Pages:
Author

Topic: Bitcoin Miners - page 39. (Read 64227 times)

sr. member
Activity: 447
Merit: 250
January 26, 2014, 12:28:02 PM
The fact that the scammer's are buying hardware in this forum's group pool indicates pretty clearly that an experienced member of the forum is involved in this scam.  Obviously into bitcoin mining themselves.

Any experienced forum members writing in defense of this scam?

Oh, I guess there are a few, eh?  The prime suspects are the guy who said he bought a bunch of them, and had the block chain entry to "prove it," and the Hawaii dude.  

Posts an order on his scam website, then pays with a different wallet, then posts to "prove" he really believes in this scam.  I'm not an expert in the block chain, so if this would not work for some reason, I'd be glad to hear an explanation as to why.

Of course, it could be someone who doesn't post much too.  But I'd love to see if someone could track down the pool member who is buying hardware with these bitcoins.  Seems like we could identify the criminal that way.  Wouldn't that be possible for the guy who runs the pool?

If we got the forum member's i.d., then we'd have an email address, and the feds might even be able to get his I.P. address.  And we're off to drag this/these scumbags to prison.

+1
hero member
Activity: 624
Merit: 502
January 26, 2014, 12:15:01 PM
Cross post, but Kncminers.com looks like a cloaked redirect using their reseller id (339) It is quite possible that KNCminer have the email address, or even postal address of the person who was assigned that ID.

They've not sold enough for a free Neptune anyway Cheesy

Edit: Quick look around for if that ID is used anywhere else online and found this: http://foorum.hinnavaatlus.ee/viewtopic.php?t=568902&postdays=0&postorder=asc&start=1550&sid=4f96074baf308ef97cde8610673f2b5d

Sorry, not got the foggiest what any of it says, but hopefully will give some clues.
sr. member
Activity: 434
Merit: 250
January 26, 2014, 12:03:04 PM

So it is becoming obvious that you and your brother have been pumping up the sales for the fraudsters. Of course, now you and your brother have to find a way to disassociate from the fraud, so you come here and show that you found evidence which indicates they are fraudsters. But this evidence has already been presented, so you are not showing anything new. You are just throwing bullshit around in a desperate attempt to hide your participation in the fraud. You are certainly astronomically stupid to post the above information and pretend that was not uncovered before:

I have spoken with Phoenix on Skype a few times + bought a Jupiter from him, where I trusted him by sending the coins first and then waited for the miner to arrive from Hawaii.
From these interactions I can conclude with fair certainty that it is highly unlikely he is a scammer.
I thing he just fell for the scam because greed took over and he wanted to be first in line as usual.

+1

these scammers are very clever (no offence intended to phoenix) but they would not be regular contributors to this forum. again, it's harsh and for the record, i sympathise with everyone who has sent coinage to this company. It is clear that as soon as they realised there were complaints made to the police, they have whipped down the website. now they are trying to cover their tracks. I have no doubt in my mind whatseover, the true criminals behind this will be caught.
hero member
Activity: 812
Merit: 502
January 26, 2014, 12:00:02 PM

So it is becoming obvious that you and your brother have been pumping up the sales for the fraudsters. Of course, now you and your brother have to find a way to disassociate from the fraud, so you come here and show that you found evidence which indicates they are fraudsters. But this evidence has already been presented, so you are not showing anything new. You are just throwing bullshit around in a desperate attempt to hide your participation in the fraud. You are certainly astronomically stupid to post the above information and pretend that was not uncovered before:

I have spoken with Phoenix on Skype a few times + bought a Jupiter from him, where I trusted him by sending the coins first and then waited for the miner to arrive from Hawaii.
From these interactions I can conclude with fair certainty that it is highly unlikely he is a scammer.
I thing he just fell for the scam because greed took over and he wanted to be first in line as usual.
full member
Activity: 196
Merit: 100
January 26, 2014, 11:55:28 AM
Quote
About Us

Crypto Technology Systems, the team behind the CTS Miner, have been established in the microprocessor industry since 1975. CTS are an elite group formed internally from a world-class microprocessor engineering company at the forefront of Embedded controller design and manufacture, supplying products for a wide range of applications including Aircraft Testing, Remote Switchgear Operation, Stock Control, Instrumentation, Oil and Petrochemical Exploration, Marine Science and Environmental Control.

We have been following the cryptocurrency industry, and particularly Bitcoin mining, for the past year and a half. In May 2013, a team was put together to work on producing Bitcoin mining ASIC chips to be used in miners. Our small management team have had the backing of 50 full time microprocessor designers and engineers here in the UK. Over the past 8 months, we have worked tirelessly to build a group of products which outperform all competitors that will be available at a price which is un-matchable.
Our Team

Michael Richardson
Project Manager

Michael has run the CTS Miner project from inception through to production and has been responsible for every decision made. He has hand picked his small team with an ultimate aim of building the best in Bitcoin mining hardware. Michael joined the company in 2007 after graduating from Cambridge University with a Masters degree in Manufacturing Engineering and has worked in nearly every department of the company. Specialising in microchip product design, Michael, along with Steve, are wholly responsible for our products.


Steve Hodgeson
Product Design & Development

Steve is an expert in algebra based microchip development. Joining the team in 2012, Steve is relatively new to the CTS team; however, was the key instigator into looking further into production of Bitcoin products. Bringing 13 years of industry experience in GPU engineering at renowned semiconductor companies, Steve is a huge asset to the development of Bitcoin mining products. Steve runs the engineering team here and is responsible for the in-house build of our products.


David Brown
Customer Services/Sales

David comes from a strong electronics sales based background. Born in the UK, David has worked for electronics companies ranging from appliances through to components throughout the world. Returning to the UK in 2010, David joined the team at CTS as national sales manager and has successfully led sales and customer service for all projects since. David has ultimate responsibility for customer satisfaction and will be the first point of call for all enquiries. Don’t be surprised if David answers if you give us a call!


Rebecca Saunders
Marketing and Branding

Rebecca completes the CTS team as our Marketing and Branding Manager. Working with each of the other three team managers, Rebecca has ensured the products are aesthetically pleasing, that the branding is unique and memorable and ultimately runs all of our marketing efforts from PR through to social media. For all media enquiries, please contact Rebecca at: [email protected].
I have added this for future reference, seeing as the site is currently down. 
sr. member
Activity: 434
Merit: 250
January 26, 2014, 11:52:31 AM
I'm still not 100% sold that this is scam, but I've never had an itchy trigger finger when to investing large sums of money.  CTSMiner will likely respond to this sooner or later, so I'll wait for proof of product, like everyone else should have.  Until then, I think we can leave off on the banter and speculation.

convincing aren't they?

 Undecided
full member
Activity: 168
Merit: 100
January 26, 2014, 11:47:02 AM
I'm still not 100% sold that this is scam, but I've never had an itchy trigger finger when to investing large sums of money.  CTSMiner will likely respond to this sooner or later, so I'll wait for proof of product, like everyone else should have.  Until then, I think we can leave off on the banter and speculation.
newbie
Activity: 42
Merit: 0
January 26, 2014, 11:15:04 AM
Nice amount of coins in the retirement fund you got there birdman (phoenix).
While scrolling back in the thread and reading everything it´s clear as glas (for me), birdman and honolulu pumped the scam, made people think it´s possible etc, now trying to find a way to "clean" their names so they can stay @ bitcointalk etc.

Didn´t loose a single satoshi in this scam, but i feel for the people who did fall for birdmans pump-and-scam.
member
Activity: 60
Merit: 10
January 26, 2014, 10:55:44 AM



A few days ago I started a long-winded thread, partly in response to this announcement, to address two serious and related problems with mining hardware companies: 1) the practice of taking pre-orders and 2) the lack of disclosure by hardware companies. Cheshyr and I have been going back and forth productively sharing ideas on how to develop community norms RE: disclosure practices. Norms for product announcements may help filter out the fraudsters by limiting their ability to use this forum (won't stop them from using other forums). I'd invite any of you with ideas, especially given the new information about CTS, to join our conversation.

https://bitcointalksearch.org/topic/mining-and-the-fakeblock-chain-430511

Also, wasn't this conversation supposed to be moved to Scam Accusation sub-forum?  I guess it doesn't matter now since CTS isn't taking orders any longer.
vip
Activity: 756
Merit: 504
January 26, 2014, 10:41:18 AM
SCAM WEBSITE you are hosting.

Domain: ctsminer.com
IP: 199.188.201.252

http://domains-by-day.com/2014-01-24/ctsminer.com-domain-name-data.html
shows that ctsminer.com was originally associated with IP 185.8.106.66 (on another network)

THIS IS A KNOWN SCAMMER IP:
https://www.virustotal.com/en/ip-address/185.8.106.66/information/

So it is becoming obvious that you and your brother have been pumping up the sales for the fraudsters. Of course, now you and your brother have to find a way to disassociate from the fraud, so you come here and show that you found evidence which indicates they are fraudsters. But this evidence has already been presented, so you are not showing anything new. You are just throwing bullshit around in a desperate attempt to hide your participation in the fraud. You are certainly astronomically stupid to post the above information and pretend that was not uncovered before:



A research using domaintools.com Internet page shows the domain ctsminer.com was redirect from the IP address 185.8.106.66 to the IP address 199.188.201.252. In accordance with the above evidence, the Internet Page was host in the IP address 185.8.106.66 from 13rd January 2014 to 17th January 2014.  An examination of the IP address 185.8.106.66 reveals some interesting results, such as:

https://www.virustotal.com/en/ip-address/185.8.106.66/information/

http://i.imgur.com/0Ei0aou.png

The WHOIS record on 19th January 2014 for the domain butterflyiab.com matches exactly with the WHOIS record on 12th January 2014 for the domain ctsminers.com:

http://i.imgur.com/m9c3ZD4.png

http://i.imgur.com/BC7lbZt.png

That means it is very likely the same person operating the domain ctsminers.com is also responsible for the domain butterflyiab.com. Both domains were first directed to a hosting service located in Lithuania. One domain is being used to perpetrate a fraudulent scheme and the other was registered to prey on people which misspell the official domain from Butterfly Labs.
legendary
Activity: 1974
Merit: 1077
^ Will code for Bitcoins
January 26, 2014, 10:23:49 AM
..but the chances of finding these guys is slim to none, if they were pros, they did everything behind a web proxy, located somewhere the US has no jurisdiction, and sat in a web cafe with open wifi.

No need for a web cafe, they could safely work from home using VPN. There are many VPN providers who do not collect user logs.
hero member
Activity: 490
Merit: 500
January 26, 2014, 10:12:28 AM

if i have my addresses correct...they made off with 144 btc of which 0 is left....

https://blockchain.info/address/1BofXEuBSAbjwjhZuvxkoLJ9D8btpJ8knu

if somehow i mixed up the addresses tell me i'll delete this post but i think the above is correct

sheesh...

Searing



yup, been watching it myself;
over $118k - as BTC prices rising today

If you're an American victim the FBI does take wire & mail fraud seriously when it goes above $100k...

..they extradited BFL's Sonny from Italy in 2007 (https://bitcointalksearch.org/topic/re-butterfly-labs-ceo-25-million-usd-mail-fraud-a-concise-summary-of-evidence-110805) in case anyone missed that one..  Wink

..but the chances of finding these guys or getting your coins back is slim to none, if they were pros, they did everything behind a web proxy, located somewhere the US has no jurisdiction, and sat in a web cafe with open wifi.
sr. member
Activity: 434
Merit: 250
January 26, 2014, 09:52:19 AM

if i have my addresses correct...they made off with 144 btc of which 0 is left....

https://blockchain.info/address/1BofXEuBSAbjwjhZuvxkoLJ9D8btpJ8knu

if somehow i mixed up the addresses tell me i'll delete this post but i think the above is correct

sheesh...

Searing



yup, been watching it myself;
over $118k - as BTC prices rising today
copper member
Activity: 2898
Merit: 1465
Clueless!
January 26, 2014, 09:51:01 AM
if i have my addresses correct...they made off with 144 btc of which 0 is left....

https://blockchain.info/address/1BofXEuBSAbjwjhZuvxkoLJ9D8btpJ8knu


ie $118,000 USD?

if somehow i mixed up the addresses tell me i'll delete this post but i think the above is correct

sheesh...makes my tummy hurt in sympathy...at least bfl sends you a doorstop.

Searing

sr. member
Activity: 434
Merit: 250
January 26, 2014, 09:45:38 AM

But these crooks have probably been running scams for a long time, so actually a chance they are past free intro period. Or at least, they might have provided credit card details when they signed up, even if they didn't pay at the time.

true, i'm sure there would have been some kind of payment assurance provided at the first instance.
hero member
Activity: 798
Merit: 1000
January 26, 2014, 09:42:51 AM
But these crooks have probably been running scams for a long time, so actually a chance they are past free intro period. Or at least, they might have provided credit card details when they signed up, even if they didn't pay at the time.
sr. member
Activity: 434
Merit: 250
hero member
Activity: 812
Merit: 502
January 26, 2014, 09:35:04 AM

Hm, I have no idea why but http://www.kncminers.com/ shows me logged in with all my personal details, order history + items that I left in the basket on the original site.

Always look for the HTTPS verification from a trusted third party.
There should be a HTTPS padlock that says..
"Website: www.kncminer.com"
"Owner: Kennemar & Cole AB"
"Verified by: Thawte, Inc."



I know what to look for, but how does it show all of my personal info if I have never logged in?
I believe it's because of cookies, which came from the original site, but somehow apply to this one too.

Anyone who logs in on a fake site gives the bogus site their username and password which they can use to retrieve your details I guess.

Let me repeat myself: I have never logged in on that website, yet I am logged in.

I cannot even open the shopping basket my browser tells me it's not secure.

I just logged out on http://www.kncminers.com/ and I was logged out on http://www.kncminer.com/
Then I logged back in on http://www.kncminer.com/ and I was logged in on http://www.kncminer.com/ too.

hero member
Activity: 490
Merit: 500
January 26, 2014, 09:33:11 AM

The cts website had https by comodo ca ltd

Edit: Actually, is it worth contacting comodo.com to see if they can reveal who paid for the https services on ctsminer.com website?

+1
I'm sure that would help with police investigations, please post the response here. (thread being monitored)
Phoenix or someone who has been burned needs to contact comodo and let them know they need the info for police. Comodo must surely have a fraud department?

the more info we can dig up and post on here the better IMHO

Sadly they seem to do something really dumb for a verification certificate company.
90 days free no documents SSL! So I doubt they can help track them down.

http://ssl.comodo.com/free-ssl-certificate.php?key5sk1=99f7df534d1ad0d1cbe906bfb690599adc5aa290&key5sk2=1907&key5sk3=1390745603000&key5sk4=1907&key5sk5=1390745651000&key6sk1=&key6sk2=FF260&key6sk3=6&key6sk4=en-us&key6sk5=&key6sk6=0&key6sk7=Google&key6sk8=119900&key6sk9=1366768&key6sk10=false&key6sk11=4abbbda1e6da568df4c6f9c64ea8961138c67831&key6sk12=53.5&key6sk13=-2.217&key7sk1=196106&key1sk1=ors&key1sk2=Google
sr. member
Activity: 434
Merit: 250
January 26, 2014, 09:29:47 AM

The cts website had https by comodo ca ltd

Edit: Actually, is it worth contacting comodo.com to see if they can reveal who paid for the https services on ctsminer.com website?

+1
I'm sure that would help with police investigations, please post the response here. (thread being monitored)
Phoenix or someone who has been burned needs to contact comodo and let them know they need the info for police. Comodo must surely have a fraud department?

the more info we can dig up and post on here the better IMHO
Pages:
Jump to: