Showing posts with label whore guide. Show all posts
Showing posts with label whore guide. Show all posts

Sunday, June 2, 2013

Email Address Set Up & Etiquette


Before you begin finding a reputable sexworker, you have to set up a few things to protect yourself & your privacy.  First, create an email address that is specifically for whoremongering.  Do not be a dumb ass & use your current personal, school, or business email address.

Yes, I know what you are thinking.

1.  "Maybe she will feel more comfortable if she sees I am a legitimate business owner & therefore, my business email address will help in that endevour".

2.  "I have not used my current email address for anything important & therefore, there is no need to get another one."

WRONG!  I had one who emailed me from his old college email account, after he had long since graduated.  When I did a search on Google for anything connected to his email address, nothing popped up.  However, when I went to the school's website & popped in his email address to search EVERYTHING popped up, from his full name to his birth date, as well as all the papers for which he had received awards.

Just assume all of your old email addresses are linked to something you do not want a complete stranger, doing something illegal to know.  It's that simple.  Just get a new email address, specifically for whoring.  My favorite email program happens to be Gmail.

Once you set up your account, be sure to use a fake name when you register.  Make is sound legitimate, such as "Richard Evans", not "Pussy Licker" (Yes, I really did get that one).  Make the email address sound legitimate too, such as "MatthewHarrington@gmail.com", not "IPay4Pussy@gmail.com"

Remember, reputable providers are looking for signs & reasons not to see you.  Do not give them one.

In your email, be very polite & not a horny dumb ass, with poor grammar, who alludes to sex and money.  Something like..

"Hello.  My name is Mike.  I recently saw your wonderful reviews on The Erotic Review.  I am very interested in meeting you & I noticed, based upon reading your website, that you prefer emailing, rather than talking on the phone.  I wanted to know what's the next thing I need to do, in order to visit."

You see that?  Nice pleasant introduction, giving her a compliment, alluding to her website, without bringing up sex or money.  Mike would be good to go in this situation. :) 


Saturday, June 1, 2013

Cell Phones & Texting Etiquette


It is very common for sexworkers & clients to communicate by cell phone & texting.  Do not be a dumb ass & use your personal or professional cell phone.  Yes, I know it seems like a very easy thing to do.  However, you are a moron if you do.  Go & purchase a cheap prepaid cell phone.  You can get them all over the place, including gas stations.  When you purchase the phone, you will have to load minutes on the phone with a phone card.  Purchase the card with the lowest minutes, considering you are probably not going to be seeing a whore daily. You should throw the phone away at least every 6 months or if your favorite whore has been arrested.  Yes, I am being very serious.  When you set up your voicemail, let your number, not your name be announced.  There is no need for your voice to be recorded.

Do not text a sexworker.  She will have a permanent record of everything you are texting.  If her phone is confiscated, during an arrest, your stupidity is going to shine, like a polished turd.

When you call, be very polite.  Ask if it's a good time to talk.  On the phone, do not give your real name.  Give your whoremongering name, as you have it in your emails.  Never refer to sex or money, when you call.  Actually, never refer to sex and money at all, not in person, by phone or email.

A good introduction would be..

"Hello.  My name is Mike.  I recently saw your wonderful reviews on The Erotic Review.  I am very interested in meeting you & I noticed, based upon reading your website, that you prefer talking on the phone rather than emailing.  I wanted to know what's the next thing I need to do, in order to visit."

You see that?  Nice pleasant introduction, giving her a compliment, alluding to her website, without bringing up sex or money.  Mike would be good to go in this situation. :)


Monday, May 27, 2013

Don't be a Petraeus: A Tutorial on Anonymous Email Accounts


Tomorrow, as the Senate Judiciary Committee considers reforming the decades-old federal email privacy law, the personal Inboxes and love lives of senior military and intelligence figures may be on that august body's mind.  When the FBI pored through the personal lives of CIA Director David Petraeus, Paula Broadwell, Jill Kelly and General John Allen, citizens across the land began to wonder how the FBI could get that kind of information, both legally and technically.

So, just how do you exchange messages with someone, without leaving discoverable records with your webmail provider? This is an important practical skill, whether you need to use it to keep your love life private, to talk confidentially with a journalist, or because you're engaged in politics in a country where the authorities use law enforcement and surveillance methods against you.

The current state of anonymous communication tools is not perfect, but there here are some steps that, if followed rigorously, might have protected the Director of the CIA, the Commander, U.S. Forces Afghanistan, and their friends against such effortless intrusion into their private affairs.

Pseudonymous webmail with Tor

According to press reports, Broadwell and Petraeus used pseudonymous webmail accounts to talk to each other. That was a prudent first step, but it was ineffectual once the government examined Google's logs to find the IP address that Broadwell was using to log into her pseudonymous account, and then checked to see what other, non-pseudonymous, accounts had been used from the same IP address. Under current US law, much of this information receives inadequate protection, and could be obtained from a webmail provider by the FBI without even requiring a warrant.

Because webmail providers like Google choose to keep extremely extensive logs1, protecting your pseudonymous webmail against this kind of de-anonymization attack requires forethought and discipline.

You should use the Tor Browser Bundle when setting up and accessing your webmail account. You must always use Tor. If you mess up just once and log into the pseudonymous account from your real IP address, chances are that your webmail provider will keep linkable records about you forever. You will also need to ensure that you do not give your webmail provider any information that is linked to your real world identity. For instance, if prompted for an email account, do not use another real account during signup; use a throwaway address instead.

Download the Tor Browser Bundle

To use Tor, start by downloading the Tor Browser Bundle by going to Tor Download page: https://www.torproject.org/download/download-easy.html.en, shown in the screenshot below, and click on the Download button for the  appropriate browser bundle for your operating system. The screenshot below shows the Tor Browser Bundle for Windows.


The Tor Bowser Bundle is a zip self-extracting archive. Click "extract" to extract the files from the archive.


To start the Tor Browser in Windows, go to Local Disk-->Program Files-->Tor Browser and double click on "Start Tor Browser," shown in the screenshot below:


When the Tor Browser launches, it will automatically test itself to see if Tor is working correctly. If Tor is correctly anonymizing your traffic, it will display a message saying, "Congratulations. Your browser is configured to use Tor." It will also display the IP address that your traffic appears to be coming from. This is the IP address your webmail provider will see when you go to set up your webmail account. 

Set Up A Webmail Account

Now that you have your Tor Browser up and running, use it to set up a new webmail account, ideally with a provider that you do not otherwise use. Using a separate webmail provider will help you to distinguish between your anonymous account and your regular email account. Hushmail allows users to set up new webmail accounts while using Tor to protect their anonymity, which is why we are using it in this tutorial. Note that Hushmail has a checkered history, but it is the only webmail service we are aware of that allows the use of Tor in this way--something we'd like to see changed.  Google tries to prevent people from signing up for Gmail accounts pseudonymously, and alternatives like Yahoo! Mail are missing HTTPS protection. Without both HTTPS and Tor at the time of creation and use, your account is not truly anonymous.  As an added precaution, you may want to use public wifi at an Internet cafe or a library whenever you connect.

To set up your Hushmail account, go to https://www.hushmail.com/start, shown in the screenshot below, and click the "Try Hushmail" button, which will allow you to set up a free Hushmail account.


Fill in the form shown in the screenshot below. Remember to choose a strong password. You must also check a box acknowledging that Hushmail will cooperate fully with authorities pursuing evidence via valid legal channels. This means that, given a proper court order, Hushmail may give up metadata about your messages--the IP addresses you've been logging in from (luckily you use Tor every single time), the times you've logged into your webmail, and the email addresses of the people with whom you've been corresponding. Hushmail may even give up the contents of your messages to law enforcement, and has in the past as we note above, which is why you want to make sure that your messages never contain any information that may give your identity away if you wish to remain anonymous. If you are concerned about law enforcement obtaining the contents of your emails from Hushmail, you should encrypt your email correspondence using OpenPGP.


When you send messages via Hushmail, beware the "Ecrypt" checkbox, shown in the screenshot below. This is not end-to-end encryption like PGP. Hushmail will still have access to the plaintext of your email messages. This means that you are not safe from de-anonymization via the clues you type into your pseudonymous emails.

Using End-to-End Encryption With Your Pseudonymous Email Account

Setting up pseudonymous PGP/GPG in Hushmail is an complicated task that lies outside the scope of this tutorial. You are unlikely to do it safely unless you are quite technically sophisticated, and any mistakes could break the pseudonymity of your account. If you do want to attempt to do this, here are some considerations to bear in mind:
  • You will need to make a new key just for your pseudonymous account and the other pseudonymous people you want to talk to will need to do the same
  • You will need to figure out a way to exchange public key fingerprints with them. Your Hushmail accounts are probably good enough for this.
  • You will need to make sure that all of the software you use to handle the key (intentionally or unintentionally) is always Torified
  • If you use PGP normally for non-pseudonymous purposes, you will need to make sure that no PGP software uses or produces evidence of one key in the context of your other identity.

Conclusion

Anonymous online communication is a valuable tool for journalists, whistleblowers, dissidents, and Directors of the CIA. As you can see, it is still quite hard to do and do well, and few people will have the discipline necessary to ensure that their webmail provider can never disclose their IP address or inter-account linkages, because the provider will never see the identifying information in the first place.  Technologists all over the world are hard at work, improving the usability of all sorts of anonymous online communications tools, and we look forward to the day when all people who need to exercise their freedom of expression can do so safely, simply, and anonymously.

Friday, May 24, 2013

Google Image Search is Your Friend

Google Image Search is a great weapon in your arsenal to find a quality sexworker.  The online program will allow you to find a duplicate of any image on the net.  Why is this important to you?  I will give you an example.  What if there is a sexworker on BackPage advertising & you are interested in contracting her services?  You can take the picture she uses on her ad & run it though the program, seeing it if pops up on any other websites, such as rip off websites, police profile pictures, or even her personal facebook page.  Here's how it works.

1.  right click the image & save it on your computer, in your secret file, that your wife cannot access.
3.  Click "images" in the top left corner.
4.  On the center search bar, click the little camera at the right end of the bar.
5.  When the box pops us, click "upload image".
6.  Upload the naughty photo you saved in your secret file.
7.  The next page will be the other duplicate pictures on the net, along with ones that have the same attributes.

Click onto any other images that are the same as the picture you uploaded.  Did you find anything interesting?


Saturday, January 12, 2013

Whore Guide (Escorts): Whore Reputations

It's very important that you follow these steps to find a reputable whore.

1.  Locate a whore online, through the use of escort directories & message boards.  You should hit up this previous blog entry for a growing list of those sites.

2.  Once you find one that looks appealing, based upon looks, rate, services, etc, you should check out her reviews.  I am going to use this whore on Eros for our guinea pig.  At this point, I know nothing about Miss Morgan Marie.

In order to check out her reviews, we need a piece of information that is always connected to her, such as a telephone number, email address, or website.  Unfortunately, whores are notorious for changing their information on a regular basis, particularly if they have something to hide, like poor reviews.  So, we may come up empty our first go around.  For our purposes, I prefer an email address.  In Miss Morgan Marie's case, that would be
Provider's Contact Information", I am going to cut & paste Miss Morgan Marie's email address (, then click "search" at the bottom of the page. 

The next page is going to be all the reviews she has under that email address, including doubles with another whore, cities other than her home turf, etc.  The end of each profile has the number of reviews attached to it.  Click the profile that has the most reviews.  In Miss Morgan Marie's case, that would be this one.

This page has all of her general information & appearance.  The rest you will not be able to see, because chances are likely you are not a member.  However, the most significant thing you will need to know is available to the general public & that information is found right under the whore's name in the top left corner.  It says "Rating 9.17 (Looks 9.14 / Performance 9.2)".  Those numbers are out of 10.  So, Holy Mother of God!  This chick is an awesome whore.

Now for the details, about what makes her so awesome.  Go to the bottom of her page & click one of the reviews.  We will use this one.  In the general details & public section it says:

"This was my second date with Morgan. She was visiting Chicago so I paid her a visit. Morgan is an exceptionally vibrant and sweet lady. She is absolutely beautiful, inside and out. I could only book 2 hours because of a busy travel schedule. Otherwise, I would have taken her out for a nice dinner and enjoyed her the way every man should, with deep conversation along with the physical side of the date. Non-VIPs, definitely see Morgan if you have the chance. Treat her like she is as special as they come, because she is."

That should be enough to get you started, if you are a newbie, in terms of finding a reputable whore.  My next entry will be about deciphering reviews, because they are not always as they seem.  In the meantime, Happy Whoring!


Saturday, January 5, 2013

Whore Guide (Escorts): Reviews

By far, the largest review database can be found at The Erotic Review (AKA TER).  It is so popular, because as a VIP member you get full access to all the naughty details of the provider's service, such as does she suck cock without a condom or are her pictures accurate.  Other review sites include

Big Doggie
Naughty Reviews

Reviews are an important element to visiting a reputable provider.  Without them, most of the time you would be wasting your money.  However, when you look at someone's reviews you have to do so with a discerning eye.

1.  Are the reviews about the same?  All providers have a baseline standard.  Do the reviews follow that pattern?  If they do not, chances are likely there is an outside variable affecting her service, such as drugs or alcohol.

2.  Do the reviewers have a history of other reviews?  Frequently, websites will offer free memberships to the clients, if they write a review.  Therefore, you want to make sure the reviewer has written other reviews & not just the one you are currently reading.

3.  How old is the review?  If the provider is active, there is no reason to consider reviews more than two years old.  All people change in two years, so will the provider.  Hopefully, it will be for the better.

Friday, January 4, 2013

Whore Guide (Escorts): Screening

In order to see a reputable provider, you must do everything in your power to make her feel comfortable.  One of the first steps to this is your screening.  Reputable providers have a number of ways to screen, such as..

1.  Personal Information:  She will request details about your life & do what she can to discretely verify your information.  This may include your work number, etc.

pros:  your personal information is kept by one provider, verses a database

cons:  the provider will have your personal information

2.  3rd Party:  She may be associated with a website/ company she trusts that will do her screening for her, such as Preferred411 or DateCheck.

pros:   done quickly through the site, provider does not have your personal information, easy to see multiple providers on the same 3rd party site.

cons:  you will have an online profile that you MAY have to pay for

3.  Provider Referrals:  She will request the contact information of other reputable providers you have seen & contact those ladies to verify that they would see you again.

pros:  the provider does not have your personal information.

cons:  the original providers may become jealous that you are seeing another provider & give them bad information, as well as "gossip" about you.

Every provider has her own way of doing things.  She is not going to change those ways for you, no matter how badly you try to convince her otherwise.  Decide what kind of screening you are willing to do, then find a provider who will meet that decision.

DO NOT SEE A PROVIDER, IF SHE DOES NOT SCREEN.  If she has such disregard for her own safety, how does she feel about yours?