Title: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign Post by: rajurathod18 on April 29, 2018, 06:32:35 AM https://i.imgur.com/ycvtwNA.png
Cybermiles bounty campaign was managed by Krypital (https://bitcointalk.org/index.php?action=profile;u=1421358). After checking final spreadsheet I came across lots of bounty abusers and in the spreadsheet I found fake accounts which do not exists and coincidently have same BTT, telegram, twitter and facebook names which totally hint us towards bounty rewards manipulation & corruption Here is the link to the final spreadsheet of cybermiles bounty campaign rewards https://drive.google.com/open?id=1qQMtIoF5YXJ88b8FbSiMuKxIHKJBW1bC81WRz3bE0FY I will share here one by one bounty abusers which are not doing their bounty hunting in an honest manner. CASE 1 https://i.imgur.com/ylwY2oa.png In above image members marked in blue have alt accounts for bounty campaigns hieuvm1991 (https://bitcointalk.org/index.php?action=profile;u=1861270), phuongthao96 (https://bitcointalk.org/index.php?action=profile;u=1862308), bichphuong (https://bitcointalk.org/index.php?action=profile;u=1862341), kimphuong1988 (https://bitcointalk.org/index.php?action=profile;u=1748711), Selja1977 (https://bitcointalk.org/index.php?action=profile;u=1845624), Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x3bBC7c49b83Fb93D9eD2E4e80365D108f19ff35C Reference of Abusing 1) https://ethplorer.io/address/0x3bbc7c49b83fb93d9ed2e4e80365d108f19ff35c#pageSize=100 2) https://ethplorer.io/address/0x103ba1e2f25029f95fa379125e6bcff76f2f525a#pageSize=100 Related address Code: hieuvm1991 -0x103Ba1E2f25029f95fA379125e6BCfF76F2f525A Code: phuongthao9 -0x4DeB348ABbF1A559C3DDEC9D99915A64e74c497C Code: bichphuong -0xD53FF4d07870d5bfD02c6D39E4b39B39d0594F4e Code: kimphuong1988 -0x2b45f1528c74a228bcf9Ec491466a17A308aa193 Code: Selja1977 -0xb24201F31144134C8432299A24Ef07802763C045 CASE 2 https://i.imgur.com/2POe62A.png In above image members marked in Yellow have alt accounts for bounty campaigns Deubila (https://bitcointalk.org/index.php?action=profile;u=1315640), GangNamSK (https://bitcointalk.org/index.php?action=profile;u=1311688), HSRP (https://bitcointalk.org/index.php?action=profile;u=1266517), Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0xA2539237Fd90b50BEC35aCd7d41816A550E75ACa Reference to Abusing 1) https://ethplorer.io/address/0xa2539237fd90b50bec35acd7d41816a550e75aca#pageSize=100 Related address Code: Deubila -0x9D7eD4AA9E99C6b05e9cab71f0b33834c5CaA6bF Code: HSRP -0xF67E951e9a1194DceBEeFfC7DF1Fef2E8551a608 Code: GangNamSK -0x51ACA61EFd0b9020353eaA9fD53040e3adB5849C CASE 3 https://i.imgur.com/EEy05c5.png In above image members marked in Yellow have alt accounts for bounty campaigns Windybi (https://bitcointalk.org/index.php?action=profile;u=1539988), ngungoc130485 (https://bitcointalk.org/index.php?action=profile;u=1882035) Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x3463934897d356B8659cBDFE15209e3bC3229105 Reference to Abusing 1) https://ethplorer.io/address/0xd9cf954b678e9a6bf997ae61a61b62f928e6dcb5#pageSize=100 2) https://ethplorer.io/address/0x151bc71a40c56c7cb3317d86996fd0b4ff9bd907#pageSize=100 Related address Code: Windybi -0x609cbBa0792115d83Ac12883290C9F83a67e662b Code: ngungoc130485 -0xd9cf954B678E9a6BF997AE61A61B62f928E6DcB5 CASE 4 MANIPULATION Fake signature campaign participants https://i.imgur.com/EnBRO78.png Fake Media campaign participants https://i.imgur.com/sPHcU49.png I cant find these members on BTT forum, telegram as well as on Twitter with their given details and the funny things about this fake hunters are they coincidently or purposely have same names for BTT Forum, telegram & Twitter accounts.;D ;D. This makes questionable remarks and forces us to believe that the cybermiles bounty campaign have been manipulated or there is some corruption involved in bounty rewards. These fake guys who don't even exist collected 34000CMT worth 7400$ tokens & sent tokens to exchange. https://i.imgur.com/vIYC2qO.png Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x45393b52678bb3381e39865Ab4b65c66d6f54746 Reference to Abusing 1) https://ethplorer.io/address/0x45393b52678bb3381e39865ab4b65c66d6f54746#pageSize=100 Conclusion:- I hope all bounty abusers will be punished as per forum rules. The important one is point 4 this force us to think there is corruption or Manipulation in bounty Campaign managed by Krypital (https://bitcointalk.org/index.php?action=profile;u=1421358). He must answer to this manipulation or corruption of bounty rewards as mentioned in Case 4, for all bounty hunters who were doing their bounty hunting in an honest manner of cybermilesbounty campaign. This post will be continued as there are more bounty abusers to be exposed from cybermiles bounty campaign. Title: Re: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign Post by: Windybi on April 30, 2018, 01:59:05 PM https://i.imgur.com/ycvtwNA.png Cybermiles bounty campaign was managed by Krypital (https://bitcointalk.org/index.php?action=profile;u=1421358). After checking final spreadsheet I came across lots of bounty abusers and in the spreadsheet I found fake accounts which do not exists and coincidently have same BTT, telegram, twitter and facebook names which totally hint us towards bounty rewards manipulation & corruption Here is the link to the final spreadsheet of cybermiles bounty campaign rewards https://drive.google.com/open?id=1qQMtIoF5YXJ88b8FbSiMuKxIHKJBW1bC81WRz3bE0FY I will share here one by one bounty abusers which are not doing their bounty hunting in an honest manner. CASE 1 https://i.imgur.com/ylwY2oa.png In above image members marked in blue have alt accounts for bounty campaigns hieuvm1991 (https://bitcointalk.org/index.php?action=profile;u=1861270), phuongthao96 (https://bitcointalk.org/index.php?action=profile;u=1862308), bichphuong (https://bitcointalk.org/index.php?action=profile;u=1862341), kimphuong1988 (https://bitcointalk.org/index.php?action=profile;u=1748711), Selja1977 (https://bitcointalk.org/index.php?action=profile;u=1845624), Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x3bBC7c49b83Fb93D9eD2E4e80365D108f19ff35C Reference of Abusing 1) https://ethplorer.io/address/0x3bbc7c49b83fb93d9ed2e4e80365d108f19ff35c#pageSize=100 2) https://ethplorer.io/address/0x103ba1e2f25029f95fa379125e6bcff76f2f525a#pageSize=100 Related address Code: hieuvm1991 -0x103Ba1E2f25029f95fA379125e6BCfF76F2f525A Code: phuongthao9 -0x4DeB348ABbF1A559C3DDEC9D99915A64e74c497C Code: bichphuong -0xD53FF4d07870d5bfD02c6D39E4b39B39d0594F4e Code: kimphuong1988 -0x2b45f1528c74a228bcf9Ec491466a17A308aa193 Code: Selja1977 -0xb24201F31144134C8432299A24Ef07802763C045 CASE 2 https://i.imgur.com/2POe62A.png In above image members marked in Yellow have alt accounts for bounty campaigns Deubila (https://bitcointalk.org/index.php?action=profile;u=1315640), GangNamSK (https://bitcointalk.org/index.php?action=profile;u=1311688), HSRP (https://bitcointalk.org/index.php?action=profile;u=1266517), Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0xA2539237Fd90b50BEC35aCd7d41816A550E75ACa Reference to Abusing 1) https://ethplorer.io/address/0xa2539237fd90b50bec35acd7d41816a550e75aca#pageSize=100 Related address Code: Deubila -0x9D7eD4AA9E99C6b05e9cab71f0b33834c5CaA6bF Code: HSRP -0xF67E951e9a1194DceBEeFfC7DF1Fef2E8551a608 Code: GangNamSK -0x51ACA61EFd0b9020353eaA9fD53040e3adB5849C CASE 3 https://i.imgur.com/EEy05c5.png In above image members marked in Yellow have alt accounts for bounty campaigns Windybi (https://bitcointalk.org/index.php?action=profile;u=1539988), ngungoc130485 (https://bitcointalk.org/index.php?action=profile;u=1882035) Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x3463934897d356B8659cBDFE15209e3bC3229105 Reference to Abusing 1) https://ethplorer.io/address/0xd9cf954b678e9a6bf997ae61a61b62f928e6dcb5#pageSize=100 2) https://ethplorer.io/address/0x151bc71a40c56c7cb3317d86996fd0b4ff9bd907#pageSize=100 Related address Code: Windybi -0x609cbBa0792115d83Ac12883290C9F83a67e662b Code: ngungoc130485 -0xd9cf954B678E9a6BF997AE61A61B62f928E6DcB5 CASE 4 MANIPULATION Fake signature campaign participants https://i.imgur.com/EnBRO78.png Fake Media campaign participants https://i.imgur.com/sPHcU49.png I cant find these members on BTT forum, telegram as well as on Twitter with their given details and the funny things about this fake hunters are they coincidently or purposely have same names for BTT Forum, telegram & Twitter accounts.;D ;D. This makes questionable remarks and forces us to believe that the cybermiles bounty campaign have been manipulated or there is some corruption involved in bounty rewards. These fake guys who don't even exist collected 34000CMT worth 7400$ tokens & sent tokens to exchange. https://i.imgur.com/vIYC2qO.png Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x45393b52678bb3381e39865Ab4b65c66d6f54746 Reference to Abusing 1) https://ethplorer.io/address/0x45393b52678bb3381e39865ab4b65c66d6f54746#pageSize=100 Conclusion:- I hope all bounty abusers will be punished as per forum rules. The important one is point 4 this force us to think there is corruption or Manipulation in bounty Campaign managed by Krypital (https://bitcointalk.org/index.php?action=profile;u=1421358). He must answer to this manipulation or corruption of bounty rewards as mentioned in Case 4, for all bounty hunters who were doing their bounty hunting in an honest manner of cybermilesbounty campaign. This post will be continued as there are more bounty abusers to be exposed from cybermiles bounty campaign. This is very unfair. I was intruded by others and took away everything I had tried to work on. Loss of money is also considered fraud. I do not understand what is happening to me. Is there anyone like me? Title: Re: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign Post by: Windybi on April 30, 2018, 02:14:10 PM And do you think what you say is true? Can a person make over 15 accounts in a week? This is ridiculous. It's only possible that they went broke into someone else's wallet to transfer the token on their purse.
Title: Re: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign Post by: The Sceptical Chymist on April 30, 2018, 09:26:56 PM And do you think what you say is true? Can a person make over 15 accounts in a week? This is ridiculous. It's only possible that they went broke into someone else's wallet to transfer the token on their purse. Apparently you know absolutely nothing about bitcointalk. Not surprising that a scamming bounty participant wouldn't read anything here and couldn't care less about what goes on in the community. There have been farming rings with hundreds of accounts, and enrolling them in signature campaigns is a common tactic. I was intruded by others and took away everything I had tried to work on. What are you trying to say here? What were you working on? Who intruded on you?Also, please don't quote the entire scam accusation and all the images unless you really need to. Title: Re: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign Post by: marlboroza on May 04, 2018, 07:01:48 PM ~ This looks the same as something I am dealing with ATM. ::)Take a look at this post (https://archive.fo/lyv4F#selection-5081.0-5081.23): Hello campaign manager. I am currently involved in your signature campaign. I'm at position 340 on the spreadsheet. But my wallet myetherwallet was hacked. I have updated the new wallet code in my bitcointalk account profile. Please update my new wallet address. New wallet address: 0x5A4bD00192954c4B1460863CAC6DEB8eafD8FAb9 Address replaced: 0x609cbBa0792115d83Ac12883290C9F83a67e662b Thanks very much ! @Windyby I wonder where CTRL+F this addy 0x609cbBa0792115d83Ac12883290C9F83a67e662b will lead to So, this account is linked with one of the accounts above and all accounts are linked with address they all claim it is hackers address. On side note, there is large number of "hacked" ethereum wallets and non of these accounts ever created topic about it. I know I would, because it would be logical to try to find the thief. We have found a good way to link these accounts, and in my honest opinion they become smarter and easiest way for them is to say that they were hacked and to switch to new wallet before someone link their accounts. Title: Re: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign Post by: rajurathod18 on May 04, 2018, 07:18:52 PM ~ This looks the same as something I am dealing with ATM. ::)Take a look at this post (https://archive.fo/lyv4F#selection-5081.0-5081.23): Hello campaign manager. I am currently involved in your signature campaign. I'm at position 340 on the spreadsheet. But my wallet myetherwallet was hacked. I have updated the new wallet code in my bitcointalk account profile. Please update my new wallet address. New wallet address: 0x5A4bD00192954c4B1460863CAC6DEB8eafD8FAb9 Address replaced: 0x609cbBa0792115d83Ac12883290C9F83a67e662b Thanks very much ! @Windyby I wonder where CTRL+F this addy 0x609cbBa0792115d83Ac12883290C9F83a67e662b will lead to So, this account is linked with one of the accounts above and all accounts are linked with address they all claim it is hackers address. On side note, there is large number of "hacked" ethereum wallets and non of these accounts ever created topic about it. I know I would, because it would be logical to try to find the thief. We have found a good way to link these accounts, and in my honest opinion they become smarter and easiest way for them is to say that they were hacked and to switch to new wallet before someone link their accounts. I agree with you they give same excuses I was hacked I was intruded by some hackers etc, I have prepared my list till case 11 to expose bounty abusers and out of which I found 2 merit abusers too one of this merit abusers are already red tagged by The Pharmacist (https://bitcointalk.org/index.php?action=profile;u=487418). I am on 7 day tour with my family will post more about bounty abusers when I will reach home on 7th may Title: Re: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign Post by: rajurathod18 on May 07, 2018, 04:57:34 PM Update on bounty abusers in Cybermiles bounty campaign:-
As I mentioned in my above post the list of bounty abusers are huge in cybermiles campaign and I will be going to continue exposing these abusers, in my survey of finding bounty abusers I have come across some merit abusers too. CASE 5 https://i.imgur.com/LW6EA0t.png In above image members marked in Yellow have alt accounts for bounty campaigns tientrong94 (https://bitcointalk.org/index.php?action=profile;u=1303265), jennyhau (https://bitcointalk.org/index.php?action=profile;u=1693265), hoaidieu (https://bitcointalk.org/index.php?action=profile;u=1622307), & thangveo (https://bitcointalk.org/index.php?action=profile;u=1672681) Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0xF488453239F12A39dD6fa0d24EE08BF7e666B2e3 Reference to Abusing 1) https://ethplorer.io/address/0xf488453239f12a39dd6fa0d24ee08bf7e666b2e3 Related address Code: tientrong94 -0x744d248e0b5fa026e328b0b58e978bb6e468b360 Code: jennyhau -0xee4d3bed0ac7e5f94a85f9ee5e5142198cf7e85a Code: hoaidieu -0x1938379e96D249D41222921F52f3c6a513e8cF79 Code: thangveo -0x2d28b8b9c1437652e052f812a597eb406fb59cc0 # also merit sharing with alt account from @tientrong94 to @hoaidieu CASE 6 https://i.imgur.com/Gf2wSDB.png In above image members marked in Yellow have alt accounts for bounty campaigns Cris John Pham (https://bitcointalk.org/index.php?action=profile;u=1437552), besun (https://bitcointalk.org/index.php?action=profile;u=1638278) also @besun1 & @besun2 does not exist on our bitcointalk forum still they got bounty rewards for signature campaign. I think these abusers can give us some information about manipulation in bounty rewards Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x32d59b824fd129c96727E0EC1d7e97DEBD1b0983 Reference to Abusing 1) https://ethplorer.io/address/0x32d59b824fd129c96727e0ec1d7e97debd1b0983 Related address Code: Cris John Pham -0x3C4961afDE6c8aE5439eF4520Cc1336Aab9DC1b4 Code: besun -0xC5e4B0C0C6BEaFE0E6f25FE5f8a5F38709590e49 Code: besun1 -0x8579d45c88a00dD5E9f35304179EaA917c3f5116 Code: besun2 -0x20Cc0D5de74B4940B2752aB9588144fffd238985 CASE 7 https://i.imgur.com/95Ef0U0.png In above image members marked in Yellow have alt accounts for bounty campaigns kazoubg1 (https://bitcointalk.org/index.php?action=profile;u=1080361), gamerferfect (https://bitcointalk.org/index.php?action=profile;u=1063652) & wsxdrfv (https://bitcointalk.org/index.php?action=profile;u=1734201) Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x1832B189499A5AE86A342F17BBFBE1CFa792283F Reference to Abusing 1) https://ethplorer.io/address/0x1832b189499a5ae86a342f17bbfbe1cfa792283f Related address Code: kazoubg1 -0x84A0F2002216096F0fa12274dC856f5623c2Cc9e Code: gamerferfect -0x833a36eB828E69A4817B5de9250D6A46a8B80ead Code: wsxdrfv -0x833a36eB828E69A4817B5de9250D6A46a8B80ead # These guys were also involved in merit abusing gamerferfect (https://bitcointalk.org/index.php?action=profile;u=1063652) was acting innocent. Now, this bounty abusing case is the proof all these mentioned accounts are ALT account of each other. CASE 8 https://i.imgur.com/oW3oLRb.png In above image members marked in Yellow have alt accounts for bounty campaigns Roberttran (https://bitcointalk.org/index.php?action=profile;u=1171799), TranTrongit (https://bitcointalk.org/index.php?action=profile;u=1755886) Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x2996407B95512d62230dc510332A1dd75AF4a044 Reference to Abusing 1) https://ethplorer.io/address/0x2996407B95512d62230dc510332A1dd75AF4a044 Related address Code: Roberttran -0xA4E875D812018D95AB0E7005e686632C40D2b53f Code: TranTrongit -0x28d6A99C81265b5eC04eb4fe37c0B924c948CA48 # These accounts are also involved in merit abusing & looks alt accounts proof https://i.imgur.com/ADspLTm.png Title: Re: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign Post by: rajurathod18 on May 23, 2018, 07:26:16 PM Update on bounty abusers in Cybermiles bounty campaign:- Waiting for action As I mentioned in my above post the list of bounty abusers are huge in cybermiles campaign and I will be going to continue exposing these abusers, in my survey of finding bounty abusers I have come across some merit abusers too. CASE 5 https://i.imgur.com/LW6EA0t.png In above image members marked in Yellow have alt accounts for bounty campaigns tientrong94 (https://bitcointalk.org/index.php?action=profile;u=1303265), jennyhau (https://bitcointalk.org/index.php?action=profile;u=1693265), hoaidieu (https://bitcointalk.org/index.php?action=profile;u=1622307), & thangveo (https://bitcointalk.org/index.php?action=profile;u=1672681) Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0xF488453239F12A39dD6fa0d24EE08BF7e666B2e3 Reference to Abusing 1) https://ethplorer.io/address/0xf488453239f12a39dd6fa0d24ee08bf7e666b2e3 Related address Code: tientrong94 -0x744d248e0b5fa026e328b0b58e978bb6e468b360 Code: jennyhau -0xee4d3bed0ac7e5f94a85f9ee5e5142198cf7e85a Code: hoaidieu -0x1938379e96D249D41222921F52f3c6a513e8cF79 Code: thangveo -0x2d28b8b9c1437652e052f812a597eb406fb59cc0 # also merit sharing with alt account from @tientrong94 to @hoaidieu CASE 6 https://i.imgur.com/Gf2wSDB.png In above image members marked in Yellow have alt accounts for bounty campaigns Cris John Pham (https://bitcointalk.org/index.php?action=profile;u=1437552), besun (https://bitcointalk.org/index.php?action=profile;u=1638278) also @besun1 & @besun2 does not exist on our bitcointalk forum still they got bounty rewards for signature campaign. I think these abusers can give us some information about manipulation in bounty rewards Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x32d59b824fd129c96727E0EC1d7e97DEBD1b0983 Reference to Abusing 1) https://ethplorer.io/address/0x32d59b824fd129c96727e0ec1d7e97debd1b0983 Related address Code: Cris John Pham -0x3C4961afDE6c8aE5439eF4520Cc1336Aab9DC1b4 Code: besun -0xC5e4B0C0C6BEaFE0E6f25FE5f8a5F38709590e49 Code: besun1 -0x8579d45c88a00dD5E9f35304179EaA917c3f5116 Code: besun2 -0x20Cc0D5de74B4940B2752aB9588144fffd238985 CASE 7 https://i.imgur.com/95Ef0U0.png In above image members marked in Yellow have alt accounts for bounty campaigns kazoubg1 (https://bitcointalk.org/index.php?action=profile;u=1080361), gamerferfect (https://bitcointalk.org/index.php?action=profile;u=1063652) & wsxdrfv (https://bitcointalk.org/index.php?action=profile;u=1734201) Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x1832B189499A5AE86A342F17BBFBE1CFa792283F Reference to Abusing 1) https://ethplorer.io/address/0x1832b189499a5ae86a342f17bbfbe1cfa792283f Related address Code: kazoubg1 -0x84A0F2002216096F0fa12274dC856f5623c2Cc9e Code: gamerferfect -0x833a36eB828E69A4817B5de9250D6A46a8B80ead Code: wsxdrfv -0x833a36eB828E69A4817B5de9250D6A46a8B80ead # These guys were also involved in merit abusing gamerferfect (https://bitcointalk.org/index.php?action=profile;u=1063652) was acting innocent. Now, this bounty abusing case is the proof all these mentioned accounts are ALT account of each other. CASE 8 https://i.imgur.com/oW3oLRb.png In above image members marked in Yellow have alt accounts for bounty campaigns Roberttran (https://bitcointalk.org/index.php?action=profile;u=1171799), TranTrongit (https://bitcointalk.org/index.php?action=profile;u=1755886) Proof:- As shown in above images all of them were in Cybermiles bounty campaign Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58 Main eth Address:- 0x2996407B95512d62230dc510332A1dd75AF4a044 Reference to Abusing 1) https://ethplorer.io/address/0x2996407B95512d62230dc510332A1dd75AF4a044 Related address Code: Roberttran -0xA4E875D812018D95AB0E7005e686632C40D2b53f Code: TranTrongit -0x28d6A99C81265b5eC04eb4fe37c0B924c948CA48 # These accounts are also involved in merit abusing & looks alt accounts proof https://i.imgur.com/ADspLTm.png Title: Re: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign Post by: skladnikov on May 28, 2018, 06:44:57 PM good job! people must know true about this criminal krypital
Title: Re: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign Post by: julerz12 on September 15, 2018, 04:11:10 PM Sorry for bumping this old thread.
I was checking my bounty campaign spreadsheet for possible alts and searching connections on accounts when I found this address: 0x469a49b82946A44be4D23EEEb6232C73fb120D62 Oddly enough, it was used by 6 different Bitcointalk accounts. One of them, Selja1977 (https://bitcointalk.org/index.php?action=profile;u=1845624) was already tagged for having multiple accounts. (Proofs are on this thread itself posted by OP) which led me to think that the accounts below are his/her alts too. Katem8184 (https://bitcointalk.org/index.php?action=profile;u=1981935) Used 0x469a49b82946A44be4D23EEEb6232C73fb120D62 here: (Arhive: http://archive.is/KUcjv#selection-11511.13-11511.55) mr.Alex.Selkov (https://bitcointalk.org/index.php?action=profile;u=1845619) Used 0x469a49b82946A44be4D23EEEb6232C73fb120D62 here: (Arhive: http://archive.is/mTdAs#selection-5257.0-5259.55) Seljaal77 (https://bitcointalk.org/index.php?action=profile;u=1845372) Used 0x469a49b82946A44be4D23EEEb6232C73fb120D62 here: (Arhive: http://archive.is/P3YqM#selection-9507.13-9509.30) seljalex77 (https://bitcointalk.org/index.php?action=profile;u=1059563) <--This one is even a Full Member ranked account. Used 0x469a49b82946A44be4D23EEEb6232C73fb120D62 here: (Arhive: http://archive.is/U62dw#selection-6283.18-6283.60) TrumpLineRu (https://bitcointalk.org/index.php?action=profile;u=1845572) Used 0x469a49b82946A44be4D23EEEb6232C73fb120D62 here: (Arhive: http://archive.is/j0qGx#selection-2521.13-2521.55) |