Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    MOBILE    |    I think its to discuss tablet/app stuff?    |    945 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 895 of 945    |
|    August Abolins to All    |
|    bank shirks responsibility    |
|    25 May 23 22:15:00    |
      MSGID: 2:221/1.58@fidonet 08c501c8       PID: OpenXP/5.0.57 (Win32)       CHRS: ASCII 1       TZUTC: -0400       Kinda mobile related since mobile tech "security" was at play..              I can't believe that someone fell for this:              https://www.cbc.ca/news/canada/montreal/phone-bank-fraud-montreal-1.6853465              And yet..              "Although he filed a complaint with TD, his request for reimbursement was       denied as was his appeal. He'll have to pay back the $13,000 cash advance in       full. The bank offered three months interest free, then it goes back up to 30       per cent interest."              It is disturbing that the bank is refusing to take ANY responsibility. The       original fraud was committed by the scammers who managed to take out a cash       advance from the victim's credit card and deposit that money into the victim's       chequing account.              This part is disturbing..              "In a letter explaining the decision not to reimburse Shattah, the bank said       its investigation showed a "one-time passcode was sent to your device with       your Easyweb password being changed."              "Shattah said he never requested a password change and believes the scammers       requested it. Typically, an alert is sent to a customer's phone asking them if       they asked for the change. Shattah never received one and believes the       scammers may have redirected the alert."              So.. how could the scammers have commandeered the request to have a temp pw       changed and routed to a new phone number? Something at the bank went horribly       wrong and they ALLOWED the transaction. The bank SHOULD be responsible.              --         ../|ug              --- OpenXP 5.0.57        * Origin: (2:221/1.58)       SEEN-BY: 15/0 103/705 106/201 124/5016 153/143 149 757 7715 203/0       SEEN-BY: 218/700 221/1 6 360 226/30 227/114 229/110 112 113 307 317       SEEN-BY: 229/426 428 470 664 700 240/1120 250/8 266/512 280/464 291/111       SEEN-BY: 292/854 8125 301/1 310/31 317/3 320/219 341/66 234 396/45       SEEN-BY: 423/81 460/58 633/280 712/848 770/1 2320/105 3634/12 24       PATH: 221/1 280/464 153/757 770/1 317/3 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca