the victim and claim to be able to help the victim recover funds they lost in the scam. General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter. Credit card debt scam Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement. The parcel mule scam A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods. The Skype sex scam You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious. What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account. The underage girl scam You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer. What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money. Phishing Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious. The blackmail email scam part 5: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/ PSA: you did not win a giftcard: https://old.reddit.com/Scams/comments/fffmle/psa_you_did_not_win_a_gift_card/ Sugar scams Sugar scammers operate all over the internet and usually come in two varieties: advance-fee scams where the scammer will ask for a payment from you before sending you lots of money, and fake check style scams where the scammer will either pull a classic fake check scam, or will do a "bill pay" style scam that involves them paying your bills, or them giving you banking information to pay your bills. If you encounter these scammers, report their accounts and move on. Google Hangouts Google Hangouts is a messaging platform used extensively by all kinds of scammers. If you are talking with someone online and they want you to switch to Hangouts, they are likely a scammer and you should proceed with caution. Publishers Clearing House scams PCH scams are often advance-fee scams, where you will be promised lots of money after you make an initial payment. You will never need to pay if you win money from the real PCH. Pet scams You are looking for a specific breed of puppy, bird, or other pet. You come across a nice-looking website that claims to be breeding them and has some available right now - they may even be on sale! The breeders are not local to your area (and may not even list a physical location) but they assure you they can safely ship the pet to you after a deposit or full payment. If you go through with the payment, you will likely be contacted by the "shipper" who will inform you about an unexpected shipping/customs/processing fee required to deliver your new pet. But there was never any pet, both the "breeder" and the "shipper" are scammers, typically operating out of Africa. These sites are rampant and account for a large percentage of online pet seller websites - they typically have a similar layout/template (screenshot - example) If you are considering buying a pet online, some easy things to check are: (1) The registration date of the domain (if it was created recently it is likely a scam website) (2) Reverse image search the pictures of available pets - you will usually find other scam websites using the same photos. (3) Copy a sentence/section of the text from the "about us" page and put it into google (in quotes) - these scammers often copy large parts of their website's text from other places. (4) Search for the domain name and look for entries on petscams.com or other scam-tracking sites. (5) Strongly consider buying/adopting your pet from a local shelter or breeder where you can see the animal in person before putting any money down. Thanks to djscsi for this entry. Fake shipping company scams These scams usually start when you try to buy something illegal online. You will be scammed for the initial payment, and then you will receive an email from the fake shipping company telling you that you need to pay them some sort of fee or bribe. If you pay this, they will keep trying to scam you with increasingly absurd stories until you stop paying, at which point they will blackmail you. If you are involved in this scam, all you can do is ignore the scammers and move on, and try to dispute your payments if possible. Chinese Upwork scam Someone will ask you to create an Upwork or other freelancer site account for them and will offer money in return. You will not be paid, and they want to use the accounts to scam people. Quickbooks invoice scam This is a fake check style scam that takes advantage of Quickbooks. The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam. The blackmail mail scam This is very similar to the blackmail email scam, but you will receive a letter in the mail. Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse. Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on. Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum. Man in the middle scams Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to. Digit wallet scam A variation of the fake check scam, the scammer sends you money through a digital wallet (i.e. Venmo, Apple Pay, Zelle, Cash App) along with a message claiming they've sent the money to the wrong person and a request to send the money back. Customer service for these digital wallets may even suggest that you send the money back. However, the money sent is from a stolen credit card and will be removed from your account after a few days. Your transfer is not reversed since it came from your own funds. Cam girl voting/viewer scam You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories. Amateur porn recruitment scam You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer. Hot girl SMS spam You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card. Identity verification scam You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to. This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website. Multi Level Marketing or Affiliate Marketing You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.
You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls. Tax Call You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world. Warrant Call Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards. [Legal Documents/Process Server Calls] Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number. Student Loan Forgiveness Scam Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program. Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam. Chinese government scam This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats. Chinese shipping scam This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators. Social security suspension scam You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information. Utilities cutoff You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin. Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same. Mexican family scam This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help. General family scams Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money. One ring scam Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.
Online shopping scams
THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is. Dropshipping An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer. Influencer scams A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products. Triangulation fraud Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer. Instagram influencer scams Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time. Cheap Items Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off. Cheap Amazon 3rd Party Items You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam. Scams on eBay There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month. Scams on Amazon There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items. Scams on Reddit Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online. Computer scams Virus scam A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.
Chinese Brushing / direct shipping If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings. Money flipping Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.
When I was kicked out of the public school system at the age of 9, I ended up going to a special needs school for a few years. Being at that place, I was forced to comply. The place was an extension of my parents. My parents would have long phone conversations with my "teachers" over the weekend and a "daily contract" had to be signed each day by a parent or guardian and returned the next day. They'd always say "You start at 100!" It was because the contract had been based on a fake monetary value and each day was "a dollar." In other words, each point taken off was a cent taken off. Every so-often, you could use the "money" that you've accumulated to buy staff's junk in a closet. That was "the student store." At the end of the school year would be the "student auction" where you could "buy" the staff's junk, like a chewed up water bottle, with your "money." There were three statuses of students, platinum, gold, and silver. If you had 90 or above on your contract for above a certain amount of days, you would be "platinum." I don't remember the exact circumstances to dropping status. "Platinum students" would get the right to "platinum trips." One "platinum trip" was a trip to a nursing home. If you "acted out," staff would mark it on your contract and "take points off" based on their judgment. They'd also be so random with giving out "bonus points," so you could end a day with a 103 or 104. Students had complained that the contract system had been very discouraging to them and once the staff got started negatively marking their contracts, it would make them feel awful, and it just caused them to get further negative marks. I know, I used a lot of quotation marks. That place made no sense and it ran on suppression. You were treated like little babies and dummies there. The place was honestly a private hospital with a CEO and a board of directors. I don't feel as though we were "students," but sometimes, I just don't want to keep substituting words. If I had "acted out," then my parents often knew before I'd get home. I wasn't at that school because I was slow. I was there because of my reactions. The place had consumed me. Why? Because I was forced to comply. I had seen the consequences of not complying. I hadn't complied and I ended up in a hospital day program for months. That was the summer I had turned 10. It was really swell. So...just as in 2011, when my family went freakin' mad after I was doing things on my own, I had never wanted to be treated that way again. I put on an act until my body couldn't take it anymore. Each time I got out of the house, there was a chance that TV Tokyo might've been filming. That wasn't normal. I don't live in Japan. So I escaped home and got to the dorms. I felt so ashamed, stressed, and afraid living there. I had basic freedoms that I had never been allowed to have. Also, though, I didn't have a plan to transition out of the dorms. I had gone through so much before escaping and there wasn't any transition. My mother had threatened me with the police up until the moment we left the house to leave for the dorms. I said some crazy things over Internet messages and I ended up hospitalized and imprisoned. My mother had blamed "computers" and she's like the mainstream news personified. Nearly all my life, my mother was terrified that I was going to be "investigated by the FBI," so I'm really not surprised that it actually happened. "Computers" was not it, but my mother's mind is a product of so much strange fear mongering. I got out of prison and a few months later, I was sentenced to three years of probation. My mother wouldn't help me get a computer. As a result, I spent $20 on a 2013 ThinkPad from eBay. The seller said there was no memory or Wi-Fi module. They had existed under the keyboard, though. Even though I bought both of those things after buying the laptop, I still had to buy an AC adapter. Also, my mother wouldn't help me with getting my belongings back from my house, so I broke in when my parents were in Cape May. Now, my mother tells me "I could've GIVEN YOU your stuff! You didn't have to do what you did!" Sure. I asked for one container and my mother picked things out and wouldn't let me have them. My mother consumes each step of progress that I make. When I got of prison, she limited the amount of money she gave me each week so that I couldn't buy a computer of any kind. When she saw that I was struggling with that, she "increased the amount that I get," as she had worded it. Then I bought a laptop and she ended up "being fine" with me having it. She wouldn't let me have my belongings, but then she told me crap like I just stated. Then, I was asking for help with building a PC because my laptop really wasn't ideal. Did I mention how scared she was that I was registered for school for the fall of 2019 when the only computers that I could've used were the ones at my town's library and at my school's campus? My Sundays were so awful. I didn't have a phone or a computer and the library was closed on Sundays over the summer. I was going CRAZY each Sunday staring at the walls. So anyway, I asked my mother for help in building a PC. She was adamantly declining. I then spent what money I had saved up to build a PC and it's fantastic! I have four monitors and an Elgato Stream Deck. The Elgato Stream Deck is amazing. If I want to take a screenshot of the current window during class, I just press a button. Microsoft PowerToys's FancyZones helps so much. I have three of my monitors divided into three zones that I can snap windows to. Also, I'm not struggling with the small-capacity solid state drive in my ThinkPad. When I got out of prison, I had scoured the Internet trying to find all my personal files again and I was buying extra space in various cloud services and even transferring the files from, say, Google Drive to OneDrive so that I'd have the files in more than one place. Hell, I don't know if I'd be able to record my audio for notes from my school's accessibility office with the audio built into the motherboard. My sound card has a feature called "What U Hear," though, and it lets me record whatever audio is being played on the computer. Of course, I want to drive and my mother is NEVER going to help with that. Instead, as with everything else, if I buy a car and start driving again, she's initially going to be absolutely terrified, but she's going to consume that as well. My setup has proved to be so helpful in ways that that 2013 laptop would have made far more difficult or even impossible. Heck, I even found myself having to attend two conference calls at the same time recently. I had moved one of the conference calls to a secondary monitor and it was really not necessary for me to participate in it or listen to anything. I lowered the volume on the unnecessary conference call using EarTrumpet from the Microsoft Store and I focused on the call that I had to focus on. Before I got my computer, I didn't even have a home network. I wouldn't have had the Internet speed to handle things during COVID-19 while tethering with my phone. I had to do it myself. Asking my mother for help would've gone nowhere. I have a real-time Bitcoin value monitor on my Elgato Stream Deck. It's sure rising. If I would've not spent what I had spent to have this setup, then I would've had nearly $20,000. I'm past the point of blaming myself, but I'm not past the point of feeling frustrated. My mother takes me for drives and that helps. I wish I could do that myself, though. Movement soothes my newborn baby niece and it works for me, too. I'd prefer an Android phone, actually, due to how it can interface with Windows, but I don't have the money to buy a Google Pixel phone when I can buy an iPhone SE and it'll be supported for way longer. I bought an iPhone SE about 15 or 16 months ago and it'll be supported until next September. Also, because I don't drive, I'm playing video games. Microsoft's cloud streaming service isn't available on iPhone. Microsoft is trying to get around that by making it available as a web app. That doesn't exist yet, though. This is just a final aside, but Outlook is permanently opened on my fourth monitor and it would work even better if it was a touch screen. I was so stressed without a computer, though, so the original "use" of having that fourth monitor was related to Microsoft Flight Simulator. I was so caught up in it and I had no control over that. I'm not going to replace that monitor right now, though. Thank you so much for reading.
UK resident got scammed to send money to an Australian bank account. What I did and what to do next?
Hello, I live in England and this is a long post about how I got scammed, presenting my story and asking for advice. Much appreciated to all who go through all of it and send their ideas. Also posted in AusLegal here: https://www.reddit.com/AusLegal/comments/iujgpq/uk_resident_got_scammed_to_send_money_to_an/ So I met a person online, and after chatting a bit she started showing me her gold trading profits. At first I didn't care that much, but she kept showing me profits and I said I wish I knew how to trade like that. She puts me in contact with this person, who is supposed to teach me how to trade. This teacher tells me that I will start with simulated gold trading, and after some time I would move on to real trading. After a couple of days of trading she says I'm ready to trade for real, I say I need more time to do simulated trading. We do another day of simulated trading and she says I'm ready and I should start trading with real money. Hindsight is 20/20, I can't believe what I was thinking. But I did do some checks on these people, like I aske them for pictures of themselves and I google image searched them. No results, not stock images, so I'm like, okay, a good sign. I ask the first person to have a phone call to talk, we do. Okay, fair enough. I ask the first person to send me the link to her design company that she said she owns, and she sends it over. Site is in Chinese but it's filled with a lot of images of homebuilding and some English sentences about home design. I ask her for more photos and it seems okay. I do the same with the "teacher". Google image search, no stock images, no results. I google the platform she's asking me to open an account on, can't find anything about it saying it's a scam. The reviews for the iphone app are mostly 4-5 stars, with people in the reviews complaining that the previous version of the app was better. So after all this, on the 11th of September I transfer the minimum needed to start investing, USD 10,000. I do this by using Transferwise, so I transfer the money in UK pounds to Transferwise (I live in the UK), the money is converted by Transferwise to USD and is send to the scammer's account to an Australian bank on Friday evening. I sleep on it, and next day morning I start panicking, I think my instincts started kicking in, and I do some more research online and I found something similar, not exactly the same scam, but something similar where you meet somebody online, start talking, some people even met with these people, and then they say can teach you or know somebody that can teach you to trade (gold, bitcoin, forex, etc). At that point I really panicked and I realised I got scammed. I try to reach Transferwise, but since it was Saturday, you could only reach them by email, couldn't even call them. I call the bank in Australia, I tell them what happened, I was scammed and the scammers account is with them and I give them the details of the bank account and everything. So literally after a few hours of the money leaving Trasnferwise I contacted the receiving bank. They told me they will pass it on to the Financial Crime team and look into it. I file a report with Action Fraud in the UK, I sent the report number to my bank, to the Australian bank and to Transferwise, but to Transferwise only on Monday when I can contact them again. I search online for some advice, and everybody thinks the best solution is to keep contacting the receiving bank as they could block the account, or the transaction and it could bounce back to Transferwise so I keep doing that. The receiving bank in Australia tells me to contact Transferwise and have them raise a fraud report and to get in contact with the Australian bank. After numerouse calls with Transferwise asking them to contact the receiving bank where I was told there's nothing they can do after the money has left Transferwise, I resort to calling the bank in Australia again. By this point I raised a cyber fraud report with the Australian police as well and sent the report number to the Australian bank. I ask the bank in Australia what is there to do, if they will deny the transfer or do something so that money does not leave the Australian bank account, and they said the Financial Crime team is looking into it, but I could also ask Transferwise to raise a recall request and to contact them, but I say I already did but Transferwise keeps telling me they can't do that. The person from the Australian bank tells me it seems like Transferwise is giving me wrong information. So I decide to call Transferwise again. I reach out to somebody, and they explain it still cannot be done. I'm almost begging them to do it, but they say it cannot be done. I start searching online of any events with TW and recall requests, and I found something where it said Transferwise doesn't want to do it because there's slim chance of getting the money back so they tell customers it cannot be done. I call Transferwise again and push and complain that I think they're just telling me they can't do it just to get rid of me and the person I'm talking to this time says it can actually be done and she'll do that request for me, and she apologises for her colleagues telling me the wrong information previously. I call the Australian bank again to let them know that Transferwise said they will do the recall and if there is anything I can do. They tell me best thing is for me to keep talking to Transferwise, as the Australian bank has done everything it can. Now, Transferwise shows you an estimation in days of how long a transfer will take. I did the transfer on Friday the 11th, and Transferwise estimated that the transfer would be completed by the 16th at 9:30 pm UK time. So doing all this I had some hope that something can happen. Mind you, I called the receiving bank a few hours after the transfer was done by Transferwise, and by their estimate had around 4-5 days until the transfer was complete. I feel like I wasted precious time because Transferwise was not helpful at all, from the start when I raised the scam with them telling me there's nothing they can do, to the moment I had to make around 5 calls just to get them to do the recall request. The 16th passes, the transfer appears complete in Transferwise and I get a message from the scammer that the funds have arrived and I can start trading. I didn't block them because I didn't want to freak them out and withdraw the money immediately it hits their account. I posted my long story here to see if there is something I can do. I had hopes that the Australian bank would block the withdrawal and it would bounce back, or they would block the scammer's account and my money would not be withdrawn and the recall would go through. I also have some hopes that based on what the scammer said today, the money is still in the Australian bank account. I feel like I acted pretty promptly after I realised I got scammed. Contacted the receiving bank, my bank, Transferwise and the authorities both in the UK and Australia. I don't know what else I could have done to get a more positive outcome, but now I'm asking you, the people of this subreddit, is there anything else I can do? Is there a chance the money is still in the scammer's account and the Australian bank has blocked it? Do you guys think Transferwise didn't treat me properly by dismissing me off the bat, and only helping me with the recall request after around 10 calls and pushing? Any advice would be much appreciated. I know I was foolish, I should have trusted my instincts, but I feel I also took some verification steps that I knew from the internet and I contacted every instituion asap after I realised I was scammed, so a few hours after sending the money. TL;DR I got scammed into sending money to an Australian bank account from the UK. What can I do now?
Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.
Flatten the Curve. Part 48. Source Here It's getting crazier day by day now, so are you following the Boy Scout motto? On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.” Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island. But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply. Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it. But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right? Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court. 'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act. Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies. The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you. Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more. Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered. PACOM? Why isn't that command group responsible for the South China Sea? Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India. Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here Nah. I'm just fear mongering and Doomscrolling again. Heads up and eyes open. Talk soon.
Cash App Customer Support ✆ 𝟑𝟏𝟎-𝟗𝟐𝟗⥂𝟏𝟏𝟗𝟏™™ cash app customer support number buy bitcoin with cash app ✴USA CANADA $#[email protected]#@",>>✴ FKTSPPH
Cash App Customer Support 𝟑𝟏𝟎-𝟗𝟐𝟗⥂𝟏𝟏𝟗𝟏™ cash app customer support number buy bitcoin with cash app ✴USA CANADA $#[email protected]#@",>>✴ FKTSPPH Cash App Customer Support 𝟑𝟏𝟎-𝟗𝟐𝟗⥂𝟏𝟏𝟗𝟏™ cash app customer support number buy bitcoin with cash app ✴USA CANADA $#[email protected]#@",>>✴ FKTSPPH Cash App Customer Support 𝟑𝟏𝟎-𝟗𝟐𝟗⥂𝟏𝟏𝟗𝟏™ cash app customer support number buy bitcoin with cash app ✴USA CANADA $#[email protected]#@",>>✴ FKTSPPH Cash App Customer Support 𝟑𝟏𝟎-𝟗𝟐𝟗⥂𝟏𝟏𝟗𝟏™ cash app customer support number buy bitcoin with cash app ✴USA CANADA $#[email protected]#@",>>✴ FKTSPPH Cash App Customer Support 𝟑𝟏𝟎-𝟗𝟐𝟗⥂𝟏𝟏𝟗𝟏™ cash app customer support number buy bitcoin with cash app ✴USA CANADA $#[email protected]#@",>>✴ FKTSPPH With starting its journey as control Video Corporation in 𝟏𝟗83, Cash app unbroken on increasing its roots with a lot of and additional services. It fell down; it rose, however with the conviction of staying within the lives of its valuable users. Cash app Support Number USA + Cash app Support Phone Number USA + Cash app SuPpOrT pHoNe nUmBeR uSa + Cash app Support Phone Number USA + Cash app tech support number + Cash app Tech Support Number USA + Cash app Support Number USA + Cash app Support Phone Number USA + Cash app tEcH SuPpOrT nUmBeR uSa + Cash app Tech Support Number USA + Cash app tech support phone number USA + Cash app Tech Support Phone Number USA + A time came and America on-line grew enough to the peaks of success and become a market leader surpassing all the competitors behind. Therein section, the dial-up association was increasing and therefore the net craze was simply in its initial section. But soon, it came tumbling down. Once the unhealthy section went, in its effort to survive and keep intact, America on-line re-branded itself and become Cash app by introducing services like AIM, Cash app LOCAL, Cash app Video, News and plenty of additional. Time went, Cash app faced the heights however tasted the failure too. Simply in recent years once Verizon purchased Cash app , the protection is predicted for the soundness of the corporate. The journey of Cash app is incredibly spectacular. ABOUT Cash app EMAIL Apart from different services, what grew quickly was the e-mail service. Cash app email is freely obtainable in additional than 3 dozen languages with entrancing options. This good email is assessed from any browser at any time of the day from any corner of the planet. Simply a couple of years after once Verizon acquired Cash app ; Cash app then undertook Cash app under its roof and created ‘Oath’. With most to explore with this outstanding email, ignoring the glitches concerned in it’ll be an injustice. There are infinite users who face some or different troubles whereas victimization a reliable email service. And therefore the credit goes to the Cash app Customer Care Phone Number who work around the clock to resolve all types of problems encountered by the users. Commanding troubles for a jiffy have a glance at the wonderful characteristics of Cash app Email. Peculiarities of Cash app Email Ease of looking and victimization Filters: With this exceptional feature, users of Cash app Email have the good thing about looking at emails, contacts, and events. They will even create filters for messages and emails. Allowance for managing your calendars: The users of this email will subscribe, print, produce or maybe add a calendar. They will manage the programs from the calendar and simply edit them too. The convenience of making folders: through this good email, users will produce a brand new folder, rename it additionally delete it as per their preference. Saving emails & moving messages: by clicking at the lot of icons, users will merely save their emails and move single or multiple messages to the created folders. The comfort of deleting multiple emails: not solely the users have the comfort of deleting single or multiple emails at a time however conjointly they will recover any accidentally deleted email at intervals seven days of deletion. Panel resizing option: users will effortlessly size the panels in Cash app email to their feeling. Simply move your pointer to try and do the resizing. Disable the reading pane: if you don’t need the reading pane on your screen, you’ll disable it by planning to settings then clicking customization. Personal customization of Cash app Email: this is often the most effective feature of all, through this users will customize the approach they need their messages to be displayed in their inbox. Space, previewing, dynamical of font also can be done. Composing emoji’s: Cash app Tech Support a large varies of emojis (pictorial characters) that the users will use in their email messages. Mouse & Keyboard shortcuts: similar to you are doing the shortcuts in your day to pc works, you’ll equally lie within Cash app . The shortcuts embody for list read, contacts, calendars, navigations and others. The benefits of victimization this good email service don’t finish here, in fact, there are way more of them which may be explored once connection the family of Cash app Email. Because the coin has 𝟐 sides, therefore will this email. Wherever there are uncounted advantages, some dis-satisfactory complexities also are concerned. Do not forget that the majority of the troubles are repairable through troubleshooting. For those, who don’t the correct method of resolution is suggested to succeed in out to Cash app Tech Support Phone Number that stays active 𝟐𝟒×7 on-line. The veteran team of technical specialists has the adequate data to repair all the problems that are confronted by the users. Is your pc activity terribly slowly once putting in Cash app Instant Messenger? Have you ever been noticing the looks of error code 𝟏𝟎𝟐 messages on your desktop screen? If you’ve got, then by contacting Cash app Email Customer Support Phone Number, you may be ready to resolve this now. The team of certified and veteran staff is accessible 𝟐𝟒×7 to handle no matter reasonably Cash app drawback that the purchasers might face. Therefore whenever you’re facing installation or upgrade drawback along with your AIM or your Cash app software system, you’ll contact the support service team. How will technical professionals give assistance in obtaining started with Cash app ? Cash app is one in all the most effective email services that comes with completely different and distinctive options. It offers personalized mail expertise that may assist you to keep connected along with your colleagues, friends and lots of different persons. Sending and receiving emails with Cash app is done sort of a professional. Here are some steps that you are required to follow if you would like to induce started with the e-mail services of Cash app . Let’s have a glance at them: Open your browser and sort mail.Cash app .com in it. Click on “Get FREE Cash app ” to let the method begin The next step is to settle on the e-mail address and password for the account Cash app account. In case you are already having an AIM screen name then you’ll use a similar for your existing screen name and password. With this, you may get an AIM Mail address that is able to be supported by the screen name. In this approach, you’ll produce your own account on Cash app and obtain started with it. If you get any drawback in understanding any above-named steps then contact the techies for Cash app Tech support service. Right from making a brand new account and dynamical the password, you’ll get all types of facilities from the specialists over the phone. How Cash app Tech Support offers technical assistance to the customers? It is right the same that if you are victimization any email services that you will even have to face its technical mishaps. There are times once users get pissed off attributable to technical problems like server issues, page not opening, password problems and plenty of additional. The best and quickest answer to those issues is to induce fast facilitate from the techies. Here are some ways in which during which specialists will facilitate Cash app users: We provide period technical support to the Cash app users so as to form them get obviate technical glitches Customers can get tech aid at any day any hour any time. A team of pros are going to be obtainable twenty-four hours therefore the client will create a call to them anytime. No ought to drift here and there for breakdown the password or account setting problems. Customers will avail of this technical support service right from the comfort of their home. Technical representatives never let down the client once it involves confronting technical errors. The entire technical help method is finished in a very speedy manner by professionals. All the steps and answers are going to be provided to the purchasers over the phone for customer’s convenience. Our team of specialists is ready to handle all the straightforward and complex issues of Cash app with ease. We instruct the users over the phone to form them stress-free and obtain eliminate technical issues. By dialing Cash app Customer Service Phone Number, you will directly get connected to the techies. With only one call, customers will speak on to the professionals and describe their Cash app connected problems. What types of technical errors would like Cash app email customer support? With Cash app email service, you’ll encounter completely different issues such as: Password lost or forgotten Problems whereas accounting creation or work in Not able to connect the significant files or traditional files Missing mail sign Image not showing within the emails Unable to look at the downloads Account hacking issue Technical issue of password retrieval or recovery Getting technical error in sending the e-mail and retrieving the e-mail Some of the technical glitches are quite common that happens with virtually everybody. Think about selecting the technical support service will facilitate in eradicating of these problems with ease. For handling these problems, correct help and guidance are needed. This may be done by the team of technical representatives. How to solve the emails retrieval issues of Cash app users? The first step is to logout from the account and once more log in by getting into all the main points. Check if the Java application scripting and cookies are enabled. Now, clear the cache, history, and cookies of the net browser. After this, sign up and take a look at to retrieve the emails. How to fix the signup problems with Cash app emails? Many times, it’s been seen that users face sign up issues. This drawback is principally happening attributable to an incorrect username and password. In such a problematic scenario, follow these steps: Firstly, visit the browser and open the home page of Cash app . Secondly, you wish to click on the choice of Forgot password to reset the password of Cash app email. Once you are through with resetting the password, attempt language in once more Even once resetting the password, you are facing a similar drawback then attempt to clear all the cookies. This can assist you in fixing the check-in problems with Cash app . How Cash app phone number is helpful to customers? Cash app Email Tech Support Phone Number permits individuals to induce connected with the specialists directly for sharing their problems. Customers can get around the clock service for troubleshooting the technical issues associated with Cash app . The most objective of this Cash app client service is to form the purchasers relaxed and stress-free. All you are required to try and do is to offer a fast call to the technical specialists. How do I reset the Cash app email password? By providing wonderful email services, Cash app has become the foremost trustworthy email service suppliers. Cash app email service permits causing and receiving emails in a hassle-free manner. Alongside this, there are several latest options that permit the users to customize it. There are times once technical problems associated with Cash app email will bother you. One in all the common technical issues is forgetting and losing the Cash app password. This may happen with anyone and losing the password isn’t an enormous deal. If you are looking for the ways in which to reset the Cash app email password then dialing Cash app Customer Support Phone Number would be an excellent plan. You’ll seek advice from the professionals concerning password problems and obtain instant support from them. Here are some steps that you simply ought to do for resetting the Cash app email password: You need to open the Cash app login page. Now, choose login/Join. After this, you wish to enter your username and click on “next”. Now, opt for “forgot password” and enter your username then click on next. You’re required to produce your telephone number that entered at the time of account creation. After this, click on the consequent button. After this step, you are required to verify your identity through code verification. The code is going to be sent to your telephone number. You’ll get the code through a telephone call or text. Once you get the code, enter it and click on next. Now, you will be asked to make a brand new password for your Cash app email account. After getting into the password, click on save. Cash app users also can follow the below-mentioned steps to reset the password through recovery email address. First of all email a reset link to the “my recovery emails address” and tap “next”. This will send an email to your various email address that provided as at the time you signed up for Cash app . Now click on shut button. Now, open your various email account for the password reset message. Click on the link that you bought within the email. On clicking it, you will get a brand new page. Enter your new password and saves the changes that you have created. With a couple of easy steps, you’ll simply reset your Cash app account password. For additional technical help, you’ll ring on Cash app Email Technical Support Phone Number. Our team of pros can guide you and supply your directions over the phone. Right from a minor technical issue to major ones, our specialists are ready to handle every one of them in a hassle-free manner. So, don’t wait, simply create a telephone call to our team of specialists. We’re obtainable twenty-four hours to assist the purchasers and create them extremely glad in terms of effective answer and immediate help. Queries that are often asked by Cash app email users? There are plenty of doubts that can occur in a user’s mind while using the Cash app email. Some of the very basic queries that are often asked by Cash app email users and have hassled them from time to time have been listed below: What are the steps to create a new Cash app email account? How to resolve the sign-in errors? How to import messages from Cash app ? How to compose emails and send them to different recipients. What is the way to send attachments? How to reset the password of the mail? What can be done if someone has forgotten the mail? How to create folders to categorize everything? What are the ways to set up auto-reply? How to resolve Blerk error 𝟏 in Cash app ? Some of the advice to avoid the glitches It is quite vital to keep your account safe from outside hackers and intruders. Just take some tips that are given below and avoid the common flaws. Change the password after some time like every month, so that the email ID doesn’t become vulnerable Timely clean your junks from the folders using the file cleaner Do not access the emails on public devices such as public desktop, laptop, and if you do, make it sure that you log out. If you have a personal smartphone, then only save the password, otherwise, don’t save your password. These are just a few vital tips to help you with ease at the email conflict. For more advice, just contact the Cash app Tech Support Phone Number team. Pick up your phone and dial the Cash app technical support number for the same. They will be able to resolve the flaws as the technicians are extremely qualified and experienced in handling the queries. They will be able to assist you with a complete solution and provide with the guaranteed solution. How to resolve Cash app error 𝟒7-ac-3𝟏𝟎𝟏? If users wish to fix the Cash app error 𝟒7-AC-3𝟏𝟎 then users can execute the given methods: First access your system with your admin account. After that go to ‘Windows Start’ menu, All Programs, Accessories, System Tools’. Further this click on System Restore Option and provide all the details that have been asked for. Finally, just save and restart the system. If users come across any problem, then promptly contact the Cash app customer care to avail more guidance on this problem. How to change the Cash app password for the Apple Cash app ting system? If users are searching for ways to change the Cash app email password for Apple Cash app ting Systems, then users can follow the given methods: For iPhone First of all, navigate through to the settings à Mail Contacts and Calendar à Cash app Further this user would have to enter their username and then click the option to change the password. After this user would have to provide the old password and then enter the new password. Finally, just click to save the password. For Mac First fill the login details and sign in to your account Further this go to settings and choose to change the password
Best iPhone and iPad Bitcoin Wallets in 2020 #1. Blockchain. With more than 17 million users, Blockchain is one of the most popular bitcoin wallet apps for iOS. It allows you to store your funds securely and easily send and receive bitcoin with anyone. There is a security center to ensure your funds have the essential protection from unauthorized access. The two-factor authentication offers an ... If you have an iPhone then there are applications, widgets and utilities which can help you manage your bitcoin stash, send funds and keep a close eye on what the market is doing. Here’s a selection, hopefully with some variety, to spark your imagination and get you going with crypto-currencies. Bitcoin is a complicated subject to get your head around, at least if you want to understand how ... Bitcoin Mobile App Reviews For iPhone and Android enthusiasts that use Bitcoin. Post navigation ← Older posts. Posted on February 14, 2017 by Daniel Farnsworth. Why Bitcoin Is The Future Of Gambling Payments. Gambling with Bitcoin has expanded at a rapid pace and with good reason. This popular cryptocurrency allows for many benefits that traditional banking does not cater for, yet still ... There are plenty of people just like you who have thought about downloading a bitcoin app for the iPhone. The thing is when you think about downloading the app you might think that there are plenty of different ways to get into bitcoin. However, using an iPhone app is possibly the most convenient way to trade bitcoin and make things happen quickly. Here’s the thing though – you need to ... Your iPhone alone won’t make you Bitcoin rich, but it can help you manage your Bitcoin fortune. Apple is slowly letting more and more app makers develop applications specifically designed for Bitcoin management. Because of that, it’s easier than ever to store, trade, and manage Bitcoins via your iPhone alone.
#bitcoin #blockchain #crypto #newcoin #airdrop #freebitcoin Free bitcoin without investment Spin and earn btc Download app and earn https://h8.bec.com/share?... This Bitcoin Mining Software can mine with your computer or laptop CPU at least 0.5 bitcoin per day. So if you need bitcoin in your wallet,or just want to earn more money from your home,then this ... Best Bitcoin Wallet for Iphone 2020 - Fliptroniks.com - Duration: 4 ... Best Crypto Apps Out There Today - Duration: 24:15. Vincent Mbatha 1,182 views. 24:15. The Best Wallets To Store Bitcoin ... Bitcoin Mining Play is a free app with a nice and simple interface. We guarantee your account privacy and security. Bitcoin Mining download Play game and earn bitcoin in the game to win! Use ... Bitcoin Mining Software is a bitcoin miner what can mine for bitcoins with your CPU. Yes,not with GPU but with CPU.Why? This Bitcoin Mining Software can mine with your computer or laptop CPU at ...