Fiona_TG
LE

As Steptoe got arrested for cottaging that even more disturbing.
Had this been a few years later than it was old man Steptoe might have got a worrying blackmail email on the matter, something to do with webcams....
As Steptoe got arrested for cottaging that even more disturbing.
Yes, quite disappeared, from all boxes in that address's part of the Outlook system I use. There are about 6 addresses which come together in it, and it's not in any of them. I didn't know that could be done; I expect it's some sort of code in the email which self-destructs it after being opened. There've been times in the past when I could have used that...Without understanding the email client and configuration you have it is impossible to say, perhaps you have a rule or add in that has moved them to a sort of quarantine folder. Perhaps if you perform a search across the whole mailbox using a short term from the emails that you might recall then see what comes up, no pun intended.
Yes, quite disappeared, from all boxes in that address's part of the Outlook system I use. There are about 6 addresses which come together in it, and it's not in any of them. I didn't know that could be done; I expect it's some sort of code in the email which self-destructs it after being opened. There've been times in the past when I could have used that...
I'm appalled and disgusted.
You haven't given any thought to social distancing.
Yep. I subscribe to crime email updates from my local Police authority, and actually received one yesterday telling me that there had been a marked increase in the reporting of sextortion/porn scam emails.They are all the rage right now! Sextortion emails and porn scams are back – don’t let them scare you!
I've now received this email twice in the past four days:
View attachment 465996
I am aware,&&&&&&& is your pass word.
I need your 100% attention for the up coming 24 hours, or I may make sure you that you live out of embarrassment for the rest of your lifetime.
Hi, you don't know me. However I know nearly anything about you. Your personal fb contact list, smartphone contacts and all the digital activity on your computer from previous 185 days.
And this includes, your masturbation video clips, which brings me to the main reason why I 'm composing this specific mail to you.
Well the last time you went to the porno web sites, my malware was triggered in your computer which ended up recording a beautiful video footage of your masturbation play by activating your web camera.
(you got a tremendously weird preference by the way lmao)
I have got the whole recording. If you feel I am playing around, simply reply proof and I will be forwarding the particular recording randomly to 12 people you recognize.
It might be your friend, co workers, boss, parents (I don't know! My software will randomly select the contact details).
Will you be able to look into anyone's eyes again after it? I question it...
Nonetheless, doesn't necessarily have to be that path.
I would like to make you a 1 time, non negotiable offer.
Buy $ 2000 in bitcoin and send them on the below address:
bc1***q833sk0525vuek2mprw3vj7dzjlfs55648673aw
[case sensitive copy & paste it, and remove *** from it]
(If you don't understand how, lookup how to purchase bitcoin. Do not waste my valuable time)
If you send this 'donation' (let's call this that?). Immediately after that, I will go away and never ever get in touch with you again. I will erase everything I've got about you. You may very well keep on living your ordinary day to day life with absolutely no fear.
You have got 1 day in order to do so. Your time starts as soon you go through this e-mail. I have an special program code that will alert me once you see this e-mail therefore do not attempt to act smart.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
&&&&&&&& was indeed the first password I used when I first set up the account, about 25 years ago. The laptop camera has been taped off for years.
All the antivirus and antimalware programs I have on the computer report nothing untoward, but I suspect that the originator, like the 419 scammers, will fish out and skin people who believe the threat.
Any experts on this sort of thing here?
(On advice, removed traces of old password. The damned thing was reused many times back when this means was powered by Pentium. I blame the young.)
Yep. I subscribe to crime email updates from my local Police authority, and actually received one yesterday telling me that there had been a marked increase in the reporting of sextortion/porn scam emails.
One trick to use when you are required to provide an email address to sign up or buy something is to stick a 'dot' anywhere in the first part - eg 'joeblogs@whatever.com' becomes 'j.oeblogs@whatever.com' Email disregards these 'dots' in the first part of the address and any replies will still reach your inbox. However, if the original recipient then sells your address on and you begin to recieve messages from firms/people you did not comtact, but the 'dot' is in the address, you will know who sold it. ETA thanks to input from others more in the 'the know', It is likely this only works with Gmail.I checked whether my old email address had been pwned and indeed it had, as I knew because it was on I had when we were with TalkTalk and their server got hacked.
Followed it through but the password was totally wrong and not one that I'd ever used.
I also get regular emails of the type received by the OP. Fvck me, my webcam must be able to see through a layer of black nasty!
These spammers sent out millions of emails and even if they get 0.01% success rate they make a lot of money.
I've also had someone trying to set up spotify accounts using my old email. needless to say I don't have a spotify account and a email spotify to remove them immediately. Evidently there is a scam where they open a spotify account and sell the details on and try to get your bank details.
One trick to use when you are required to provide an email address to sign up or buy something is to stick a 'dot' anywhere in the first part - eg 'joeblogs@whatever.com' becomes 'j.oeblogs@whatever.com' Email disregards these 'dots' in the first part of the address and any replies will still reach your inbox. However, if the original recipient then sells your address on and you begin to recieve messages from firms/people you did not comtact, but the 'dot' is in the address, you will know who sold it.
Your password was grabbed from a compromised site - you can check which sites using https://haveibeenpwned.com/
It's a very common scam these days, what should you do? Don't pay anything and don't think you've been hacked. Change your passwords and make sure you have different passwords for different sites - lastpass is good for this. Also:
![]()
Sextortion Bitcoin scam makes unwelcome return - Malwarebytes Labs
A well-worn sextortion scam is back in user's inboxes. We explain what to look for and why recipients shouldn't panic.blog.malwarebytes.com
Just change your current email password and it’s negated.Turns out my main email has been pwned 5 times ffs. Cheers for this
Will do thanksJust change your current email password and it’s negated.
Interestingly, mrs kinch asked me the same question. I told her I would write to the offending org/individual and complain, threatening to shame them publically. She knows me better than that, she said I couldn't be bothered to do that and that I was more likely to write to them in a profane and threatening manner.Cheers, Sherlock. What do you suggest would be the best way to use this vital information?
Are you sure about that? I'm fairly sure it's a Google-only flaw in their email system as the '.' is a valid part of the local addressOne trick to use when you are required to provide an email address to sign up or buy something is to stick a 'dot' anywhere in the first part - eg 'joeblogs@whatever.com' becomes 'j.oeblogs@whatever.com' Email disregards these 'dots' in the first part of the address and any replies will still reach your inbox. However, if the original recipient then sells your address on and you begin to recieve messages from firms/people you did not comtact, but the 'dot' is in the address, you will know who sold it.
Yes, I certainly use gmail and although I have long binned the source article, I believe you are correct. Must try your method. Cheers.Are you sure about that? I'm fairly sure it's a Google-only flaw in their email system as the '.' is a valid part of the local address
A better way and one that complies to RFC 5322 is to use '+unique_id' or (Unique_id) in the local part of the email address, that way, it will be obvious where the data leak comes from
So, with a base email of firstname.lastname@example.org you could use
firstname.lastname+arrse@example.org
or
firstname.lastname(arrse)@example.org
as valid email addresses to sign up to a website that requires email verification. Note that if you reply to an email sent to firstname.lastname+unique_id@example.org, the local part of the email address will not include the additional field with most email clients.
Also note that although it is a valid part of the email address structure, not all websites allow it's use. I've been using the modified local fields since the early 00's and it has revealed some 'sharp practices' from address lists being sold-on rather than hacked, notably in the recruitment and estate agent sectors. I've yet to come across a case where anyone has been clever enough to remove the + or () identifiers in order to obfuscate their sources.
On a slightly different tangent, I also disable and remove the drivers for laptop webcams, to be sure. I have had several laptops that had hardware switches for the webcam & microphone, think they were Toughbooks, the ones I have now still have the Wifi on a hardware switch but no webcam fitted, might have been HP though.
ETA: as a great example of how most website software doesn't follow RFC's properly, in the above examples you can see that firstname.lastname(arrse)@example.org isn't hyperlinked but firstname.lastname+arrse@example.org is, despite them both being correct use of the local part of an email address.