- Editor Rating
- Rated 1 stars
- Really Bad
- Reviewed by:
- Published on:
- Last modified:
- LegitimacyEditor: 0%
BitcoinMining (bitcoinmining.me) was launched in September 2015 providing Bitcoin cloud mining services. The website is awfully similar to the one of TeraBox (terabox.me) previously featured here (and a confirmed scam). The company’s legitimacy has been evaluated based on the items listed below. Every individual item has been checked for the presence of obvious red flags or warning signals. If these are present, an explanation detailing what triggered them has been included. A detailed description of the reasons to evaluate each of the included items can be found below the table.
|Total Flags: 14 (3 Warnings = 1 Flag)|
|Phantom Riches||The website advertises the "largest profits" and "fastest return on your investment"|
|Social Proof||Referral program awarding 10 percent commission. For a normal business this would represent a heavy blow to the profit margin, as it is paid directly from revenue and costs would still have to be subtracted.|
|Reciprocity||Users can get a free 1000 GH/s trial upon signing up.|
|High Return / Low Risk||BitcoinMining's rates at the time of writing (0.00044 per GH/s) imply that an investment could be earned back completely in just three months. Taking into account the option to reinvest, it would imply an unrealistic and unsustainable annual rate of return of more than 1,500%.|
|Overly Consistent, Positive Returns||N/A|
|External Risk Insurance||N/A|
|Public Mining Address||No|
|Pictures of Mining Equipment||None|
|Secretive or Complex Equipment||Users buy GH/s lacking any significant description of underlying equipment. At best, the website features vague and meaningless descriptions such as "very cheap electricity with efficient custom made mining hardware along with modified mining software".|
|Website Registration Details||Registered September 23 2015, for a period of just 1 year.|
|Website Design||The website is almost a copy of another scam called TeraBox. Graphically the design features many similar elements, but the strongest evidence is in the text. There are almost no differences between the FAQs, and the homepage features many exact duplicates. The terms and conditions are missing as well.|
|Grammar on Website||Good, but duplicated from TeraBox (see Website Design).|
|Payments Options||Bitcoin only|
|Service Disruptions & Unbusinesslike Conduct||No terms and conditions (no legal basis for doing business). Reinvesting is strongly encouraged (there is even an option to do so automatically).|
|Contact Information||No contact information (address or telephone number).|
|Verified Address||The address could not be determined due to a lack of information. The website registration details have been hidden (whois privacy protection).|
|Verified Owner||The owner could not be determined due to a lack of information. The website registration details have been hidden (whois privacy protection).|
|Business Registration||At the very least a country of origin is required to find a business registration, but even this could not be determined.|
Note that items with a warning instead of a flag indicate that these could occur at a legitimate company. For example, legitimate companies will normally try to persuade you into buying their products. Multiple warnings will, however, still trigger a flag. A description for the listed items is provided below. This list is meant to assist with identifying obvious scams, and therefore does not provide any guarantees that a company is truly legitimate.
The most common tactic used by fraudsters is called “phantom riches”. By dangling the prospect of wealth such as “big payoffs”, the scam artist tries to get you to stop thinking logically.
Using the fear of missing out, fraudsters create a false sense of urgency with statements such as “last chance” or “only so few available”. This causes people to agree hastily, before even having the opportunity to think about what they’re doing.
Persuasion is more likely when the source presents itself as being credible, expert and trustworthy. Common tactics used by scammers to make themselves look legitimate include using fake websites or hacked emails and pretending to be someone they are not. Alternatively, sources can also be external with claims such as “Warren Buffet has already invested in this”.
Fraudsters take advantage of herd behavior by creating the illusion of consensus or social proof that the investment is legitimate with claims that “everybody is already doing it”, or referral programs in which members encourage their friends and associates to invest as well. This automatically triggers something in the head that says: “if everybody [or someone from the inner circle] wants it, it must be good”.
A business is likely to receive far more of our trust when it provides a lot of free value, because of the rule of reciprocity which causes us to tend to feel obligated to return favors after people do favors for us
All investments carry some degree of risk, so a guaranteed profit is a clear red flag. A valid question would be why an organization would try to sell such a scheme instead of using it to get rich themselves.
High Return / Low Risk
Like a guaranteed return, a high return / low risk investment opportunity also defies the common risk-return relationship. The best advice is an old one: “if it sounds too good to be true, it probably is”.
Overly Consistent, Positive Returns
Cryptocurrency markets are among the most volatile markets, hence the performance of any related product or service is also expected to fluctuate.
External Risk Insurance
The fraudster may present some external risk insurance for the investment in order to add to its credibility. In reality, insurance is only seldom acquired and guarantees typically lack substance. Dummy companies are often used to act as the guarantor or insurer.
Public Mining Address
A cloud mining company must have a public cryptocurrency address in order to participate in the mining process. There is no reason for a legitimate company not to disclose this.
Pictures of Mining Equipment
Cloud Mining companies should be able to provide some pictures of the products they are selling besides any textual descriptions.
Secretive or Complex Equipment
Even in the world of cryptocurrencies one should be skeptical about special competitive advantages without any proper disclosure, or when the information is incomprehensible or incomplete. Too often only the positive elements are accentuated.
Considering the importance of domains and websites in the internet age, there is almost no reason for a legit company not to have one.
Website Registration Details
Very few scam websites survive longer than one year, so domains are generally registered for just one year unless otherwise required for the specific domain. For the same reason, websites created less than one year ago should be considered suspicious.
Amateurish, cluttered and disorganized websites can point to a scam as many scam sites use text and images from legit websites and other sources which may not work together very well.
Grammar on Website
Many scammers have limited English proficiency.
Even though cryptocurrency payment options are logical for a cryptocurrency company, it is also very convenient for scammers as the recipient essentially remains anonymous. The same goes for services such as Western Union and Moneygram. Hence a lack of alternative payment options should still be considered a warning signal.
Service Disruptions & Unbusinesslike Conduct
Especially Ponzi scheme promotors will encourage participants to “roll over” their investment. These schemes are not very fond of investors cashing out, which may lead to difficulties receiving payments and a non-responsive or difficult to reach customer service.
Legitimate companies have very little reason not to list their contact information.
First, you should never hand your hard-earned money over without knowing where it is going. Second, you should do a background check to avoid handing it to a known scammer. Be weary of people without an online identity. Scammers will typically try to hide their identity or conceal their true identity to avoid being easily discovered.
Audits certainly do not root out every instance of fraud, but auditors do have a responsibility to detect errors or fraud in the company’s financial statements.