February 21, 2021

WWH education 20-21. Part 11.Driving from A to Z

Lecture#11 Driving from A to Z 12.02.2020

Lecturer: Payne

(20:14:14) Payne: Let's start.

(20:14:41) Payne: Greetings. Lecture topic: "Driving from A to Z".

(20:15:07) Payne: Conventionally, the act of driving can be reduced to preparing material and transmitting data to a store or service, but in fact there are anti-fraud systems - a real minefield containing a lot of filters of a technical, statistical and behavioral nature. In a broader sense, "driving in" is a collective term of many parameters and actions.

(20:15:33) Payne: It is wrong to rely entirely on the technical part only, because in addition to the "valid / invalid" patterns, the process involves both user psychology and circumstances beyond the control of us or the holder. While not easy to account for, having an overview of the process can expand the boundaries and fill in the gaps.

(20:16:04) Payne: In an area where every detail can somehow provoke financial losses, learning the subtleties in advance and working on mistakes is no less significant contribution to the activity than, for example, good material. The basis of the lecture is the study of the components of the process, prerequisites and causes of failure.

(20:16:44) Payne: Let's talk about the material first.

Of course, living material is one of the key parameters in the work, but this alone is not enough. The card can be limited by limits, technical design or modest balance. The technical side of the issue, as a rule, is learned by experience, and the main variables here are:

(20:17:13) Payne: - Validity. Working material, of course, first of all. However, “validity” does not ensure “immortality” - a huge number of payment attempts, a frankly bad user profile (IP, system), checkers and a suspicious order can ruin the material or, at least, cause various checks, which will be described below.

(20:17:42) Payne: Moreover, already limited material can fall into the hands, with which you can do little, even if it is alive. You can reliably make sure that the card is working only by calling the bank or using specific material like Enroll.

(20:20:02) Payne: Simply put, the basic verification methods absolutely in every single episode should not be trusted, as well as wielding the material like a jackhammer.

(20:20:23) Payne: - VBV and its analogues: MCSC for MasterCard, SafeKey for Amex, as well as alternatives to AutoVBV (automatic processing without a password). In the course of working with VBV merchandise, being unprepared in this matter will become a problem if the material is limited to such a system. However, you can change the password with knowledge of the owner's data, based on the bin.

(20:20:05) Payne: - Probability and speed of chargeback - transaction cancellation. It usually happens automatically immediately, but with the intervention of the owner, the time depends on his activity, the type of notifications about spending (periodic statements, online access, etc.) and the bank's agility: if necessary, for example, if a transaction with VBV, proceedings can sometimes be initiated ...

(20:20:45) Payne: - To a certain extent, the balance can be estimated using the type and level of the card: Debit, Credit; Classic, Permier, Gold, Platinum and so on. It is believed that platinum credit cards are often richer than classic debit cards, but this is more an observation than a pattern, so this factor cannot be ruled out.

(20:20:32) Payne: The above characteristics converge under a common label - the map bin. And certain bins, similar to, for example, addresses, due to the actions of other buyers or fraudsters, can be marked as a risk factor or even be on the black list of stores and antifraud systems. In addition, what works today may fail tomorrow.

(20:21:15) Payne: As you can see, there is a development of events in which outwardly good material becomes a dead weight, therefore, living material is by no means a guarantee of success.

(20:21:55) Payne: Expanding the topic of masking, let's focus on the session configuration: IP address, system, browser.

First, let's briefly refresh our memory. IP address: blacklists, ISP, DNS, ping, ports; system: user-agent, fingerprints; browser: plugins, antidetect, cookie. In addition to what has been said about this in previous lectures, it is worth bringing up some details regarding the current subject of discussion - practice.

(20:22:37) Payne: However, it's important to keep in mind that the then and now settings are not mutually exclusive. And dirty IP addresses, and questionable fingerprints, and even more so the principles of security do not lose their relevance, but only complement the picture.

(20:23:21) Payne: The first is the distance between the zip of the IP address and the zip of the card. For example: if the index of the card is "97401", then the IP address should be searched for as close as possible - 97401, 9740 *, 974 ** and so on. Situationally, if, for example, special heating is used or billing changes, but in general, an increase in the distance affects the attitude of antifraud systems.

(20:23:56) Payne: Alas, the geolocation of IP addresses named by anonymity check sites can be strikingly different from the stores' own information about the customer's location, up to tens and hundreds of miles. This is due to different sources of information, moreover, the databases are updated.

(20:24:29) Payne: These stores often offer automatic filling of some data: ZIP, city, state. Thus, it is better to focus on their performance, where possible - first a check, followed by a search for material with a suitable location.

(20:25:03) Payne: For reference: when choosing a disguise, you should start with an IP address - it's easier than finding pure IP access for a map location. An exception is the search for a specific material (for example, by bin), in this case the order is forced to change.

(20:25:37) Payne: The second is system and statistics. Obviously, we are not alone in shopping. Over time, configurations wear out, overlaps with other fraudulent orders begin to appear, which leads to the need to change characteristics, stores, actions, directions - in other words, to change the "approach".

(20:26:12) Payne: It is not possible to break through a store or service, succeed with an anti-fraud system and wait for delivery - all this is one answer: it’s probably time to make adjustments. This can be a remote desktop (RDP), a physical device (PC, phone), an operating system and other methods that allow you to dissolve in the crowd and not go straight ahead.

(20:26:52) Payne: The field of activity is in constant flux, and in order to always keep your finger on the pulse of events, you need to continue to experiment.

(20:27:16) Payne: And third, the browser. This includes the actions of the client prior to visiting the store. Among other things, many stores automatically check the registration of social networks on the client's email: Google, LinkedIn, Instagram and others. The specific list of sites searched for may differ depending on the anti-fraud system, but the benchmark here is Facebook.

(20:27:39) Payne: Explanation: firstly, various anti-fraud systems note the presence of mechanisms for checking the client's social networks in their arsenal; secondly, in the conditions of using the social networks themselves, there is the possibility of transferring some information about users to third parties, for example, advertisers.

(20:28:15) Payne: It is not necessary to fill in accounts with information and photos, since in a normal situation there is no manual assessment, and with automatic accounts themselves play in favor of the image of a normal client. Also, you can establish the fact of authorization in the browser: https://browserleaks.com/social - an example.

(20:29:00) Payne: Another aspect that positively affects the client's portrait is the imitation of the behavior of an ordinary person. By surfing the net, clicking on relevant (from the perspective of the owner of the material) advertisements and consciously searching for goods or services, one can play along with large analytical companies and advertising managers.

(20:29:37) Payne: The latter will collect information about the user, then, perhaps, through the chain of analytics and advertising, it will go to popular sites, thereby reinforcing the illusion. We specify the actions: choosing local stores, restaurants, clinics, viewing articles, media, well-known catalogs, registering on third-party sites, and so on.

(20:30:22) Payne: Strictly speaking, this will kill two birds with one stone: fill in your own cookies, and imitate the behavior of the average client, so to speak, a hamster user. Obviously, the implementation requires an already configured masking. When all the preparations are done, it remains to visit the desired store, but there is something to pay attention to.

(20:31:00) Payne: The way the customer enters the store is tracked to collect statistics and analyze the effectiveness of a particular advertising integration (from the store's point of view, this is a traffic source). Surely at least once met a survey about how you found a site or service - proof that stores are interested in this. A few examples:

(20:31:24) Payne: • browser home page> store;

• search> store;

• social networks, advertising on other sites, coupon or cashback services, mailings to email> store.

The most unobvious and unexpected ways are an additional stone in the foundation of the entire client's image.

(20:32:03) Payne: Mode of action.

The next stage is behavior in the store or service. Before describing it, it should be emphasized that there is no formula for success - each individual indicator is in limbo and changes depending on the circumstances, services, shops, current settings and the human factor.

(20:32:37) Payne: At the same time, there are a number of popular technical and behavioral patterns adopted by most anti-fraud systems. Let's move on to the description.

A) The first part is general information about the client.

(20:33:04) Payne: - Once again, there is no need to talk about the unacceptability of "copy-paste", because there are other errors in the area of ​​unnatural behavior: chaotic switching between tabs (for example, to use a translator) or amazing awareness Of the "new" client about all the functions and products of the site.

(20:33:36) Payne: - Staying. Long break between registration and purchase to increase store loyalty. Do not break off at the last moment before ordering, having already linked the card, in order to continue from the same place a week later, but copy the adequate behavior of people - studying the range, registering, choosing, comparing.

(20:34:09) Payne: In general, such actions are variable and this includes the whole warm-up scenario. It is useful to learn the following: "holders" are not an abstract term, they are real, ordinary people. One will put himself VBV, the other will not; a third person will go through dozens of sites before buying, or, on the contrary, will immediately place an order.

(20:34:59) Payne: - In the case when the true owner of the material has previously bought something or has an account in a particular store, the chance of selling the material in it decreases in proportion to a number of factors: the owner's activity, his account in the store, used by him billing & shipping.

(20:35:26) Payne: When the owner made purchases in a local store, on the Internet without registering, or long enough for the time interval between the creation of the old and new accounts to look natural, chances remain.

(20:35:58) Payne: On the one hand, the customer's knowledge of offline purchases says little about his online activity, and the personality without registration is not so pronounced, but if it took place, forget about the account of a particular store or its data , in principle, a matter of everyday life, especially over time.

(20:36:40) Payne: On the other hand, the activity itself plays a role: the dates and frequency of the last visits, the type and amount of transactions, a selection from the assortment. Obviously, a parallel session with the real owner or teleportation between cities in short periods of time is something out of the ordinary.

(20:37:16) Payne: - A sharp change in preference from detergents to laptops from the point of view of an extremely sensitive bank, alone or together with other details of the order, can affect the request for verifications and the life of the material in general, since its customer information is deeper and more comprehensive than the store's anti-fraud system.

(20:37:58) Payne: A simple example: the owner of the material in recent months has only bought groceries and clothing in stores or paid bills - in short, satisfied domestic needs. And then, one day I fell for the conditional Rolex on the Internet. It is very likely that if the card is not blocked, the bank can at least suspend the transaction.

(20:38:30) Payne: B) Customer technical data.

(20:38:36) Payne: - Purchase method. In most stores, it is possible to place an order with the registration of an account or a "guest". Yes, the account will be assessed as recent, not to mention the possibility that the owner of the material has his account in the store (mainly if it is popular). On the other hand, the fact of registration can add loyalty.

(20:39:11) Payne: Plus, a guest without an account is, in a sense, also a new, unverified user. In other words, one or another idea of ​​the client cannot be avoided, therefore the result depends on the mood of the anti-fraud system and the totality of all the details. Conclusion: it is pointless to get hung up, you need to strive to improve the general opinion.

(20:39:59) Payne: - Payment method. Elapsed time since binding, number of cards, billing addresses, payment attempts, changes in personal data; used promotional codes, gift certificates, filling the basket or "buy now" - all this to some extent gives an impression of the client.

(20:40:44) Payne: Paying on the tenth try or the third linked card will cast a shadow, a promo code or a discount for mail left for mailing can contribute to the result. In practice, it is necessary to act within the limits of the norms of behavior - "special" actions stand out against the background of the average buyer. Typing is okay, copying and pasting your own name is not.

(20:41:46) Payne: - Order by phone. Some stores provide an opportunity to place an order through an operator by phone. It happens that the client, due to technical problems, cannot use the site and turns to support, which independently enters all the information. The store's anti-fraud system does not evaluate the customer's prints, but the method itself is costly and suspicious.

(20:42:06) Payne: C) Order characteristics and customer personal data.

(20:42:31) Payne: - Product category and price. Certain positions and price thresholds in stores can be treated with increased attention and the anti-fraud system filters can be adjusted accordingly. It manifests itself in the form of a more serious assessment, verification, manual verification. For example: gift certificates (gift) or a particularly expensive product.

(20:43:06) Payne: - Coincidence of characteristics with other orders. First, it allows you to recognize a client or detect multi-accounts; second, to compare the order with fraudulent precedents. The signal can be: fingerprints, bins, e-mails; personal data such as addresses.

(20:43:33) Payne: Crossing multiple parameters with fraudulent orders will increase the risk, almost complete match is a fatal error, and the similarity or identity of individual elements will signal the participation of the multi-account owner. It also works in the opposite direction - according to the principle of the average buyer.

(20:44:16) Payne: - If you do not go into technical details, the processing of personal data by stores and services, according to formal doctrines, is needed to collect statistics and issue relevant advertisements, although in fact it is used for intrusive advertising tracking, selling data and tracking.

(20:44:35) Payne: But this coin has another side, the research value of which coincides with the interests of the lecture - analyzing the participation of data in customer identification and transactions. A prominent place here is occupied, in particular, by the billing and shipping addresses of the client, that is, personal and delivery.

(20:45:12) Payne: 1. The first is verified by AVS (Address Verification System) - a verification system that compares the billing address used with the client's data in the bank file. Provided in USA, CA and UK and allows you to at least indicate a security risk in case of address mismatch - validation failure means incorrect card information.

(20:46:07) Payne: Mostly, a data error is the result of a method of obtaining material, in which the source is the owner himself, like phishing or sniffing, although there are also loss of relevance and technical failures. You can dispel suspicions, check or correct the defect like this:

• an attempt to find information in the public domain, for example, social networks;

(20:46:44) Payne: • refer to the "puncher" on the forum or use services - whitepages and analogues;

• material of the "business" type, where billing in most cases corresponds to the work address, and purchases are made for the purpose of the company (there may be some nuances).

(20:47:21) Payne: 2. Shipping, in turn, is the competence of the anti-fraud system and shows: identity with billing, and therefore with a bank file; use of blacklisted addresses and location. To check AVS, billing is enough, which implies the ability to work on different addresses.

(20:48:06) Payne: Continuing in this vein, in comparison with orders for a work or alternative address, specifically consumer goods (clothing, popular electronics, etc.), customers are much more likely to buy at home, in most cases the same with a bank file.

(20:48:43) Payne: Thus, different addresses reflect "work for different bill / shipps" and give rise to suspicion, since even without that from a relatively small sample of orders with this property, fraudulent activities are often encountered, for example, when using intermediaries or drops.

(20:49:07) Payne: Suspicion doesn't necessarily translate into action, though. An order for a work or a relative's address fits into the framework of what is permissible, though not without exceptions: firstly, some stores may be critical of such orders; secondly, purchases for different billing and shipping are less, the greater the distance between them.

(20:49:45) Payne: The latter is easy enough to understand: people tend to work closer to home, and orders, for example, in their own or a neighboring city are much more than in another state, not to mention another country. In addition, comparison is possible not only in relation to address locations, but also taking into account the IP address map.

(20:50:30) Payne: Accordingly, as the distance increases, the chance of selling the material decreases, and if the real owner can insist or verify the order, then from the point of view of a third party this is additional costs in the form of ringing, warming up, breaking through the necessary information and time, for which one cannot always be prepared.

(20:51:03) Payne: If you can't find the key to the tactics of different addresses, besides the above, there are the following options:

• order for billing with the purpose of further redirecting the parcel or stopping it at the post office (reroute, pickup);

• search for stores with a qualitatively lower level of anti-fraud systems and / or illiquid goods;

(20:51:34) Payne: • special warm-up (“I want to order a gift for a friend”);

• enroll with the function of changing the address, which can also help with incorrect billing;

And the extreme is to avoid AVS entirely. Quite special cases, but in short: working with digital goods, payment systems and banks where address speculation is not required, as well as countries without AVS.

(20:52:13) Payne: Reactions. Suppose the order is completed and it remains to wait for news from the store or service.

(20:52:33) Payne: With rare exceptions, the universal responses of stores and services to customer actions are as follows.

1. Confirmation. Conditionally positive and contains two options:

(20:52:46) Payne: a) primary. A notification about the formation of an order, figuratively speaking - the creation of an order that has yet to be processed.

b) actual. The request has been processed, and the funds have been authorized or debited. You need to wait for the order to ship

(20:53:20) Payne: It is possible to distinguish one from the other in a particular store only empirically, therefore, as soon as you see "Order Placed", it will be hasty to share the bearskin - confirmation remains intermediate. The primary can be followed by cancellation or verification, and in the case of the actual material die.

(20:53:55) Payne: 2. Decline - instant refusal to conduct a transaction upon payment, even before the order is formed. Causes of occurrence in order of increasing probability:

• a source on the side of a store or service: excessive vigilance or technical problems;

(20:54:22) Payne: • reaction of the anti-fraud system. Reflects the highest degree of customer distrust? it smells so bad that it is not allowed to form an order;

• problems with the payment method. In addition to being invalid, it includes insufficient balance and various restrictions or limits in the bank's area.

(20:55:02) Payne: 3. Cancel - notification of the refusal to conduct a transaction after the order has been formed. A similar list:

• the store authorizes funds after placing the order and, thus, may mistakenly accept defective material (empty, with limits, etc.);

(20:55:25) Payne: • death of the material after the order, for example, due to the reaction of the owner or the bank;

• negative response of the anti-fraud system. Not only automatically, but also as a result of manual verification by the operator or contact with the owner of the material.

(20:56:07) Payne: 4. Client verification.

(20:56:24) Payne: For reasons of lack of trust, harsh store policies due to deplorable statistics or, in a word, "delayed", as well as due to a special attitude towards certain categories, for example, electronic goods or high value items can verification should be requested in the following forms:

a) photo of the card with which the payment was made. Usually it is allowed to leave only the last 4 digits of the number, covering the rest with something;

(20:57:00) Payne: b) a request to contact support by phone "to clarify details" (the request comes to the mail from the order, they rarely call without notification). During the conversation, they will ask leading questions or wish to confirm the identity of the client with information from his life (Background).

(20:57:25) Payne: For example, the make and year of the car, past jobs and addresses - this and the other is similar to billing, and for a call you can contact the call service or use SIP. Depending on the store, this item may indicate incorrect billing.

(20:58:01) Payne: c) It should be noted that the issuing bank can act in a similar way: requesting confirmation of the transaction via the owner's email or blocking the card before contacting support. At the same time, under normal conditions, there is no access to his mail, and to call the bank, more often information is needed more difficult to access than the store.

(20:58:46) Payne: The request from the outside looks like decline or cancel, while blocking is, in fact, the death of the card. This is not the most common scenario, so there is no point in getting stuck in a loop, however, if in doubt, you can attend to it in advance by carefully creating a disguise, using less sensitive jars or special material.

(20:59:33) Payne: Moving on to services, companies from the business relations segment - exchanges, some exchangers, payment systems and bookmakers - adhere to the so-called KYC principle (Know Your Customer, know your customer), legal norms for customer identification to prevent money laundering, tax evasion, etc. At best, you will need:

(20:00:09) Payne: • SMS confirmation of the phone;

• bank statement;

• photo of the identification document: passport (ID) or license (DL) in various variations - spread, several pages, from different sides and angles;

(20:00:36) Payne: • personal photos with documents;

• proof of address: photo of registration in the passport, receipt for payment of utilities not older than n-months.

(20:01:04) Payne: At worst, it can go down to video recordings, live video conferencing, and even office visits. Half of what is touched upon can be drawn, for the other half will require dummies and verification services for drawing or real documents, depending on the situation. One way or another, these services can be found on the forum or implemented independently.

(20:01:48) Payne: The last stated verification method is used by both shops and services - requesting transaction data, for the issuance of which you will need access to the personal account of the card (enroll) or a call to the bank:

a) ID-number of the transaction or comment to it;

b) the exact size of a microtransaction sent or authorized by the service, as a rule, in the range of 0.01-1.99 - commonly called "miniki".

(20:02:30) Payne: Note: stores and services have common scenarios for requesting information, and sometimes they involve third-party companies conducting verification. So, having collected statistics, you can assume the necessary measures - breaking through information, drawing and so on.

(20:03:04) Payne: Let's summarize. In light of all that has been described, finding a working bin or a store does not mean winning the jackpot. It may seem that the lecture material exaggerates the colors, but this is not entirely true. The lecture focuses on what can go wrong, in which direction to look for potential errors, and generally summarizes the data within a single process.

(20:03:38) Payne: That's all. If desired, feedback on the lecture can be sent here: https://wwh-club.cc/index.php?threads/otzyvy-o-pejn.95690/

Moving on to the questions, put "?"

(20:04:13) yarah4: so basically, if I do this, am I following the teaching here? :

* go to shalom.ninja, buy CC with 123 zip code (x in Florida)

* go to socks.bz, buy socks in or very close to 123 zip code (in Florida)

* login to newly made social accounts on browser in VM, using socks from FL.

* warm up shop the way you guys taught us

* find a drop in Florida

* make shipping info to his place

* after 30mins warm up, make 200-300 dollars clothing order

(20:04:32) yarah4: * also will we see live session from you guys? or we should start ourselves now? thanks

(20:05:50) Payne: On a different billing and shipping addresses? Well, yes, but you may face some problems with this type of work. What to do is described in this lecture.

(20:05:59) panacashe: Today there was supposed to be a lecture about Android, I was really looking forward to it.

(20:06:29) Payne: Not in charge of the schedule. Sooner or later, there will undoubtedly be.

(20:06:41) AK-Baks: 1. It turns out that we have now sorted out the moments that can go wrong?

2.If you make small transactions to buy goods in a store, say, illiquid stock up to $ 400, will antifraud start up?

(20:07:05) Payne: 1. Including.

2. Depends on antifraud. The amount does not guarantee anything, alas.

(20:07:26) Koba787: koba in shock

1 - that is, buying Gift, on the contrary, increases the attention of anti-fraud?

2 - are we talking about different beats / thorns again? but how to register the drop address if it cannot be registered? already confused with this beat / shield

3 - did I understand correctly that if the address is correct (it is it that AVS checks), then you can write another spike address? I say adequate in terms of distance

4 - When buying, if you use Gift from this store - does it soften AF or alert you?

(20:09:39) Payne: 1. Of course. One of the most extreme forms of activity in this area.

2. It is possible, but it was mainly said about what to do, if it does not work out simply to "register" it.

3. No, not connected. The accuracy of billing is one of the checks of the legitimacy of a transaction as such. Conditionally as a CVV check.

4. Making Gift the process is much easier than driving it in. There is a lecture on Gift.

(20:10:36) yarah4: yes, you described going to FEDEX / UPS, then re-routing the order to our shipping address of the drop, is that sufficient?

also, looking at the coming topics, it's going to all talk about different stuff like paypal, banks, hotels etc., so is this information enough for us to start or we should wait to learn more?

(20:12:02) Payne: 1. I described like 7-8 options what to do. Please reread lecture.

2. Better wait. You will know more details about work with shops and services.

(20:12:22) goldenbaum: 1. Is it possible, for example, if we order a beat - a thorn. Having received a track number for example the same UPS. Call UPS and, using knowledge of the owner's data, or call to change the address of the parcel on the way?

2. Asked a question. I want your point of view. It is logical that driving from an application on an iPhone through a router configured for socks increases trust? Or so-so theory?

(20:14:25) Payne: 1. There is a lecture on the rearout / pickup. It's not a fact that you can just call yourself, but dialing is doing it, yes.

2. Right, it raises. It's about the phone itself: mobile devices are generally more favorable than desktop devices. With an iPhone, in particular, it's a disaster, because on it you can't walk around with a change in hardware characteristics and a substitution of parameters, as on an android. Only dances with a tambourine, jailbreaks and more.

(20:14:42) Izolentna: How often does it happen that you have to bypass vbv? From the samples of my friends, they constantly got a confirmation code. What is the point then, since 3D costs almost 90 percent of the cards? To score and search for leaked cards without them?

(20:14:58) Izolentna: litter for stupid questions. really not clear in this regard

(20:15:38) Payne: Not often. Many stores and banks with bins do not have vbv, moreover, you can purposefully work with non-vbv merchandise.

(20:16:41) Koba787: Without a reroute and a pickup and enroll - in general on a different beam-spike - it makes sense to beat or the topic is dead conceptually

(20:17:17) Koba787: is it easier to buy a product with adequate behavior than a gift? Then why are newbies offered to start with Gift?

(20:20:16) Payne: 1. It makes sense, at least for tests. And of course, there are people who are actively working. Don't take talk of dead topics seriously - only a specific store or service can die.

2. The product is simpler. Why? Perhaps the question should be directed to the one who proposes it. I'm not suggesting :) Probably for my own reasons.

(20:20:39) IB $ integral: Do I understand correctly that, in fact, the roller significantly increases the probability of a successful drive because of the beating = spike and the ability to check minikis?

(20:20:17) IB $ integral: Simply speaking, relatively speaking, 1 roll is equal to 10 cards in terms of the success of the drives?

(20:20:46) IB $ integral: Possibly clumsy, I have an understanding. Just would like to confirm soon

(20:22:13) Payne: 1. No, by itself it does not increase, but it provides a greater understanding of the material and the amount of information - that's what increases. This, in turn, allows you to find other ways to implement the material. And about minikis: not the most frequent guest.

2. No. However, if you declare that 9 out of 10 cards will be dead and one single roller is alive - yes. But you do not take into account that these cards can be alive, and on the contrary, it can take 10 cards to create one roller, so they are applied in specific directions, and not for each drive. In other words, for specific purposes. Plus an anti-fraud store system ...

(20:22:38) Izolentna: That is, should we reroute at the moment when the staff is already on the point? Or just ask to pick up the drop from the delivery point? Or do all sorts of variks work and just test and test everything?)

(20:23:28) Payne: 1. When already walking. 2. Pick up - pickup, another scheme of work. 3. All sorts of variki work, you can put it that way.

(20:23:32) yarah4: you mentioned to look for "less popular" shops, does that have a visitors range? like less than a million visitors per month? 1-5m? less than 10m? thanks

(20:24:12) Payne: ~ 500k-1m

(20:24:20) IB $ integral: I understand that there will be a separate lecture on the video, but you can list these "specific directions"

(20:24:59) Payne: Billing changes, bays, services with mandatory verification, large balances.

(20:25:51) Koba787: So there will be details of how the reroute is done and with what?

(20:25:52) yarah4: can you give us free socks and CC? ?? just kidding thank u

(20:26:44) Payne: Koba787 There is a related lecture topic. Again, I'm not responsible for the schedule. You can find the approximate group in which she appears in the training topic.

(20:26:50) Payne: lectures *

(20:26:58) Izolentna: ????

I thought, and many, too, perhaps. Today we thought it would be driven. In terms of how it all happens, and we'll see. This will not happen? : D

(20:27:24) Payne: It will.

(20:27:45) AK-Baks: After training?

(20:28:33) Payne: This is one of the lectures. Don't overstate your expectations by driving in - a common online purchase with a couple of additional actions like connecting an IP address. Have you ever ordered a pizza? :)

(20:28:53) Koba787: Payne: her delivery address was not changed))

(20:30:31) goldenbaum: iPhone question. Why change the hardware characteristics to change via jailbreak. they essentially have 4 models. Or do you need to pick the serial number if it is marked on af?

(20:31:36) Payne: The idea is correct, but the identification data is nevertheless there, the same unique advertising number, the SSID of the networks, and even the serial, if they get access to it. Dig a lot, believe me.

(20:32:22) goldenbaum: Got it. Looking forward to a lecture on android then. does she seem to have it?

(20:32:42) Payne: Yes.

(20:33:11) Payne: Ok. Since there are no more questions, thank you for your presence and good luck. See you.

Don't forget that we have a private channel with the most up-to-date information and material, please contact our support team @ouhom2 to enter