My Scammer Girlfriend: Baiting a Romance Fraudster

Scam mechanics and playbook

  • Commenters note the scammer’s emails mix boilerplate romance text with a personalized paragraph, consistent with common “playbooks.”
  • Early messages are seen as template-based; quality often drops once scammers must improvise, which can be a detection signal.
  • The fast escalation to money requests and implausible backstory (model-like photos, too-perfect interest) match classic romance scam patterns.

Metadata, EXIF, and OPSEC

  • Readers highlight how email headers, Message-ID, and EXIF data strongly undermined the scammer’s anonymity.
  • Discussion clarifies that SMTP headers typically expose the sending mail server’s IP, but many providers also include the client IP when using SMTP from a desktop client.
  • Several people mention that using webmail avoids leaking the user’s IP; others dispute how consistently this is enforced.
  • EXIF scrubbing is mentioned as a basic but often neglected step; scammers may not care because anyone who checks EXIF is not an ideal target.

Scammer origin and forced labor

  • Some argue the scammer is credibly Russian based on metadata; others suggest Southeast Asian “pig butchering” operations run by trafficked workers are more typical today.
  • Multiple comments describe large scam centers in Myanmar/Cambodia staffed by modern slaves, with reports of torture and massive police “rescues.”

Why people read scam-baiting content

  • Motives cited: education and awareness, acting as a “guide” to tactics, and pure entertainment/“justice porn.”
  • Several stress that this article is relatively analytical and not primarily mocking.
  • There’s disagreement on ethics: some see scammers as exploited workers deserving empathy; others focus on the harm to vulnerable victims.

Engaging scammers vs. ignoring them

  • Some advocate wasting scammers’ time (even via AI) to reduce their effective hit rate and attack margins.
  • Others argue the industry is too optimized for this to matter, and time-wasting may just further exploit low-level, possibly enslaved workers.

Victims, blame, and vulnerability

  • One line of discussion partially blames victims for believing wildly mismatched romantic attention; others counter that anyone can be scammed at a low point or over long grooming periods.
  • “Pig butchering” scams are noted as slow-burn, investment-style romance scams that can drain victims over months.

Other notes

  • One person’s antivirus flagged the linked site as carrying a trojan; others strongly suspect a false positive.
  • Some argue stolen-face photos of the real woman in the article should be redacted to protect her.