Campaign manager must have monitor the spreadsheet after all
I've messaged needmoney after posting this thread and there's no reply as of the moment. Let's look forward if he will take an action.
Given the fact that he uses different telegram usernames, same address, (plus used my Bitcointalk username and profile link) - it is considered as cheating, right?
It's a bit strange, since he/she didn't use your telegram username. For me, this is a "failed attempt at cheating".
Failed if we could stop him from receiving payments, but it can be considered a success otherwise. Thanks for digging, with the information you've given I got to dig more as well. It seems that he also uses other member's telegram usernames. Not so surprising, thinking that why would a single person bother make several telegram accounts for every bounty.
#proof of authenticaton
Telegram username: @saa_aash
Eth wallet: 0x3f76aE158fC9b35b0F7e6f6d1c968BE635a0b0c4
His/her profile:
SashafatychovaPosition: Jr. Member
Date Registered: September 20, 2017, 06:46:35 AM
Last Active: April 12, 2018, 09:14:45 PM
From this telegram username @saa_aash, what you got was from the Photochain Airdrop. That Bitcointalk user (
Sashafatychova) most likely is the true owner of the telegram username (@saa_aash) and that is his Eth wallet address (0x3f76aE158fC9b35b0F7e6f6d1c968BE635a0b0c4).
In my main post, I saw this telegram account on Kripton Signature Bounty Program :
Spreadsheet - Row #14347, by searching the cheater's address. As I've checked the Eth address given in the authentication post above, I found out that this Bitcointalk user
Sashafatychova also joined the Kripton Bounty using his telegram username and Eth address:
Row #2112 and #2214
Telegram Username: @saa_aash
Ethereum Address: 0x3f76aE158fC9b35b0F7e6f6d1c968BE635a0b0c4
Maybe the cheater did it on purpose (use of different telegram usernames) to be harder to dig. I just hope needmoney will consider not paying him (0x172C527c17Ad0A71204A8754896c926F5b00e74b)