Skip to main content

Blocksims ICO Investigation Continues



In my prior investigative article I was focused specifically on the alleged ICO fraud of Shehar Yar and Blocksims. A couple of weeks have passed since that post and the investigation and observations have really started dominating the internet. Many of the ICO databases are marking Blocksims as a scam. One even removed their name from their list of ICO’s and they have been reported to the Ripoff Report and others.

Today I saw a video Blocksims.io posted trying to communicate the legitimacy of their ICO. The video looks great. Very CONvincing. It features two individuals, Elias Rodriguez and Uri Valles who are allegedly Blockchain influencers and advisors for BlockSims.

Uri Valles
Problem is, they are actors.


There is an entire ICO promotional industry working throughout the world. $20 per hour dev hacks from Malaysia, India, Philippines and abroad like Shehar Yar and his team, take advantage of the fact most new ICO’s are being run by people who would rather stay behind the scenes.

An ICO is just air. A void if you will, until it is funded. Out of the 1,100 ICO’s in play right now, most are complete scams or enthusiastic crypto junkies that honestly want to make a go of it.
Many of the scammers are overseas Fiverr sellers living with goats behind their parents home. They have to communicate a successful presence on the web. They need to look like “ballers” in the ICO world. So they hire successful looking actors to represent their brand. Then they build fraudulent Linkedin profiles which never really line up with reality.
elias rodriguez
For instance, Elias Rodriguez states in his LinkedIn profile that he attended two Universities.

Imperial College London
Degree Name Postgraduate Diploma
Field Of Study Inertial Confinement Plasma Physics
Dates attended or expected graduation 1989 – 1991
Queen Mary University of London
Degree Name BEng
Field Of Study Nuclear Engineering
Dates attended or expected graduation 1985 – 1989

As an investigator I made formal contact with both colleges. They responded there were no records for Elias Rodriguez and in fact, the representative from the Imperial College in London ended his e mail with an “LOL” with regard to the study of “Inertial Confinement Plasma Physics” as it really is not a thing. Google it.

There are 8 posts worldwide using variants of such a field of study. I think I am actually going to send this to the Big Bang Theory to use in one of their scripts.

Elias holds a BEng in Nuclear Engineering from London University and now leads a small RD&E team in the automotive industry. He is a web developer and website reseller.
Elias Rodriguez

And I ask myself, if I was Elias and had was a nuclear physicist, why would I be labeled an automotive consultant and a stand in for a couple of ICO’s?
Then we look at Uri Valles. Same story. False educational statements.
Uri valles
Now let’s look at another business these two are part of. KryproBonds. KryptoBonds was also designed by Shehar Yar representing AxChain.
axchain shehar yar
The primary principals of Kryptobonds are Elias and Uri. Kryptobonds does not look like it is going to fly. The following statement is on their website:

Dear Investors,

We have decided to postpone the ICO for KryptoBonds for a few months until we manage some crucial negotiations with new partners which will make the platform even more exciting. Please bear with us and do rest assured that we will keep you informed of new developments as they come out.

KBS Team
Elias rodriguez uri valles kryptobond
And they are principals in Blocksims which is currently under investigation for fraud.
Uri Valles Elias Rodriguez
And lastly, AxChain(Shehar Yar), who denies any cross relationships, worked for Mobilink as their web developer via his company AxChain.
Axchain
This whole thing just stinks. Actors pretending to be players in the ICO industry and Shehar Yar who is the centerpiece of what looks like an organized criminal enterprise.


Comments

Popular posts from this blog

Hackers Behind $530 Million Coincheck Heist Begin Moving Stolen Funds

The hackers behind last week’s $530 million Coincheck heist have once again begun moving the stolen XEM tokens, marking the beginning of what will likely be a cat-and-mouse game to launder the funds. Blockchain data demonstrates that the hackers made a litany of transfers from their primary address to a variety of other addresses on Jan. 30. Each transaction transferred 100 XEM, worth approximately $77 at the present exchange rate. Source: ournem.com That represents a small percentage of the 500 million XEM the hackers raked in during the theft , but it likely indicates that they are attempting to launder the stolen funds. “When people look to launder these types of funds, they sometimes spread it into smaller transactions because it’s less likely to trigger (exchanges’) anti-money laundering (mechanisms),” Tom Robinson, co-founder of Elliptic, a cryptocurrency security firm in London, told Reuters . Indeed, while the hackers are sitting on a fortune that is now sp...