Cari Charnock in Erie, PA (Pennsylvania) Age 24 Age 24, Born February 2000 02/18/2000 Lives in Erie, PA (814) 520-5858 1121 E 27th St Erie PA 16504 Erie County Recorded November 2020 (seems more accurate due to her post and google maps) https://maps.app.goo.gl/AbnCzgBSVZShm7p38 https://coomer.su/onlyfans/user/lucilynn/post/600109614 https://archive.ph/KI1JA (archive of post, she's on a bitch fit) https://www.realtor.com/realestateandhomes-detail/M3609551475 confirmed to be her place. Employment: Cari Charnock Home Health Care Assistant at Tempus Unlimited, Inc. Erie, Pennsylvania, United States https://pa.tempusunlimited.org/ Locations Open by Appointment Only: 3410 West 12th Street, Erie, PA 16505 1400 S. Braddock Avenue, Pittsburgh, PA 15218 625 Clark Ave, #21B, King of Prussia, PA 19406 6 Stauffer Industrial Park, Taylor, PA 18507 Contact us: Phone: 844-983-6787 Fax: 833-583-6787 TTY: 833-888-0133 email: paFMS@tempusunlimited.org Office Hours Monday- Tuesday- 8:30AM to 4:30PM Wednesday – 8:30AM – 8:00PM Thursday – Friday – 8:30AM – 4:30PM Email Addresses for Cari Charnock in Erie, PA carilynn03@live.com titanic203876@gmail.com EPIOS: https://epieos.com/?q=titanic203876%40gmail.com&t=email https://www.google.com/maps/contrib/102535234666085553720/reviews/@42.1204224,-80.0635036,13z/data=!3m1!4b1!4m3!8m2!3m1!1e1?entry=ttu&g_ep=EgoyMDI0MTAxNi4wIKXMDSoASAFQAw%3D%3D She seems active on her google account. HIBP info for titanic203876: 8tracks: In June 2017, the online playlists service known as 8Tracks suffered a data breach which impacted 18 million accounts. In their disclosure, 8Tracks advised that "the vector for the attack was an employee’s GitHub account, which was not secured using two-factor authentication". Salted SHA-1 password hashes for users who didn't sign up with either Google or Facebook authentication were also included. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies and contained almost 8 million unique email addresses. The complete set of 18M records was later provided by JimScott.Sec@protonmail.com and updated in HIBP accordingly. Compromised data: Email addresses, Passwords HauteLook: In mid-2018, the fashion shopping site HauteLook was among a raft of sites that were breached and their data then sold in early-2019. The data included over 28 million unique email addresses alongside names, genders, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by dehashed.com. Compromised data: Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords National Public Data (unverified): In April 2024, a large trove of data made headlines as having exposed "3 billion people" due to a breach of the National Public Data background check service. The initial corpus of data released in the breach contained billions of rows of personal information, including US social security numbers. Further partial data sets were later released including extensive personal information and 134M unique email addresses, although the origin and accuracy of the data remains in question. This breach has been flagged as "unverified" and a full description of the incident is in the link above. Compromised data: Dates of birth, Email addresses, Genders, Government issued IDs, Names, Phone numbers, Physical addresses Poshmark: In mid-2018, social commerce marketplace Poshmark suffered a data breach that exposed 36M user accounts. The compromised data included email addresses, names, usernames, genders, locations and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com". Compromised data: Email addresses, Genders, Geographic locations, Names, Passwords, Usernames River City Media Spam List: In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data. Compromised data: Email addresses, IP addresses, Names, Physical addresses SHEIN: In June 2018, online fashion retailer SHEIN suffered a data breach. The company discovered the breach 2 months later in August then disclosed the incident another month after that. A total of 39 million unique email addresses were found in the breach alongside MD5 password hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com". Compromised data: Email addresses, Passwords Truth Finder: In 2019, the public records search service TruthFinder suffered a data breach that later came to light in early 2023. The data included over 8M unique customer email addresses, names, phone numbers and passwords stored as scrypt hashes. Compromised data: Email addresses, Names, Passwords, Phone numbers Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable. Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses Wanelo: In approximately December 2018, the digital mall Wanelo suffered a data breach. The data was later placed up for sale on a dark web marketplace along with a collection of other data breaches in April 2019. A total of 23 million unique email addresses were included in the breach alongside passwords stored as either MD5 or bcrypt hashes. After the initial HIBP load, further data containing names, shipping addresses and IP addresses were also provided to HIBP, albeit without direct association to the email addresses and passwords. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com". Compromised data: Email addresses, IP addresses, Names, Passwords, Physical addresses Wattpad: In June 2020, the user-generated stories website Wattpad suffered a huge data breach that exposed almost 270 million records. The data was initially sold then published on a public hacking forum where it was broadly shared. The incident exposed extensive personal information including names and usernames, email and IP addresses, genders, birth dates and passwords stored as bcrypt hashes. Compromised data: Bios, Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Social media profiles, User website URLs, Usernames HIBP info for carilynn03@live.com: Poshmark: In mid-2018, social commerce marketplace Poshmark suffered a data breach that exposed 36M user accounts. The compromised data included email addresses, names, usernames, genders, locations and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com". Compromised data: Email addresses, Genders, Geographic locations, Names, Passwords, Usernames River City Media Spam List: In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data. Compromised data: Email addresses, IP addresses, Names, Physical addresses SHEIN: In June 2018, online fashion retailer SHEIN suffered a data breach. The company discovered the breach 2 months later in August then disclosed the incident another month after that. A total of 39 million unique email addresses were found in the breach alongside MD5 password hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com". Compromised data: Email addresses, Passwords Anti Public Combo List (unverified): In December 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Anti Public". The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned. Compromised data: Email addresses, Passwords Collection #1 (unverified): In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post The 773 Million Record "Collection #1" Data Breach. Compromised data: Email addresses, Passwords MySpace: In approximately 2008, MySpace suffered a data breach that exposed almost 360 million accounts. In May 2016 the data was offered up for sale on the "Real Deal" dark market website and included email addresses, usernames and SHA1 hashes of the first 10 characters of the password converted to lowercase and stored without a salt. The exact breach date is unknown, but analysis of the data suggests it was 8 years before being made public. Compromised data: Email addresses, Passwords, Usernames Pemiblanc (unverified): In April 2018, a credential stuffing list containing 111 million email addresses and passwords known as Pemiblanc was discovered on a French server. The list contained email addresses and passwords collated from different data breaches and used to mount account takeover attacks against other services. Read more about the incident. Compromised data: Email addresses, Passwords piZap: In approximately December 2017, the online photo editing site piZap suffered a data breach. The data was later placed up for sale on a dark web marketplace along with a collection of other data breaches in February 2019. A total of 42 million unique email addresses were included in the breach alongside names, genders and links to Facebook profiles when the social media platform was used to authenticate to piZap. When accounts were created directly on piZap without using Facebook for authentication, passwords stored as SHA-1 hashes were also exposed. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com". Compromised data: Email addresses, Genders, Geographic locations, Names, Passwords, Social media profiles, Usernames, Website activity Another BBBREACH: { "_id" : { "$oid" : "54208d8d2d24900f5d1996b8" }, "aggregates" : { "_id" : { "$oid" : "54208d8d2d24900f5d1996ba" } }, "created_at" : { "$date" : 1411419533337 }, "devices" : [ "ios2:00d0cbb995fa79cd091c83e65f114c662caf9f03" ], "eb" : true, "ebat" : { "$date" : 1449786133301 }, "email" : "carilynn03@live.com", "email_verified" : null, "fb_info" : { "_id" : { "$oid" : "54208d8d2d24900f5d1996bc" }, "devices" : [ { "hardware" : "iPhone", "os" : "iOS" } ], "education" : [ { "school" : { "id" : "109610775731916", "name" : "Central Tech High School" }, "type" : "High School" } ], "email" : "carilynn03@live.com", "ext_access_token" : "CAACmQ6zHxvsBAH6p7o2mpks417F3JhX6Uk57GyruRZBxDP1de6oMJfVECNPDuxFra7m0HyPOvsJhjZAWD6ty9ZBZCZCnZBhJ74E0JgMuDJvw3zC5AIdSNU3wyjkwPMMlHnQUzEZBbMiz1eJcQZBM1kf89AxG5zvM3cv1lymAZBit1DcV2VcZBjRoZCg42ZCuyrhGjernTiODIw9kfAmRCYiQ8aOckrafqSFbPdoZD", "ext_permissions" : { "installed" : 1, "basic_info" : 1, "public_profile" : 1, "email" : 1, "user_friends" : 1 }, "ext_token_expr" : { "$date" : 1416603476000 }, "ext_user_id" : "100001672674707", "ext_username" : null, "fetched_at" : { "$date" : 1411419533333 }, "first_name" : "Cari", "gender" : "female", "hometown" : { "id" : "108306975863361", "name" : "Erie, Pennsylvania" }, "installed" : true, "last_name" : "Charnock", "locale" : "en_US", "location" : { "id" : "108306975863361", "name" : "Erie, Pennsylvania" }, "name" : "Cari Charnock", "third_party_id" : "XfFih7Bmi_Lzcq4TVJgNSsIMdl0", "timezone" : -4, "updated_time" : "2014-09-13T23:11:58+0000", "username" : "cari.lynn2", "verified" : true }, "fb_user_id" : "100001672674707", "first_name" : "Cari", "gen" : 0, "gender" : "female", "last_name" : "Charnock", "passwd_hash" : "$2a$10$YJmvIES9w190CwuwLBkGeudytz0fVV8fQi2Vuxgu9mTBfBmu0U5m.", "passwd_upd_at" : { "$date" : 1411419533427 }, "profile" : { "_id" : { "$oid" : "54208d8d2d24900f5d1996bb" }, "city" : "Erie", "dress_size" : "Size 14", "shoe_size" : "US 7 / Euro 37", "state" : "Pennsylvania", "website" : "" }, "pv2" : { "desc" : "Erie, Pennsylvania" }, "reg_app" : "iphone", "reg_method" : "fb", "seg" : { "sup" : "E" }, "settings" : { "timeline" : true, "_id" : { "$oid" : "54208d8d2d24900f5d1996bd" } }, "sizes" : { "dr" : [ "14" ], "sh" : [ "7" ] }, "status" : "active", "tw_info" : { "fetched_at" : { "$date" : 1411421248470 }, "ext_user_id" : "1379796055", "ext_access_token" : "1379796055-QHowtNXIA6UGGMXzdgCuTjQ29BYpY7Ts9uT6th7", "ext_token_secret" : "COwjw56Yh5MeqddQwMEu1LeFanClApdIq0wwiQsrzxb8u", "ext_username" : "pierce_the_cari", "_id" : { "$oid" : "5420944088e3c67366001f8e" } }, "username" : "titanic203876" } carilynn03@live.com:titanic203876:$2a$10$YJmvIES9w190CwuwLBkGeudytz0fVV8fQi2Vuxgu9mTBfBmu0U5m.:2015-12-10 14:22:13: Info from blackbird titanic203876@gmail.com ✔ [Poshmark] https://poshmark.com/closet/titanic203876 https://ghostarchive.org/archive/y7VyW ✔ [Snapchat] https://www.snapchat.com/add/titanic203876 https://ghostarchive.org/archive/SAbzx ✔ [smule] https://www.smule.com/titanic203876 https://ghostarchive.org/archive/8QTDa titanic203876@gmail.com Twitter: {"valid":false,"msg":"Email has already been taken.","taken":true} https://ghostarchive.org/archive/qjVac xitter https://www.sotwe.com/Lucilynn22 old pinterest account: https://www.pinterest.com/titanic203876/_created https://www.snapchat.com/add/lilbabycari another snapchat account https://www.influenster.com/profile/lilbabycari influenster account The moms account https://www.facebook.com/profile.php?id=100075266513806 Moms Email address, data breach? data breach!: tab171@msn.com ab171@msn.com cottoncandy16@comcast.net amsc@faes.net needluvin101@yahoo.com sweetie6987@msn.com ab171@yahoo.com ab171@att.net xtab171q96@msn.com teliah_stewart@yahoo.com elitwardog@aol.com tab171yb57@msn.com amsc@faeces.com [onlyfans] https://coomer.su/onlyfans/user/lucilynn https://archive.ph/3dYkO (archive IA is down damn it) https://www.snapchat.com/add/shewildaf her snapchat https://www.instagram.com/Luciwildaf (need to login 18+, follow only) https://www.pornhub.com/model/luci-lynn https://web.archive.org/web/20240915120949/https://www.pornhub.com/model/luci-lynn (archive, starring the former BF) Deleted pornhub account, she's on a delete spree lol. https://pornmove.net/video/358946/fucking-my-chubby-teen-step-sister-rough-luci-lynn/ (her and her BF) speaking of... https://pornmove.net/models/luci-lynn/ https://archive.ph/xBvIB https://www.facebook.com/carilynnwow Facebook (need to login) https://archive.ph/SZKDe/image https://ghostarchive.org/archive/zCZgp Her and her hubby (see below) https://www.facebook.com/100001486821697/posts/1377206462338901/ https://archive.ph/MP6fX/image https://ghostarchive.org/archive/hvgFi https://archive.ph/r9vWs/image https://ghostarchive.org/archive/WpkXg Her status as of now (She gonna be single forever lol, lmao) https://fancentro.com/lucilynn https://ghostarchive.org/archive/0Z6Wo fancentro (paysite) https://ghostarchive.org/archive/9KkXQ https://chaturbate.com/lucilynn/ chaturbate https://archive.ph/fdJ3J/image https://www.redgifs.com/users/misslucilynn19 Redgifs https://archive.ph/8ZxsF https://www.reddit.com/user/misslucilynn/ Reddit https://www.friendfinder-x.com/profile/shewildaf https://archive.ph/EPGhF FriendXfinder (hookup/dating site) https://hclips.com/videos/7251398/sexy-blonde-gets-her-pussy-creamed-luci-lynn/ Her and her hubby Kenneth Sienicki; probably someone uploaded this from her PH. https://archive.ph/4FM32/image https://hclips.com/videos/6806606/luci-lynn-has-an-intense-orgasm/ again from PH, solo https://archive.ph/nST8v/image https://txxx.com/videos/15176262/blonde-teen-bbw-rides-dildo-when-daddy-s-not-home-luci-lynn/ from PH solo https://archive.ph/iZ5Cu/image https://www.instagram.com/antithetic.aesthetic/ Lol she privated her account, lol; lmao. Lives in Erie, Pennsylvania From Erie, Pennsylvania In a relationship with Austin Lewallen https://www.linkedin.com/in/cari-charnock-77728b278 Her than boyfiend Kenny Sienicki III Kenneth Sienicki Kenneth J Sienicki (814) 218-0777 (Primary Phone) Wireless T-Mobile USA Inc First reported August 2010 814-454-1832 814-454-7064 814-454-1161 814 920 0589 <- from his facebook, might have changed, why are people so fucking stupid? tsnick@att.net sienicki34@gmail.com 1121 E 27th St Erie PA 16504 Erie County Recorded January 2023 https://registry.thebump.com/cari-charnock-kenneth-sienicki-iii-january-2024-pa/60818089 https://www.facebook.com/sienickiiii https://www.picuki.com/profile/sienickiiii Instagram https://archive.ph/o6u7M (archive) ▶ Enumerating accounts with email "sienicki34@gmail.com" ✔ [Spotify] https://spclient.wg.spotify.com/signup/public/v1/account?validate=1&email=sienicki34@gmail.com ✔ [Twitter] https://api.twitter.com/i/users/email_available.json?email=sienicki34@gmail.com She had failed the Physiognomy Check - Zodiac