- XPP sell page had one of the many 'click here' links hijacked and had http://1.fxinvinci.pay.clickbank.net/ instead of http://2.pipfx.pay.clickbank.net/
- email from email@example.com which has at bottom, unsubscribe link Xtreme Pip Poacher
This link goes to page that AWeber is service provider and the clickable picture on the page is FxInvincible's with its url URGENT: This Page Could Be Taken Down In Minutes
- unsubscribe link destination page also has "Return to Xtreme Pip Poacher" which again has link URGENT: This Page Could Be Taken Down In Minutes
NOTE: the above email (2) and unsubscribe page (2,3) incidents happened after XPP support had acknowledged irregularities and that they have dealt with the incident via email reply to 'you've been scammed' notice email previously sent to them (XPP support)
It would appear that they have not cleared up anything and that a certain escalation of subversive tactics are being employed..."We had found this out earlier,..."
"...we managed to catch it before it was too severe... We have now managed to solve the problem and everything is safe. "
Do to something incorrect with the download containing .pdf + .ex4 and supporting Terminal files, XPP issued a download update.
What was wrong with first product download?
What may be wrong with the second product download?
The Expert Advisor communicates with ??? servers when it runs.
What could it be doing if a hijacked version is running on live account?
It should be noted:
This XPP package may be very good.
This post is not about berating the product but to advise of experiences encountered and that something is not as it should be.
Unlike the author, ALWAYS look at browser status bar when mouse cursor hovers over ANY link!
ALWAYS ask self: Is this the target link I expected?
If not why not?