http://turkeyoe6akd6azkgkmj7rbuhmabrgdg63ez3mzfhsjf6cnnbxthqrqd.onion/proof-before-payment.html
Actually, John acts as an intermediary . He gets his own clients and then he requests that same service from a real hacker. The real hacker receives John's order and does the work and, after getting the password for the requested Instagram account, John receives the proof from the real hacker .