A person shares their experience hiring a hacker from a website to test the security of three different email services (Gmail, Protomail, and Tending). The person pays the hacker €250 to hack into a Gmail account without two-factor verification. The hacker responds, claiming to have successfully hacked the account, but the person notes that the hacker's methods may not be legitimate. The person plans to test the hacker's abilities further by asking them to hack into the other two email services.
Here are the key facts extracted from the text:
1. The speaker hired a hacker from a website.
2. The hacker offered three options for services: hacking Facebook accounts for 250 euros, spying for 500 euros, and a "big task" for 900 euros.
3. The speaker chose the 250-euro option to hack a Gmail account.
4. The speaker paid the hacker in Bitcoin.
5. The hacker asked for the email address to be hacked and if the speaker wanted the password.
6. The speaker replied that they wanted the password and asked the hacker where they were from.
7. The hacker responded that they would start working on the task and would need some time.
8. The speaker waited for two days and then checked in with the hacker.
9. The hacker replied that they were having an issue with their tool and were fixing it.
10. After some time, the hacker sent the speaker the hacked email and password.
11. The speaker checked the email account and found that the hacker had removed two-factor authentication.
12. The speaker plans to use the hacked email account to test the hacker's services further.