Pages:
Author

Topic: Cheating in Bounties/Airdrops - page 5. (Read 1407 times)

full member
Activity: 546
Merit: 100
November 06, 2018, 07:18:25 PM
#50
Yes it is true, I myself experienced the same thing as the author said, there are a lot of scams that duplicate my account and change my MEW address with their address, this is an act of cowardice who is lazy to work in a bounty. If there is such a fraud, we may immediately report to the Bounty manager so that fraudsters are scribbled from the spreadsheet list.
sr. member
Activity: 434
Merit: 250
November 06, 2018, 07:15:29 PM
#49
The scams in bounty and airdrop happen a lot, and you need to be careful to avoid falling into their trap. But usually only 2-step security with all accounts is that you can fight off hackers easily. Currently, two-step authentication is most useful.
sr. member
Activity: 643
Merit: 253
November 06, 2018, 07:11:00 PM
#48
yes right, I really agree with this post. lots of fraudsters who use this method. they use someone else's identity and replace their own ERC address.
they cheat without thinking of others.
it is very complicated to be able to get a solution from this kind of case, because it is very difficult to trace which real identity and false identity because the fraudsters do that all with very neatly.
hero member
Activity: 1274
Merit: 516
November 06, 2018, 07:06:14 PM
#47
As long as spreadsheet are displayed openly, cheaters will always gather information about hunters from it and utilize the info for cheating mostly in Airdrop campaign so as to gain enough tken for large profit.
And if the spreadsheets are not displayed openly then you won't find out that someone else is using ur id in the same bounty campaign and then you won't even report it and its a fair chance that he ends up with the rewards of your work.

Even if its an open spreadsheet, it's impossible for us to check all the campaign spreadsheet every day, and sometimes we need the spreadsheet to open to check the data, maybe staking or proof of authentication will do a better job to stop the identity theft, and it's not only the manager job to stop this action, as the users we need to create way, so we can eliminate the cheater and not putting too much burden on the manager
copper member
Activity: 798
Merit: 250
November 06, 2018, 07:03:16 PM
#46
I have lived these problems more and more. Open-public spreadsheets causes these problems. I think All Bountys or Airdrops should hide the eth-address btc link or anything. After filled form, bounty should give a number and this number should written on form. This is solution.
If it just eth or btc address, it's okay to be displayed to the public. The important thing is to hide link for our work and link to the social media participant, so that no one knows what he has done, and only the bounty manager is fully aware of it. This will effectively to reduce copy-paste cheater.
jr. member
Activity: 616
Merit: 1
November 06, 2018, 06:50:42 PM
#45
That's the truth, there was a time I found out that 3 different users had copied my bounty submission using my Bitcointalk Username, my blog site and only changed my wallet to theirs. It is very bad, I wish there is solution to such practices.
sr. member
Activity: 2114
Merit: 268
Leading Crypto Sports Betting & Casino Platform
November 06, 2018, 06:36:38 PM
#44
As long as spreadsheet are displayed openly, cheaters will always gather information about hunters from it and utilize the info for cheating mostly in Airdrop campaign so as to gain enough tken for large profit.
And if the spreadsheets are not displayed openly then you won't find out that someone else is using ur id in the same bounty campaign and then you won't even report it and its a fair chance that he ends up with the rewards of your work.
I really hate someone who do that, they only use our ID and use their address, if we not really care about project that we join, our work can be claimed by someone else, or maybe in bad case both account can get disqualified by bounty manager.
full member
Activity: 1260
Merit: 102
November 06, 2018, 06:31:54 PM
#43
As long as spreadsheet are displayed openly, cheaters will always gather information about hunters from it and utilize the info for cheating mostly in Airdrop campaign so as to gain enough tken for large profit.
And if the spreadsheets are not displayed openly then you won't find out that someone else is using ur id in the same bounty campaign and then you won't even report it and its a fair chance that he ends up with the rewards of your work.
full member
Activity: 616
Merit: 101
November 06, 2018, 02:45:59 PM
#42
I have lived these problems more and more. Open-public spreadsheets causes these problems. I think All Bountys or Airdrops should hide the eth-address btc link or anything. After filled form, bounty should give a number and this number should written on form. This is solution.
member
Activity: 644
Merit: 10
November 06, 2018, 02:39:24 PM
#41
Hi,

I am a bounty hunter and i have realized that almost all the bounties are being flooded by some morons who use one person's BTC id, other person's fb/twitter, and put their own ERC address.

They may be using some kind of bots to do that.

What i think he/they are doing is that they have made a list of btc address, fb address, twitter address, and telegram and then use them in bounties and airdrops. They have made some kind of automation software that now do it for them and they take up all the spots in the Airdrops, bounties etc.
They just flood them, put their own ERC20 entries in them while using other's address.

With that they don't have to worry because their ERC address can't be traced to their identity as the rest of the info is all fake.

I have found my BTC id used at quiet a few bounties now which i never applied. Same with my twitter and fb address.

I know that a few bounties are now asking for proof of authentication post but not all of them.

With the growing security issues in BTC can't we start Google 2 factor authentication for our profile as it also has been attacked and also what can be the solution to these kind of scammers ?
I've seen a lot of cheaters in bounty campaigns and some of them really can get away with it. The good thing about KYC and Proof of Authentication post implementing in some bounties because cheaters are now getting caught. And it's the best way to flushed out the scammers in all bounty programs.
sr. member
Activity: 952
Merit: 308
November 06, 2018, 02:29:23 PM
#40
The right solution is to report it to the bounty manager, in order to immediately cheat the bounty hunter list, then don't forget to give negative credence to the user so that he can't follow the bounty on another day
sr. member
Activity: 531
Merit: 258
November 06, 2018, 02:10:32 PM
#39
I never understood what you guys are doing with your "bounty" "airdrop" Why on earth are you cheating or even participating in a campaign that will either not pay, never listed, scam project or who know what.
You're just participating to promote a scam. In real life, you could have troubles with justice.
hero member
Activity: 2688
Merit: 540
DGbet.fun - Crypto Sportsbook
November 06, 2018, 02:07:00 PM
#38
Hi,

I am a bounty hunter and i have realized that almost all the bounties are being flooded by some morons who use one person's BTC id, other person's fb/twitter, and put their own ERC address.

They may be using some kind of bots to do that.

What i think he/they are doing is that they have made a list of btc address, fb address, twitter address, and telegram and then use them in bounties and airdrops. They have made some kind of automation software that now do it for them and they take up all the spots in the Airdrops, bounties etc.
They just flood them, put their own ERC20 entries in them while using other's address.

With that they don't have to worry because their ERC address can't be traced to their identity as the rest of the info is all fake.

I have found my BTC id used at quiet a few bounties now which i never applied. Same with my twitter and fb address.

I know that a few bounties are now asking for proof of authentication post but not all of them.

With the growing security issues in BTC can't we start Google 2 factor authentication for our profile as it also has been attacked and also what can be the solution to these kind of scammers ?
I've seen it a few times to the other bounty campaign and i do notice that they used a lot of addresses and put other known profiles, even with the DTs name are in the list. That's why i rather like the idea of proof of authentication for anyone who wants to join in an airdrop or bounties. Though KYC may not be suitable if there were underage who doesn't have any government or valid ID yet who happened to join in a bounty/airdrop.
jr. member
Activity: 134
Merit: 1
November 06, 2018, 11:51:32 AM
#37
At the moment, I think the most reliable way to deal with this problem is the introduction of KYC and monitoring the reward table manually.
jr. member
Activity: 134
Merit: 1
November 06, 2018, 11:49:32 AM
#36
Hi,

I am a bounty hunter and i have realized that almost all the bounties are being flooded by some morons who use one person's BTC id, other person's fb/twitter, and put their own ERC address.

They may be using some kind of bots to do that.

What i think he/they are doing is that they have made a list of btc address, fb address, twitter address, and telegram and then use them in bounties and airdrops. They have made some kind of automation software that now do it for them and they take up all the spots in the Airdrops, bounties etc.
They just flood them, put their own ERC20 entries in them while using other's address.

With that they don't have to worry because their ERC address can't be traced to their identity as the rest of the info is all fake.

I have found my BTC id used at quiet a few bounties now which i never applied. Same with my twitter and fb address.

I know that a few bounties are now asking for proof of authentication post but not all of them.

With the growing security issues in BTC can't we start Google 2 factor authentication for our profile as it also has been attacked and also what can be the solution to these kind of scammers ?
If people were cheating the campaigns with fake profiles then it is the fault of the campaign managers so they need to do their work if this kind of scammers need to be removed as you mentioned the proof of authentication will do the job but it willl make little bit of work load for the campaign managers that is why they still refusing to add while the most reputed campaign managers doing that.

It is impossible to exclude the possibility of joint work of managers with scammers. Such schemes are often rotated by prior agreement.
jr. member
Activity: 168
Merit: 1
November 06, 2018, 11:44:23 AM
#35
As long as spreadsheet are displayed openly, cheaters will always gather information about hunters from it and utilize the info for cheating mostly in Airdrop campaign so as to gain enough tken for large profit.
member
Activity: 910
Merit: 12
November 06, 2018, 11:35:02 AM
#34
Yes, unfortunately, many cheaters in my bounty campaigns using my bitcointalk or telegram user name. I'm reporting my status to the bounty manager when I'm in a situation like this. And i think definitly the bounty managers should control this cheatings. The  except for some managers, unfortunately many managers do not pay much attention to this situation.
member
Activity: 267
Merit: 10
November 06, 2018, 11:28:37 AM
#33
This has happened many times. You never know who your social account will be used. If you were a bounty hunter. Submit to the form and check carefully whether anyone has used your data. If yes, please submit a complaint to the bounty manager. The misappropriation of information is very immoral. Everyone can report fraud in time.

member
Activity: 145
Merit: 10
November 06, 2018, 11:28:14 AM
#32
Hi,

I am a bounty hunter and i have realized that almost all the bounties are being flooded by some morons who use one person's BTC id, other person's fb/twitter, and put their own ERC address.

They may be using some kind of bots to do that.

What i think he/they are doing is that they have made a list of btc address, fb address, twitter address, and telegram and then use them in bounties and airdrops. They have made some kind of automation software that now do it for them and they take up all the spots in the Airdrops, bounties etc.
They just flood them, put their own ERC20 entries in them while using other's address.

With that they don't have to worry because their ERC address can't be traced to their identity as the rest of the info is all fake.

I have found my BTC id used at quiet a few bounties now which i never applied. Same with my twitter and fb address.

I know that a few bounties are now asking for proof of authentication post but not all of them.

With the growing security issues in BTC can't we start Google 2 factor authentication for our profile as it also has been attacked and also what can be the solution to these kind of scammers ?
.

Your post about cheating in bounty or airdrops is helpful to all the members here in this forum.Eye opener for us to be aware of what's going on in bounty and airdrops campaigns.Flooding of testimonies of the members with regards to this issue.Through it we learn to them how to be prepared when this things happen to us.
To those who cheats and planning to do it.remember this Your hidden sin is an open scandal in heaven. .
member
Activity: 518
Merit: 16
November 06, 2018, 11:09:28 AM
#31
Cheating by scammer is now gradually being curbed by some bounty, through the introduction of KYC and for some, proof of authentication. Although, i feel proof of authentication is more appropriate than KYC, because not everyone can pass KYC.

Although, to avoid cheating the sincere bounty hunters too, KYC should have been completed before the calculation of stakes to tokens or before token distribution. So that there will be fair and accurate distribution of the total number of tokens to
sincere bounty participants.

For KYC I think it is tok risky for bounty, but If the reward is worth it, I think it is just okay, but for social.media campaign, the rewards usually are too small
Pages:
Jump to: