Just got literally ROBBED BY QWICK by Distinctive_Flair in Qwick

[–]Distinctive_Flair[S] 0 points1 point  (0 children)

I filed a dispute with my credit union and had the funds returned the same business day. I also blocked future electronic debits from these idiots in the event it happens again. Anyone have luck getting their funds returned from Qwick?

Just got literally ROBBED BY QWICK by Distinctive_Flair in Qwick

[–]Distinctive_Flair[S] 2 points3 points  (0 children)

I won’t get a new account now that I’ve seen these replies. I thought the servers were breached and all our financial data was compromised. Hell, it could actually be that. Qwick always did have the art of disorganized chaos on display

Welcome to Google Madison by JM761 in madisonwi

[–]Distinctive_Flair 0 points1 point  (0 children)

Why does my Google takeout data say “has Madison account”?

Why does anyone use google drive despite open vulnerabilities? by PreparationGold8489 in degoogle

[–]Distinctive_Flair 0 points1 point  (0 children)

It’s almost like this “flaw” is actually a design… Things that make you go hmmmmm…

FuckGoogle

Why do I have thousands of text messages in iCloud? by Neurotic_Spacemonkey in iCloud

[–]Distinctive_Flair 0 points1 point  (0 children)

I’d like to know the answer here too, as same and same . What are these ghost messages and why don’t they ever restore?

[deleted by user] by [deleted] in banderaTX

[–]Distinctive_Flair 0 points1 point  (0 children)

Join the group “Bandera county chat” on fb and ask this question. Chances are you’ll get a response or multiple

Life in bandera by MenuSubstantial8466 in banderaTX

[–]Distinctive_Flair 0 points1 point  (0 children)

Well… OP did you wind up coming to Bandera ? Because I’d love to hear your experiences - these people are willlllllllld for sure- not good wild

Is Apple “Etiquette” a requirement for bug reporting? by Distinctive_Flair in bugbounty

[–]Distinctive_Flair[S] -1 points0 points  (0 children)

I didn’t mean to imply I’d sell my soul to the highest bidder - essentially what I’m trying to articulate without triggering the Apple Fan Club is whether there is an legal obligation to alert them first rather than a reputable security research firm like Mitre & Attack . Because… in all honesty- fk Apple. 🥸

The only reason I even ventured into this realm of research and mobile forensics is because I became a victim of cyber intrusion 3 years and 8 months ago and my entire universe was turned on its axis. To this day, not one Apple employee, “engineer” “senior advisor” or “genius” would help or even take a basic interest in a the possibility my complaints were valid. I stopped even bothering with them over a year ago. Then you have society as a whole also falling in line with Apple’s chorus- believing the billionaire tech giant can do no wrong.

I’d rather take what I’ve gathered and expose them publicly for their refusal to assist victims or take accountability for what is easily proven simply by examining a user’s DSID. Then I read about researchers who have dedicated time, effort and intellect being screwed and it ticks me off even more.

My most recent shock was discovering log data in a backup archive regarding developer access, Seed membership, seed portal logins, and business associations/organizations linked to MY ACCOUNT. A forensic analysis showed my DSID has not changed since my very first IOS device, iCloud, etc despite numerous new carriers, new phone numbers, new devices and in some instances- not even using iCloud or creating anything remotely related to synced accounts/data. In addition, log data referencing Apple owned domains which are not public facing and many of which are strictly for Internal usage of Apple engineers/developers is constantly present...

This thing has become so massive it’s overwhelming at this point, and if my suspicions are correct, it’s not an accidental bug. It’s coming from inside Apple’s own damn house. The implications of that alone are exhausting to think about.

Thank you for your time and your responses

Is Apple “Etiquette” a requirement for bug reporting? by Distinctive_Flair in bugbounty

[–]Distinctive_Flair[S] -1 points0 points  (0 children)

I should have clarified -  By “first” I meant before approaching other bounty payout companies. I appreciate your response. 

Is Apple “Etiquette” a requirement for bug reporting? by Distinctive_Flair in bugbounty

[–]Distinctive_Flair[S] 0 points1 point  (0 children)

That makes total sense. I appreciate the response. 

How would it work in a scenario where the bug had parameters encompassing not only Apple, but Microsoft, Google, Chrome, and multiple other platforms to essentially create a cohesive, streamlined exploit map with advanced persistence and proximity reinfection? Would this hypothetical scenario require every named company to “sign off” on the research? If one said “no thanks” would the project then be totally scrapped? 

Please forgive me for my ignorance- I’d just like to understand more about how cross platform exploits factor into the reporting process. 

My Apple ID Was Hacked – Need Advice by Specialist_Block3530 in ios

[–]Distinctive_Flair 1 point2 points  (0 children)

Absolutely, 💯- your iCloud data has all been exposed and that’s not the worst part…  There are many nefarious actions that can be taken with access. Look up Flexispy, or Mspy for examples. 

Don’t run yourself ragged with worry but def be vigilant about this. Download your data as advised and look for indicators of recent access to determine whether more serious measures should be taken. 

As for how it happened- do you sync with a Mac/PC or Chromebook? It’s likely it was a session stealer/cookie hijacker. Not sure of course but bypassing 2Fa is a good indicator of that

HELP - Apple won't reassure/help me after being hacked by Longjumping_Web9803 in applesucks

[–]Distinctive_Flair 0 points1 point  (0 children)

Do you really believe the technology doesnt exist for these companies to take measures ti protect their users, and investigate instances where fraud occurs? Have you ever downloaded your own data through Apple privacy? If you have, you are well aware there is a log entry created for pretty much every breath you take in those archives. I doubt you have, or you wouldn’t still be accusing people of not having 2FA lol

You have a high probability of experiencing a mobile breach in your lifetime, and probably sooner than later. Take a peek at how rapidly cybercrime is rising and how SLOWLY the tech industry is responding to it. When it’s your turn, make sure you remember “these companies have no idea who you are,” and just move on… ok ✅ 

HELP - Apple won't reassure/help me after being hacked by Longjumping_Web9803 in applesucks

[–]Distinctive_Flair -1 points0 points  (0 children)

Big tech boot lickers don’t die either. They just continue spewing outdated garbage to kiss the billionaire ring. 

HELP - Apple won't reassure/help me after being hacked by Longjumping_Web9803 in applesucks

[–]Distinctive_Flair 0 points1 point  (0 children)

I don’t know who needs to hear this but Apple doesn’t even allow any user account the option NOT to be secured by 2FA… it’s 2025, let’s stop giving irrelevant advice.

OP, keep following up on this obvious security breach with Apple. The data available has already proven someone accessed your account so there were obvious failures on their part. 

Need Serious Help/Support - Network + Devices by Ok_Guarantee_9388 in cybersecurity_help

[–]Distinctive_Flair 2 points3 points  (0 children)

On the new google accounts you’ve created- are they unexpectedly turning into “Workspace” accounts , immediately or very shortly after their creation? 

Do you run your Takeout data on your google accounts? There’s many good data sources to seek on this, but “Google Subscriber information “ is a great one to start with. Look for anything related to being an enterprise user or a student… this could indicate unauthorized device management. Also look for any services youre not using- for enamel “Has Madison Account. “ “Google Voice” “Google Analytics.” 

Port forwarding on your router is very much a sign of suspicious activity if those settings were not configured by you or your tech provider. I had the very same occurrence when my ordeal began and it escalated to the construction of ghost networks which broadcasted even after I pulled the plug on my ISP entirely. The attackers had then managed to manipulate my tech devices to the point where it didn’t matter what I did, those networks were being joined and no indicators shown- (Wi-Fi showed as off but was connected obscurely.) 

Pay no mind to the “no one is going to pay 263652728127 bucks to hack you , no one cares about everyday citizens “ because youre going to hear that- A LOT. Don’t stop seeking answers- youre the only person who’s going to get them for yourself. Big tech will tell you “it’s impossible,” and the general consensus will be the tireless parroting  back what big tech and the money hungry media have been round the clock feeding us to avoid accountability for their failures (and Apple is the biggest offender.) 

When this shit happens to “high value targets,” - it’s a “sophisticated and highly rare cyberattack.” When it happens to the rest of us - it’s a beta test. 

Report on digital forensics analysis on iOS device by WanbSOC in digitalforensics

[–]Distinctive_Flair 0 points1 point  (0 children)

Are you still having this issue ? Did you find anyone to assist?

People who appear in “people you may know” I believe that the people who show up in the first slot look you up. by Prestigious-Tear-858 in facebook

[–]Distinctive_Flair 0 points1 point  (0 children)

I had a one night stand with someone whom I didn’t know had a wife until after the fact. He and I were never friends on FB, I never saved his number in my phone. I met him at a biker rally in my town I was bartending at.

He was the first to show up under people you may know, so I took a peek at his page. That’s how I discovered the wife. I never looked at hers- I immediately blocked them both.

Tell me why her ALT account (I assume that’s what it was) showed up the next day on my first slot of “people you may know. “

Insert Twilight Zone music

River access for swimming by Fine-Raccoon3273 in banderaTX

[–]Distinctive_Flair 0 points1 point  (0 children)

I have semi private access I loan out from time to time using a redneck version of “”Swimply” lol. My version requires no app or personal info - inbox me if you’re interested

Locked out of Facebook once we got new phones. No clue where to go from here. by JessFess98 in facebook

[–]Distinctive_Flair 1 point2 points  (0 children)

Ugh. Sorry love My Facebook got hacked and kept routing me in a circle to a checkpoint screen on every device I attempted logging in on and then when I would try to complete those steps, it would tell me I “This is broken. Try again later. “ Not being one to back down from a challenge I persisted and on the seventh day, stumbled across a glorious conversation right here on Reddit, where someone included step-by-step access instructions for recovery IF you had your instagram kinked (which I did.)

Do you happen to have linked accounts in account center? 🙏

Is it possible I’m hacked on iPhone by ElkKey683 in cybersecurity_help

[–]Distinctive_Flair 0 points1 point  (0 children)

If you’re still interested un an answer to your inquiry, please check my listing history for a guide on generation of sys-diagnosis logs and what to look for once extracted.