“Book Profits” (aka Textbook Money) Implodes: Ex-members speak out
The story of $3,500 book arbitrage tool “Textbook Money” (aka “Book Profits”) gets even worse
Part II In a 5-Part Series on Amazon Trade-In Credit
Since speaking out about Book Profits earlier this year, I have been deluged with emails from their former members. They describe being “scammed,” “cheated,” and “robbed,” and the creators of Textbook Money / Book Profits as “snakes,” “crooks,” and “unethical.”
In this article:
- Brief recap of Textbook Money scandal.
- Textbook Money purges dissenters.
- Ex-TBM members report Textbook Money to state and federal authorities.
- New Facebook group for ex-Textbook Money members.
- Textbook Money using testimonials without permission?
- Textbook Money changes name to “Book Trades.biz” & “Book Arbitrage”
- Screenshots of over 50 ex-Textbook Money sharing their experiences.
A special announcement (Or: “How Textbook Money stealing our data inspired us to duplicate their software and sell it for 1/20 the price”) (Update: Our new trade-in tool is live. It’s called ZenTrade, and we’ve bundled it with Zen Arbitrage. Get both for one low price here.)
Before we get into the latest drama…
You can get our tools here:
- Zen Arbitrage (for selling books)
- Zen Trade (for trade-in and textbook buyback sites)
- Both tools together (click “start trial” button to access this semi-secret offer)
- 10x better tools & training at less than 1/10 the price of “Book Profits.”
If you’re new to this story…
Here’s the recap of this epic saga, from earlier this year:
- In 2016, the $1,000 + $97/mo “Textbook Money/Book Profits” book arbitrage tool gets released, along with a clone of my tool, Zen Arbitrage.
- Around this time, strange hack bots are detected infiltrating Zen Arbitrage.
- We feed them mountains of inaccurate, garbage data.
- We exposed the culprits as having the same IP address as Textbook Money, stealing our data.
- We prank them by feeding them mountains of garbage data on finding an FTC lawyer, how to not be terrible at hacking, etc.
- We publicly exposed them.
Post a Comment
0 Comments