Defcon 32 : $10k Giveaway by Darknet Market Archetyp was a SCAM - Here's Why...

Defcon 32 : $10k Giveaway by Darknet Market Archetyp was a SCAM - Here's Why...


7,294 views Aug 14, 2024 #darkweb #darknet #darknetmarketDefcon 32 : $10k Giveaway by Darknet Market Archetyp was a SCAM - Here's Why...
The Archetyp darknet market hosted a scavenger hunt at DEFCON 32, one of the most well-known hacking conferences in the world. The event, announced late into the conference, promised a $10,000 prize in Monero for finding three hidden QR codes across Las Vegas, including areas like Caesars Palace, MGM Grand, and the DEFCON 32 venue itself. The challenge seemed exciting at first glance, but in reality, it was a nearly impossible task due to the complexity of the requirements, such as cracking encrypted hashes to locate the codes.

Participants had only 24 hours to complete this daunting challenge, which involved searching through a massive area with little guidance. The odds were incredibly low, making it almost certain that no one would win the prize. This led to speculation that the event was more about generating publicity for Archetyp rather than offering a fair contest. The market’s approach to the scavenger hunt raised ethical concerns, as it seemed to exploit participants' time and effort for their gain, without providing any meaningful chance of success.

This event also highlighted the complex relationship between DEFCON 32 and law enforcement, as the conference has increasingly become a space where federal agencies are present and involved. The involvement of these agencies in hacking events has caused some unease within the community, adding another layer of controversy to the already contentious scavenger hunt.

Overall, the Archetyp scavenger hunt serves as a reminder that not all challenges in the hacking community are as they appear. It's essential to approach such events with caution, keeping in mind the potential for exploitation and the underlying motivations of the organizers. As the community evolves, there is a growing need for transparency, fairness, and ethical considerations in the planning and execution of these events.

☆--—☆--—☆--—☆--—☆ Transcript ☆--—☆--—☆--—☆--—☆

Introduction
0:00
What's up everyone? I hope you're doing well today. Today we're going to be talking about Defcon and a darknet market
0:07
called Archetyp Many of you are already pretty familiar with Defcon,
0:12
which is my personally my favorite hacking conference in the world. I do find that with each year that goes by, it seems to get a little bit more
0:22
corporate, I think. but that's, completely different issue for another day today.
0:29
Today, specifically, the actual topic is going to be a scavenger hunt that was actually sponsored by Archetyp.
0:37
Notice of this was on August 9th. Defcon had basically already been going on at this point, for a while.
0:47
it actually started on the eighth. The announcement basically announced that the next day, on the 10th,
0:54
the contest would begin. At that point, you're already 48 hours into the Defcon conference itself.
1:03
And this might not have actually mattered if Defcon had lasted a week or more.
1:10
But this just isn't the case. That's not how long the conference actually goes for. This basically meant that the contest
1:17
would be held for 24 hours and then that was it. The post also mentioned, you know, something about cracking encrypted hashes.
Archetype's Role and Responsibility
1:27
Initially, it wasn't really clear what this actually meant. However, a post by Archetyp contained a signed PGP message
1:36
letting people know that there were actually running this event like they were the ones that were responsible for it.
1:45
At least that's what I got from it. In actuality, they said that they weren't the ones that were actually, quote
1:52
unquote, organizing the event and that instead they were just overseeing it.
Anonymity and Accountability in Darknet
1:59
I have a real issue with this, pull, of all the, you know, beautiful things about the darknet
2:06
and its people is that, you know, anonymity allows you to typically be much less superficial
2:14
if you're anonymous, like, I can't judge you for the clothes you wear or the way you speak or how much money you have.
2:21
If I can't see you. Right. and This leads me only to be able to judge you based on things like how you act,
2:29
where you respond to how articulate you are, and the level of intelligence that you actually have because you demonstrate it.
2:36
Now, with that in mind, imagine a pilot claiming that they didn't actually fly the plane.
2:42
Instead they just observed the flight. It makes absolutely no sense, especially when they're the ones
2:49
that are actually finding the prize, or they're trying to keep the appearance of control while avoiding any real responsibility whatsoever.
2:59
And this way, they could try to dodge when people point to how just absolutely ludicrous things really are with this.
3:08
It's not anyone else's scavenger hunt. This is apparent by many things, including the by the sign TGP message.
Archetype's Attempt to Sidestep Blame
3:16
And my point of view, the whole idea of overseeing which I would actually organizing is really nothing more
3:23
than like a week in desperate attempt to try and sidestep blame in case anything happens to go wrong, while remaining in a position
3:32
where they get tangible value from their name actually being used.
3:38
And many people think that the darknet is just like the wild, wild West. And, you know, initially it kind of has that appearance, so I get it.
3:47
But it is still the ability to actually verify clarifies and promotes accountability in this space.
3:55
And it was very cool or at least interesting
4:00
to see, like this way of promoting themselves, like many darknet markets, compete really hard
Publicity in Darknet Markets
4:07
to actually be able to get good publicity in one way or another.
4:12
for example, there's a darknet market named Black Spurt, and it was considered a successor to Hydra.
4:19
They ended up getting their market on a billboard or two in Russia. And how they did it was, you know, no one really knows by hook or crook,
4:27
meaning like I personally am not quite sure if they actually paid to have it
4:32
put up there or, you know, acted like they did. My point is that coming up with,
4:38
you know, innovative PR for darknet market is something you see in many successful markets,
Difficulty of the Challenge
4:44
So I'm sharing this video with you to really discuss the odds, of accomplishing this challenge, even just to begin with.
4:54
But before we actually get into all that craziness, when you start
4:59
throwing around phrases like cracking encryption hashes, like you're not just
5:05
upping the ante, so to speak, you're setting a bar that that might absolutely be too high
5:10
or impossible for the majority of participants. So one particular user, copesex.
5:18
or Copesex pointed out this kind of challenge might be so overwhelming
5:23
that it could actually scare off a lot of the would be contestants, making it seem like they're setting up a game that there's no real way to win.
5:33
if there's less completion and fewer payouts, basically. And if you can get less people to compete, you have a lesser
5:40
chance of actually having a payout and a lot of the hype without actually having to deliver on that $10,000 prize.
5:47
And it's a smart move if you're looking to create buzz while minimizing the actual risk of actually having to pay out.
5:56
But it's also a bit of a kind of a bait and switch, if you ask me.
6:01
in any case, Archetyp responds to his comment by saying, “I love you too”, which is it's an obvious sidestep to copesex’s comment
Archetype's Response and the Hurdles
6:11
about how Archetyp was actually going about organizing this entire thing.
Technical Complexities and Unrealistic Expectations
6:17
First and foremost, the requirement to crack the hashes to find
6:22
the sticker locations was always going to be a major hurdle. Hashes, especially those that are generated from strong algorithms,
6:30
are not trivial to crack at all without really significant and computational power and prior knowledge to to back it up.
6:41
Now try to imagine you're at a conference, right? Like you don't have access to your RTX 4090 where you know,
6:49
you can use your crazy GPU to crack anything to begin with. Like you're damn sure don't want to log into any kind of like
6:58
RDP session or if you have the ability to remote into that workhorse computer,
7:05
you might not actually want to do that because you're at a hacking conference. Like the fact that no one managed to crack the hashes within 24 hour window
7:13
really reinforced the point that this challenge was likely to, you know, way too difficult for
7:22
other people and poorly designed, you know, for the participants. In this case, this issue ties directly into what was discussed earlier regarding the term
7:32
cracking encrypted hashes and how it's set completely unrealistic expectations.
7:37
By the time the contest ended, it became apparent that the challenge might have been designed in a way that was more about
Outcome of the Contest
7:45
generating hype than actually awarding a prize. The final edit in the post at the bottom
7:53
stating that there were no winners and that, you know, next year's puzzle
7:58
and that next year's puzzle would be easier, seems to acknowledge this flaw without actually addressing it directly.
Scope of the Scavenger Hunt
8:06
Furthermore, the post added really reinforces the perception that the actual organizers
8:12
may have not fully understood the technical complexities that were actually involved in this contest.
8:17
Well, obviously the Archetyp admin was aware of this issue, citing that
8:23
the user Archetyp Defcon host lacked the technical ability, Obviously pointing to the fact
8:31
that Big Boss Chief of Archetyp obviously is in technically unskilled, right?
8:38
which points to the fact that this challenge would be too much for the majority of people, and he still allowed it to go forward.
8:46
So what's actually worse, the guy the admin says doesn't know because his lack of technical skills,
8:53
or the admin who insinuates that he has the technical skills to do it and allows it anyway.
9:01
Announcing that they will make it a little easier next year suggests that they definitely
9:07
understated. Underestimated the difficulty of the challenge this time around, leading to an outcome with no winner.
9:16
Not only was this done for blocking the generalized location of the clues
9:21
by putting them in hashes, but furthermore, in addition to making it so that people couldn't actually get that first clue
9:29
of where the QR code was located in Las Vegas, the scope originally was the entire city of Las Vegas, which,
9:38
you know, basically you'd have to search 3.7 6,000,000,000ft² of the entire city.
9:46
That's how realistic to you And this is if you didn't bother getting the original clues.
9:51
Now, keep in mind that number is strictly on the assumption that it's on the first floor of every every building in Vegas.
9:59
Right? Like, remember, if you were actually able to crack the hashes, then the scope of where you actually have to search
10:06
would be limited to the locations of MGM Grand, Caesars Palace,
10:12
and the actual Defcon convention where it was actually held. And once you limited to these three places,
Finding the QR Codes
10:21
then you scope would go from that 3.7 6,000,000,000ft² to 2,000,000ft².
10:28
That said, like it's it's still an absolutely insane number.
10:33
And you still need to keep in mind if you found one, it didn't matter. You still had to find the other two in order to be able
10:41
to claim the actual prize. So even if somehow you managed to defy the odds
10:46
and get all three of these locations, you would still have quite a bit of work ahead of you to be able to find all three of the actual
10:54
QR codes, which are required for you to win the prize. From an outsider's perspective, I would say that the goal was to create
Publicity and Buzz Creation
11:02
buzz about the scavenger hunt and specifically the market.
11:07
Hosting it like this absolutely worked, because Caesars had prop bets on whether or not someone would actually win.
11:15
Also, a ton of different people messaged me personally about this very thing.
11:21
Which just further confirmed that the simple post on dread was far more enough, than they actually needed to get the word out.
Mathematical Improbability of Winning
11:28
Now, I want to quickly look at how absolutely insane mathematically and and I'll I'll keep the mathematics very short.
11:35
And I'm not a mathematician, so I could absolutely, totally screw this up. but these are kind of like my about numbers.
11:41
So I wanted to give you a ballpark. And that's basically what this is. because I'm not a mathematician in the head. All.
11:47
It would have been extremely difficult for someone to find these QR codes. Obviously, this is, you know, completely discounting the fact that you actually
11:55
had to crack the hashes before you even knew where to look initially, so you can see why this entire thing was basically just a complete waste of time
12:04
and a massive gaslighting campaign on the part of Archetyp
12:09
as a whole, against those who actually participated in it.
The Setup and Execution
12:15
The setup, So the scavenger hunt started on August 10th
12:20
and lasted only 24 hours, probably due to the absolutely atrocious planning, which again speaks volumes about the actual admins
12:29
ability to plan and execute effectively, which is kind of worrying, but participants needed to find the three QR codes
12:36
hidden across the mass of locations Caesars Palace, MGM Grand, and Def Con.
12:41
Like we said before, these locations collectively spanned roughly Two million square feet.
Estimating the Participants and Area Covered
12:49
Now consider that, you know, say a. around 500 people were, say, likely participating in the hunt.
12:56
And this is a number I simply just pulled out of thin air. According to Wikipedia, Defcon 31, in Defcon 30
13:03
both had attendee numbers around 30,000 people. So I'd say that estimating that 500 people, were searching the area,
13:12
you know, for the 24 hours at the concert was, you know, actually, you know, maybe even overestimating who actually participated.
Probability of Finding All QR Codes
13:20
so searching the actual area, if participants effectively searched about 1000ft² every hour on the hour, which is absolutely generous
13:29
considering the fact that you're looking under, you know, planted pots and underneath chairs, under desks, in the bathrooms
13:36
and pretty much anywhere else where there are nooks and crannies or places that you could hide something the size of an SD card.
13:44
remember that the entire thing was only 24 hours, so if they did this
13:50
and they stayed up for 24 hours and they, you know, somehow were able to abide at the exact same pace
13:58
at the end of the 24 hours, they would have covered 240,000ft².
14:04
Right? Throughout the entirety of the event. And that's almost a quarter of 1,000,000ft², which absolutely,
14:12
you know, sounds like a crazy amount of space, right? Remember, this is you searching 1000ft².
14:19
And every nook and cranny. Every hour on the hour for 24 hours straight.
14:25
And by the end of that, you would have covered about 12% of the 2,000,000ft² that you actually had to search through to find it.
14:35
you had to find all three codes, not just one, to be able to win the prize.
14:40
Since the codes were in different locations, each one was independent. So if you multiply the individual probabilities,
14:48
it's a .000012 5% chance
14:53
That one person would be able to actually find all three QR codes.
14:59
So to put that in perspective, you're 8000 times more likely to get struck by lightning
15:07
in your lifetime than to have found all three QR codes in the scavenger hunt.
15:13
And to put it into another perspective, you know, you're far more likely to win the Powerball jackpot,
Comparing the Odds and Time Constraints
15:20
where the odds are about 1 in 292,000,000, which is a daunting figure to begin
15:26
with, yet still far more achievable then this particular challenge.
15:32
Even the chances of being attacked by a shark are about 1 in 3 point 7 million,
15:37
which are exponentially higher than finding these QR codes To drive home this absurdity,
15:44
consider that the odds of dying in a plane crash are about 1 in 11,000,000,
15:50
which is vastly more probable than winning this contest. when not taking into account
15:55
the fact that we actually had to decrypt these hashes to even begin with.
16:00
Time constraints. Now, as if this wasn't bad enough, the odds become even more unrealistic
16:08
because participants only had 24 hours to search. And like we calculated before,
16:13
that means you can search a total of 12% of the area. The vast area is where the codes were hidden and clues
16:20
were just generalized locations from my understanding, like Caesars Palace or MGM Grand, which are enormous venues.
16:29
Even with the best strategies and perfect conditions, the sheer size
16:35
of the search area and the limited time make the odds absolutely small.
16:40
And when we look at, you know, past darknet markets that did well, we see that they made anywhere from 100 million
Archetype's Earnings and User Base
16:48
to 400 million, which obviously, there's a pretty massive difference in what specific markets have actually made in the past.
16:56
But Archetyp is one of the top markets. And the last time that I was there, there were well over 420,000 users
17:05
that were registered and had an account, which would absolutely put them in the weight class of those heavy heavy earners that we mentioned.
17:13
Now, having people scramble around in a desperate attempt to try and get ten grand, with an almost impossible challenge?
Critique of the Challenge and Potential Alternatives
17:22
Is beyond cruel, in my opinion. this is especially true given the current economic situation
17:29
of many people, including myself. I have no doubt that there are a few people who got distracted
17:36
from the conference that they paid so much to actually get to, and ended up spending a good portion of their own time going on this fool's errand.
17:44
If Archetyp actually wanted to do some good, they easily could have said that, you know, if no one actually gets it.
17:51
Which of course, they already ran these numbers. They knew that no one was going to get it ahead of time.
17:56
And that, you know, it was just inevitable they would have actually done something like they would have said,
18:03
if no one gets it, then will donate the money to the Electronic Frontier Foundation, which is the EFF, or donate
18:09
to ITP or something that actually benefits the community. there is no doubt that this would have gotten them a ton of,
18:16
you know, complimentary attention. Instead, they created the challenge on a whim.
18:22
so right off the bat, if someone did have a computer or server that was capable of doing a difficult task, like cracking these hashes,
18:31
they didn't have access to it because they didn't know about it ahead of time, and they can bring that hardware there.
18:36
And on top of this is why, like a lot of these villages, like hacking villages and whatnot, they tell people ahead of time.
18:42
And on top of that, even though, you know, Defcon had multiple days in the time span, they elected to limit it to one short 24 hour period.
18:52
And they also made it so that you would basically have to get all three,
18:57
which pretty much solidified it as impossible, you know, as a task as a whole.
19:03
And all in all, I just I found this pretty disgusting behavior like this market could have easily made a $100,000 price
19:12
and made it so that any given QR code was worth, say, $1,000,
19:18
and this would have greatly increased the odds of them actually being found. In addition, they could have donated whatever wasn't found.
19:25
and done a ton of good for, you know, these communities, whether it's the darknet community or the hacking community as a whole.
19:32
Instead, they elected to hold on to the ten grand as if it was like a hundred million.
19:39
ten grand is a lot of money for me personally, I know a ton of people who like me are, you know, just dealing with inflation
19:47
on a daily basis and struggling just to get groceries. ten grand would be a good amount for people like that.
19:54
But it's a pittance in comparison to someone who runs a darknet market who's making tens, if not hundreds of millions of dollars on a regular basis.
Archetype's Response and Contradictions
20:05
The fact that they had to rig a game, to me is even more disgusting.
20:11
I’d imagine, the admin of Archetyp would try to say something, you know, along the lines, you know, they only overshot and, you know,
20:19
which is why they, which is what they said in their signed message to quote them. They said, the person who organizes this event is not me, but yes,
20:28
Archetyp will pay the price of 10,000 in that XMR. And we oversee it.
20:34
I am in contact with the person and I hope this event will catch some interest.
20:40
We hope to organize things like this more often in the future.
20:45
Now know how you know. In one line they say that they're not the actual ones
20:51
that are organizing this event, but then on the other hand, they turn around and they say that we, i.e.
20:57
both parties mentioned, hope to organize things like this more often in the future.
21:04
So in one sense, so in one sense, they say they didn't organize things, but in the other sense they say that they did.
21:11
Apparently they oversee it. But don't organize it, but actually do organize it
21:18
and hope to do more of them in the future. Like I too would hope to do more of them in the future.
21:25
If advertising costs nothing and you could play people into searching
21:31
for something that you know mathematically they'll never actually find. And what was really disappointing was, oh no, I didn't see many people,
Lack of Opposition and Security Concerns
21:39
if any, really calling any of this out on dread, which is actually for me, it was super disappointing.
21:45
Like I didn't see one person besides one username locomotives who pointed out the fact that Defcon is basically full of cameras in feds.
21:56
we've seen in the past the darknet market admins and major vendors who have had horrendous operational security mistakes
22:05
and end up paying for with decades or in some cases, life sentences in prison.
22:10
That fact alone should have played a deterrent. It's absolutely, in my opinion, the obligation of Archetyp
22:18
to tell people how to safely operate when participating in something like this.
22:23
A great example, for example, I have, for example, would have been to use tails and to make sure that you,
22:32
you know, have a throwaway account when you're submitting your answer or something like, it's not rocket science.
22:38
Even something as simple as that would have at least showed a little bit of care and, you know, consideration for the individuals
22:46
they're telling to go out and, you know, find the QR codes and just the complete lack of any type of even passive suggestion
22:56
to those people, in my opinion, absolutely demonstrates a complete lack of care or consideration for the people that they're trying
23:05
to get public relations from and attention from. And, you know, argumentative.
23:11
I would say that, you know, that's a it's a currency. Time and energy is something that costs money.
23:17
It takes effort. So you're robbing people essentially it's a scam. And all of this again, for an amount of money
23:24
that the administrator looks at, like me, and you look at a nickel, right?
23:30
It absolutely blows my mind that there's not a complete outrage, over this entire thing to begin with.
23:35
And that locomotive was the only user that actually had something to say, about,
23:42
something that just completely has a lot of severe issues in,
23:48
you know, built into it from the start regarding a real life, treasure hunt and what is what's now,
23:57
Locomotive was the only actual use that it had something to say, opposing this,
24:02
this actual scavenger hunt nonsense and, and at what now is a largely corporate conference that openly embraces and loves feds.
DEF CON's Relationship with Federal Agencies
24:13
And none of this is classified or hidden, so much so that games have actually been invented that revolve around them.
24:20
Like Spot the Fed, where you can find a federal agent and you get a free t shirt.
24:26
And over the years, like specifically since 2015, 30 different federal agencies
24:32
have actually reportedly sent representatives to this conference. The founder of Def Con,
Examples of DEF CON's Cooperation with Law Enforcement
24:38
Jeff Moss, actually served on the Homeland Security Advisory Council for nine years from 2009 to 2017.
24:48
In 2016, Def Con actually partnered with the Pentagon for a Hack the Pentagon initiative or show was called IDs.
24:57
This is basically they invited hackers to, come in and try to attack
25:04
the Department of Defense's public facing website. And this is tantamount to pimping out the various highly
25:11
intelligent individuals who, you know, love Def Con to the feds, for the feds to have a free pen test on their public facing site.
25:21
Essentially like that's what it was. In addition to that, it's one of the only hacking conferences that actually has a meet the feds panel
25:29
where representatives from the FBI, NSA, and the secret Service openly discuss
25:35
cybersecurity issues with, you know, various attendees. Again, that's all consensual, though.
25:41
Like, that's pretty pretty out in the open. Everyone knows about that. So you said, oh, it's not really a big deal. But along with Jeff Moss actually being on the Homeland Security Advisory Council
25:51
for nine years, you should also, you know, know the fact that in some cases,
25:56
there's actually been open cooperation with law enforcement. Chris Pageant, for example, was at Defcon
26:04
15, as a presenter and was a security researcher who was set to demonstrate a vulnerability
26:12
that he had found in RFID chips. But out of nowhere, Defcon suddenly canceled his talk.
26:18
At the time, it was speculated that the Defcon organizers had done
26:24
this due to intervention from law enforcement, who was concerned about the potential legal implications
26:32
of the talk, as well as public exposure of sensitive information. One thing we definitely know is they're not his lawyer.
26:38
They weren't concerned about him. During Defcon 20, a group of hackers uncovered a serious vulnerability
26:45
in a hotel's electronic door lock. This shouldn't really be a big surprise when you consider the fact
26:51
that Defcon is the biggest hacking convention in the world. I think during that incident, it was rumored that federal agents were
26:58
basically quickly involved in this investigation and,
27:03
you know, deliberately prevented disclosures, that would be public
27:09
so that, you know, the security of the hotel wouldn't be compromised.
27:15
You know, and, you know, supposedly on a national level, and the fact that it happened so quickly shows that there's probably
27:22
a good amount of behind the scenes cooperation that actually takes place. then you had the voting machine Hacking Village during 2017 with Defcon 25,
27:32
which allowed hackers to expose vulnerabilities in the US voting system. and after the vulnerabilities were found, the Defcon organizers were reported,
27:42
were reportedly in communication with federal and state authorities to discuss the findings and potential implications for election security.
27:52
Once again through the back door, pimping out the intellectual abilities
27:58
of the attendees specifically for the feds. During Defcon 22, there was a debate titled
28:06
No More Free Bugs, and essentially this debate centered around hackers revealing critical software vulnerabilities, and that time where
28:16
there was a growing discussion around whether vulnerabilities should in fact be disclosed directly to the companies
28:23
that were actually involved or to the government. Can you guess which side the Defcon organizers landed on?
28:31
it wasn't to side with, you know, the the people who actually discovered vulnerabilities, but rather it was to
28:39
practice statism and side, you know, with the people who can't fix potholes. So that was awesome.
28:46
They ended up facilitating these discussions, which in my opinion, absolutely showed a, you know, cooperative stance with law enforcement.
28:52
And that's something from everything I've seen that they actually pride themselves on. at Defcon 17, in 2009, there was a talk about vulnerabilities
29:01
inside the Tor network, which attracted obvious significant attention from various federal agencies.
29:08
Said presentation led to a behind the scenes discussion between the Defcon organizers and the Tor Project, and feds
29:17
about various issues that would be coming from or arise
29:23
from publicly discussing such vulnerabilities, the Defcon organizers elected to coordinate with law enforcement.
29:30
They schock in order to censor the talk show that those who they deemed
29:35
malicious actors would not be made aware of. The various disclosures that were made in the presentation
29:44
during Defcon. During Defcon 26. In 2018, the Airport Hacking Village was actually introduced,
29:51
and this is where hackers exploited vulnerabilities in aviation systems, including airport security protocols.
29:57
In following the event, there were reports that the Defcon organizers had actually coordinated with the Department of Homeland Security
30:06
before the information was actually released. Again, being sure to sanitize all information that was given out
30:14
after the feds gave their approval at Defcon 30. Again, we saw the Biohacking Village, which focused
30:21
on vulnerabilities and medical devices, caused interest by various federal agencies, including the FDA.
Federal Agencies' Interest and Security Flaws
30:30
They were involved in discussing both before and after to address security flaws that were uncovered.
30:36
Once again, information was actually kept from the people that they were trying to present it to and in a very nanny state type way.
The Feds and DEFCON Relationship
30:46
My point with all of this is that the Feds and Defcon have a long and intimate relationship.
30:53
Now, can you imagine a general that sends foot soldiers out to go fight a battle where they've done
31:00
absolutely no reconnaissance and have no intelligence about it? There would be a massive amount of casualties in that case.
Criticism of Archetype's Lack of Guidance
31:08
And in this case, the Archetyp admin either did no investigations or didn't
31:13
care enough to actually provide any kind of guidance or semblance of intelligence for those who may be participating in this completely rigged
31:23
game, Like it's bad enough that you couldn't win to begin with. And to make it even worse, to add
31:30
insult to injury, there's a complete disregard for the people security who would actually be participating in it.
31:37
It would take virtually no time at all to give people some basic precaution measures to at least try and follow.
31:44
But instead, you know, he was more preoccupied with finding ways to ensure that no one actually won the small amount of money, that he put up.
Character Analysis of Archetype Admin
31:54
The situation, I think really goes to show the character of the individual that's actually running this darknet market.
32:01
Their name, Andre alone shows that they're kind of a control freak and, you know, need constant recognition
32:09
and padding for their ego, for the position that they hold By far the most telling thing, though, is where he says in a post after the fact
Archetype's Attempt to Shift Blame
32:18
about this person who supposedly he was overseeing. So what happened with the ten k I sent you?
32:25
Did you just scan me? Now? Remember how at the start
32:30
of all of this, I said that his language was indicative of someone trying to avoid taking responsibility for something?
32:38
This is exactly what it was like. Remember the B side message where you know that we checked out earlier
32:45
what what was the exact wording for that? Archetyp will pay the price of 10,000 and XMR and we oversee it.
32:56
Sounds pretty clear to me. I noticed that the name that they named was the market.
33:03
That he is the big boss chief of. It's funny how you know he didn't say that
33:10
Archetyp Defcon host would be doing the payout. Rather, it very specific terms that his market would.
33:19
So not only did he create a scavenger hunt that is virtually impossible for anyone
33:24
to actually win, from a statistical and mathematical point of view. But in addition to that, he also tried to put the blame
33:33
for what's apparently now missing money, though he himself originally
33:39
said that the market that he controls would be the one paying out the 10,000.
Conclusion and Acknowledgment
33:46
It's absolutely insane the amount of contradictions and deceptions that's around this entire thing, like
33:53
big time respect to locomotive for pointing out the actual issues and going against the grain of the community who,
34:01
you know, by and large, bought everything that was said hook, line and sinker.
34:06
In this case, if you enjoyed this content, be sure to leave a like and subscribe.
34:11
and I'll see you guys in the next video.

☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆

PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: / doing.fedtime
TWITTER: / doingfedtime
LINKEDIN: / sam-bent
EMAIL: [email protected]
TIKTOK: / doingfedtime
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Ben...
Dread: http://dreadytofatroptsdj6io7l3xptbet...
Pitch: http://pitchprash4aqilfr7sbmuwve3pnkp...

☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆

The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.

By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.