Bitcoin Forum

Economy => Reputation => Topic started by: YOSHIE on December 02, 2020, 07:06:01 PM



Title: Bounty managers break forum, cheats & multi-account rules.
Post by: YOSHIE on December 02, 2020, 07:06:01 PM
What happens: if a Bounty manager violates the terms of the Forum and has multiple accounts is also involved in fraud against participants.

Account named: @amos77978, Is currently running their latest campaign below.

Topic: [BOUNTY][SCARCITYDEFI.ORG | WORTH 30 ETHEREUM|LIMITED PARTICIPANTS (https://bitcointalk.org/index.php?topic=5295493.0)
Archive (https://archive.is/wip/arKHM)

Violations committed:
1. Evasion ban.
2. Trying to register in own campaign.
3. Multi-Accounts.
4. Deceive participants in the campaign.


Proof: @amos77978 made a mistake.

[1].
25. Ban evasion (using or creating accounts while one of your accounts is banned) is not allowed.[e]

[2]. Talking alone.

Any plans for translation campaign?

[3]. Multi-accounts.
Account connected.


1. amos77978 (https://bitcointalk.org/index.php?action=profile;u=2476519)
2. Kaneki11 (https://bpip.org/Profile?p=Kaneki11) (Archived)
3. Nekoma2018 (https://bitcointalk.org/index.php?action=profile;u=2150914)
4. Psalmy2cute (https://bpip.org/Profile?p=Psalmy2cute) (Archived)

Proof:

#Proof of Authentication  
Bitcointalk UserName: amos77978
Bitcointalk Link: https://bitcointalk.org/index.php?action=profile;u=2476519;sa=summary  
Campaigns: Facebook, LinkedIn, Twitter
Telegram UserName: @kikitty
ETH Wallet Address: 0xe32c340433A440A800277CA53627d99b4414345c
Archive (https://archive.is/wip/jr1Se)

#PROOF OF REGISTRATION
Forum Username: kaneki11
Forum Profile Link: https://bitcointalk.org/index.php?action=profile;u=2199064;sa=summary
Telegram Username: @akeeto
Participated Campaigns: Facebook Twitter LinkedIn article
ETH Wallet Address: 0xe32c340433A440A800277CA53627d99b4414345c
Archive (https://archive.is/wip/2Bcqp)

Bitcointalk username : nekoma2018
Bitcointalk profile link : https://bitcointalk.org/index.php?action=profile;u=2150914;sa=summary
Telegram username : @nekoma2018
ERC20 Wallet Address : 0xe32c340433A440A800277CA53627d99b4414345c
Archive (https://archive.is/wip/7vMpw)

Twitter username: @bossman06011439
Followers: 5000
ERC20 Wallet: 0xe32c340433A440A800277CA53627d99b4414345c
Archive (https://archive.is/PPvkz)




Connected account:

1. Nekoma2018 (https://bitcointalk.org/index.php?action=profile;u=2150914)
2. Psalmy2cute (https://bitcointalk.org/index.php?action=profile;u=1153318)
3. winbk15 (https://bitcointalk.org/index.php?action=profile;u=2126074)
4. Kaneki11 (https://bitcointalk.org/index.php?action=profile;u=2199064)
5. Akeeto (https://bitcointalk.org/index.php?action=profile;u=1596340)
6. AMANULAT (https://bitcointalk.org/index.php?action=profile;u=1591002)
7. weaverkaggs (https://bitcointalk.org/index.php?action=profile;u=2521200)
8. Locotoni (https://bitcointalk.org/index.php?action=profile;u=1319477)
9. winjk02 (https://bitcointalk.org/index.php?action=profile;u=2166647)
10. MrSpasybo (https://bitcointalk.org/index.php?action=profile;u=1308842)
11. biternet (https://bitcointalk.org/index.php?action=profile;u=1149942)
12. GAronov (https://bitcointalk.org/index.php?action=profile;u=2090445)
13. eldarbek (https://bitcointalk.org/index.php?action=profile;u=1798656)
14. winbk14 (https://bitcointalk.org/index.php?action=profile;u=2126022)
15. catbuizz4 (https://bitcointalk.org/index.php?action=profile;u=2125968)
16. loinguyen1984 (https://bitcointalk.org/index.php?action=profile;u=2104418)

ETH address Related:
Code:
1. 0xe32c340433A440A800277CA53627d99b4414345c
2. 0x628DF842a6CE463475b024Fc7a981Fcc8b917568
3. 0x29535BB9b64059983B7eb475e4D9Fd56490beFB2
4. 0x1FEfB1e64313c8cf9AeF6215797d3f264cAcBA18
5. 0x004edCC6a582EEA4691100d4ed35ed119d39d35a

[4]. Deceive participants in the campaign.

https://zizihub.com/39fb90.jpg

https://bitcointalk.org/index.php?action=trust;u=2150914

Requires mod & Admin attention and action to related Alt accounts, they are involved in many abuses and also for the participants who are participating in their new campaign better avoid being vulnerable to fraud.


Title: Re: Bounty managers break forum, cheats & multi-account rules.
Post by: Jocuserious on December 03, 2020, 07:15:46 AM
With both same merit connected all account
Nekoma2018, Kaneki11, amos77978 multi-accounts same user owner three more account. It's really incredible that a bounty manager is using multi-accounts on here bounty. Thanks OP for identify such a cheating manager.


Title: Re: Bounty managers break forum, cheats & multi-account rules.
Post by: bakasabo on December 03, 2020, 07:46:45 AM
Thanks for the warning YOSHIE. Yesterday I have joined bounty campaign under the management of @amos77978, and now I'm going to skip participating in it. Because I have an inner feeling there are going to be issues with stakes, participants and distribution.

What I dont like in SCARCITYDEFI.ORG webpage - it automatically loads Metamask and asks for a connection.

The part "Token Information" looks like it was quickly made in excel and copy-pasted to webpage. I would like to point that the whole design of the page is weak. Why not stick to one particular font for all the text? Otherwise it looks like it was quickly snatched from different sources and inserted in the page.

And the signs "BUY SCARCE TOKEN NOW" and "This project is in beta. Use at your own risk" (and why this is a button) just made me smile. Also, what is "???????" button? Double, no triple smile.


Title: Re: Bounty managers break forum, cheats & multi-account rules.
Post by: reza7777 on January 18, 2021, 03:04:18 PM
Even though he already got warning at 2020-12-03 but I see he/she still insists on running the same bounty campaign (SCARCITYDEFI) in January 2021-01-06, Look now what is happening in their telegram group, investors are complaining about losing money and Hunters worked in vain all this time, This project ended up scam


Title: Re: Bounty managers break forum, cheats & multi-account rules.
Post by: YOSHIE on January 19, 2021, 05:40:50 AM
This project ended up scam
I created this topic on December 2, 2020, regarding a warning to members in this forum about the "SCARCITYDEFI" campaign which was run at this forum on December 1, 2020, by: @amos77978.

Before this happened to all of you.

https://archive.is/wip/vwnPW
Quote
KINDLY NOTE; BOUNTY PARTICIPANTS NOT FOUND IN https://t.me/SCARCEchat WILL HAVE THEIR DATA REMOVED FROM SPREADSHEET AND REWARD FORTEITED

Since this warning was made, you should be aware of and avoid the Bounty campaign managed by @amos77978, and look for other bounty campaigns with honest and responsible managers.

Warnings are already published here, but you guys are ignoring them.