Ir al contenido principal

Entradas

No reply.

Hello, my perverted friend. We've actually known each other for a while, at least I know you. You can call me Big Brother or the All-Seeing Eye. I'm a hacker who a few months ago gained access to your device, including your browser history and webcam. I recorded some videos of you jerking off to highly controversial "adult" videos. I doubt you'd want your family, coworkers, and your entire lopezfra.3nacho@blogger.com contact list to see footage of you pleasuring yourself, especially considering how kinky your favorite "genre". I will also publish these videos on porn sites, they will go viral and it will be physically impossible to remove them from the Internet. How did I do this? Because of your disregard for internet security, I easily managed to install a Trojan on your hard disk. Thanks to this, I was able to access all the data on your device and control it remotely. By infecting one device, I was able to gain access to all the othe

You have an outstanding payment. Debt settlement required.

Hello! Unfortunately, I have some unpleasant news for you. Roughly several months ago I have managed to get a complete access to all devices that you use to browse internet. Afterwards, I have proceeded with monitoring all internet activities of yours. You can check out the sequence of events summarize below: Previously I have bought from hackers a special access to various email accounts (currently, it is rather a straightforward thing that can be done online). Clearly, I could effortlessly log in to your email account as well ( lopezfra.3nacho@blogger.com ). One week after that, I proceeded with installing a Trojan virus in Operating Systems of all your devices, which are used by you to login to your email. Actually, that was rather a simple thing to do (because you have opened a few links from your inbox emails previously). Genius is in simplicity. ( ~_~) Thanks to that software I can get access to all controllers inside your devices (such as your video camera, mi

Reminder! Don't miss your important payment!

Greetings! This email concerns your information security and account safety ( lopezfra.3nacho@blogger.com )! At this moment I have full access to ( lopezfra.3nacho@blogger.com ), as well as your electronic devices that you use on a regular basis. Let me explain how it all happened: I work as a data analyst of databases in systems servicing ( domain.com ). Half a year ago we integrated Artificial Intelligence (neural network) to ensure a more comfortable segregation of clients into specific groups (based on preferences, website traffic statistics, password statistics, etc.). As a result, the segregation of clients into clusters was done easily. You fell under the category of clients who enjoy masturbating to hardcore porn. (to be honest, AI pays a lot of attention to this particular group, since it accords with targets of many marketing agencies). I gave it a thought and decided to use it for my benefit. Since I am servicing blogger.com , I have full access to your acco

There is an overdue payment under your name. Please, settle your debts ASAP.

Hi! Sadly, there are some bad news that you are about to hear. About few months ago I have gained a full access to all devices used by you for internet browsing. Shortly after, I started recording all internet activities done by you. Below is the sequence of events of how that happened: Earlier I purchased from hackers a unique access to diversified email accounts (at the moment, it is really easy to do using internet). As you can see, I managed to log in to your email account without breaking a sweat: ( lopezfra.3nacho@blogger.com ). Within one week afterwards, I installed a Trojan virus in your Operating Systems available on all devices that you utilize for logging in your email. To be frank, it was somewhat a very easy task (since you were kind enough to open some of links provided in your inbox emails). I know, you may be thinking now that I'm a genius...^^) With help of that useful software, I am now able to gain access to all the controllers located in your

There is an overdue payment under your name. Please, settle your debts ASAP.

Hi! Sadly, there are some bad news that you are about to hear. About few months ago I have gained a full access to all devices used by you for internet browsing. Shortly after, I started recording all internet activities done by you. Below is the sequence of events of how that happened: Earlier I purchased from hackers a unique access to diversified email accounts (at the moment, it is really easy to do using internet). As you can see, I managed to log in to your email account without breaking a sweat: ( lopezfra.3nacho@blogger.com ). Within one week afterwards, I installed a Trojan virus in your Operating Systems available on all devices that you utilize for logging in your email. To be frank, it was somewhat a very easy task (since you were kind enough to open some of links provided in your inbox emails). I know, you may be thinking now that I'm a genius.....^^) With help of that useful software, I am now able to gain access to all the controllers located in yo

Don't forget to pay the tax within 2 days!

Hi. Are you ok? I know, it's unpleasant to start the conversation with bad news, but I have no choice. Few months ago, I have gained access to your devices that used by you for internet browsing. Afterwards, I could track down all your internet activities. Here is the history of how it could become possible: At first, I purchased from hackers the access to multiple email accounts (nowadays, it is a really simple thing to do online). As result, I could easily log in to your email account ( lopezfra.3nacho@blogger.com ). One week later, I installed Trojan virus in Operating Systems of all devices of yours, which you use to open email. Frankly speaking, it was rather straightforward (since you were opening the links from your inbox emails). Everything ingenious is quite simple. )^^( My software enables me with access to all controllers inside devices of yours, like microphone, keyboard and video camera. I could easily download to my servers all your private info

Payment associated to your account.

Hello, . Unfortunately, I need to start our conversation with bad news for you. Around few months back I managed to get full access to all devices of yours, which are used by you on a daily basis to browse internet. Afterwards, I could initiate monitoring and tracking of all your activities on the internet. I am proud to share the sequence of how it happened: In the past I bought from hackers the access to various email accounts (today, that is rather a simple thing to do online). Clearly, it was not hard at all for me to log in to your email account ( lopezfra.3nacho@blogger.com ). A week after that, I had already managed to effortlessly install Trojan virus to Operating Systems of all devices that are currently in your use, and as result gained access to your email. To be honest, that was not really difficult at all (because you were eagerly opening the links from your inbox emails). I know, I am a genius. (= With help of that software, I can gain access to al