18 December 2005. E-gold.com and Omnipay.net (which redirects to Omnipay.com) are back online. NSI provides information on omnipay.ORG which shows the same address and telephone number as those for of e-gold.com.
17 December 2005
In September 2005 an unknown party transferred to Cryptome's E-gold account $11,800.00:
From: <SCIRobot_donotreply@e-gold.com> To: <jya[at]pipeline.com> Subject: Notification of e-gold payment via SCI Date: Mon, 12 Sep 2005 15:16:50 -0400 The account 'Cryptome' - #101771 has been paid via e-gold shopping cart interface (SCI) : Payment Amount: 11800 USD Gold (Metal ID = 1) e-gold batch number: 48775986 Payer e-gold account #2368768 Ounces (Troy) paid: 26.233882 US Dollars per Ounce: 449.80 Payment Hash: A621E3FC11B712B8FBDFF98CBAE3D679 Payment Receive Fee (ounces): 0.001608 Timestamp (GMT): 1126552610 Version 2 Payment Hash: DE5A6E1F59E99AE304A688A204DEE97C (This mail automatically generated).
Cryptome heard nothing from the unknown source (an unrecognized name (perhaps fake) is listed with the payer e-gold account).
Cryptome does not receive contributions like this. In 9 years there has been only one other largish for less than half this amount and that source was known to Cryptome. Most are $25 for the CD and DVDS, with a few for more for $50 to $100. The site is mostly funded by Natsios Young Architects, with small contributions paying for less than 10% of the cost.
So the "donation" was first seen as a spoof which would soon disappear, another of the E-gold and PayPal spams and subterfuges received weekly, but it didn't.
Then it was seen as a ploy to induce Cryptome into participating in a honey-pot transaction, perhaps a bribe, a lure into receiving more than $10,000 that would have to be reported to the US government. Or a way to get a hook into Cryptome for future exploitation or smear.
After 2 months with the funds sitting at E-gold, to test their legitimacy and to see what would happen (or may yet happen), Cryptome attempted to convert the E-gold amount to US cash by using a conversion service, R.L. Wahl/Tampa Exchange listed on the E-gold website and which had converted small amounts for Cryptome previously.
This attempt which led to a bounced check and eventual receipt of a good check is recounted here:
It is unclear what the funds were for. Cryptome would be grateful for a genuine contribution but is cautious about being bribed, entrapped for future exploitation, or being co-opted with the dirty journalists, bloggers, websites, spooks, advertisers, stock market advisors and defense contractors. Maybe for millions, but not only for $12K.
The funds are still in the bank but are subject to confiscation, mysterious loss, cancellation, or theft.
Readers are asked for suggestions on how to handle this boodle. Send to jya[at]cryptome.net for publication, anonymous if you wish.
Ponder Part 2 and the USG's aggression against financial institutions and manipulation of information sources worldwide.
In the past few days reports have begun to appear on the bulletin boards about some online financial services being in trouble, E-gold among them.
Cryptome still has a few dollars in E-gold and decided to take a look today. Surprise.
At 4:45 PM today an attempt to log on to www.e-gold.com produces an error message:
www.e-gold.com could not be found. Please check the name and try again.
NSI lists E-gold.com:
A trace of the four e-gold servers produced four similar reports:
================================================== === VisualRoute report on 17-Dec-05 4:42:58 PM === ================================================== Real-time report for NS1.E-GOLD.COM [22.214.171.124] (40% done) Analysis: IP packets are being lost past network "126.96.36.199" at hop 15. There is insufficient cached information to determine the
A telephone call today at 4:45PM to E-gold's only listed telephone number,
1.321 956 1200, produced a
At 4:55 PM today an attempt to log on to the OmniPay.net produces an error message:
www.omnipay.net could not be found. Please check the name and try again.
NSI lists omnipay.net, with no contact information:
Domain Name: OMNIPAY.NET
A trace of the two omnipay.net servers produced similar reports:
================================================== === VisualRoute report on 17-Dec-05 4:59:53 PM === ================================================== Real-time report for NS1.G-SR.COM [188.8.131.52] (30% done) Analysis: IP packets are being lost past network "184.108.40.206" at hop 15. There is insufficient cached information to determine