Bitcoin Forum
April 28, 2024, 06:52:47 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 »  All
  Print  
Author Topic: Is this possible?  (Read 508 times)
LoyceV
Legendary
*
Offline Offline

Activity: 3290
Merit: 16569


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
October 20, 2022, 05:59:09 PM
Merited by Stalker22 (1)
 #21

If we consider that there are USB cables that can steal coins from hardware wallets, we can assume that something similar can exist for keyboard hacking as well.
Don't you love how USB is so versatile? It can be used to charge your phone, or connect your keyboard, mouse and data storage. Or all at once without you knowing it: a normal looking USB cable can pretend to be a keyboard and give your computer instructions. Since it looks like a keyboard to the computer, it instantly gets very powerful access. And you don't even notice it when you plug in a cable to charge your phone.
Cables like the O.MG Cable can do stuff from nightmares to your system.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
1714330367
Hero Member
*
Offline Offline

Posts: 1714330367

View Profile Personal Message (Offline)

Ignore
1714330367
Reply with quote  #2

1714330367
Report to moderator
1714330367
Hero Member
*
Offline Offline

Posts: 1714330367

View Profile Personal Message (Offline)

Ignore
1714330367
Reply with quote  #2

1714330367
Report to moderator
"Governments are good at cutting off the heads of a centrally controlled networks like Napster, but pure P2P networks like Gnutella and Tor seem to be holding their own." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Crypt0Gore
Sr. Member
****
Offline Offline

Activity: 840
Merit: 264



View Profile
October 21, 2022, 07:25:22 AM
 #22

Clipboard hacks and keyloggers are very popular but still I don't joke with my PC, avoid inserting any USB Drive in your PC, this days it's better to use Sender software to send file to people, do not plug their own USB whatever into your PC, you don't know what they may have in mind for you.

█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█
█                             █
   ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄          █
            ▄▄████████▄▄     █
     ▄▄▄▄▄▄██████████████▄   █
          █████▀▀  ▀▀█████▄  █
          █████      ██████  █
          █████▄▄  ▄▄█████▀  █
     ▀▀▀▀▀▀██████████████▀   █
            ▀▀████████▀▀     █
   ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀          █
█                             █
█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█
|
▄▄███████▄▄
▄████▀▀▀▀▀▀▀████▄
▄███▀▄▄███████▄▄▀███▄
▄██▀▄█▀▀▀█████▀▀▀█▄▀██▄
▄██▄██████▀████░███▄██▄
███░████████▀██░████░███
███░████░█▄████▀░████░███
███░████░███▄████████░███
▀██▄▀███░█████▄█████▀▄██▀
▀██▄▀█▄▄▄██████▄██▀▄██▀
▀███▄▀▀███████▀▀▄███▀
▀████▄▄▄▄▄▄▄████▀
▀▀███████▀▀
SSC NAPOLI
OFFICIAL EUROPEAN
BETTING PARTNER
|.
ROLLBOTS
|
▄▄███████▄▄
▄███████████████▄
▄███████████████████▄
▄██▀▀▀▀▀▀▀▀▀▀▀▀▀▀█████▄
▄█████████▀████████▀████▄
██████▄▄▄█████▄▄█████████
█████████████████████████
██████▀▀▀█████▀▀█████████
▀█████████▄████████▄████▀
▀██▄▄▄▄▄▄▄▄▄▄▄▄▄▄█████▀
▀███████████████████▀
▀███████████████▀
▀▀███████▀▀
ROLLBIT COIN
TRADE RLB NOW!
|█▀▀▀











█▄▄▄
.
   PLAY NOW   
▀▀▀█











▄▄▄█
nakamura12
Hero Member
*****
Offline Offline

Activity: 2254
Merit: 669


Bitcoin Casino Est. 2013


View Profile
October 21, 2022, 01:19:55 PM
 #23

It is very possible to get your private keys. If you are using public pc which is very common here in my country and those who plan to do that can install a program that records everything you press on the keyboard. The other one is clipboard hijacking or clipboard malware which will change whatever you just copied on the internet. For example, I copied bc1address but when you paste it became bc1address2.

███▄▀██▄▄
░░▄████▄▀████ ▄▄▄
░░████▄▄▄▄░░█▀▀
███ ██████▄▄▀█▌
░▄░░███▀████
░▐█░░███░██▄▄
░░▄▀░████▄▄▄▀█
░█░▄███▀████ ▐█
▀▄▄███▀▄██▄
░░▄██▌░░██▀
░▐█▀████ ▀██
░░█▌██████ ▀▀██▄
░░▀███
▄▄██▀▄███
▄▄▄████▀▄████▄░░
▀▀█░░▄▄▄▄████░░
▐█▀▄▄█████████
████▀███░░▄░
▄▄██░███░░█▌░
█▀▄▄▄████░▀▄░░
█▌████▀███▄░█░
▄██▄▀███▄▄▀
▀██░░▐██▄░░
██▀████▀█▌░
▄██▀▀██████▐█░░
███▀░░
isaac_clarke22
Sr. Member
****
Offline Offline

Activity: 1596
Merit: 264


View Profile
October 21, 2022, 04:28:35 PM
 #24

~
Dang, I could not imagine people buying this to mess with people, although I was expecting somehow that these kinds of cable exists anyway since it is USB.

I was thinking of getting a wireless keyboard back in the days, but meh I ain't risking my security as well with dongles these days considering that hardware keylogger were always there to screw me up. Cheesy
Eureka_07
Sr. Member
****
Offline Offline

Activity: 1750
Merit: 260


Binance #SWGT and CERTIK Audited


View Profile
October 21, 2022, 05:01:04 PM
 #25

Brothers and sisters is it possible for PC keyboard to get compromised and reveal your private keys to hackers? How are they doing it? I read a comment on Reddit about a guy that lost his keys to hackers through a keyboard hack, is it in form of Trojan or Malware?.
I am not familiar with the specifics but I really believe that it is possible. One technique that is widely known is the keyloggers, which detects and monitor every key that you pressed. Through that the hacker can get your information such as email, passwords, etc. Moreover, wireless keyboards are more susceptible to being hacked as those that manufactures these keyboard doesn't include any encrypting method on key strokes.
Trojan is a type of Malware.
Malware is a general term for "software" that are "malicious" including Trojan.

Alisha-k
Member
**
Offline Offline

Activity: 840
Merit: 23


View Profile
October 21, 2022, 07:17:22 PM
 #26

It is very possible and one way they get access to your  PC is through spam mails. Avoid clicking any site sent by unknown users. Thos hackers send Malicious software through different means even through adverts and once anyone clicks the link the gain access to what ever device is connected to their website. Ensure to verify links sent that it starts with Https:// and also look at the bottom of ur device to see the color of the address appears in green at the bottom right of your PC before clicking on it. Alternative search for the website on any reliable search engine preferably Google.

center]██                      ►          ⦁               1xBit.com     │     S p o r t s b o o k   &   C a s i n o               ⦁          ◀                      ██
                  WELCOME BONUS UP TO 7 BTC!                  ♣
██  ██████████████          ■                   30+ ALTCOINS AVAILABLE                   ■          ██████████████  ██[/center]
JeromeTash
Legendary
*
Online Online

Activity: 2128
Merit: 1210


Heisenberg


View Profile
October 21, 2022, 08:03:59 PM
 #27

Dang, I could not imagine people buying this to mess with people, although I was expecting somehow that these kinds of cable exists anyway since it is USB.
Or you just buying it unknowingly and cheaply as a replacement to your old or spoiled mobile USB cable from one of those online shopping sites like Aliexpress only for you to plug it into your PC while trying to charge or tethering the phone to PC  Grin

█████████████████████████
██
█████▀▀███████▀▀███████
█████▀░░▄███████▄░░▀█████
██▀░░██████▀░▀████░░▀██
██▀░░▀▀▀████████████░░▀██
██░░█▄████▀▀███▀█████░░██
██░░███▄▄███████▀▀███░░██
██░░█████████████████░░██
██▄░░████▄▄██████▄▄█░░▄██
██▄░░██████▄░░████░░▄██
█████▄░░▀███▌░░▐▀░░▄█████
███████▄▄███████▄▄███████
█████████████████████████
.
.ROOBET 2.0..██████.IIIIIFASTER & SLEEKER.██████.
|

█▄█
▀█▀
████▄▄██████▄▄████
█▄███▀█░░█████░░█▀███▄█
▀█▄▄░▐█████████▌▄▄█▀
██▄▄█████████▄▄████▌
██████▄▄████████
█▀▀████████████████
██████
█████████████
██
█▀▀██████████████
▀▀▀███████████▀▀▀▀
|.
    PLAY NOW    
LoyceV
Legendary
*
Offline Offline

Activity: 3290
Merit: 16569


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
October 22, 2022, 06:29:10 AM
 #28

~
Dang, I could not imagine people buying this to mess with people, although I was expecting somehow that these kinds of cable exists anyway since it is USB.
I'm not so worried about a targeted attack with an expensive O.MG Cable. I'm much more worried that the tiny chip inside a cable becomes cheap enough for Chinese mass production, and millions of people will use it unknowningly. USB hubs can have the same risk.

Quote
I was thinking of getting a wireless keyboard back in the days, but meh I ain't risking my security
Cables are a lot easier to protect.

One technique that is widely known is the keyloggers, which detects and monitor every key that you pressed.
For the truely paranoid: don't type sequential, use your mouse to click half way your password to continue typing a few times. I do this sometimes with private keys: I copy one part, and type another part.



It's the thing I hate most about modern cables: they all have a chip inside (meant to identify power ratings). I miss the days when a cable was just a piece of copper connecting 2 points.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Saint-loup
Legendary
*
Offline Offline

Activity: 2590
Merit: 2352



View Profile
October 22, 2022, 07:57:24 PM
 #29

If we are talking about real keyboard (device) hacking, I guess anything is possible if the hacker had physical access to your device. If we consider that there are USB cables that can steal coins from hardware wallets, we can assume that something similar can exist for keyboard hacking as well. For example, someone can create a USB device that connects between the keyboard and the computer that will register everything that is typed on the keyboard and record it in internal memory or wirelessly send the data to the hacker. If this device is plugged into your computer while you are typing, it can record all the characters that you type. And if the hacker has access to this data, he or she will be able to recover your passwords or private keys.
I don't understand why you say that the hacker needs to create himself the device. You don't need to live with an electronic engineer to be subjected to this kind of attack actually. It's not new. A random "evil maid" just needs to look for a keylogger on Google, to be able to freely purchase one in few minutes. She doesn't even need to go on the darknet to find a cheap one for $20. E.g. https://www.keydemon.com/en/39-hardware-keylogger

██
██
██
██
██
██
██
██
██
██
██
██
██
... LIVECASINO.io    Play Live Games with up to 20% cashback!...██
██
██
██
██
██
██
██
██
██
██
██
██
isaac_clarke22
Sr. Member
****
Offline Offline

Activity: 1596
Merit: 264


View Profile
October 22, 2022, 08:12:29 PM
 #30

~
Or even in Wish. I remember a lot of hardware content creators buying some stuffs from there and ended up having a different from what they were expecting. Good thing I do not cheap out on PC components anyway though I am also avoiding overspending on peripherals. Cheesy

Cables are a lot easier to protect.
True. I also hate dealing with latency issues with the wireless devices.  Could be convenient for some but not for me.
Stalker22
Legendary
*
Offline Offline

Activity: 1484
Merit: 1357



View Profile
October 22, 2022, 09:15:08 PM
 #31

~
I don't understand why you say that the hacker needs to create himself the device. You don't need to live with an electronic engineer to be subjected to this kind of attack actually. It's not new. A random "evil maid" just needs to look for a keylogger on Google, to be able to freely purchase one in few minutes. She doesn't even need to go on the darknet to find a cheap one for $20. E.g. https://www.keydemon.com/en/39-hardware-keylogger

Honestly, I had no idea that these devices already existed, and I answered the question "off the top of my head." But now that we know they exist, and are readily available on the market, the threat becomes even more possible and realistic. Thank you for this info.

█████████████████████████
██
█████▀▀███████▀▀███████
█████▀░░▄███████▄░░▀█████
██▀░░██████▀░▀████░░▀██
██▀░░▀▀▀████████████░░▀██
██░░█▄████▀▀███▀█████░░██
██░░███▄▄███████▀▀███░░██
██░░█████████████████░░██
██▄░░████▄▄██████▄▄█░░▄██
██▄░░██████▄░░████░░▄██
█████▄░░▀███▌░░▐▀░░▄█████
███████▄▄███████▄▄███████
█████████████████████████
.
.ROOBET 2.0..██████.IIIIIFASTER & SLEEKER.██████.
|

█▄█
▀█▀
████▄▄██████▄▄████
█▄███▀█░░█████░░█▀███▄█
▀█▄▄░▐█████████▌▄▄█▀
██▄▄█████████▄▄████▌
██████▄▄████████
█▀▀████████████████
██████
█████████████
██
█▀▀██████████████
▀▀▀███████████▀▀▀▀
|.
    PLAY NOW    
Peanutswar
Legendary
*
Offline Offline

Activity: 1526
Merit: 1027


Top Crypto Casino


View Profile WWW
October 23, 2022, 01:30:33 PM
 #32

Once your computer got or injected with the Malware, these malware can take your information such as the files, change into other format that's we called as ransomware most of the time hackers are asking for the bitcoin as a payment to your retrieved files back, also we have the keylogger once you installed a suspicious file into your computer and allowing access to your computer they can now have the full potential of the users activity, the best way is to reformat your computer and store your funds into hardware wallet.

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
Taskford
Hero Member
*****
Offline Offline

Activity: 2520
Merit: 786



View Profile
October 23, 2022, 01:41:47 PM
 #33

Brothers and sisters is it possible for PC keyboard to get compromised and reveal your private keys to hackers? How are they doing it? I read a comment on Reddit about a guy that lost his keys to hackers through a keyboard hack, is it in form of Trojan or Malware?.

If you download unknown links coming out of nowhere then provably they can. Hackers right now are so smart and they can do unimaginable things so best to avoid seeking for something on google search since this is where you can get those malwares. If you feel your pc is infected much better if you follow the suggestions above and that is to reformat your pc to avoid any possible upcoming attacks.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits.
▄▄█▄▄░░▄▄█▄▄░░▄▄█▄▄
███░░░░███░░░░███
░░░░░░░░░░░░░
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░░░░███▄█░░░
░░██▌░░███░▀░░██▌
█░██░░███░░░██
█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀
.
REGIONAL
SPONSOR
███▀██▀███▀█▀▀▀▀██▀▀▀██
██░▀░██░█░███░▀██░███▄█
█▄███▄██▄████▄████▄▄▄██
██▀ ▀███▀▀░▀██▀▀▀██████
███▄███░▄▀██████▀█▀█▀▀█
████▀▀██▄▀█████▄█▀███▄█
███▄▄▄████████▄█▄▀█████
███▀▀▀████████████▄▀███
███▄░▄█▀▀▀██████▀▀▀▄███
███████▄██▄▌████▀▀█████
▀██▄█████▄█▄▄▄██▄████▀
▀▀██████████▄▄███▀▀
▀▀▀▀█▀▀▀▀
.
EUROPEAN
BETTING
PARTNER
Shaha98
Full Member
***
Offline Offline

Activity: 140
Merit: 135



View Profile
October 24, 2022, 04:15:13 AM
 #34

Hackers can access your computer through malware. May even get your personal information or access. And if you copy the phases then they can get your key too. And if it continues like this you will force everything into someone else's hands if you don't notice. Which you will regret later. Many have lost a lot of wealth to hackers in this way.
Mpamaegbu
Legendary
*
Offline Offline

Activity: 2674
Merit: 1208


Once a man, twice a child!


View Profile
October 25, 2022, 08:47:29 AM
 #35

I like watching Kitboga, Pierogi and the rest of the dudes dealing scammers hot blows on YouTube. One of the things I've come to note about all scammers is that they can't harm their victims if the victims don't grant them access to their devices. It's the same thing with hackers. No hacker can hack anything if a victim hasn't compromised anything. When this compromise happens and the victims falls prey, they hardly tell exactly what happened. They want to paint a picture of their innocence and how they were unaware of how they were hacked or scammed. There's something called Remote Access. No one can hack a device if the victim didn't grant them a remote access to their device. It's always a link to click or a set of codes to enter and the scammer is with you. That I learnt from YouTube, following those dudes I mentioned above. So, if one stays without clicking on suspicious and irrelevant links there's no way they can get malware.

.BEST..CHANGE.███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
boyptc
Hero Member
*****
Offline Offline

Activity: 2982
Merit: 678


★Bitvest.io★ Play Plinko or Invest!


View Profile
October 25, 2022, 09:57:10 AM
 #36

Once your computer got or injected with the Malware, these malware can take your information such as the files, change into other format that's we called as ransomware most of the time hackers are asking for the bitcoin as a payment to your retrieved files back, also we have the keylogger once you installed a suspicious file into your computer and allowing access to your computer they can now have the full potential of the users activity, the best way is to reformat your computer and store your funds into hardware wallet.
All of these malwares are worst.

They're all targeting our files, and for these ransomwares, they're using the files as hostage and making the victim believe that they've got the password for the encryption of it.

I've read some victims have said that there's really no password on the ransomware that they contain and that's part of the hack and scam that these hackers do. Whilst I've read also from some of them that have given the password for encryption about paying the ransom.

Needless of that, don't be a victim of them and avoid those pirate and crack websites, don't download there. If a license is needed to get paid and you need it for your productivity, just buy it.



.
.BIG WINNER!.
[15.00000000 BTC]


▄████████████████████▄
██████████████████████
██████████▀▀██████████
█████████░░░░█████████
██████████▄▄██████████
███████▀▀████▀▀███████
██████░░░░██░░░░██████
███████▄▄████▄▄███████
████▀▀████▀▀████▀▀████
███░░░░██░░░░██░░░░███
████▄▄████▄▄████▄▄████
██████████████████████

▀████████████████████▀
▄████████████████████▄
██████████████████████
█████▀▀█▀▀▀▀▀▀██▀▀████
█████░░░░░░░░░░░░░████
█████░░░░░░░░░░░░▄████
█████░░▄███▄░░░░██████
█████▄▄███▀░░░░▄██████
█████████░░░░░░███████
████████░░░░░░░███████
███████░░░░░░░░███████
███████▄▄▄▄▄▄▄▄███████

██████████████████████
▀████████████████████▀
▄████████████████████▄
███████████████▀▀▀▀▀▀▀
███████████▀▀▄▄█░░░░░█
█████████▀░░█████░░░░█
███████▀░░░░░████▀░░░▀
██████░░░░░░░░▀▄▄█████
█████░▄░░░░░▄██████▀▀█
████░████▄░███████░░░░
███░█████░█████████░░█
███░░░▀█░██████████░░█
███░░░░░░████▀▀██▀░░░░
███░░░░░░███░░░░░░░░░░

██░▄▄▄▄░████▄▄██▄░░░░
████████████▀▀▀▀▀▀▀██
█████████████░█▀▀▀█░███
██████████▀▀░█▀░░░▀█░▀▀
███████▀░▄▄█░█░░░░░█░█▄
████▀░▄▄████░▀█░░░█▀░██
███░▄████▀▀░▄░▀█░█▀░▄░▀
█▀░███▀▀▀░░███░▀█▀░███░
▀░███▀░░░░░████▄░▄████░
░███▀░░░░░░░█████████░░
░███░░░░░░░░░███████░░░
███▀░██░░░░░░▀░▄▄▄░▀░░░
███░██████▄▄░▄█████▄░▄▄

██░████████░███████░█
▄████████████████████▄
████████▀▀░░░▀▀███████
███▀▀░░░░░▄▄▄░░░░▀▀▀██
██░▀▀▄▄░░░▀▀▀░░░▄▄▀▀██
██░▄▄░░▀▀▄▄░▄▄▀▀░░░░██
██░▀▀░░░░░░█░░░░░██░██
██░░░▄▄░░░░█░██░░░░░██
██░░░▀▀░░░░█░░░░░░░░██
██░░░░░▄▄░░█░░░░░██░██
██▄░░░░▀▀░░█░██░░░░░██
█████▄▄░░░░█░░░░▄▄████
█████████▄▄█▄▄████████

▀████████████████████▀




Rainbot
Daily Quests
Faucet
isaac_clarke22
Sr. Member
****
Offline Offline

Activity: 1596
Merit: 264


View Profile
October 25, 2022, 08:26:14 PM
 #37

~
Oh hey! I also watch them and Jim Browning as well. Kit is even streaming as of writing this.

The script are almost the same to each and every scammers not gonna lie. It is just that those typical refund scam usually and they require remote access to your PC claiming that they will connect you to a "bs" secured server of whatever company they were from, be it Geek Squad, Microsoft, Norton, etc. It is quite scary that they were really up to loot whatever you have in your PC as they could already had planted some malware or "backdoor" in your computer giving them almost the full access to it without your knowledge.
Mpamaegbu
Legendary
*
Offline Offline

Activity: 2674
Merit: 1208


Once a man, twice a child!


View Profile
October 25, 2022, 10:04:49 PM
 #38

~
Oh hey! I also watch them and Jim Browning as well. Kit is even streaming as of writing this.
It's good to know someone else here watches and values their efforts. Those dudes are of a great service to many of us who dwell on the cyberspace, with their attempt at sanitizing it. I've watched a clip where Kit and Jim Browning (I think it was him or Pierogi. Can't be too sure anymore) combined to disrupt scammers' peace. There's also Trilogy Media, those guys are equally good too.


.BEST..CHANGE.███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
isaac_clarke22
Sr. Member
****
Offline Offline

Activity: 1596
Merit: 264


View Profile
October 26, 2022, 08:51:26 PM
 #39

~
Oh yeah, I forgot to mention them. Not gonna lie, that guy Jaani has some inspirational story after he changed his ways. I have not watched Kit and Pierogi together yet though since I believe they do not have the same "methodology" in disrupting scammer's time. Both of them are great still. Cheesy

ScammeRevolts is also worth watching, since we can see how he messes with the scammer's computer files and what usually these scammers are storing in their PC files.
Adbitco
Hero Member
*****
Offline Offline

Activity: 1414
Merit: 653


Always Act Smart and Play Safe With Your Funds


View Profile WWW
October 27, 2022, 04:42:41 AM
 #40

If you must stay long without being hacked or compromised your wallet phrase or private keys you have to deal with conscious whatever you are clicking on the internet or some forms of links they send you and file before opening it, keyboard doesn't only enables hacker to steal your funds but a keyboard board virus could make you lost your private keys and phrase.

.BEST..CHANGE.███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
Pages: « 1 [2] 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!