Author

Topic: http://ecrypto.net/ is down - No surprises (Read 4690 times)

member
Activity: 101
Merit: 10
April 02, 2016, 02:33:39 PM
#62

_https://www.facebook.com/smagik

Blur scammer back to life .

CURRENT CITY AND HOMETOWN

Victoria, British Columbia
Current city

Halifax, Nova Scotia (former city)
Hometown

We never forget to fuck you  Grin
newbie
Activity: 42
Merit: 0
January 02, 2015, 06:39:00 AM
#61

He claims it was only was only 11 BTC, but he also promised to pay everyone back 150% of what they lost, which he never did.
Classic hallmark of a scammer....
sr. member
Activity: 341
Merit: 250
January 02, 2015, 06:27:45 AM
#60
How much did he make off with?

He claims it was only was only 11 BTC, but he also promised to pay everyone back 150% of what they lost, which he never did.

We only have his word on how much he made off with, and he lied about paying everyone back.


UPDATE!!

Explanation for loss of service and plans for recovery and repayment.

From the day Ecrypto started operating it was under attack. Many attempts to penetrate the servers occured and attempts to hack my personal accounts were constant. Unfortunatly on the morning of December 28 the attacker was successful in gaining entry to the wallet servers. Things were operating normally when I noticed the wallet balance had gone to -11 BTC. A few minutes later the wallet servers stopped responding completly, and access to them through the command line became impossible. Digital Ocean began to investigate the problem and after some time sent this response.

Greetings,

I appreciate your patience. After loading your droplet's into a recovery environment, it appears that someone has compromised both of your droplet's, and stolen your bitcoin from the `W2` droplet. This is confirmed from the `.bash_history` file, which the attack did not effectively remove. In an attempt to cover their tracks, they attempted to wipe out your droplets filesystem with `rm -rf /`, but mistakenly left the `/root` folder, which left some of the data for the blocks you had found.

On the `W1` droplet, it is not apparent if there were any *coin's transferred, as the .bash_history folder over there was effectively wiped out prior to the `rm -rf /` on that droplet.

For your reference, both droplets remain in the recovery environment right now, and have the drives mounted. I've taken a few screenshots of the console and pulled of the transfer of your 11 bitcoin on blockchain.info to confirm the theft:
http://screencast.com/t/Ba7Mvgh6md0
http://screencast.com/t/1eKtogngnw
https://blockchain.info/address/19Xn6GPjMoj8FMLMWg77Wq7PNiFSUsZxSV

Given the nature of bitcoin, this theft is effectively irreversible. Unfortunately, even if the data of your droplet's did remain intact, the theft would remain irreversible.

I would certainly be quite suspicious of this compromise, as if these bitcoin were just transferred last night, it would seem someone associated with you, or the other party, is well aware of your two mining droplets, or may have had access to the droplet's prior.

Unfortunately, there is truly nothing more that we are able to do for you at this point.

Regards,
Russell Mitchell | Support Team

There is noone with access to the account information hare so clearly this was a pure hack. I made great efforts to make the servers impossible to hack, however the hacker simply walked right in and stole everything. The coins they did not steal, they deleted. Since the attack I have just been sick to my stomach. Ecrypto has taken 6 months of 16 hour days to build, and anyone suggesting this was a theft by me is a complete fool. The total stolen was only 11 BTC which is not a huge amount. If the hacker had waited, they would have been able to steal a significant amount more, but it is obviously just an impatient child. I am currently reworking the entire setup, making significant changes that will make it impossible to penetrate. The wallet servers will have NO communications with the website server at all, and gaining access to them should be impossible. The weak point will be the weak passwords that Digital Ocean automatically generates for servers, but since the wallet server will have no connection with the website, even finding the server will be nearly impossible. I will also change the location of the wallet server at least once a week, and transfer the majority of BTC and LTC in the wallets into cold storage for additional security.

So the next question is, when will you get the coins you lost back? We have backup images of the wallet balances at the time of the attack. When the site comes back up, 100% of fees collected by the site will go to pay back lost coins. Not only will you receive the coins you lost, you will receive a 50% bonus. So for every 2 coins you had at the time of the attack - you will receive 3 coins as repayment.

Unfortunatly this is the best I can do for now. I personally suffered a large loss as well which makes it impossible to repay the lost coins faster than the plan.

When will the service resume operations? I am thinking a month or so. I need to make the servers bulletproof, and that will take time. If you feel the need to rant or call me names you can email [email protected]. Reasonable emails will be responded to ASAP.
newbie
Activity: 42
Merit: 0
January 01, 2015, 08:14:41 PM
#59
How much did he make off with?
legendary
Activity: 1022
Merit: 1001
January 01, 2015, 08:10:06 PM
#58
Ah old Brucey boy...how could we forget...  Roll Eyes
legendary
Activity: 1680
Merit: 1205
January 01, 2015, 06:31:06 PM
#57
No, but every time a service turned out to be a scam, like hashie or mintpal lately, I remeber of this.

This was the first time i was scammed by someone.
I will Never forgive, never forget.
sr. member
Activity: 341
Merit: 250
January 01, 2015, 04:44:04 PM
#56
Bump

I don't suppose anyone's got their money back yet?
full member
Activity: 194
Merit: 100
never forget
legendary
Activity: 1022
Merit: 1001
bump

you still around brucey?
legendary
Activity: 1680
Merit: 1205
we're still waiting  Angry
legendary
Activity: 1022
Merit: 1001
Anyone here living in BC, Canada able to go pay this guy a visit?

I also just saw the "grinning" cow on the website. He wouldn't have posted it, if he were in over his head. Seems to me, he just ran with all the money he collected.

This is very unfortunate for the people who deposited their coins there.

Which exchange do you trust besides Cryptsy?

I trust cn.bter.com and (maybe) vircurex.

P.S.

Name: bruce degrosbois
Organization: sitemagik
Street: 19613-42 ave
City: langley
State/Province: BC
Postal Code: v3a3a3
Country: CA
Phone: +1.6045399527


Experience
Recreation and Tourism Alumni Event Coordinator at Vancouver Island University
Professional Driver at AC Taxi
Coder at Coastal Webmasters (Self-employed)
Assistant Manager at Agape Ministry
Manager at Edmonton Restaurant Slowpitch League, Edmonton, AB
Coder at Coastal Webmasters (Self-employed)



(From Linkedin) Experience

CEO
Ecrypto
October 2013 – Present (3 months)Vancouver, Canada Area
Ecrypto is developing the worlds most advanced cryptocurrency trading platform. Ecrypto is currently in Alpha development with an expected Beta release date of December 1, 2013.
http://www.Ecrypto.net

Projects

Understanding Bitcoin
March 2013
I suspect Bitcoin is a game changer much like windows was. It is hard not to love it once you understand it. The growth of Bitcoin is unprecedented and surprisingly the percentage growth of the alternate digital currency called Litecoin has been even higher. Many millionaires have been created by this and for the rest of us, well we missed the boat - this time.

I see understanding Bitcoin as...more
HeartofGoldProject.ca(Link)



Simon Fraser University
Urban Planning Certificate, Urban Planning
2013 – 2014 (expected)
RFABC
Masters certificate, facility management
2012 – 2013
I have been doing the courses for the past year and a half. I currently need 1 course to complete my certificate, however the course has not been offered - ever. Will complete it ASAP

How we going with the payback plan Brucey boy?
legendary
Activity: 1680
Merit: 1205
February 03, 2014, 11:03:14 AM
#51
Since many scammed people do know his identity, i'm really scared that someone will threat him in real life if he don't give any feedback soon.
Of course i'll never do that, but i bet that some bad people would be glad to pay a little extra to someone to see him beaten or worst. you'll not see again you money, but it's cheaper than a legal Smiley
In italy you usually get a shoot in your knees for a thing like that.. it's not lethal, but you'll need a baton for the rest of your life.

How do you treat scammers in your countries?

legendary
Activity: 1680
Merit: 1205
February 03, 2014, 10:52:37 AM
#50
We do not Forgive.
We do not Forget.
full member
Activity: 194
Merit: 100
February 03, 2014, 08:10:33 AM
#49
yep, we are not going to let this go forgotten..
newbie
Activity: 2
Merit: 0
February 03, 2014, 04:18:27 AM
#48
Bump.


I still didn't forget.

Are there more scammed people?

Yep, i lost 0.5 BTC there. I have not forgot!
legendary
Activity: 1680
Merit: 1205
January 31, 2014, 07:18:17 AM
#47
Bump.


I still didn't forget.

Are there more scammed people?
legendary
Activity: 1680
Merit: 1205
January 18, 2014, 08:25:42 PM
#46
Any news?
full member
Activity: 140
Merit: 100
January 16, 2014, 07:12:32 AM
#45
http://ecrypto.net/

DOWN.

My coin still with them  Sad Sad Sad
newbie
Activity: 21
Merit: 0
January 11, 2014, 06:17:05 PM
#44
that was quick, down forever?
full member
Activity: 194
Merit: 100
January 01, 2014, 12:29:20 PM
#43
I emailed Bruce some Q's, answers here: https://bitcointalksearch.org/topic/m.4256049
newbie
Activity: 32
Merit: 0
January 01, 2014, 09:51:34 AM
#42
Anyway I've send an email to him for my coins. I have nothing but hope Cheesy
hero member
Activity: 532
Merit: 500
January 01, 2014, 09:08:43 AM
#41

I believe I mentioned SQL injection as a possibility in the original thread on ecrypto. It's basic security 101 for SQL and user input though.

Someone specifically said the GET variables were not being sanitised. I didn't check myself at the time. If that is the case then it's almost certainly how the hacker gained entrance so easily. A single un-escaped input gives the hacker complete control over the server.

There's no way to check for GET sanitation on the front end of the site that I'm aware of, as it happens on the server after it retrieves the input. An SQL query is just a string, like any data. If you're coding a website that processes financial transactions and don't know how to prevent SQL injection, then you shouldn't be coding financial websites period. I cannot express how basic knowledge that is in secure web development.

If this is what caused the hack, then I'm sorry, but I wouldn't put a single Dimecoin on Ecrypto.

Yes I am assuming the person who claimed there is no GET sanitisation injected into the sql to test his hypothesis, otherwise it would make no sense since there's literally a million ways to penetrate a server.

It is v basic php security which you'll learn in any beginner's book on php. This is why I posed OP the question, to ascertain how much of a php noob he is. Unfortunately the fact his site got hacked so damn quickly suggests in itself it was a basic security hole he left uncovered and not some sophisticated hack attempt.

Yes, either that, or crying "hacked". Plausible deniability; we have no real way of proving if the site ever got hacked at all. Only his word.
legendary
Activity: 1344
Merit: 1001
January 01, 2014, 09:04:34 AM
#40

I believe I mentioned SQL injection as a possibility in the original thread on ecrypto. It's basic security 101 for SQL and user input though.

Someone specifically said the GET variables were not being sanitised. I didn't check myself at the time. If that is the case then it's almost certainly how the hacker gained entrance so easily. A single un-escaped input gives the hacker complete control over the server.

There's no way to check for GET sanitation on the front end of the site that I'm aware of, as it happens on the server after it retrieves the input. An SQL query is just a string, like any data. If you're coding a website that processes financial transactions and don't know how to prevent SQL injection, then you shouldn't be coding financial websites period. I cannot express how basic knowledge that is in secure web development.

If this is what caused the hack, then I'm sorry, but I wouldn't put a single Dimecoin on Ecrypto.

Yes I am assuming the person who claimed there is no GET sanitisation injected into the sql to test his hypothesis, otherwise it would make no sense since there's literally a million ways to penetrate a server.

It is v basic php security which you'll learn in any beginner's book on php. This is why I posed OP the question, to ascertain how much of a php noob he is. Unfortunately the fact his site got hacked so damn quickly suggests in itself it was a basic security hole he left uncovered and not some sophisticated hack attempt.
sr. member
Activity: 476
Merit: 250
I´ve got a picture! Haha!
January 01, 2014, 08:58:58 AM
#39
I'm still have 243 earth coin at there, how to retrieve back ? Any help ? Sad.

LOL
hero member
Activity: 532
Merit: 500
December 31, 2013, 07:36:26 PM
#38

I believe I mentioned SQL injection as a possibility in the original thread on ecrypto. It's basic security 101 for SQL and user input though.

Someone specifically said the GET variables were not being sanitised. I didn't check myself at the time. If that is the case then it's almost certainly how the hacker gained entrance so easily. A single un-escaped input gives the hacker complete control over the server.

There's no way to check for GET sanitation on the front end of the site that I'm aware of, as it happens on the server after it retrieves the input. An SQL query is just a string, like any data. If you're coding a website that processes financial transactions and don't know how to prevent SQL injection, then you shouldn't be coding financial websites period. I cannot express how basic knowledge that is in secure web development.

If this is what caused the hack, then I'm sorry, but I wouldn't put a single Dimecoin on Ecrypto.
legendary
Activity: 1344
Merit: 1001
December 31, 2013, 07:31:17 PM
#37

I believe I mentioned SQL injection as a possibility in the original thread on ecrypto. It's basic security 101 for SQL and user input though.

Someone specifically said the GET variables were not being sanitised. I didn't check myself at the time. If that is the case then it's almost certainly how the hacker gained entrance so easily. A single un-escaped input gives the hacker complete control over the server.
hero member
Activity: 532
Merit: 500
December 31, 2013, 06:42:21 PM
#36
I'm still have 243 earth coin at there, how to retrieve back ? Any help ? Sad.

He says he'll be relaunching the site with better security and paying people anything that was taken with interest. That's what he's stated, anyway.
full member
Activity: 140
Merit: 100
December 31, 2013, 06:36:57 PM
#35
I'm still have 243 earth coin at there, how to retrieve back ? Any help ? Sad.
hero member
Activity: 532
Merit: 500
December 31, 2013, 06:31:36 PM
#34
Well, we've got a response. He's told us what's supposedly happened, so all we can do is wait to see if he keeps his word. As long as this is not somehow some way to placate people, and the site will be coming back, and people will be reimbursed, then that is something. I'm willing to give anyone the benefit of the doubt, but the wall of silence has been worrying a lot of people.

The cynic in me would say that it's strange how we've now heard an update now that all his personal details have been revealed, but hey, I'm just suspicious like that. Benefit of the doubt. Everybody should get it at least once.

Thanks for the update. The old posting pof dating profile trick usually works  Cheesy Tbh it looks like you're only updating because you're realised you can't just run away from this without consequences. Why has it taken you so many days to issue *any* kind of statement?

I made great efforts to make the servers impossible to hack, however the hacker simply walked right in and stole everything.

Someone suggested you was not sanitising user input on your GET variables? Is this true? Because it would leave the doors to your database wide open for anyone to walk in via SQL injection.

I believe I mentioned SQL injection as a possibility in the original thread on ecrypto. It's basic security 101 for SQL and user input though.
legendary
Activity: 1344
Merit: 1001
December 31, 2013, 06:30:13 PM
#33
Thanks for the update. The old posting pof dating profile trick usually works  Cheesy Tbh it looks like you're only updating because you're realised you can't just run away from this without consequences. Why has it taken you so many days to issue *any* kind of statement?

I made great efforts to make the servers impossible to hack, however the hacker simply walked right in and stole everything.

Someone suggested you was not sanitising user input on your GET variables? Is this true? Because it would leave the doors to your database wide open for anyone to walk in via SQL injection.
legendary
Activity: 1022
Merit: 1001
December 31, 2013, 06:26:04 PM
#32
full member
Activity: 126
Merit: 100
December 31, 2013, 06:11:48 PM
#31
UPDATE!!

Explanation for loss of service and plans for recovery and repayment.

From the day Ecrypto started operating it was under attack. Many attempts to penetrate the servers occured and attempts to hack my personal accounts were constant. Unfortunatly on the morning of December 28 the attacker was successful in gaining entry to the wallet servers. Things were operating normally when I noticed the wallet balance had gone to -11 BTC. A few minutes later the wallet servers stopped responding completly, and access to them through the command line became impossible. Digital Ocean began to investigate the problem and after some time sent this response.

Greetings,

I appreciate your patience. After loading your droplet's into a recovery environment, it appears that someone has compromised both of your droplet's, and stolen your bitcoin from the `W2` droplet. This is confirmed from the `.bash_history` file, which the attack did not effectively remove. In an attempt to cover their tracks, they attempted to wipe out your droplets filesystem with `rm -rf /`, but mistakenly left the `/root` folder, which left some of the data for the blocks you had found.

On the `W1` droplet, it is not apparent if there were any *coin's transferred, as the .bash_history folder over there was effectively wiped out prior to the `rm -rf /` on that droplet.

For your reference, both droplets remain in the recovery environment right now, and have the drives mounted. I've taken a few screenshots of the console and pulled of the transfer of your 11 bitcoin on blockchain.info to confirm the theft:
http://screencast.com/t/Ba7Mvgh6md0
http://screencast.com/t/1eKtogngnw
https://blockchain.info/address/19Xn6GPjMoj8FMLMWg77Wq7PNiFSUsZxSV

Given the nature of bitcoin, this theft is effectively irreversible. Unfortunately, even if the data of your droplet's did remain intact, the theft would remain irreversible.

I would certainly be quite suspicious of this compromise, as if these bitcoin were just transferred last night, it would seem someone associated with you, or the other party, is well aware of your two mining droplets, or may have had access to the droplet's prior.

Unfortunately, there is truly nothing more that we are able to do for you at this point.

Regards,
Russell Mitchell | Support Team

There is noone with access to the account information hare so clearly this was a pure hack. I made great efforts to make the servers impossible to hack, however the hacker simply walked right in and stole everything. The coins they did not steal, they deleted. Since the attack I have just been sick to my stomach. Ecrypto has taken 6 months of 16 hour days to build, and anyone suggesting this was a theft by me is a complete fool. The total stolen was only 11 BTC which is not a huge amount. If the hacker had waited, they would have been able to steal a significant amount more, but it is obviously just an impatient child. I am currently reworking the entire setup, making significant changes that will make it impossible to penetrate. The wallet servers will have NO communications with the website server at all, and gaining access to them should be impossible. The weak point will be the weak passwords that Digital Ocean automatically generates for servers, but since the wallet server will have no connection with the website, even finding the server will be nearly impossible. I will also change the location of the wallet server at least once a week, and transfer the majority of BTC and LTC in the wallets into cold storage for additional security.

So the next question is, when will you get the coins you lost back? We have backup images of the wallet balances at the time of the attack. When the site comes back up, 100% of fees collected by the site will go to pay back lost coins. Not only will you receive the coins you lost, you will receive a 50% bonus. So for every 2 coins you had at the time of the attack - you will receive 3 coins as repayment.

Unfortunatly this is the best I can do for now. I personally suffered a large loss as well which makes it impossible to repay the lost coins faster than the plan.

When will the service resume operations? I am thinking a month or so. I need to make the servers bulletproof, and that will take time. If you feel the need to rant or call me names you can email [email protected]. Reasonable emails will be responded to ASAP.
hero member
Activity: 532
Merit: 500
December 31, 2013, 04:09:22 PM
#30
This guy wasn't too smart, was he? There's going to be a lot of angry people who want answers.
member
Activity: 101
Merit: 10
December 31, 2013, 04:04:26 PM
#29
Updated
He removed his facebook face  , sure scam .
https://www.facebook.com/smagik

I will start a bounty to make him pay with his bl^^d    Wink
 
hero member
Activity: 672
Merit: 501
December 31, 2013, 02:42:30 PM
#28
Amazing he can get one localbitcoin just very recently yet can not update us here?

Ah well, lesson learned. I normally give people the benefit of the doubt, because most people are good people, but guys like this ruin it for the rest. Of course I used caution due to the site being new so I only lost around 1 mil lotto coins....days worth of mining then and was worth a lot more then than now but stilll...  Kinda wished once I saw the site having issues I would have pulled them if I could have.

Now every legit startup exchange is going to have a problem doing just that, starting up, due to assholes like this that burned many people and lost tons of money.
legendary
Activity: 1344
Merit: 1001
December 31, 2013, 02:30:56 PM
#27
This is his plenty of fish dating profile: http://www.pof.com/viewprofile.aspx?profile_id=25769873

I learned about Bruce that he is "a walking miracle - I am a 1 in 25 million survivor." Also, "there was a time in my life when I was a star athlete and an artist"



This appears to be his localbitcoins profile: https://localbitcoins.com/accounts/profile/smagik/ Last active 1 day ago. Verified phone number.


member
Activity: 101
Merit: 10
December 31, 2013, 01:41:17 PM
#26
I am in Canada I have no problem taking actions for people outside of Canada, PM me if you have any ideas

We need to hire some killer and let him pay by his blood ,silkroad2 coming service .
legendary
Activity: 1344
Merit: 1001
December 31, 2013, 01:27:16 PM
#25
If he had good intentions and was hacked he should release a statement.
member
Activity: 112
Merit: 10
December 31, 2013, 07:29:31 AM
#24
  Huh ahahahahah
newbie
Activity: 28
Merit: 0
December 31, 2013, 07:26:16 AM
#23
I am in Canada I have no problem taking actions for people outside of Canada, PM me if you have any ideas
legendary
Activity: 1680
Merit: 1205
December 31, 2013, 07:24:13 AM
#22
i wish i lived in canada...

no way to set up a legal action? I didn't lost so much money, but i would be glad to applicate to a collective action...
legendary
Activity: 1022
Merit: 1001
December 31, 2013, 07:11:37 AM
#21
Anyone here living in BC, Canada able to go pay this guy a visit?

I also just saw the "grinning" cow on the website. He wouldn't have posted it, if he were in over his head. Seems to me, he just ran with all the money he collected.

This is very unfortunate for the people who deposited their coins there.

Which exchange do you trust besides Cryptsy?

I trust cn.bter.com and (maybe) vircurex.

P.S.

Name: bruce degrosbois
Organization: sitemagik
Street: 19613-42 ave
City: langley
State/Province: BC
Postal Code: v3a3a3
Country: CA
Phone: +1.6045399527


Experience
Recreation and Tourism Alumni Event Coordinator at Vancouver Island University
Professional Driver at AC Taxi
Coder at Coastal Webmasters (Self-employed)
Assistant Manager at Agape Ministry
Manager at Edmonton Restaurant Slowpitch League, Edmonton, AB
Coder at Coastal Webmasters (Self-employed)



(From Linkedin) Experience

CEO
Ecrypto
October 2013 – Present (3 months)Vancouver, Canada Area
Ecrypto is developing the worlds most advanced cryptocurrency trading platform. Ecrypto is currently in Alpha development with an expected Beta release date of December 1, 2013.
http://www.Ecrypto.net

Projects

Understanding Bitcoin
March 2013
I suspect Bitcoin is a game changer much like windows was. It is hard not to love it once you understand it. The growth of Bitcoin is unprecedented and surprisingly the percentage growth of the alternate digital currency called Litecoin has been even higher. Many millionaires have been created by this and for the rest of us, well we missed the boat - this time.

I see understanding Bitcoin as...more
HeartofGoldProject.ca(Link)



Simon Fraser University
Urban Planning Certificate, Urban Planning
2013 – 2014 (expected)
RFABC
Masters certificate, facility management
2012 – 2013
I have been doing the courses for the past year and a half. I currently need 1 course to complete my certificate, however the course has not been offered - ever. Will complete it ASAP
full member
Activity: 210
Merit: 100
December 28, 2013, 10:16:54 PM
#20
Ecrypto's back up!! New front login page aswell...Cant log in to my account tho..
sr. member
Activity: 476
Merit: 250
I´ve got a picture! Haha!
December 27, 2013, 07:04:18 PM
#18
30+ hours ago I´ve sended there 1000 EAC, traded them for 0.0024 BTC (by some strange flaw it happened 2 times in a row, so I sold 2000 EAC for 0.0047 BTC) and tried to withdraw BTC. First time I´ve clicked on the link in confirmation email it gets me to the front page of exchange site (with no message), second and any further clicks gives me "Transaction Failed 0.0047 was not sent to ....". That 0.0047 BTC was already deducted from my acc, but never hit blockchain. And as far as there is no contact form nor email adress on ecrypto site, I believe its SCAM.
full member
Activity: 205
Merit: 100
December 27, 2013, 07:12:11 AM
#17
I'am blind! Shocked
Where can I deposit/windraw coins on ecrypto???
I dont find/see it! Huh Huh

Is there a direct link like "ecrypto.net/index.php?action=history" for "Trades"?

Plz help! Thx!!!


Okay found it!!!  Grin
legendary
Activity: 1680
Merit: 1205
December 26, 2013, 08:40:50 PM
#16
https://bitcointalksearch.org/topic/m.4161431

i feel like they stole my money now... and they have no support!

 Cry Cry Cry Cry Cry Cry
full member
Activity: 126
Merit: 100
December 26, 2013, 07:00:44 PM
#15
dez... bit harsh! There are no REAL scam reports so far just speculation,  a friend has used it and it was fine - after reading the introduction they clearly have some fresh ideas and for that reason I think these guys will go far.

trade safe!
hero member
Activity: 672
Merit: 501
December 26, 2013, 01:02:34 PM
#14
No wallets, poor load times, no contact info.

Poor prick couldn't even prop up his own scam

So dude thinking it was going to be a modest growth rate, did not expect to see as many people as he did. With as many wanting out of a unnamed exchange, plus carrys a few coins that are not listed there....

Really, a day old and people bitch. These are the same people who bitch when they can not drive up to the driveup window at a fast food place and not get the food handed to them right away as soon as they come to a stop.
member
Activity: 112
Merit: 10
December 26, 2013, 12:22:18 PM
#13
ERROR: Can't connect to local MySQL server through socket '/var/run/mysqld/mysqld.sock' (2)

Absolute pro..
legendary
Activity: 1680
Merit: 1205
December 26, 2013, 12:16:19 PM
#12
Finally i got an email confirmation using safari, but it didn't work... and now the site is again offline

 Sad

dudes, you're not doing it right
legendary
Activity: 1680
Merit: 1205
December 26, 2013, 09:14:57 AM
#11
for someone it was working only in internet explorer, try this

Also with explorer, seems impossible to me to withdraw right now
hero member
Activity: 770
Merit: 500
December 26, 2013, 09:08:18 AM
#10
not a new thing for new exchange.
sr. member
Activity: 797
Merit: 251
December 26, 2013, 08:49:02 AM
#9
for someone it was working only in internet explorer, try this
hero member
Activity: 532
Merit: 500
December 26, 2013, 08:48:18 AM
#8
It amazes me how quickly people put faith in such a new and untested website.
legendary
Activity: 1680
Merit: 1205
December 26, 2013, 08:43:57 AM
#7
i cannot withdraw my btc... the "send" button remains red and is followed by an "X". anyone have the same issue?
sr. member
Activity: 476
Merit: 250
December 26, 2013, 03:41:39 AM
#6
btw deposits and withdrawals are much faster than on craptsy  Cheesy
hero member
Activity: 672
Merit: 501
December 26, 2013, 03:36:51 AM
#5
No wallets, poor load times, no contact info.

Poor prick couldn't even prop up his own scam

With many people looking for an out of the unnamed site, there most likely was a huge influx of people. Being the first day I do not think that was expected. Pretty hard to judge on the first day IMO, I still would only put small sums of BTC in, but other wise, lets just do a wait and see.
sr. member
Activity: 476
Merit: 250
December 26, 2013, 03:35:22 AM
#4
I got mine back without withdrawal fee, it still loads sometimes  Cool
legendary
Activity: 1022
Merit: 1001
December 26, 2013, 03:33:27 AM
#3
Its working ok here albeit its a bit slow. Apparently he had a huge influx of new signups today so the site is experiencing a bit of downtime. There's a message on the site advises he's added extra RAM to the server to help with the load but work is ongoing.
full member
Activity: 193
Merit: 100
December 26, 2013, 03:31:51 AM
#2
Give it time, they're a brand new site aren't they?

New sites have bugs sometimes, especially when they don't expect to get the volume of new people signing up like they are getting lol
member
Activity: 123
Merit: 10
December 26, 2013, 03:23:00 AM
#1
No wallets, poor load times, no contact info.

Poor prick couldn't even prop up his own scam
Jump to: