Author

Topic: CRYPTSY stopping withdraw locking accounts without notifying users! Class Action - page 197. (Read 1006931 times)

legendary
Activity: 1270
Merit: 1000
OMG. So this is how their server looks up inside?. No sandboxing and poor security. How did you get access to this?. Did you make it up?

If it's a fake it's a fairly good one. The dates add up etc. Still not sure what exactly is it supposed show. That they ran Lucky7 wallet as root?

...and who is netcyber.com?
legendary
Activity: 3654
Merit: 8909
https://bpip.org
OMG. So this is how their server looks up inside?. No sandboxing and poor security. How did you get access to this?. Did you make it up?

If it's a fake it's a fairly good one. The dates add up etc. Still not sure what exactly is it supposed show. That they ran Lucky7 wallet as root?
sr. member
Activity: 916
Merit: 312
Thank you thunderjet !

Silly me, I thought when Vernon talked about Bridges in the blog note, that he was full of crap as usual. But no, at least some truth can come out of his deceptive mind, even if I'm not sure it'll help him in the long term acknowledging he had ties with a famous felon FBI agent, now behind bars.

I just hope american and chinese officials take note of all of this, this thread is a good starting point to their investigations.

Don't forget that Paul Vernon ONLY used Bridges as an excuse as to why he was unable to figure out who to contact after the event, not once considering SARs in spite of him penning just prior that he was 100% with them/FinCen regulations so to amass more Cryptsy users prior, during and after the event.

Paul Vernon and Jim Shockney are nothing but snakes from the word go.
True. Anyway, it's funny to see that Vernon had no better idea to make some obscure strategic move, perhaps for involving later the dude into the suspicious hack, than to cite a famous convicted felon FBI agent, with associated to his name drug dealers, murder contracts and all the shitstorm of villainy that comes when you hear about the infamous Silk Road.
It backfired as the said felon has apparently been proven to have pay these morons so they're more than ever suspects. Remember also for a minute it was said they did nothing about some terrorist's account. Nice acquaintances that should interest the officials.




Something more from an article about Silk Road theft by rogue agents:

http://arstechnica.com/tech-policy/2015/03/two-feds-who-investigated-silk-road-accused-of-stealing-from-it-too/


Carl Force and Shaun Bridges were suspended in May 2014,so it means that P.Vernon contacted Bridges(after theft,no before August 2014) when he was already under investigation.











From mine previuos post it was evident that Cryptsy received deposits in hot wallet from Silk Road wallets when they were under Shaun Bridges control (one of them - 75.2 BTC went directly to cold wallet and this deposit was never transfered out like the others - probably payment for services).

What if P.Vernon was afraid that Shaun Bridges and Carl Force suspension and criminal investigation could lead to Cryptsy and inevitable confiscation of all coins and money on the site and also his properties and money,so he did preventive move and hacked his own site to save it from authorities for his rainy days?




newbie
Activity: 46
Merit: 0
Thank you thunderjet !

Silly me, I thought when Vernon talked about Bridges in the blog note, that he was full of crap as usual. But no, at least some truth can come out of his deceptive mind, even if I'm not sure it'll help him in the long term acknowledging he had ties with a famous felon FBI agent, now behind bars.

I just hope american and chinese officials take note of all of this, this thread is a good starting point to their investigations.

Don't forget that Paul Vernon ONLY used Bridges as an excuse as to why he was unable to figure out who to contact after the event, not once considering SARs in spite of him penning just prior that he was 100% with them/FinCen regulations so to amass more Cryptsy users prior, during and after the event.

Paul Vernon and Jim Shockney are nothing but snakes from the word go.
True. Anyway, it's funny to see that Vernon had no better idea to make some obscure strategic move, perhaps for involving later the dude into the suspicious hack, than to cite a famous convicted felon FBI agent, with associated to his name drug dealers, murder contracts and all the shitstorm of villainy that comes when you hear about the infamous Silk Road.
It backfired as the said felon has apparently been proven to have pay these morons so they're more than ever suspects. Remember also for a minute it was said they did nothing about some terrorist's account. Nice acquaintances that should interest the officials.
newbie
Activity: 46
Merit: 0
Thank you thunderjet !

Silly me, I thought when Vernon talked about Bridges in the blog note, that he was full of crap as usual. But no, at least some truth can come out of his deceptive mind, even if I'm not sure it'll help him in the long term acknowledging he had ties with a famous felon FBI agent, now behind bars.

I just hope american and chinese officials take note of all of this, this thread is a good starting point to their investigations.

Hopefully the authorities are investigating Cryptsy, Paul Vernon, etc. but does anyone know for sure that they are?  Is this site the only place that is trying to piece together information?
IIRC Gleb Gamow recently said he's been in contact with two FBI agents on the phone. I let him correct if necessary.
member
Activity: 77
Merit: 10
Code:
12:08:26 up 244 days, 22:15,  1 user,  load average: 24.77, 23.57, 23.41

 Thu Nov 13 22:03:59 EST 2014

 22:04:04 up 245 days,  8:11,  1 user,  load average: 23.73, 24.08, 24.19

 logan    tty1                      01Aug14 103days  0.86s  0.34s -bash

Linux maindrawer3 3.8.0-29-generic #42~precise1-Ubuntu SMP Wed Aug 14 16:19:23 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux

 /root/.Lucky7Coin

 root

 blk0001.dat  blkindex.dat  database  db.log  debug.log log.0000000001 Lucky7Coin.conf  lucky7coin.dat  Lucky7Coind.pid  peers.dat  wallet.dat
 
 591.tar.gz auth.log.postattack  bitcointools coinlist.txt     concealcoin     copy_daemons.php  daemons.txt   fluttercoin   gitlist.txt  Infinitecoin-V2 litebar     Luckycoin navajocoin  OSC performCollection.php postattacklogs razor    rkhunter-1.4.2   rpcallows.txt  senddime.sh StableCoin   tmp.txt viacoin

 rpcallowip=192.51.0.0/16
 rpcuser=bigvern
 rpcpassword=redacted

 inet 204.11.237.74/27 brd 204.11.237.95 scope global eth0
 net6 fe80::1a03:73ff:fef1:3f44/64 scope link
 inet 192.51.100.243/16 brd 192.51.255.255 scope global eth1

 root     12931 10.0  0.2 1089720 288184 ?      SLsl Oct13 4525:51 BitcoinDarkd -daemon
 root       575 56.9  0.4 1207784 442284 ?      SLsl Nov11 2005:26 Ocoind -daemon -rescan
 root       989 11.8  0.2 971052 246968 ?       SLsl Jul12 21255:29 asiacoind -daemon
 root     24107  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i bitcoin|head -2|tail -1
 root     12994  0.3  0.1 1396728 177584 ?      SLsl Oct13 168:39 litecoinxd -daemon
 root     24116  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i litecoin|head -2|tail -1
 root     24121  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i dogecoin|head -1|tail -1
 root     24126  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i darkcoin|head -1|tail -1


 #0 2   1,5 /usr/bin/php /root/backup_wallets.php
 -rw-r--r-- 1 root root 1179 Apr 14  2014 /root/backup_wallets.php
 
 $password = ‘redacted’;
 $query = "select * FROM currencies where rpcport > 0";
 $build = 1;
 $link = mysql_connect('192.51.100.248’, ‘cryptsy_web’, ‘panda121’);
 mysql_select_db('cryptsy', $link);
 $query = "select * FROM currencies where rpcport > 0";
 $result = mysql_query($query);
 $backupfolder = date("YmdH");
 passthru("mkdir /root/backups/".$backupfolder."/");

OMG. So this is how their server looks up inside?. No sandboxing and poor security. How did you get access to this?. Did you make it up?
vip
Activity: 1428
Merit: 1145

12:08:26 up 244 days, 22:15,  1 user,  load average: 24.77, 23.57, 23.41

 Thu Nov 13 22:03:59 EST 2014

 22:04:04 up 245 days,  8:11,  1 user,  load average: 23.73, 24.08, 24.19

 logan    tty1                      01Aug14 103days  0.86s  0.34s -bash

Linux maindrawer3 3.8.0-29-generic #42~precise1-Ubuntu SMP Wed Aug 14 16:19:23 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux

 /root/.Lucky7Coin

 root

 blk0001.dat  blkindex.dat  database  db.log  debug.log   log.0000000001   Lucky7Coin.conf  lucky7coin.dat  Lucky7Coind.pid  peers.dat  wallet.dat
 
 591.tar.gz    auth.log.postattack  bitcointools    coinlist.txt       concealcoin     copy_daemons.php  daemons.txt   fluttercoin        gitlist.txt  Infinitecoin-V2   litebar     Luckycoin   navajocoin  OSC       performCollection.php   postattacklogs   razor         rkhunter-1.4.2   rpcallows.txt  senddime.sh   StableCoin   tmp.txt    viacoin

 rpcallowip=192.51.0.0/16
rpcuser=bigvern
 rpcpassword=redacted

 inet 204.11.237.74/27 brd 204.11.237.95 scope global eth0
 net6 fe80::1a03:73ff:fef1:3f44/64 scope link
 inet 192.51.100.243/16 brd 192.51.255.255 scope global eth1

 root     12931 10.0  0.2 1089720 288184 ?      SLsl Oct13 4525:51 BitcoinDarkd -daemon
 root       575 56.9  0.4 1207784 442284 ?      SLsl Nov11 2005:26 Ocoind -daemon -rescan
 root       989 11.8  0.2 971052 246968 ?       SLsl Jul12 21255:29 asiacoind -daemon
 root     24107  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i bitcoin|head -2|tail -1
 root     12994  0.3  0.1 1396728 177584 ?      SLsl Oct13 168:39 litecoinxd -daemon
 root     24116  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i litecoin|head -2|tail -1
 root     24121  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i dogecoin|head -1|tail -1
 root     24126  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i darkcoin|head -1|tail -1


 #0 2   1,5 /usr/bin/php /root/backup_wallets.php
 -rw-r--r-- 1 root root 1179 Apr 14  2014 /root/backup_wallets.php
 
 $password = ‘redacted’;
 $query = "select * FROM currencies where rpcport > 0";
 $build = 1;
 $link = mysql_connect('192.51.100.248’, ‘cryptsy_web’, ‘panda121’);
 mysql_select_db('cryptsy', $link);
 $query = "select * FROM currencies where rpcport > 0";
 $result = mysql_query($query);
 $backupfolder = date("YmdH");
 passthru("mkdir /root/backups/".$backupfolder."/");

newbie
Activity: 1
Merit: 0
Code:
12:08:26 up 244 days, 22:15,  1 user,  load average: 24.77, 23.57, 23.41

 Thu Nov 13 22:03:59 EST 2014

 22:04:04 up 245 days,  8:11,  1 user,  load average: 23.73, 24.08, 24.19

 logan    tty1                      01Aug14 103days  0.86s  0.34s -bash

Linux maindrawer3 3.8.0-29-generic #42~precise1-Ubuntu SMP Wed Aug 14 16:19:23 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux

 /root/.Lucky7Coin

 root

 blk0001.dat  blkindex.dat  database  db.log  debug.log log.0000000001 Lucky7Coin.conf  lucky7coin.dat  Lucky7Coind.pid  peers.dat  wallet.dat
 
 591.tar.gz auth.log.postattack  bitcointools coinlist.txt     concealcoin     copy_daemons.php  daemons.txt   fluttercoin   gitlist.txt  Infinitecoin-V2 litebar     Luckycoin navajocoin  OSC performCollection.php postattacklogs razor    rkhunter-1.4.2   rpcallows.txt  senddime.sh StableCoin   tmp.txt viacoin

 rpcallowip=192.51.0.0/16
 rpcuser=bigvern
 rpcpassword=redacted

 inet 204.11.237.74/27 brd 204.11.237.95 scope global eth0
 net6 fe80::1a03:73ff:fef1:3f44/64 scope link
 inet 192.51.100.243/16 brd 192.51.255.255 scope global eth1

 root     12931 10.0  0.2 1089720 288184 ?      SLsl Oct13 4525:51 BitcoinDarkd -daemon
 root       575 56.9  0.4 1207784 442284 ?      SLsl Nov11 2005:26 Ocoind -daemon -rescan
 root       989 11.8  0.2 971052 246968 ?       SLsl Jul12 21255:29 asiacoind -daemon
 root     24107  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i bitcoin|head -2|tail -1
 root     12994  0.3  0.1 1396728 177584 ?      SLsl Oct13 168:39 litecoinxd -daemon
 root     24116  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i litecoin|head -2|tail -1
 root     24121  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i dogecoin|head -1|tail -1
 root     24126  0.0  0.0   4408   612 ?        S    21:57   0:00 sh -c ps auwx|grep -i darkcoin|head -1|tail -1


 #0 2   1,5 /usr/bin/php /root/backup_wallets.php
 -rw-r--r-- 1 root root 1179 Apr 14  2014 /root/backup_wallets.php
 
 $password = ‘redacted’;
 $query = "select * FROM currencies where rpcport > 0";
 $build = 1;
 $link = mysql_connect('192.51.100.248’, ‘cryptsy_web’, ‘panda121’);
 mysql_select_db('cryptsy', $link);
 $query = "select * FROM currencies where rpcport > 0";
 $result = mysql_query($query);
 $backupfolder = date("YmdH");
 passthru("mkdir /root/backups/".$backupfolder."/");
legendary
Activity: 1267
Merit: 1000
Lesson learned - diversify into numerous account:
don't keep all your eggs in one basket.

That's not how it works. Diversifying among scams just increases the probability of getting scammed.

"Keep coins in your own wallet" should be the lesson learned, along with all applicable security practices.

In keeping with I mentioned above, keeping multiple wallets would be more prudent.
legendary
Activity: 2324
Merit: 1130
Judge orders hearing on motion to push @cryptsy into receivership https://t.co/diqkebyEHH

March 28 At 9:30am



the plot thickens,  the little i had left at craptsy i consider it lost but am interested to see what happens in ~10 days  Grin

SH!T is getting REAL!

In 10-ish days HOMerO (Josh Garza, GAW Miners) also goes to court &/or has to face the REAL WORLD.

I can see them both cupping their own balls now.....   Grin

Maybe Perv Vern & The Brilliant Cock* can share a cell.


* (It's what he thinks with....)
legendary
Activity: 3654
Merit: 8909
https://bpip.org
Lesson learned - diversify into numerous account:
don't keep all your eggs in one basket.

That's not how it works. Diversifying among scams just increases the probability of getting scammed.

"Keep coins in your own wallet" should be the lesson learned, along with all applicable security practices.
legendary
Activity: 1267
Merit: 1000
Lesson learned - diversify into numerous accounts:
don't keep all your eggs in one basket.
full member
Activity: 307
Merit: 102
Will they ever resolve this issue any time soon

consider any funds you had lost forever , or at least indefinitely.
legendary
Activity: 1022
Merit: 1000
Blocklancer - Freelance on the Blockchain
Will they ever resolve this issue any time soon
hero member
Activity: 1834
Merit: 639
*Brute force will solve any Bitcoin problem*


>>>
Where's Phinny ,,,
"i'm noob never herd of these catzzz"

http://www.myplanetganja.com/viewtopic.php?f=13&t=11022&start=120#p144158

*isn't this thread great ! i'm re-reading the whole thing now ... Cheesy    so where is BigPerm.. i mean Vern
ahhaha~good times bud
hero member
Activity: 658
Merit: 500
There were other exchanges also not mentioned here that Bridges approached who'd suspected him of trying to get access to their computers for suspect reasons.

My intuition always led me back to Bridges when thinking about the Cryptsy heist.

http://www.financemagnates.com/cryptocurrency/interview/charles-allen-shaun-bridges-may-have-also-targeted-bitcoin-shop/

Quote
Assistant U.S. Attorney Kathryn Haun told the court that “the number of cases that Mr. Bridges contaminated – as well as investigations across the country that his conduct led to have to be shut down – is startling.”  https://www.cryptocoinsnews.com/silk-road-agent-shaun-bridges-gets-71-months-prison



vip
Activity: 1428
Merit: 1145
who is " Company 0, LLC " referenced here ===> https://wallet.decred.org/#/disclaimer

Company 0 (c0) are the guys that developed Decred and btcsuite. They are the main developers working on both packages, but not the only developers. They have a long history of free and open-source work. btcsuite for example is a suite of packages and tools for working with Bitcoin in Go (golang) including btcd, a full node, mining capable, Bitcoin implementation. They've also done a ton of work on bitrig - which is an OpenBSD-based operating system. Just a little background on their software development work in the past. That's the main force behind Decred in terms of development, funding, and infrastructure at present.

i'm noob never herd of these catzzz ====> https://github.com/orgs/btcsuite/people

---

https://www.bitrig.org/

this^ ?

:-)

*edit -- oh wait here is this guy lols --> Dave Collins

https://bitcointalksearch.org/user/gembitz-761729


ok so this company is registered in Illinois? where is Gage when we need him? ;-) hodl!

I'm a noob.
Who is this guy?
Oh, wait, Dave Collins.
I'm a noob.
Where's Gage?

Funny, how a noob fresh on the Bitcoin scene was able to evoke an infamous nym of mine - [Phinnaeus] Gage.

Funnier still, how this thread is doin' its damndest to cement the notion that rogue FBI agents are behind the Cryptsy hack.

My take is that upon Paul Vernon reading - http://www.myplanetganja.com/viewtopic.php?f=13&t=11022&start=120#p144158 - he, along with Jim Shockney of Pineland, Texas, started to put a storyline together that'll finally allow them to safely move the not-so stolen bitcoins.


"i'm noob never herd of these catzzz"
hero member
Activity: 658
Merit: 500
Thank you thunderjet !

Silly me, I thought when Vernon talked about Bridges in the blog note, that he was full of crap as usual. But no, at least some truth can come out of his deceptive mind, even if I'm not sure it'll help him in the long term acknowledging he had ties with a famous felon FBI agent, now behind bars.

I just hope american and chinese officials take note of all of this, this thread is a good starting point to their investigations.

Hopefully the authorities are investigating Cryptsy, Paul Vernon, etc. but does anyone know for sure that they are?  Is this site the only place that is trying to piece together information?

Any investigations into the 'other' exchanges were ended due to Bridges contamination.  This was stated by the judge when he was sentenced and also why the feds never finished their investigation into Mt. Gox. 
vip
Activity: 1428
Merit: 1145
http://www.myplanetganja.com/viewtopic.php?f=13&t=11022&start=120#p144158

Quote
Now, this is where I come in. He figured, for whatever far-flung reason, that I could convince Ross to cough up the pass-phrase he needed. He also had a second theory, and that was that Ross only had 1/2 the pass-phrase, and I had the other 1/2. Either way, I am critical to his plan.



Serrin Turner aka Chrysippus aka Bob surmised that DPR had half the pass-phrase and PoM had the other half after they faked Curtis Green going to a grave. Yep, there's a movie in all this somewhere, and too bad Green was cut out of the FOX deal after it was exposed he fucked his daughter.
Jump to: