EvanR
Newbie
Offline
Activity: 40
Merit: 0
|
|
June 09, 2011, 06:08:50 PM |
|
I thought I had it!
Continuing to think it through to see if anymore water leaks out.
Be careful when scammers propose a wild possibility that would explain their innocence. Occams razor!
And do not trade with people that are not registered.
|
|
|
|
|
|
|
|
I HATE TABLES I HATE TABLES I HA(╯°□°)╯︵ ┻━┻ TABLES I HATE TABLES I HATE TABLES
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
|
JackH (OP)
|
|
June 09, 2011, 06:11:02 PM |
|
Both me and tiner messed up, and all this happened. I guess this has to be delt with between me and tiner now. Thank you all for helping collecting IP's and identifying my super bad memory in the h___ = hondura so that we could identify with him pork_
tiner, please contact me on IRC and we can talk about what we should do about all the money between us.
|
<helo> funny that this proposal grows the maximum block size to 8GB, and is seen as a compromise <helo> oh, you don't like a 20x increase? well how about 8192x increase? <JackH> lmao
|
|
|
kgo
|
|
June 09, 2011, 06:14:06 PM |
|
More specificially:
;;ident username
If gribble tells you the person can't be identified, they could be anyone. A username means nothing.
And then
;;getrating username
Or even better:
;;gettrust username
if you have some ratings of your own.
|
|
|
|
0x6763
Newbie
Offline
Activity: 24
Merit: 0
|
|
June 09, 2011, 06:23:50 PM |
|
If the theory is correct, the scammer is pork_, aka hondura, aka honduras, aka pork_honduras. pork_ = buyer - http://paste.pocoo.org/show/403595/hondura(s) = seller - http://paste.pocoo.org/show/403594/IP addresses: 65.49.14.* Here's a log of a conversation with the scammer and KCanini that just happened moments before I'm posting this: http://pastebin.com/RhSdEmxJUnfortunately I don't see anything where JackH (jacker224) directly communicated with any of them in my logs. Obviously at least part of it would have been PM, if not entirely PM. EDIT: Other nicks in my logs (which don't go back very far at this point) using IP addresses in that same range are: titi Miner-TE guest1234 bridgehead mazik grepped log showing those nicks: http://paste.pocoo.org/show/403613/
|
|
|
|
Fiyasko
Legendary
Offline
Activity: 1428
Merit: 1001
Okey Dokey Lokey
|
|
June 09, 2011, 06:36:00 PM |
|
Ho Ly
Fuck..... Run noobs run, Your all in danger, and now im probly a target.
|
|
|
|
JusticeForYou
VIP
Sr. Member
Offline
Activity: 490
Merit: 271
|
|
June 09, 2011, 11:42:38 PM |
|
As was noted in the #bitcoin-court (hehe).
Jacker224 sent money to an unregistered, unidentified Nick. Not that would have prevented this scam, but that i could have been slowed down.
I just recently moderated an escrow between 2 nicks for a pretty substantial amount. After both identifying, we went to PM mode. One of the participants lost connection and came back online. And then asked for the BTC, I had made him re-authenticate. Before releasing the BTC.
This isn't a place for the faint hearted. Buyer beware, Seller beware. If something goes wrong or you are worried, back out, there is no harm.
This an semi-advanced scam. And am glad it was brought out.
However, buying using trusted escrow, the BTC would have been protected. A resolution could have been accomplished.
In this case, Jacker224's BTC would have been safe. Jacker224 would have know the BTC was there and his upon the OK to release from the Buyer.
|
|
|
|
. ..1xBit.com Super Six.. | ▄█████████████▄ ████████████▀▀▀ █████████████▄ █████████▌▀████ ██████████ ▀██ ██████████▌ ▀ ████████████▄▄ ███████████████ ███████████████ ███████████████ ███████████████ ███████████████ ▀██████████████ | ███████████████ █████████████▀ █████▀▀ ███▀ ▄███ ▄ ██▄▄████▌ ▄█ ████████ ████████▌ █████████ ▐█ ██████████ ▐█ ███████▀▀ ▄██ ███▀ ▄▄▄█████ ███ ▄██████████ ███████████████ | ███████████████ ███████████████ ███████████████ ███████████████ ███████████████ ███████████▀▀▀█ ██████████ ███████████▄▄▄█ ███████████████ ███████████████ ███████████████ ███████████████ ███████████████ | ▄█████ ▄██████ ▄███████ ▄████████ ▄█████████ ▄██████████ ▄███████████ ▄████████████ ▄█████████████ ▄██████████████ ▀▀███████████ ▀▀███████ ▀▀██▀ | ▄▄██▌ ▄▄███████ █████████▀ ▄██▄▄▀▀██▀▀ ▄██████ ▄▄▄ ███████ ▄█▄ ▄ ▀██████ █ ▀█ ▀▀▀ ▄ ▀▄▄█▀ ▄▄█████▄ ▀▀▀ ▀████████ ▀█████▀ ████ ▀▀▀ █████ █████ | ▄ █▄▄ █ ▄ ▀▄██▀▀▀▀▀▀▀▀ ▀ ▄▄█████▄█▄▄ ▄ ▄███▀ ▀▀ ▀▀▄ ▄██▄███▄ ▀▀▀▀▄ ▄▄ ▄████████▄▄▄▄▄█▄▄▄██ ████████████▀▀ █ ▐█ ██████████████▄ ▄▄▀██▄██ ▐██████████████ ▄███ ████▀████████████▄███▀ ▀█▀ ▐█████████████▀ ▐████████████▀ ▀█████▀▀▀ █▀ | . Premier League LaLiga Serie A | . Bundesliga Ligue 1 Primeira Liga | | . ..TAKE PART.. |
|
|
|
BitcoinCyberStore.com
Newbie
Offline
Activity: 10
Merit: 0
|
|
June 10, 2011, 01:25:22 AM |
|
Seems this could have easily been avoided if people used their PGP keys and signed contracts that detailed the scope of the transaction.
|
|
|
|
Fiyasko
Legendary
Offline
Activity: 1428
Merit: 1001
Okey Dokey Lokey
|
|
June 10, 2011, 03:55:30 PM |
|
Seems this could have easily been avoided if people used their PGP keys and signed contracts that detailed the scope of the transaction.
Well. Thats what it's there for, If you dont use it you get fucked and all i can say is "you kinda fucked yourself yo"
|
|
|
|
greatscott
Newbie
Offline
Activity: 45
Merit: 0
|
|
June 10, 2011, 05:53:09 PM |
|
Seems this could have easily been avoided if people used their PGP keys and signed contracts that detailed the scope of the transaction.
Even GPG aside (or with GPG), a simple way to detect this would be to have the buyer/seller verify their agreement over a simple email exchange. The (real) buyer should send an email to the (real) seller's paypal payment address, including their receiving bitcoin address as a confirmation before actually sending the funds to the seller's paypal. The (real) seller would then see that the bitcoin receiving addresses don't match. Actually, email aside, I think you can send notes along with your paypal payment to the seller.
|
|
|
|
|