Crypto | Asset Build & Scams

A new crypto should be considered a scam, until it is registered with a mainstream exchange, and thus meet the system requirement for ID verification.

Business planning, investments and the market strategy are the company’s growth. Note: Mainstream investors aren’t interested in stupidity on social media.

It is advisable to provide updates, phase information or links in the Info Section of ​​the crypto asset.

The contract creator should register the token asset, as a company for legal rights and tax purpose, and then provide the credentials on the consumer trust website.

Creator / Director could keep their personal investment for up to 2 years, to ensure a certain stability for the base percentage of the asset (exchange-tested).

Start by depositing a reserve (low-level impact). Thus for the use in stabilising, or mitigating fallouts that can affect the investment rate.

Bitcoin (BTC) fallout was a mere withdrawal roller-coaster ride of investment interest, since the last crypto peak on April 14, 2021. The short to mid-term sell.

Bitcoin (BTC) investment interest in daily volume has not decreased.

Ethereum (ETH) on the other hand, lost 55% percent or more in daily volume.

Hence, the correlation between Ethereum (ETH) and Bitcoin (BTC) impacted growth to create the anchor for any recovery.

The impact of the loss for mainstream investment was the indebtedness, due to the larger bank withdrawal’s.

Rapid movement of general investment that is sent in to liquidity, to compensate as a surplus, can create cumulative trade debt.

This cumulated debt can be increased with the continued suffercation, which is, then viewed as an inconvenience, by the investor.

Whom in-turn will increase the debt, by subtracting a percentage or more in crypto stock units (exodus).

The self-generated liquidity has proven to be optimal for stable growth. When it is calculated on a harmonious scale.

Note: Manipulation would generally undermine, and / or even reverse the corresponding growth. This will in fact shorten the life of the asset.

Token / Coin Scams:

There are a number of fraudulent scams actively operated, and related to the cryptocurrency that may include, but are not limited to:

  • Airdrop
  • Funnel Fund
  • Identity Theft
  • Liquidity Rugpull
  • Phishing
  • Vault

Airdrops is a common selling point to advertise the token. However, it turned out to be less lucrative for the real token, and / or medium to long-term investor (short-term profit).

Airdrop scams are a simple practice, that requires funds to be sent directly to the wallet address, considered a personal donation or transfer agreement to deposit funds.

The second fraud is the momentium of interest or investment, that is used to reap the advertising value rewards, ultimately gained by the rugpull.

These contract creators are present in practise with regard to token generation.

Which was checked by BSCScan tracking, found to have association to multiple wallets used in order, to funnel or evade asset responsibility for reason of technical error or a disruption to unknown associates.

Phishing is a type of attack, to gain access to applications, such as social media, banking, professional websites, even system and / or device connections.

This is widely used to steal user data, including login information and / or credit card information, via use of the access points:

  • API Keys
  • Login Credentials

Phishing attacks are common efforts in the crypto-world, to carry out fraudulent scams, and / or launder to and from other accounts, via social media or email connections:

  • Password
  • Word Phrase
  • Phishing Link

In relevance, there is first-hand experience in monitoring the support effort, including via PancakeSwap Telegram – Anna (mod, account deleted).

The agent or direct / indirect associate of the asset, would contact the investor for the interest of aid.

They do a means test for individual technical competency and to profile, which platform or program the person have in use.

This contact would result in the individual, being asked to use the external phishing website or email link. Thus for the purpose of re-alignment and / or solution, to whatever problematic issue.

No, realignment is ever required for the wallet, nor for the exchange application (automated).

The website or survey page, maybe branded as a legitimate representation of the wallet / company. So, in order to deceive individuals from the legitimate website.

It is illegal branding or business brand leeching, and is considered property theft in the eyes of the law.

The site most commonly will ask a series of questions, thus for a credential, word phrase or even logins for the actual application of the company. Which is a fake to the original access portal.

Website pages can then redirect you, to the actual website login portal, e.g. the programming is similar to a confirmation page.

Some individuals are no-wiser, to what informtion was obtained and necessary, to hijack or access the account itself.

In general, applications that need support will make use of an internal system of support, and the application portal, such as Microsoft provide.

Token liquidity can be rug pulled.

To prevent creators from drawing liquidity, a protection protocol should be implemented, while other investors are still active.

Liquidity, has been tracked as the usual filter to channel investor funds from smart contracts, but then redirected to the following:

  • Dead Wallet (mimic)
  • Deploy Bot
  • Creator Contract Wallet
  • Uniswap Lock Wallet (6 Mth)

In this way, crypto money can be withdrawn without manipulating the investor’s share.

The cryptocurrency is sent to a similar non-dead wallet, and then fed into liquidity or other assets.

Internal 0x00000000000000000000000000000000000000000000

Deploy bots can serve a number of functions from buy / sell percentage, pre-sale airdrop and asset crypto holding distribution. However, it can be programmed to filter funds based on the contract creator choice. Multiple deploy bots can be used for a single contract.   

Investors can hold US $0.03 to US $5.00 in valued assets for the same number of shares, when buying.

Once, they have secured the bounty of value interest, they will proceed to crash the market, by removing the liquidity on exit (ready to funnel).

Wallet Tree Steam, shows the laundering practice in replicating the affair to cheat, funnel, and then launder crypto and / or the tangle asset.

FunneI crypto accounts have a common practice to dodge the Tax office and BscScan transaction trackers, by pouring scammed funds into joint assets:

  • Bitcoin (BTC)
  • Ethereum (ETH)
  • Binance Coin (BNB)
  • Binance USD (BUSD)
  • Binance-Peg BUSD-T (BUSD-T)
  • Liquidity
  • Other Asset

Whales, who have accumulated some crypto from token contract scams, could hold-off in the wallet world.

This could be to avoid detection of large amounts of crypto with exchange-authenticated wallets, until they can find a tangible exit (a flushed fund asset):

  • NFT Art
  • Alien Worlds Trilium (TLM)

Funnel scam’s are common on Binance smart chain and the Ethereum chain, which can be operated via a Trust, Exodus, Coinbase, Coin98, MetaMask and Bitcoin wallet, among others.

Thus can provide extra financial growth and / or tangible asset gain.

Fraud is perpetrated by one or more people, or wallets, who can play the role of an investor.

The group effort will ensure timely withdrawal of crypto stock units from the asset, and turn in to an asset nest of the same interest.

Thereafter, crypto funds will be laundered in to the native token that remain intangibles, mostly diverted to exchanges like Binance or Uniswap, among other.

Native crypto exits may include, but is not limited to:

  • Spot Wallet
  • Lock Vault
  • Local Bank Account (newbie)
  • Offshore Bank Account

At this time, it is conceivable that the interests of a cartel, cell or group to defraud, launder or funnel investor funds could exceed US $1 Million consolidated, as a collective agreement.

Repeat offenders, keep up to US $2 Million in more than one wallet.

On further observation, now the whale scammer may purchase baby whale scamer assets, to take advantage of the predetermined scam and reap full value.

Cybercrime, must audit for three months from March 31, 2021 to June 31, 2021.

Hence, all New smart contracts that started trading on PooCoin, and PancakeSwap exchange for mass fraud reward.

I found no evidance to a reporting system, nor a verification portial on crypto exchanges for new smart contracts.

BSCScan / Binance provide a reporting mechinism for phishing scams and contracts.

Verification / Ban:

ID verification is the implimentation, needed for application of and for all New Smart Contract, submissions (proof of identity and residence).

Regulated Exchanges, that allow creation of new contracts need to take the nessercary steps to ensure, loopholes are closed for interest of financial protection and the fight against fraudulent activity or merchants.

Renounced contracts can be reclaimed, followed by a blocking period of at least 7 days. Renounced contracts should remain exactly that, as a protocol of protection for investors.

There should be a wallet ban, wallets that are not intergrated in to mainstream exchange, or without ID verfication protocals in place.

Scamers would be forced out of underworld effort of standalone wallets, forced to indentify as a holder, and for crimes are committed can be identified.

Final Summary

Economists are short-sighted with any punt prediction (value is worthless).

Decentralisation, has demonstrated one thing in administering your own rules.

There is a lack of basic business / sole trader application, registration, auditing and track reporting. Decentralised failures are in honest and professional practice.

Deregulation is the reduction, or elimination of government power in a particular industry (company obligation).

Usually enacted to create more competition within the industry, and not to evade criminal law.

Brett J Hutton

== Reference ==

Cryto | Government Coin

Presale | Wallet Scam (.PNG)

Panther | Excuse Scam (.PNG)

APE INU | Excuse Scam (.PNG)

APE INU | Locked Wallet Scam (.PNG)

Phishing | Binance | Website Examples (Https://)

Phishing | Email Scam (.PNG)

Phishing | PancakeSwap Twitter Support (.PNG)

Airdrop | 0x0000000000000000000000000000000000000000 (.PNG)

Rugpulls | Liquidity Scam (.PNG)

Burn | Liquidity Scam | 0x0000000000000000000000000000000000000000 (.PNG)

Funnel | Fund Exit Scam (.PNG)

Funnel | 0x0000000000000000000000000000000000000000 (.PNG)

Funnel | NFTArt Investment (.PNG)

Funnel | Alien Worlds TLM | 0x0000000000000000000000000000000000000000 (.PNG)

Audit | Caution Listing | Contract Creator (.PNG)

Platform | Minereum Scam (.PNG)

Contract Submission | Scam Coins (.PNG)

Phobiatic Smite | Commoner Key of Use

Theory of Character

In all; commoner individuals’ that are community dependent or are members’ within cult sect group arise to a common effort of systematic production, thus that is wayward allegiance of phobiatic smite attacks on individual innocent beings’.

People must understand, they have taken interest in association of human and social science, psychology as a psychological tool for sale of selfishness and or jealous envy.

Thus our history of man has outlined a single-cell thought of ignorance to capitalise on the servant/peasant weaknesses for what the purposeful use of these tools were designed, the design being for comprehension to a civilised manner (behaviour) and serve society in the making (strength and sustainability).

In clear sight example, one may use a reference like our ‘King’, ‘Queen’ or another influential name of status or interest like, ‘God’ as authority to focus-tool ones mind in subject of teaching civilised comprehension to what it is about and how it functions and not the reference itself to be the essential ingredient.

Essential is the knowledge: Energy is the spore that defines the life of being as itself out of nothing, so as to separate unicellular replication for the tribe organism existence of something. – BJ Hutton

Psychology as a profession:The goal of psychology is not just to study human thinking and behaviour, but to put that knowledge into practice, to help people, communities, and society in general to solve day-to-day problems and improve quality of life. – Psychology.org.au

Inheritance of the handler self-interest to make use of science in psychology had evolved in to exploitation, conspire a capitalist of ideology and idea for psychological abuse and physical torture means in effort to build on sect and its primary brand allegiance ideology values.

We found that the members of sect brand interest and feral in general are operating in allegiance of mindset likeness, the pearl of being the ‘Baked Servant’ through repetitious desperation of ones own need and to sponsor the persona of ones interest to be true.

What’s more interesting, is the sect and feral focus is to ‘Set-up’ the individual with use of these sciences to wayward lie, con and be deceitful and religious ideas that surround supernatural interference in working effort to make use of the tools provided by brand names and or the law itself.

Which are reliant in working effort follow-through of either physical abuse exorcism for compliance through authority given by baked parents or associated friends to harm, rather than worship spiritual cleansing rituals or judicial circumstance by ones own hand, thus to naturalise independence of an individual’s natural thought and value.

In particular, are those individuals in target focus are located in nearby regions of built-up faith, where indigenous interest to mimic ideological, an idea to fabricate an existence at large in social trends, via a sadist influence of misused intellectual property.

Words of the wise, the mold growing far and wide in function and foundation of service are inherent of these fractured people in mind of the idea, compliance wins via forced means of creative obedience or trickery, where fact meets in the middle of fiction to present day.

Thus, people are killed worldwide everyday or severely injured in such a way, incapacitates the individual and or group.

Demon is a referenced to ‘Wicked’ in idea, society in scholar created for acknowledgement of ones own issues in need of moral mindset adjustment (people have demons), an understanding to help deal with ones persona, and recreate one more complacent and compliant to what freedoms are available and law (a humble life).

In relevance to effort made:

  • Families segregate or break-down through lack of trust.
  • Individual isolation or dissocialise, being exploited via psychological and physical abuse, thus leads to a lack of health and well-being.
  • People commit suicide in privacy hating the world, feeling insecure or worthless via suffered depression (deepened).
  • Groups or Individuals coin act/s of terrorism as a result.
  • Professionals’ can suffer instability within the workplace or associated financial loss, trust and even unemployment.
  • Industries suffer a feral deterioration of service and productivity in blight of integrated non technical management and lack of diversity skilled white collar workers, allocated to technical divisions (onsite and remote support, complaints and data analysts).

Through focus in lack of legal substance, nor the ability to validate personal character has always been the target.

Thus to impede farcify on ones personal and work life via harassment of privacy questions to label discrimination, be innuendo insult to repetitious bombard in effort of interference.

The aim is for innocent people to vent emotion affected, such triggered by the attacker’s effort in use of trickery to bait, label or lie and be deceitful or to torture in method of sleep deprivation, via interrogation or torment of repetitious questioning (these are illegal offences of terrorist act or sabotage).

A temptation of desire to engage in short-term urges of machiavellianism enjoyment, that threatens long-term individual goals. A culture of hope for reprisal is placed on the individual target for outcome.

This a commoner have said, “They do it to themselves!.”

In effort, is a negative generation of energy to bubble the world with emotional anxiety for imbalance and social serialisation.

A cause leading to risk of self-harm are these tension-type headache (TTH) triggers.

The most common causes of tension-type headaches reported are anxiety, emotional stress, depression and sleep deprivation, go figure.

We all have as citizens humanitarian rights and the fundamental freedoms that should be upheld for national pledge, an oath. A liberty in order of justice to wright a wrong of discrimination is needed and be applied to legal application.

It is not the colour of the skin that matters, persona on the inside is what counts. – BJ Hutton

Legal Ratification of Argument (suggestion):

For sake of argument be plaintiff or responder in term of what is known, “no reasonable doubt” is being applied to loophole methodology for paradox use of legal case build or creation of any subject matter (production).

The presiding judge must/should define a legitimate disadvantage or disposition of individual counterclaim evidence at the initial point of document preparation make suggestion, one make procurement of a lie detection test for exhibit of innocence, fairness and collaboration.

The individual should be given the full six week period to obtain as evidence and or invalidate the case at hand, as a result of non compliance to matter.

Noted: The most commonly targeted are mid to low range income earners with legal reprisal less likely.

As so, lie detection polygraph testing is over priced, ranging from AU$950 – AU$1500, such leading to convenience in lack of justice.

This should be dependable on income and charged no more than AU$500 (A4) for common claims of Yes or No (99.9% accurate results produced).

Brett Hutton

== Relevance ==

Universal Declaration of Human Rights (UDHR)

Victims of Terrorism – Support Portal