Cari Charnock
in Erie, PA (Pennsylvania)
Age 24

Age 24, Born February 2000
02/18/2000
Lives in Erie, PA
(814) 520-5858

1121 E 27th St
Erie PA 16504
Erie County
Recorded November 2020
(seems more accurate due to her post and google maps)
https://maps.app.goo.gl/AbnCzgBSVZShm7p38
https://coomer.su/onlyfans/user/lucilynn/post/600109614 https://archive.ph/KI1JA (archive of post, she's on a bitch fit)
https://www.realtor.com/realestateandhomes-detail/M3609551475 confirmed to be her place.

Employment:

Cari Charnock

Home Health Care Assistant at Tempus Unlimited, Inc.
Erie, Pennsylvania, United States

https://pa.tempusunlimited.org/


Locations Open by Appointment Only:
3410 West 12th Street, Erie, PA 16505
1400 S. Braddock Avenue, Pittsburgh, PA 15218

625 Clark Ave, #21B, King of Prussia, PA 19406

6 Stauffer Industrial Park, Taylor, PA 18507


Contact us:
Phone: 844-983-6787

Fax: 833-583-6787

TTY: 833-888-0133

email: paFMS@tempusunlimited.org

Office Hours
Monday- Tuesday- 8:30AM to 4:30PM

Wednesday – 8:30AM – 8:00PM

Thursday – Friday – 8:30AM – 4:30PM

Email Addresses
for Cari Charnock in Erie, PA
carilynn03@live.com
titanic203876@gmail.com

EPIOS:
https://epieos.com/?q=titanic203876%40gmail.com&t=email
https://www.google.com/maps/contrib/102535234666085553720/reviews/@42.1204224,-80.0635036,13z/data=!3m1!4b1!4m3!8m2!3m1!1e1?entry=ttu&g_ep=EgoyMDI0MTAxNi4wIKXMDSoASAFQAw%3D%3D
She seems active on her google account.

HIBP info for titanic203876:
8tracks: In June 2017, the online playlists service known as 8Tracks suffered a data breach which impacted 18 million accounts. In their disclosure, 8Tracks advised that "the vector for the attack was an employee’s GitHub account, which was not secured using two-factor authentication". Salted SHA-1 password hashes for users who didn't sign up with either Google or Facebook authentication were also included. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies and contained almost 8 million unique email addresses. The complete set of 18M records was later provided by JimScott.Sec@protonmail.com and updated in HIBP accordingly.
Compromised data: Email addresses, Passwords

HauteLook: In mid-2018, the fashion shopping site HauteLook was among a raft of sites that were breached and their data then sold in early-2019. The data included over 28 million unique email addresses alongside names, genders, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by dehashed.com.
Compromised data: Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords

National Public Data (unverified): In April 2024, a large trove of data made headlines as having exposed "3 billion people" due to a breach of the National Public Data background check service. The initial corpus of data released in the breach contained billions of rows of personal information, including US social security numbers. Further partial data sets were later released including extensive personal information and 134M unique email addresses, although the origin and accuracy of the data remains in question. This breach has been flagged as "unverified" and a full description of the incident is in the link above.
Compromised data: Dates of birth, Email addresses, Genders, Government issued IDs, Names, Phone numbers, Physical addresses

Poshmark: In mid-2018, social commerce marketplace Poshmark suffered a data breach that exposed 36M user accounts. The compromised data included email addresses, names, usernames, genders, locations and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
Compromised data: Email addresses, Genders, Geographic locations, Names, Passwords, Usernames

River City Media Spam List: In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data.
Compromised data: Email addresses, IP addresses, Names, Physical addresses

SHEIN: In June 2018, online fashion retailer SHEIN suffered a data breach. The company discovered the breach 2 months later in August then disclosed the incident another month after that. A total of 39 million unique email addresses were found in the breach alongside MD5 password hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
Compromised data: Email addresses, Passwords

Truth Finder: In 2019, the public records search service TruthFinder suffered a data breach that later came to light in early 2023. The data included over 8M unique customer email addresses, names, phone numbers and passwords stored as scrypt hashes.
Compromised data: Email addresses, Names, Passwords, Phone numbers

Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable.
Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses

Wanelo: In approximately December 2018, the digital mall Wanelo suffered a data breach. The data was later placed up for sale on a dark web marketplace along with a collection of other data breaches in April 2019. A total of 23 million unique email addresses were included in the breach alongside passwords stored as either MD5 or bcrypt hashes. After the initial HIBP load, further data containing names, shipping addresses and IP addresses were also provided to HIBP, albeit without direct association to the email addresses and passwords. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
Compromised data: Email addresses, IP addresses, Names, Passwords, Physical addresses

Wattpad: In June 2020, the user-generated stories website Wattpad suffered a huge data breach that exposed almost 270 million records. The data was initially sold then published on a public hacking forum where it was broadly shared. The incident exposed extensive personal information including names and usernames, email and IP addresses, genders, birth dates and passwords stored as bcrypt hashes.
Compromised data: Bios, Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Social media profiles, User website URLs, Usernames

HIBP info for carilynn03@live.com: 

Poshmark: In mid-2018, social commerce marketplace Poshmark suffered a data breach that exposed 36M user accounts. The compromised data included email addresses, names, usernames, genders, locations and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
Compromised data: Email addresses, Genders, Geographic locations, Names, Passwords, Usernames

River City Media Spam List: In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data.
Compromised data: Email addresses, IP addresses, Names, Physical addresses

SHEIN: In June 2018, online fashion retailer SHEIN suffered a data breach. The company discovered the breach 2 months later in August then disclosed the incident another month after that. A total of 39 million unique email addresses were found in the breach alongside MD5 password hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
Compromised data: Email addresses, Passwords

Anti Public Combo List (unverified): In December 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Anti Public". The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned.
Compromised data: Email addresses, Passwords

Collection #1 (unverified): In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post The 773 Million Record "Collection #1" Data Breach.
Compromised data: Email addresses, Passwords

MySpace: In approximately 2008, MySpace suffered a data breach that exposed almost 360 million accounts. In May 2016 the data was offered up for sale on the "Real Deal" dark market website and included email addresses, usernames and SHA1 hashes of the first 10 characters of the password converted to lowercase and stored without a salt. The exact breach date is unknown, but analysis of the data suggests it was 8 years before being made public.
Compromised data: Email addresses, Passwords, Usernames

Pemiblanc (unverified): In April 2018, a credential stuffing list containing 111 million email addresses and passwords known as Pemiblanc was discovered on a French server. The list contained email addresses and passwords collated from different data breaches and used to mount account takeover attacks against other services. Read more about the incident.
Compromised data: Email addresses, Passwords

piZap: In approximately December 2017, the online photo editing site piZap suffered a data breach. The data was later placed up for sale on a dark web marketplace along with a collection of other data breaches in February 2019. A total of 42 million unique email addresses were included in the breach alongside names, genders and links to Facebook profiles when the social media platform was used to authenticate to piZap. When accounts were created directly on piZap without using Facebook for authentication, passwords stored as SHA-1 hashes were also exposed. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
Compromised data: Email addresses, Genders, Geographic locations, Names, Passwords, Social media profiles, Usernames, Website activity


Another BBBREACH:

{ "_id" : { "$oid" : "54208d8d2d24900f5d1996b8" }, "aggregates" : { "_id" : { "$oid" : "54208d8d2d24900f5d1996ba" } }, "created_at" : { "$date" : 1411419533337 }, "devices" : [ "ios2:00d0cbb995fa79cd091c83e65f114c662caf9f03" ], "eb" : true, "ebat" : { "$date" : 1449786133301 }, "email" : "carilynn03@live.com", "email_verified" : null, "fb_info" : { "_id" : { "$oid" : "54208d8d2d24900f5d1996bc" }, "devices" : [ { "hardware" : "iPhone", "os" : "iOS" } ], "education" : [ { "school" : { "id" : "109610775731916", "name" : "Central Tech High School" }, "type" : "High School" } ], "email" : "carilynn03@live.com", "ext_access_token" : "CAACmQ6zHxvsBAH6p7o2mpks417F3JhX6Uk57GyruRZBxDP1de6oMJfVECNPDuxFra7m0HyPOvsJhjZAWD6ty9ZBZCZCnZBhJ74E0JgMuDJvw3zC5AIdSNU3wyjkwPMMlHnQUzEZBbMiz1eJcQZBM1kf89AxG5zvM3cv1lymAZBit1DcV2VcZBjRoZCg42ZCuyrhGjernTiODIw9kfAmRCYiQ8aOckrafqSFbPdoZD", "ext_permissions" : { "installed" : 1, "basic_info" : 1, "public_profile" : 1, "email" : 1, "user_friends" : 1 }, "ext_token_expr" : { "$date" : 1416603476000 }, "ext_user_id" : "100001672674707", "ext_username" : null, "fetched_at" : { "$date" : 1411419533333 }, "first_name" : "Cari", "gender" : "female", "hometown" : { "id" : "108306975863361", "name" : "Erie, Pennsylvania" }, "installed" : true, "last_name" : "Charnock", "locale" : "en_US", "location" : { "id" : "108306975863361", "name" : "Erie, Pennsylvania" }, "name" : "Cari Charnock", "third_party_id" : "XfFih7Bmi_Lzcq4TVJgNSsIMdl0", "timezone" : -4, "updated_time" : "2014-09-13T23:11:58+0000", "username" : "cari.lynn2", "verified" : true }, "fb_user_id" : "100001672674707", "first_name" : "Cari", "gen" : 0, "gender" : "female", "last_name" : "Charnock", "passwd_hash" : "$2a$10$YJmvIES9w190CwuwLBkGeudytz0fVV8fQi2Vuxgu9mTBfBmu0U5m.", "passwd_upd_at" : { "$date" : 1411419533427 }, "profile" : { "_id" : { "$oid" : "54208d8d2d24900f5d1996bb" }, "city" : "Erie", "dress_size" : "Size 14", "shoe_size" : "US 7 / Euro 37", "state" : "Pennsylvania", "website" : "" }, "pv2" : { "desc" : "Erie, Pennsylvania" }, "reg_app" : "iphone", "reg_method" : "fb", "seg" : { "sup" : "E" }, "settings" : { "timeline" : true, "_id" : { "$oid" : "54208d8d2d24900f5d1996bd" } }, "sizes" : { "dr" : [ "14" ], "sh" : [ "7" ] }, "status" : "active", "tw_info" : { "fetched_at" : { "$date" : 1411421248470 }, "ext_user_id" : "1379796055", "ext_access_token" : "1379796055-QHowtNXIA6UGGMXzdgCuTjQ29BYpY7Ts9uT6th7", "ext_token_secret" : "COwjw56Yh5MeqddQwMEu1LeFanClApdIq0wwiQsrzxb8u", "ext_username" : "pierce_the_cari", "_id" : { "$oid" : "5420944088e3c67366001f8e" } }, "username" : "titanic203876" }

carilynn03@live.com:titanic203876:$2a$10$YJmvIES9w190CwuwLBkGeudytz0fVV8fQi2Vuxgu9mTBfBmu0U5m.:2015-12-10 14:22:13:

Info from blackbird

titanic203876@gmail.com
  ✔  [Poshmark] https://poshmark.com/closet/titanic203876  https://ghostarchive.org/archive/y7VyW
  ✔  [Snapchat] https://www.snapchat.com/add/titanic203876 https://ghostarchive.org/archive/SAbzx
  ✔  [smule] https://www.smule.com/titanic203876 https://ghostarchive.org/archive/8QTDa

titanic203876@gmail.com
  Twitter:
  {"valid":false,"msg":"Email has already been taken.","taken":true}
https://ghostarchive.org/archive/qjVac xitter
https://www.sotwe.com/Lucilynn22


old pinterest account:

https://www.pinterest.com/titanic203876/_created

https://www.snapchat.com/add/lilbabycari another snapchat account

https://www.influenster.com/profile/lilbabycari influenster account

The moms account
https://www.facebook.com/profile.php?id=100075266513806

Moms Email address, data breach? data breach!:

tab171@msn.com ab171@msn.com 
cottoncandy16@comcast.net amsc@faes.net 
needluvin101@yahoo.com sweetie6987@msn.com 
ab171@yahoo.com ab171@att.net 
xtab171q96@msn.com teliah_stewart@yahoo.com 
elitwardog@aol.com tab171yb57@msn.com 
amsc@faeces.com


[onlyfans] https://coomer.su/onlyfans/user/lucilynn https://archive.ph/3dYkO (archive IA is down damn it)

https://www.snapchat.com/add/shewildaf her snapchat

https://www.instagram.com/Luciwildaf (need to login 18+, follow only)

https://www.pornhub.com/model/luci-lynn https://web.archive.org/web/20240915120949/https://www.pornhub.com/model/luci-lynn (archive, starring the former BF)
Deleted pornhub account, she's on a delete spree lol.

https://pornmove.net/video/358946/fucking-my-chubby-teen-step-sister-rough-luci-lynn/ (her and her BF) speaking of...

https://pornmove.net/models/luci-lynn/
https://archive.ph/xBvIB

https://www.facebook.com/carilynnwow Facebook (need to login)

https://archive.ph/SZKDe/image https://ghostarchive.org/archive/zCZgp Her and her hubby (see below)

https://www.facebook.com/100001486821697/posts/1377206462338901/
https://archive.ph/MP6fX/image https://ghostarchive.org/archive/hvgFi

https://archive.ph/r9vWs/image https://ghostarchive.org/archive/WpkXg Her status as of now (She gonna be single forever lol, lmao)

https://fancentro.com/lucilynn https://ghostarchive.org/archive/0Z6Wo fancentro (paysite)

https://ghostarchive.org/archive/9KkXQ https://chaturbate.com/lucilynn/ chaturbate

https://archive.ph/fdJ3J/image https://www.redgifs.com/users/misslucilynn19 Redgifs

https://archive.ph/8ZxsF https://www.reddit.com/user/misslucilynn/ Reddit

https://www.friendfinder-x.com/profile/shewildaf https://archive.ph/EPGhF FriendXfinder (hookup/dating site)

https://hclips.com/videos/7251398/sexy-blonde-gets-her-pussy-creamed-luci-lynn/ Her and her hubby Kenneth Sienicki; probably someone uploaded this from her PH.
https://archive.ph/4FM32/image

https://hclips.com/videos/6806606/luci-lynn-has-an-intense-orgasm/ again from PH, solo
https://archive.ph/nST8v/image

https://txxx.com/videos/15176262/blonde-teen-bbw-rides-dildo-when-daddy-s-not-home-luci-lynn/ from PH solo
https://archive.ph/iZ5Cu/image

https://www.instagram.com/antithetic.aesthetic/
Lol she privated her account, lol; lmao. 


Lives in Erie, Pennsylvania

From Erie, Pennsylvania

In a relationship with Austin Lewallen

https://www.linkedin.com/in/cari-charnock-77728b278

Her than boyfiend

Kenny Sienicki III 

Kenneth Sienicki

Kenneth J Sienicki

(814) 218-0777 (Primary Phone)
Wireless
T-Mobile USA Inc
First reported August 2010

814-454-1832
 
814-454-7064
 
814-454-1161

814 920 0589 <- from his facebook, might have changed, why are people so fucking stupid?

tsnick@att.net sienicki34@gmail.com

1121 E 27th St
Erie PA 16504
Erie County
Recorded January 2023

https://registry.thebump.com/cari-charnock-kenneth-sienicki-iii-january-2024-pa/60818089

https://www.facebook.com/sienickiiii

https://www.picuki.com/profile/sienickiiii Instagram
https://archive.ph/o6u7M (archive)

▶ Enumerating accounts with email "sienicki34@gmail.com"
  ✔  [Spotify] https://spclient.wg.spotify.com/signup/public/v1/account?validate=1&email=sienicki34@gmail.com
  ✔  [Twitter] https://api.twitter.com/i/users/email_available.json?email=sienicki34@gmail.com

She had failed the Physiognomy Check

- Zodiac