Post
Topic
Board Service Discussion
Re: ▁ ▂ ▄ ▅ ▆ Cloudmining 101 (ponzi risk assessment) ▆ ▅ ▄ ▂ ▁
by
cyberpinoy
on 29/12/2014, 00:47:11 UTC
Ponzi schemes developed, and should be added number 8
Hashprofit now asking money for sending them a message (0.03 BTC!). And if you see there are no connection between message and payment.
You just pay and... message goes somewhere or maybe not... Don't be fooled.

yep, It doesn't look good:

"Our service was under the most severe attack ever. Due to most specialists' holidays we've decided for a reliable safety of users' funds to suspend site's work until the first Monday of 2015 (5th of January). Everybody will return to standard work then and we'll continue our work in a usual way. Please be calm. Thank you for understanding.

To keep contact with our users and to separate priority mail from spam, we've developed mail accepting via BTC payments. For guaranteed processing of your message you'll have to pay small amount through an interface below.

We've successfully deflected serious threats and attacks on our service earlier and we're sure that together we can do this even in a situation this hard."


I am certainly no fan of Puppet, however, did anyone notice anythig really funny or contradicting about thier message? So they say thier people who can handle the DDOS attack are on holiday until january 5th. However they just so happened to have a person hanging around who could completely recode their index.html page as well as code a second page using Java script, MySql and PHP that will accept payments in order for you to recieve satisfactory customer service from any complaints you may have.

I pray to god no one was stupid enough to send thier BTC and file a formal message with these idiots.

The person who spent 9+ hours re-coding their site could have very easily and quickly ended the DDOS attack. it takes a lot less intelligence to stop a DDOS attack than it does to rewrite and completely re-code an Index.html with a button to a second page that also accepts payments and code that whole page.

Thank god I already got my ROI from these guys Smiley Good luck tho those of you who put a massive amount of BTC with these scammers, you should have checked their WHOIS which is completely whois guarded. and the registrar is enom and the phone number they ahd displayed was for Enom abuse not to anyone involved in HAshprofit.

Puppet do you use anything from whois in your predictions?