QSC HGH 36IU purple tops latest promo

Really?

What about for the harm reduction benefits to members of the greater bodybuilding community?

Surely, you're not doing testing solely for your own personal benefit?
Offcourse if the result was not good i will tell people for harm reduction

But i think source need to stimulate that people will test product and get a small refund back from it because its very expensive

But maybe to many people will do testing and there is no profit for them
 
its kind of a bummer that if you send off a hgh test with dimer test , that qsc will only give you a "random gift" of theyre choice? Seriously
 
Especially since its one of there untested hgh promo buy, unless there is "recent" testing on the current 15 iu kits beeing offered in this last month of August?
 
From June: https://thinksteroids.com/community/threads/qingdao-sigma-hplc-testing.134411274/post-3298090

I'm not sure it's the same batch, but it's 36iu and has purple tops.
Why this link redirects to EDIT:REMOVED ?? Are you trying to hack the people here ?? I Hope some moderator answer me soon!!!
 
Why this link redirects to EDIT:REMOVED ?? Are you trying to hack the people here ?? I Hope some moderator answer me soon!!!
There is NOT a REDIRECT by MESO.

For some reason this was posted by @egruberman most likely by mistake:

From June: [URL='EDIT:REMOVED']https://thinksteroids.com/community/threads/qingdao-sigma-hplc-testing.134411274/post-3298090[/URL]

I'm not sure it's the same batch, but it's 36iu and has purple tops.
 
There is NOT a REDIRECT by MESO.

For some reason this was posted by @egruberman most likely by mistake:

From June: [URL='EDIT:REMOVED']https://thinksteroids.com/community/threads/qingdao-sigma-hplc-testing.134411274/post-3298090[/URL]

I'm not sure it's the same batch, but it's 36iu and has purple tops.
Ok i understand but why you don't ban an hacker trying to get gmail accounts details??
 
Ok i understand but why you don't ban an hacker trying to get gmail accounts details??
This was not a phishing link disguised as a thinksteroids.com address to obtain google account details.

It goes to google.com so anyone who would have entered their google credentials would have sent them to google.com

This is not consistent with a hacking attempt.

It is certainly suspicious that the google hyperlink was disguised as a thinksteroids.com url but I don't see obvious malicious intent.

So I will see if @egruberman can answer.
 
This was not a phishing link disguised as a thinksteroids.com address to obtain google account details.

It goes to google.com so anyone who would have entered their google credentials would have sent them to google.com

This is not consistent with a hacking attempt.

It is certainly suspicious that the google hyperlink was disguised as a thinksteroids.com url but I don't see obvious malicious intent.

So I will see if @egruberman can answer.
It's not a phishing link. It's a link for "hijacking session" . It means he get the access without knowing the password . It's really Dangerous.
 
It's not a phishing link. It's a link for "hijacking session" . It means he get the access without knowing the password . It's really Dangerous.

Nope. Was a malformed link on my part. I assure you that I am not collecting people’s credentials.

Can’t offer much more than that by way of explanation, but I’ll work with @Millard to make sure he’s satisfied with my explanation. At that point I’m hoping he’ll chime in here with further reassurance.
 
It's not a phishing link. It's a link for "hijacking session" . It means he get the access without knowing the password . It's really Dangerous.
Nope. Was a malformed link on my part. I assure you that I am not collecting people’s credentials.

Can’t offer much more than that by way of explanation, but I’ll work with @Millard to make sure he’s satisfied with my explanation. At that point I’m hoping he’ll chime in here with further reassurance.
After discussion with @egrubman via DM, I am satisfied that this was an innocent mistake and nothing more and represented no danger to anyone.
 
After discussion with @egrubman via DM, I am satisfied that this was an innocent mistake and nothing more and represented no danger to ananyone.
@Millard,
Any chance that could happen to anyone else posting/re-posting links? Is that a fluke thing or something we need to proactively avoid?
 
Any chance that could happen to anyone else posting/re-posting links? Is that a fluke thing or something we need to proactively avoid?

It was purely a mistake on my part. I had the wrong thing in my paste buffer, which was a link to a google doc that required a login. If anyone clicked on it, it would request Google credentials, and lacking the permission to view, it would then throw an error.
 
After discussion with @egrubman via DM, I am satisfied that this was an innocent mistake and nothing more and represented no danger to anyone.
Maybe he is innocent but i am sure that link is 100% malicious. Maybe he got hacked, and posted that link from a Copy and paste but If Someone clicked and did the login with his gmail is already compromised. That's an hijacking Google session. The bug is already public since january 2024 and Google still didn't solved this issue.

Why he posted a different link? Where he got the link ? Why he posted that exact link ? It's not from Google . That Is a subdomain with customized link made by a person to hijack Google session with cookies without entering any password. Everyone can do this with One Cloud developer Google account. I can send you via DM the complete link that redirect from that link. He used also proxies to mask his identity.

So if he is innocent why he only wrote to you and not here in the public ? How many people clicked that link ? The people Who clicked that link want an explanation here.
 
It was purely a mistake on my part. I had the wrong thing in my paste buffer, which was a link to a google doc that required a login. If anyone clicked on it, it would request Google credentials, and lacking the permission to view, it would then throw an error.
You posted as a "frontend" text the correct meso link but as the "backend" the wrong and malicious link that is invisible and you only discover It by clicking or copy and paste. How do you First pasted the correct link and in the URL form you pasted the wrong link? If you do Copy and paste you paste the same link . Not a different link.
 
You posted as a "frontend" text the correct meso link but as the "backend" the wrong and malicious link that is invisible and you only discover It by clicking or copy and paste. How do you First pasted the correct link and in the URL form you pasted the wrong link? If you do Copy and paste you paste the same link . Not a different link.

I don’t recall the specific error on my part, but I vaguely remember using markdown or something to form the link.

Regardless, it wasn’t a malicious link, just a link to a doc I recognized.
 
You posted as a "frontend" text the correct meso link but as the "backend" the wrong and malicious link that is invisible and you only discover It by clicking or copy and paste. How do you First pasted the correct link and in the URL form you pasted the wrong link? If you do Copy and paste you paste the same link . Not a different link.
Well done raising awareness to examine destination for any link before you click. Title and actual destination can be quite different. Thank you.
 

Sponsors

Latest posts

Back
Top