bighunanballs
Well-known Member
Ya that would be sweet, def nothing brand specific just pooling members for testing of all sortsNot this but maybe MESO can do something in the future but for various brand and not for any specific brand.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Ya that would be sweet, def nothing brand specific just pooling members for testing of all sortsNot this but maybe MESO can do something in the future but for various brand and not for any specific brand.
Offcourse if the result was not good i will tell people for harm reductionReally?
What about for the harm reduction benefits to members of the greater bodybuilding community?
Surely, you're not doing testing solely for your own personal benefit?
That will be greatNot this but maybe MESO can do something in the future but for various brand and not for any specific brand.
Why this link redirects to EDIT:REMOVED ?? Are you trying to hack the people here ?? I Hope some moderator answer me soon!!!From June: https://thinksteroids.com/community/threads/qingdao-sigma-hplc-testing.134411274/post-3298090
I'm not sure it's the same batch, but it's 36iu and has purple tops.
There is NOT a REDIRECT by MESO.Why this link redirects to EDIT:REMOVED ?? Are you trying to hack the people here ?? I Hope some moderator answer me soon!!!
From June: [URL='EDIT:REMOVED']https://thinksteroids.com/community/threads/qingdao-sigma-hplc-testing.134411274/post-3298090[/URL]
I'm not sure it's the same batch, but it's 36iu and has purple tops.
Ok i understand but why you don't ban an hacker trying to get gmail accounts details??There is NOT a REDIRECT by MESO.
For some reason this was posted by @egruberman most likely by mistake:
From June: [URL='EDIT:REMOVED']https://thinksteroids.com/community/threads/qingdao-sigma-hplc-testing.134411274/post-3298090[/URL]
I'm not sure it's the same batch, but it's 36iu and has purple tops.
This was not a phishing link disguised as a thinksteroids.com address to obtain google account details.Ok i understand but why you don't ban an hacker trying to get gmail accounts details??
It's not a phishing link. It's a link for "hijacking session" . It means he get the access without knowing the password . It's really Dangerous.This was not a phishing link disguised as a thinksteroids.com address to obtain google account details.
It goes to google.com so anyone who would have entered their google credentials would have sent them to google.com
This is not consistent with a hacking attempt.
It is certainly suspicious that the google hyperlink was disguised as a thinksteroids.com url but I don't see obvious malicious intent.
So I will see if @egruberman can answer.
It's not a phishing link. It's a link for "hijacking session" . It means he get the access without knowing the password . It's really Dangerous.
It's not a phishing link. It's a link for "hijacking session" . It means he get the access without knowing the password . It's really Dangerous.
After discussion with @egrubman via DM, I am satisfied that this was an innocent mistake and nothing more and represented no danger to anyone.Nope. Was a malformed link on my part. I assure you that I am not collecting people’s credentials.
Can’t offer much more than that by way of explanation, but I’ll work with @Millard to make sure he’s satisfied with my explanation. At that point I’m hoping he’ll chime in here with further reassurance.
@Millard,After discussion with @egrubman via DM, I am satisfied that this was an innocent mistake and nothing more and represented no danger to ananyone.
Any chance that could happen to anyone else posting/re-posting links? Is that a fluke thing or something we need to proactively avoid?
Maybe he is innocent but i am sure that link is 100% malicious. Maybe he got hacked, and posted that link from a Copy and paste but If Someone clicked and did the login with his gmail is already compromised. That's an hijacking Google session. The bug is already public since january 2024 and Google still didn't solved this issue.After discussion with @egrubman via DM, I am satisfied that this was an innocent mistake and nothing more and represented no danger to anyone.
You posted as a "frontend" text the correct meso link but as the "backend" the wrong and malicious link that is invisible and you only discover It by clicking or copy and paste. How do you First pasted the correct link and in the URL form you pasted the wrong link? If you do Copy and paste you paste the same link . Not a different link.It was purely a mistake on my part. I had the wrong thing in my paste buffer, which was a link to a google doc that required a login. If anyone clicked on it, it would request Google credentials, and lacking the permission to view, it would then throw an error.
You posted as a "frontend" text the correct meso link but as the "backend" the wrong and malicious link that is invisible and you only discover It by clicking or copy and paste. How do you First pasted the correct link and in the URL form you pasted the wrong link? If you do Copy and paste you paste the same link . Not a different link.
Well done raising awareness to examine destination for any link before you click. Title and actual destination can be quite different. Thank you.You posted as a "frontend" text the correct meso link but as the "backend" the wrong and malicious link that is invisible and you only discover It by clicking or copy and paste. How do you First pasted the correct link and in the URL form you pasted the wrong link? If you do Copy and paste you paste the same link . Not a different link.