This guy did a really great effort. Now I need someone else who can dig some more info about these multi accounts.
!!! WARNING: This user is a newbie. If you are expecting a message from a more veteran member, then this is an imposter !!!
Hey,
I am from russian BTT local and I must report about multiaccount cheater detected.
This is user "targetmlrd". See proof below. His multiaccounts BTT usernames are: DmitryMarkov, MarryBit, VadimWorld92, Altmannn, AndyLowley, JusticeLife, CryptoDoncov, AndrewDuakyn.
He greatly deceived you in aeternity's signature part1, blog, russian thread moderation bounty campaigns.
In aeternity's russian thread he made fictitious activity to get more stakes, he asking and answering himself to his multiaccounts. For example, especially see page #14 in russian thread
https://bitcointalk.org/index.php?topic=1791710.260 where you can see all those multi usernames (almost all of them have bancor or sonm avatars/signature now).
In aeternity's signature part1 bounty spreadsheet you can see his multiaccounts DmitryMarkov, MarryBit, AndyLowley, JusticeLife
In blog bounty he participated as VadimWorld92.
Proof
All of those accounts registered on October 2016, I think to participate in Iconomi, vSlice and other bounties. All usernames have the same style of naming. All messages of those acoounts have the same writing style with some same words. All twitter accounts, related to them, in same style too and all was last active month ago with last retweets about TaaS and Edgeless: @CryptoWorld92, @D_Markovv, @MarryByte, @LowleyAndy, @altmantrader, @CryptoProfixxx, @AndrewDuakyn.
And main proof is to explore payment ETH adresses in public bounty spreadsheets of vSlice, Edgeless, TaaS and other. Everybody can see how tokens migrate from his multiaccount ETH adresses to one address:
for example see about vSlice tokens
https://etherscan.io/address/0x0f5f6e9f54b43466d7c6ae753abd7b05b3eeb5a4#tokentxns wich transfered from
0x8435328AebfE971df220dACf6F387bAE19b66556 VadimWorld92
0x996Cf37e8fB98999ABFf59A7f116D1e7f2B08847 DmitryMarkov
0x6fb50c245D42147AF9A58BB17C0bAe1DeF9a4Da4 CryptoDoncov
0xbB18910616EcF5D51Cc8303d66E7C7Bf43A617E9 AndyLowley
0x8DcBb728B00c442Dbd6337B2d14730Ba2ad186fD Altmannn
0xF90C096Bf0Fa1A9eB0008200763d50B5bBC46eFf MarryBit
these addresses are from vSlice bounty spreadsheet and the same in other projects.
Also we can see follow across transfers:
VadimWorld92 0x8435328AebfE971df220dACf6F387bAE19b66556 and AndrewDuakyn 0xFbfCbb268EaBf8c9DBA46D7BdcD7451ABb01eDC6 to here
https://etherscan.io/address/0x9d9127ace4f60b99aff20ebf295e804177ace93d#tokentxnsThen from AndrewDuakyn 0xFbfCbb268EaBf8c9DBA46D7BdcD7451ABb01eDC6 to targetmlrd 0x09F3480871B1a3384f948841C29eEe9C1392E776
And can find more and more