[Return Home] [Privacy] [About Me] [VE7LEE] [Fraud] [Crypto] [How To Get Rich]
[Whistleblowing] [Why I do NOT give out financial advice] [Passwords Tips] [How to use PGP] [pfSense Why]
Here is my story about why I created this webpage:
I was a successful businessman in the financial business, who had worked hard to build his reputation and credit score. One day, I received a call from my credit card company informing me that my credit card had been used to make several unauthorized purchases. I was shocked and immediately contacted the bank to report the fraud. After an investigation, it was discovered that someone had stolen my identity and opened several credit accounts in my name.
My life was turned upside down as he tried to clear his name and repair the damage done to his credit score. I spent countless hours on the phone with creditors and credit bureaus trying to resolve the issue. The stress of the situation began to take its toll on my personal and professional life. Causing me to retire early before I turned 65.
Despite the challenges I faced, I refused to give up. I worked tirelessly to restore my credit score and reputation. In the end, I was able to overcome the obstacles and emerge stronger than ever before. But I still have to be fingerprinted every few years by local police to maintain my security clearance for the volunteer work I do.
I hope this story helps you understand the challenges that people face when their identity is stolen.
Best VPN for many reasons
Therefore I suggest that you:
Do not use your real name on the Internet or social media,
Make up your own birthday unless it is for income, taxation or other security reasons,
Used HTTPS on web browsers, not HTTP,
Get your credit report and review it annually,
Use PGP encryption like I do, see PRIVACY [click here]
Ted Lee's (mine) personal details were found on the dark web. Causing me to change my credit card account numbers (due to fraud) every two to three years. Next in order to keep my security clearance, I have to visit my local police station on an annual basis to be fingerprinted to be verified that I am NOT the criminal version of Ted Lee. And to be very careful about how I donate money to charitable organizations.
Below are the locations where my personal information was found.
In September 2021, the domain registrar and web host Epik suffered a significant data breach, allegedly in retaliation for hosting alt-right websites. The breach exposed a huge volume of data not just of Epik customers, but also scraped WHOIS records belonging to individuals and organizations who were not Epik customers. The data included over 15 million unique email addresses (including anonymized versions for domain privacy), names, phone numbers, physical addresses, purchases, and passwords stored in various formats.
In October 2020, a security researcher published a technique for scraping large volumes of data from Gravatar, the service for providing globally unique avatars . 167 million names, usernames and MD5 hashes of email addresses used to reference users' avatars were subsequently scraped and distributed within the hacking community. 114 million of the MD5 hashes were cracked and distributed alongside the source hash, thus disclosing the original email address and accompanying data. Following the impacted email addresses being searchable in HIBP, Gravatar release an FAQ detailing the incident.
In March 2020, a massive trove of personal information referred to as "Lead Hunter" was provided to HIBP after being found left exposed on a publicly facing Elasticsearch server. The data contained 69 million unique email addresses across 110 million rows of data accompanied by additional personal information including names, phone numbers, genders, and physical addresses. At the time of publishing, the breach could not be attributed to those responsible for obtaining and exposing it. The data was provided to HIBP by dehashed.com.
In February 2018, the diet and exercise service MyFitnessPal suffered a data breach. The incident exposed 144 million unique email addresses alongside usernames, IP addresses, and passwords stored as SHA-1 and encrypt hashes (the former for earlier accounts, the latter for newer accounts). In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im".
In approximately 2008, MySpace suffered a data breach that exposed almost 360 million accounts. In May 2016 the data was offered up for sale on the "Real Deal" dark market website and included email addresses, usernames and SHA1 hashes of the first 10 characters of the password converted to lowercase and stored without a salt. The exact breach date is unknown, but analysis of the data suggests it was 8 years before being made public.