Author

Topic: Bounty managers break forum, cheats & multi-account rules. (Read 320 times)

legendary
Activity: 2128
Merit: 1775
This project ended up scam
I created this topic on December 2, 2020, regarding a warning to members in this forum about the "SCARCITYDEFI" campaign which was run at this forum on December 1, 2020, by: @amos77978.

Before this happened to all of you.

https://archive.is/wip/vwnPW
Quote
KINDLY NOTE; BOUNTY PARTICIPANTS NOT FOUND IN https://t.me/SCARCEchat WILL HAVE THEIR DATA REMOVED FROM SPREADSHEET AND REWARD FORTEITED

Since this warning was made, you should be aware of and avoid the Bounty campaign managed by @amos77978, and look for other bounty campaigns with honest and responsible managers.

Warnings are already published here, but you guys are ignoring them.
sr. member
Activity: 1414
Merit: 255
Even though he already got warning at 2020-12-03 but I see he/she still insists on running the same bounty campaign (SCARCITYDEFI) in January 2021-01-06, Look now what is happening in their telegram group, investors are complaining about losing money and Hunters worked in vain all this time, This project ended up scam
legendary
Activity: 2520
Merit: 1218
Thanks for the warning YOSHIE. Yesterday I have joined bounty campaign under the management of @amos77978, and now I'm going to skip participating in it. Because I have an inner feeling there are going to be issues with stakes, participants and distribution.

What I dont like in SCARCITYDEFI.ORG webpage - it automatically loads Metamask and asks for a connection.

The part "Token Information" looks like it was quickly made in excel and copy-pasted to webpage. I would like to point that the whole design of the page is weak. Why not stick to one particular font for all the text? Otherwise it looks like it was quickly snatched from different sources and inserted in the page.

And the signs "BUY SCARCE TOKEN NOW" and "This project is in beta. Use at your own risk" (and why this is a button) just made me smile. Also, what is "HuhHuh?" button? Double, no triple smile.
sr. member
Activity: 1936
Merit: 290
With both same merit connected all account
Nekoma2018, Kaneki11, amos77978 multi-accounts same user owner three more account. It's really incredible that a bounty manager is using multi-accounts on here bounty. Thanks OP for identify such a cheating manager.
legendary
Activity: 2128
Merit: 1775
What happens: if a Bounty manager violates the terms of the Forum and has multiple accounts is also involved in fraud against participants.

Account named: @amos77978, Is currently running their latest campaign below.

Topic: [BOUNTY][SCARCITYDEFI.ORG | WORTH 30 ETHEREUM|LIMITED PARTICIPANTS
Archive

Violations committed:
1. Evasion ban.
2. Trying to register in own campaign.
3. Multi-Accounts.
4. Deceive participants in the campaign.


Proof: @amos77978 made a mistake.

[1].
25. Ban evasion (using or creating accounts while one of your accounts is banned) is not allowed.[e]

[2]. Talking alone.

Any plans for translation campaign?

[3]. Multi-accounts.
Account connected.


1. amos77978
2. Kaneki11 (Archived)
3. Nekoma2018
4. Psalmy2cute (Archived)

Proof:

#Proof of Authentication  
Bitcointalk UserName: amos77978
Bitcointalk Link: https://bitcointalksearch.org/user/amos77978-2476519;sa=summary  
Campaigns: Facebook, LinkedIn, Twitter
Telegram UserName: @kikitty
ETH Wallet Address: 0xe32c340433A440A800277CA53627d99b4414345c
Archive

#PROOF OF REGISTRATION
Forum Username: kaneki11
Forum Profile Link: https://bitcointalksearch.org/user/kaneki11-2199064
Telegram Username: @akeeto
Participated Campaigns: Facebook Twitter LinkedIn article
ETH Wallet Address: 0xe32c340433A440A800277CA53627d99b4414345c
Archive

Bitcointalk username : nekoma2018
Bitcointalk profile link : https://bitcointalksearch.org/user/nekoma2018-2150914;sa=summary
Telegram username : @nekoma2018
ERC20 Wallet Address : 0xe32c340433A440A800277CA53627d99b4414345c
Archive

Twitter username: @bossman06011439
Followers: 5000
ERC20 Wallet: 0xe32c340433A440A800277CA53627d99b4414345c
Archive




Connected account:

1. Nekoma2018
2. Psalmy2cute
3. winbk15
4. Kaneki11
5. Akeeto
6. AMANULAT
7. weaverkaggs
8. Locotoni
9. winjk02
10. MrSpasybo
11. biternet
12. GAronov
13. eldarbek
14. winbk14
15. catbuizz4
16. loinguyen1984

ETH address Related:
Code:
1. 0xe32c340433A440A800277CA53627d99b4414345c
2. 0x628DF842a6CE463475b024Fc7a981Fcc8b917568
3. 0x29535BB9b64059983B7eb475e4D9Fd56490beFB2
4. 0x1FEfB1e64313c8cf9AeF6215797d3f264cAcBA18
5. 0x004edCC6a582EEA4691100d4ed35ed119d39d35a

[4]. Deceive participants in the campaign.



https://bitcointalk.org/index.php?action=trust;u=2150914

Requires mod & Admin attention and action to related Alt accounts, they are involved in many abuses and also for the participants who are participating in their new campaign better avoid being vulnerable to fraud.
Jump to: