Assuming what HaXXOR1337 is saying is true, why would anyone try to enter a near-duplicate username into a bounty?
It's very little effort with a chance to get a free reward.
I can't be absolutely certain HaXX0R1337 is innocent (after all, I don't know anything about him), but from what I've seen in bounty abuse, it's
much more likely someone else tries to steal his stakes.
It just doesn't make a whole lot of sense to me, as there's nothing to gain by this.
If the bounty manager doesn't pay attention, the tokens can be send to the cheater's address. For this campaign I don't even see addresses in the spreadsheet, which makes even less sense. Then again, I gave up trying to make sense of bounty cheaters, they just enter whatever rubbish they can without understanding anything.
(If you want to try to make sense of bounty cheaters, this is a nice example, submitted by what I can only describe as a drunk plagiarism copy/paste randomizer bot. Cheaters are amazingly creative to steal Stakes.)Good eyes, OP and I'm glad you notified the bounty managers about this. For me, this isn't proof enough that there are alt accounts being entered, but it sure is suspicious.
As a bounty manager, I wouldn't care much about the usernames provided. I'd search for duplicate UIDs (and duplicate addresses). The first one to enter the real UID is likely to be the real account owner.
This is an adverse side effect of running clean campaigns: participants are required to submit their entries outside of Bitcointalk, but anybody can pretend to own your account.
My preferred solution would be to let Google Docs scrape Eth addresses from the Bitcointalk profile, I'm still working on a proof of concept.