- Joined
- Mar 18, 2019
SIR HAVE YOU CONSIDERED... BEING MORE POLITE TO THE TURKISH PEDOPHILE WORSHIPPERS ABUSING YOUR LEGAL SYSTEM TO CENSOR LEGAL COMMENTARY ON A SEXPEST TRANNY????
no! i have not!
faggot
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
SIR HAVE YOU CONSIDERED... BEING MORE POLITE TO THE TURKISH PEDOPHILE WORSHIPPERS ABUSING YOUR LEGAL SYSTEM TO CENSOR LEGAL COMMENTARY ON A SEXPEST TRANNY????
no! i have not!
faggot
Thesis and antithesis.I'm very excited for a new season of Null's Internet adventure: Onlyfans vs Kiwifarms
Add him to the J.DatabaseView attachment 7320585
He looks like J D Vance's little brother or something. J D Pantsu.
It's pretty easy to trick dumb whores (and their pimps) and trannies that you hold the golden key to taking everything they don't want on the Internet, off it. I can easily see a bunch of OF girls' managers paying thousands of dollars a year each for this.Pretty sure it's a money laundering racket, unless DCMA spam really gets you 3M of sales revenue. Also what automated bot costs 3.4M to run? Those aren't wage costs, but expenses on bought materials, goods and services (unless they're subcontracting another shelf company).
![]()
Yeah, the whole Estonia thing is probably just to get them an EU corporate entity, bank accounts, etc. Plus it lets them avoid Turkey's inflation problem (currently clocking in at 38% annually, was at 75% a year ago). It makes perfect sense to do as much business as possible in Euros instead of a currency that is rapidly devaluing.I really doubt that they are doing something outright illegal. They don't pay workforce taxes since none of them are Estonian residents, they'd be paying those in Turkey instead. Sub-contracting is also nothing illegal, it's tax optimization (not evasion) 101. EMTA is a relatively competent agency, they'd need a really good local bookkeeper to cook the books. Currently their bookkeeper is some guy called Lennart Lundve (https://ariregister.rik.ee/eng/company/16017422/Lundve-OÜ), unless you can find him hanging out with the Turks it's most likely some random guy they found to do their paperwork.
I opened the site for the first time. The revenues seem plausible, given that according to them they serve 4764 pornographists and at max rate they charge 3k per year. That would give them an annual revenue of 14M minus 22% VAT (ofc most of them are on the lower-tier, but the numbers kinda check out).
I wouldn't say a really good one. You can find tons of them online and you just need to toss them a bone in form of hundred or more euros and they'll just do your papers monthly. However in this case I think they were advised to contact this guy. This is the website that Lennart runs: https://www.buukify.com/ While he probably doesn't know them personally, this is how he describes and advertises his services.EMTA is a relatively competent agency, they'd need a really good local bookkeeper to cook the books. Currently their bookkeeper is some guy called Lennart Lundve (https://ariregister.rik.ee/eng/company/16017422/Lundve-OÜ), unless you can find him hanging out with the Turks it's most likely some random guy they found to do their paperwork.
Given the recent 'OMG my Only Fans content got leaked' stories, I can see that it would be a profitable venture.It's pretty easy to trick dumb whores (and their pimps) and trannies that you hold the golden key to taking everything they don't want on the Internet, off it. I can easily see a bunch of OF girls' managers paying thousands of dollars a year each for this.
Deep cut for wrestling fans: Chikara referee Jon Barber's (RIP) scam anti-piracy service that didn't accomplish anything but a bunch of promotions still paid him good money for it.
When nonces like Jeffree Marsh can buy stock in Alphabet, they'll soon demand that the company adhere to what they want.First I hear of ruben's bot being banned on discord and now this. Being a pdf is not a "protected characteristic". It's a fucking crime that should get people tossed in the slammer forever to rot.
It's probably the same people doing guerrilla marketing and DMCAs. Post clips on popular websites, wait a few days, then DMCA them. That way you can count them as both ad impressions and content removals.Given the recent 'OMG my Only Fans content got leaked' stories, I can see that it would be a profitable venture.
'Oh, you posted your tits, ass and pussy pics/videos on Only Fans... a shame if these were to be leaked out (and yes, we can do this with help from our hacker chums)... you'll pay us to keep these secure? Wonderful!'
They also failed to turn up for a footy match against the Scots in 1996:Okay, one thing to note about Estonia - apparently, a tax haven.
This concludes my knowledge about Estonia.
Greeks don't work.You need to hire some Greeks to respond.
Get to digging
ahmetfteke@gmail.com
View attachment 7320297View attachment 7320299View attachment 7320300
View attachment 7320310View attachment 7320311View attachment 7320312View attachment 7320313View attachment 7320314
@notorietus this might interest you if you have time to phonebook some roaches.
{
"23 Million BTC Combos": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Password": "ahmetfteke"
}
],
"Description": "In 2019, a list of emails and passwords in plain text was published online. This collection included 23 million records collected from cryptocurrency-related websites. This collection was used to hack accounts on crypto exchanges."
},
"500px": {
"Data": [
{
"Birth Day": "1994-01-25",
"Email": "ahmetfteke@gmail.com",
"Gender": "0",
"Username": "Phantasos"
}
],
"Description": "In mid-2018, the online photography community 500px suffered a data breach. The incident exposed nearly 15 million unique email addresses. The data also included usernames, gender, dates of birth, and MD5 or bcrypt password hash."
},
"8tracks": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Username": "ahmetfteke",
"Password(SHA1+Salt)": "7bc71f9f18e293c6ce1c2e412e61a47cb83e5315",
"Salt": "b2fb5dbf77a987386bc074bb5a922662febe028a"
}
],
"Description": "In June 2017, the online playlist service 8Tracks suffered a leak that affected 18 million accounts. Mail and salted SHA-1 password hashes for most users were made publicly available."
},
"AntiPub by Nik_Tesla": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Password": "furkant3k3"
}
],
"Description": "So-called “Anti-Public” lists are used by hackers to analyze new leaks for the presence of unique entries. They usually contain emails and passwords collected from various leaks. This particular list was published in March 2020 and included 3.2 billion rows. After removing duplicate records from collections, there were 252 million rows left."
},
"Avvo": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Password(SHA1+Salt)": "263d69e106d02e598594b7af12f84de76468c648",
"Salt": "d2f79976030b51fbba59d2bdf33005af1a37fd6b"
}
],
"Description": "Around December 2019, the Avvo attorney directory data leak was posted on an online hacker forum. She was later used in an extortion scam. The data contained 4.1 million unique email addresses, as well as SHA-1 hashes that most likely represented user passwords. Several attempts to contact Avvo were unsuccessful."
},
"BitcoinTalk": {
"Data": [
{
"Birth Day": "0001-01-01",
"Count Messages": "0",
"Email": "ahmetfteke@gmail.com",
"Gender": "0",
"IP": "149.125.107.129",
"LastActivity(UNIX)": "1423881350",
"Username": "ahmetfteke@mail.com.tr",
"Password(HASH)": "$5$rounds=7500$mi2L7qdrpyUry2C1$.TDqd8pZ1kV33gvv4EeX2D1sLxkK6MsQ9Gxwmojx5CA",
"Posts Count": "0",
"Created On (UNIX)": "1423880514",
"Salt": "349c",
"Unread Messages": "0"
}
],
"Description": "In May 2015, the cryptocurrency forum Bitcoin Talk was hacked. More than 500 thousand users were affected. The attack exposed personal data including names, email addresses, IP addresses, gender, dates of birth, security questions and MD5 hashes of their answers, as well as hashes of the passwords themselves."
},
"Canva": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Language": "en",
"Username": "AhmetFurkanTeke",
"Created On": "2018-07-08 08:15:55"
}
],
"Description": "In May 2019, the graphic design tool Canva's website suffered a data breach. This leak affected 137 million subscribers. The exposed data included email, names, cities of residence and passwords in the form of bcrypt hashes."
},
"Chegg": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Last Active": "2014-10-29 00:12:38",
"Password(MD5)": "9b05086ad5d25d925d9a4d01483ac840",
"Created On": "2014-10-28 12:45:46",
"State": "NU"
}
],
"Description": "In April 2018, textbook rental service Chegg suffered a leak that affected 40 million subscribers. The data included email, usernames, and passwords in the form of unsalted MD5 hashes."
},
"Cit0Day": {
"Data": [
{
"Category": "Shopping",
"Email": "ahmetfteke@gmail.com",
"Leak Site": "flores.com.bo",
"Password(MD5+Salt)": "a790ae7840db9eeab14a7ca23d4f5494",
"Salt": "58"
},
{
"Category": "Shopping",
"Email": "ahmetfteke@gmail.com",
"Leak Site": "flores.com.bo",
"Password": "furkant3k3"
}
],
"Description": "Cit0day is a now defunct service for searching emails among various leaks. After its closure in November 2020, a collection of more than 23,000 hacked sites became publicly available. The data was sorted into several dozen categories and contained more than 226 million emails and passwords. Some passwords were protected using hashes."
},
"Cloudata": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Password": "furkant3k3"
}
],
"Description": "Large collection of email:password. The database was assembled from multiple files on May 18, 2023. Initially, all databases weighed 338 GB (11 billion rows). After removing duplicates and data from the collections, about 2 billion remained."
},
"Collection": {
"Data": [
{
"Collection Numbers": "1,2,4",
"Email": "ahmetfteke@gmail.com",
"Password": "ahmetfteke"
},
{
"Collection Numbers": "2,4",
"Email": "ahmetfteke@gmail.com",
"Password": "ahmetfteke@mail.com.tr"
}
],
"Description": "In January 2019, a collection of 5 parts appeared on a hacker forum, representing a combination of data from different sites. The collection contained 108 thousand files with a total size of 870GB. These files contained 26 billion lines containing email and password. However, many values were repeated many times, and there were only 4.3 billion unique pairs. And yet this collection is considered the biggest leak in history."
},
"DailyMotion": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Username": "tqmedia",
"Password(bcrypt)": "$2a$10$DLehGz57WpejDU5elofTVuCWYqBnmkhC/1ILNmpOBbBOFaFwrS4XO"
}
],
"Description": "In October 2016, video sharing platform Dailymotion suffered a data breach. The attack exposed 85 million user accounts and included email addresses, names and bcrypt password hashes."
},
"Epik": {
"Data": [
{
"Date": "2020-08-11 21:34:47",
"Email": "ahmetfteke@gmail.com",
"IP": "178.233.230.250"
},
{
"Date": "2020-08-11 21:34:49",
"Email": "ahmetfteke@gmail.com",
"IP": "178.233.230.250"
},
{
"Country": "US",
"Email": "ahmetfteke@gmail.com",
"Full Name": "Ahmet Teke"
},
{
"Date": "2020-08-12 04:34:47",
"Email": "ahmetfteke@gmail.com",
"IP": "178.233.230.250",
"Username": "ahmetfteke",
"Password(MD5)": "d41d8cd98f00b204e9800998ecf8427e"
},
{
"Date": "2020-08-12 04:34:47",
"Email": "ahmetfteke@gmail.com",
"IP": "178.233.230.250",
"Username": "ahmetfteke",
"Password": "d41d8cd98f00b204e9800998ecf8427e"
}
],
"Description": "In September 2021, domain registrar and web hosting company Epik suffered a data breach, allegedly in retaliation for hosting alt-right websites. The leak exposed a huge amount of data not only from Epik customers, but also exposed WHOIS records belonging to individuals and organizations that were not Epik customers. The data contained 15 million email addresses, names, phone numbers, physical addresses, purchases and passwords in various formats."
},
"Ga$$Pacc": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Leak Site": "Dailymotion.com",
"Password": "furkant3k3"
}
],
"Description": "In 2020, a set of decrypted databases containing 580 million emails and passwords was made publicly available. The data was obtained from 243 different leaks and contained only mails and unencrypted passwords."
},
"Gravatar scrape 2023": {
"Data": [
{
"Avatar": "https://secure.gravatar.com/avatar/da7d3dee35c77c0594164c550427d8b7",
"Email": "ahmetfteke@gmail.com",
"Username": "itusuny"
}
],
"Description": "The Gravatar service allows users to use one avatar on multiple services. In January 2023, the data of 61 million users was collected from it using scraping. They included mails, nicknames and avatars."
},
"PasswordIndex": {
"Data": [
{
"Emails": "ahmetfteke@gmail.com",
"Password": "ahmetfteke@mail.com"
},
{
"Emails": "ahmetfteke@gmail.com",
"Password": "ahmetfteke@mail.com.tr"
}
],
"Description": "This is an inverse index created in March 2023. It allows you to search for all emails associated with a particular password. This index contains 1.3 billion unique passwords and 3.2 billion emails for which they were used. Enter the received emails into the search to get more information."
},
"TeraBase64": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Password": "ahmetfteke"
},
{
"Email": "ahmetfteke@gmail.com",
"Password": "ahmetfteke@mail.com.tr"
}
],
"Description": "A huge collection of files published in February 2020 by a person with the handle @HTTSMVKCOM. It contained 3.2 billion lines of plain text emails and passwords, but only 1.28 billion unique lines. All this data was most likely obtained from many other leaks."
},
"USA Fresh Dump": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Password": "ahmetfteke@mail.com"
}
],
"Description": "A combination of many hacks from the USA, collected in 2022. Contains 25 million emails along with their passwords."
},
"VerificationsIO": {
"Data": [
{
"Email": "ahmetfteke@gmail.com"
}
],
"Description": "In February 2019, the email verification service Verifications.io was damaged. Data in MongoDB was left publicly accessible without a password, which exposed 763 million unique emails, phone numbers and IPs. Passwords were not included in the data."
},
"Zeeroq": {
"Data": [
{
"Email": "ahmetfteke@gmail.com",
"Password": "furkant3k3"
}
],
"Description": "Around 2019, about 250 combo players were found in the open directory on the demo.zeeroq.com domain. The number of entries was more than 200 million. The leak contained emails and passwords in plain text."
}
}