Physical Return U Scam Explanation

This refers to operations such as running U, joining groups, registration fees, first U then money, etc., where you send your address to the other party and let them open their wallet to transfer money.

The other party opens their wallet to transfer, pastes your address, and then the scammer has them paste something generated by the system into the notes for order verification. A novice enters their password and authorizes it.

The usual reason given is to test 1 U, or to have the other party transfer 0 miner fees for verification, with a note of the order number (which is actually the authorization data generated in the background). The other party enters their password and authorizes it.

80% of the fish caught from ERC/OKC/BSC chains are big fish.

The scenario usually involves double betting projects on planes, collecting phones to profit from price differences.

You provide the delivery address to the supplier, and they will place orders on e-commerce platforms or in phone stores. The merchant sends the phone to you, and of course, this money is definitely dirty money.

You receive the product at a price 20-30% lower than normal, for example, for a phone worth 10,000 yuan, you can return 7,000 worth of U after receiving it, and then sell the phone yourself for the price difference as profit.

This is a definite laundering... a hand in the dark.

In such cases, if the merchant reports the frozen card to the police, they will be apprehended at the delivery station when picking up the goods, usually around half a month later, so absolutely do not engage in such activities.

#BNBChainMeme热潮 #币安Alpha上新 #BTC