Pranked by Perdant (Venus Technologies)

If you came to this page from “Meet women–with your smart phone! two things:

  1. Don’t be mad!  I’m trying to save you money and grief.
  2. Please keep reading, and I’ll explain everything.

If you didn’t come from there, you might enjoy looking at that web page.

I made up “Venus Technologies LLC” and the Perdant smartphone app as an outreach to people (men, anyway) who might become victims of a web scam.  VenusTech is an April Fools’ Day prank (notice the date in the byline).  But I do not laugh, and I sincerely apologize if it inconvenienced or troubled you.  Now I’d like to use the occasion to pass on some tips about web scams.

Here are two ways to protect yourself from web scams.

  1. Easy: Don’t buy stuff online.   Or, buy only from Amazon.
  2. Hard: Figure out whether the seller is trustworthy.  (Don’t get distracted by how much you want the product.  Some scams involve good products.).  Pay by credit card or PayPal, not by debit card.  Debit cards are like cash; they make it harder to get your money back.  If you do get scammed, it’s best to block your credit card and get a new one with a different number to prevent the scammer from stealing again.

If you chose the hard way, please read on.  Here are some signs that “Perdant” is a web scam and “Venus Technologies” is not to be trusted.


Ridiculous claims:  Common sense should tell you that these claims can’t be true.

  • Discovered in a secret experiment.  Scammers love to claim that their products are barely legal.  Project MK-Ultra was real; but experiment 37-J was not.
  • The CIA forced Dr. Adelph Montague into hiding.  Scammers love an antigovernment backstory, so you’ll root for the little guy by buying their product.
  • So many scammers offer a 75% discount that it’s a pretty certain indicator of a web scam.

Lying and deception:  Does this kind of lying do any harm? That depends. Would you give your credit card to a liar?

  • Dr. Adelph Montague is clip-art. Connoisseurs of web scams may recognize him under various names as the chief technologist or engineer on many scam sites (here, for example). He’s a credibility prop.  How would you know?  Save his picture to a file and use it to do a Google image search.
  • Anton Revanaugh is a guy I made up. A journalism style byline is another credibility prop.  How would you know? Do a Google search on the name.
  • A forged magazine cover feature article blurb. This is a typical credibility prop for web scams that involve gadgets.  How would you know?  Again, Google image search.

Obfuscation:

  • An opportunity that could end at any time!”  It’s standard practice to make you think you don’t have time to consider carefully.
  • You don’t see the price. All you know is that you’re getting 75% off of the normal price, whatever that is.  On a real scam site, you might not find out the price until you’ve given them your email address.  Then they’ll spam you whether you buy anything or not.
  • The important links to the terms and conditions document and the privacy policy are camouflaged in the bottom border.  It’s not unknown for a scam site to hide important information. Here’s an example from real life:For more tips about how to spot a web scam, click some of the tabs in the right toolbar to read my reports about actual scams.

Here are links to some good information sources:

Bonus outtakes:

  • “Perdant” is French for “Loser.”
  • The part about women hearing a higher range of frequencies is true.  But that’s a long way from hypnotizing them.
  • The text in the newspaper clipping is from Donald Trump’s inaugural address.

 

 

 

 

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s