Find the Bullshit.

Paste any email, message, offer, or conversation. We'll identify scams, phishing, trolling, manipulation, and fraud โ€” and tell you exactly what's being used against you.

5 free analyses remaining
1 What type of interaction?
2 Paste the content
3 Context (optional but helps accuracy)
--
Analyzing...

๐Ÿšฉ What We Found

๐Ÿ“‹ Recommendation

Scam
Phishing
Trolling
Extraction
Caution
Positive

The Bullshit Field Guide

A comprehensive reference of every con, scam, phishing trick, trolling tactic, and manipulation technique โ€” what they look like, how they work, and how to protect yourself.

๐Ÿšจ Scams & Fraud
Advance Fee Fraud
aka "419 Scam," "Nigerian Prince"
Promises a large payout (inheritance, lottery, investment return) but requires you to pay fees, taxes, or processing costs upfront. The payout never arrives. Each "fee" is followed by another.
"You've inherited $4.2 million from a distant relative. To release the funds, we need a $500 processing fee."
Legitimate windfalls never require upfront payment. If you didn't enter it, you didn't win it.
Ponzi / Pyramid Scheme
aka "Investment Club," "Multi-Level Marketing"
Early investors are paid returns using money from new investors, creating the illusion of profit. Collapses when recruitment slows. Pyramid schemes add layers of recruitment with commissions.
"I'm getting 15% monthly returns โ€” guaranteed! You just need to bring in two friends to join."
Consistent high returns with "no risk" don't exist. If returns depend on recruiting others, it's a pyramid.
Romance Scam
aka "Sweetheart Scam," "Catfishing for Cash"
Builds a fake romantic relationship over weeks or months. Uses love bombing, emotional intensity, and fabricated crises to extract money. Always has excuses for not meeting in person (military, oil rig, overseas).
"I've never felt this way about anyone. I'm stuck overseas and my wallet was stolen. Can you wire me $2,000?"
If they can't video call, won't meet, and need money โ€” it's a scam regardless of how real the feelings seem.
Tech Support Scam
aka "Remote Access Scam"
Claims your computer is infected or compromised. Creates urgency to get you to call a fake support number or grant remote access. Once in, they steal data, install malware, or charge for fake "repairs."
"SECURITY ALERT: Your computer has been compromised. Call Microsoft Support immediately at 1-800-XXX-XXXX."
Microsoft, Apple, and Google will never pop up alerts asking you to call. Real security software doesn't use phone numbers.
Pressure Sale / Urgency Manufacturing
aka "Limited Time," "Act Now"
Creates artificial time pressure to prevent you from thinking clearly, researching, or consulting others. Legitimate businesses don't need to rush you because their product stands on its own merits.
"This price is only available for the next 30 minutes! Only 2 spots left!"
Any deal that disappears because you took time to think was never a good deal. Walk away and see if it comes back.
Affinity Fraud
aka "Community Scam," "Church Scam"
Targets tight-knit communities (religious, ethnic, professional, military) by exploiting trust networks. Uses a community member (real or fake) to vouch for legitimacy. Particularly devastating because victims are reluctant to report it.
"Brother Johnson from the congregation put his whole family's savings in. It's how our community takes care of each other."
Shared identity doesn't equal shared trustworthiness. Verify independently regardless of who's vouching.
Pig Butchering
aka "Sha Zhu Pan," "Crypto Romance"
Combines romance scam with fake investment platform. "Fattens the pig" with small profitable trades on a fake exchange before encouraging larger deposits that can never be withdrawn. Often run by trafficking victims.
"I made $50,000 last month on this trading platform. Let me teach you โ€” start with just $500."
If a romantic interest introduces you to an investment platform, it's a scam. Always. No exceptions.
๐ŸŽฃ Phishing & Email Fraud
Credential Harvesting
aka "Fake Login," "Account Verification Phishing"
Sends you to a fake website that looks like a real login page (bank, email, social media). When you enter your password, they capture it. URLs often have subtle misspellings or extra characters.
"Your account security needs verification. Log in at paypa1-secure.com to confirm your identity."
Never click login links in emails. Go directly to the site by typing the URL yourself. Check for "l" vs "1" and "0" vs "O" in URLs.
Spear Phishing
aka "Targeted Phishing," "Whaling" (when targeting executives)
Unlike mass phishing, this targets specific individuals using personal details scraped from social media, data breaches, or company websites. Makes emails seem highly credible because they reference real names, projects, or events.
"Hi Sarah, following up on our conversation at the Denver conference. Here's the proposal you asked for." [malicious attachment]
Verify unexpected attachments through a separate communication channel, even from people you know.
Smishing & Vishing
aka "SMS Phishing," "Voice Phishing"
Phishing via text message (smishing) or phone call (vishing). Text messages create urgency about package deliveries, bank alerts, or account issues. Phone calls impersonate banks, IRS, or tech support.
"USPS: Your package could not be delivered. Schedule redelivery: [suspicious link]"
The IRS never calls demanding immediate payment. Banks never text asking for your password. Carriers don't text random tracking links.
Business Email Compromise (BEC)
aka "CEO Fraud," "Invoice Scam"
Impersonates a boss, vendor, or partner via email to redirect payments. Often uses slightly altered email domains. May hack a real account and insert themselves into existing email threads.
"Hi, I need you to wire $42,000 to our new vendor account ASAP. Use this updated routing number. Keep this between us for now."
Always verify payment changes by phone using a number you already have โ€” not one from the email.
QR Code Phishing (Quishing)
aka "QR Jacking"
Places malicious QR codes over legitimate ones (on parking meters, restaurant menus, flyers) that redirect to phishing sites or trigger malware downloads. Exploits the fact that most people scan QR codes without checking where they lead.
Sticker placed over a restaurant's real QR code menu that redirects to a fake "order and pay" page.
Check if a QR code sticker was placed over another one. Preview the URL before opening. Be suspicious of QR codes in unexpected places.
๐ŸŽฉ Con Games & Classic Fraud
The Long Con
aka "Big Con," "The Sting"
Extended fraud that builds trust over weeks or months before the actual theft. The con artist invests time, appears legitimate, may even give you small wins or gifts. The payoff comes when trust is fully established.
A "business partner" who takes you to dinners, introduces you to "investors," and delivers on small promises before asking you to invest $100,000 in a "can't miss" deal.
The most dangerous cons feel like genuine relationships. If someone seems too perfect, too generous, or too aligned with your dreams โ€” slow down and verify everything independently.
Bait and Switch
aka "Switcheroo," "False Advertising"
Advertises one thing (low price, specific product, attractive terms) to get your attention, then switches to something inferior or more expensive once you're committed. Uses your investment of time and energy against you.
"That model is sold out, but I have something even better for just $200 more."
If what you were promised isn't available, walk away. Your time investment isn't a reason to accept less.
The Pigeon Drop
aka "Found Money Scam"
A stranger "finds" money or valuables near you and offers to split them. But first, you need to put up "good faith money" or pay taxes/fees. The found money is fake; yours is real and gone.
"Look what I found! There's $10,000 in this envelope. Let's split it โ€” I just need you to hold $500 as good faith while I get it verified."
Found money from strangers is always a setup. Walk away immediately.
Pretexting
aka "Pretext Call," "Social Pretexting"
Creates a fabricated scenario (pretext) to justify extracting information or money. The con artist poses as a researcher, government official, bank employee, or IT support to make their request seem routine.
"This is the fraud department at your bank. We've detected suspicious activity. Can you verify your account number and the last four of your Social?"
Hang up and call back using the number on your card or statement. Legitimate institutions never ask for full credentials by phone.
Authority Impersonation
aka "Badge Flash," "Fake Official"
Poses as police, IRS agents, utility workers, or other officials. Exploits the human tendency to comply with authority figures. May threaten arrest, fines, or service shutoff to create compliance.
"This is Officer Martinez with the county sheriff. There's a warrant for your arrest for unpaid fines. You can resolve this now with a payment of $1,500."
Real law enforcement doesn't call demanding payment. Real IRS sends letters first. Real utility workers have verifiable ID and scheduled appointments.
Charity Fraud
aka "Disaster Scam," "Fake Charity"
Exploits generosity after disasters, during holidays, or around emotional causes. Uses names similar to real charities, pressure tactics, and emotional manipulation. Very little or none of the money goes to the stated cause.
"We're collecting for the hurricane victims. Any amount helps. We can take your credit card right now over the phone."
Donate directly through charities you know. Check Charity Navigator. Never give credit card info to unsolicited callers.
๐ŸŽญ Trolling & Bad Faith Tactics
Sealioning / JAQing Off
aka "Just Asking Questions," "Concern JAQing"
Asks an endless series of questions disguised as genuine curiosity. The goal isn't to learn โ€” it's to exhaust you, waste your time, and make you look unreasonable for eventually refusing to engage. Each answer generates five more questions.
"I'm just trying to understand. Can you explain why? But what about this case? Can you prove that? What's your source for that specific claim?"
If someone's questions never end and they never acknowledge your answers, they're not actually curious. State your position once and disengage.
Gaslighting
aka "Reality Denial," "Crazy-Making"
Systematically denies your experience, memory, or perception of events. Makes you question your own reality. Can be interpersonal (a partner) or institutional (an organization denying documented facts). Named after the 1944 film.
"That never happened. You're imagining things. Everyone else remembers it differently. You're being paranoid."
Document everything. Trust your records over someone else's reinterpretation. If someone regularly makes you doubt your own memory, that's the pattern.
Whataboutism
aka "Tu Quoque," "Deflection"
Responds to criticism by pointing to someone else's wrongdoing rather than addressing the point. Designed to deflect accountability and change the subject. Originally a Soviet propaganda technique.
"Sure, but what about when YOUR side did [unrelated thing]?"
Stay on topic. "That may also be worth discussing, but right now we're talking about X."
Strawman Arguments
aka "Misrepresentation"
Restates your position in an exaggerated or distorted way, then attacks the distortion rather than what you actually said. Makes it appear they've defeated your argument when they've actually argued against something you never claimed.
"So what you're REALLY saying is that you hate all veterans." (When you said military spending should be audited.)
"That's not what I said. I said [restate your actual position]. Please respond to what I actually said."
Concern Trolling
aka "I'm Worried About You"
Disguises attacks, undermining, or sabotage as helpful concern. The "concern" always leads to the conclusion that you should stop doing whatever they object to. Often used in professional settings to derail initiatives.
"I'm just worried that this project might hurt your reputation. Are you sure you want to put your name on it?"
Ask yourself: does this person have a history of supporting me? Is their "concern" consistently aligned with their own interests? Genuine concern offers help; concern trolling offers doubt.
Tone Policing
aka "Calm Down," "Be Civil"
Dismisses the content of your argument by criticizing your emotional tone. Puts the burden on you to perform calmness rather than addressing the substance. Particularly used to silence people raising legitimate grievances.
"I can't take you seriously when you're so emotional. Come back when you can discuss this rationally."
Emotions and logic aren't opposites. Someone can be both angry and correct. Don't let tone criticism become a substitute for substance.
Gish Gallop
aka "Argument Flood," "Firehose of Falsehood"
Overwhelms with so many arguments, claims, or accusations that it's impossible to address them all. Each unaddressed point is treated as "won." Quantity is used as a substitute for quality. Common in debates and online arguments.
Posts a wall of text with 15 different claims, half-truths, and misleading statistics in one message, then declares "victory" when you can't respond to all of them.
Pick the strongest or most central claim and address only that. "You've raised many points. Let's focus on the core one: [X]."
DARVO
Deny, Attack, Reverse Victim and Offender
First denies the behavior, then attacks the person who raised the concern, then reverses roles by claiming THEY are the real victim. A specific pattern documented by psychologist Jennifer Freyd. Common in abuse dynamics.
"I never did that. Why are you always attacking me? You're the one who's been abusive in this relationship."
Document the pattern. When someone goes from denial to counterattack to victimhood in rapid succession, that's DARVO โ€” and it tells you more about them than about you.
๐Ÿ•ต๏ธ Social Engineering & Information Extraction
Pretexting
Creates a fabricated scenario to justify extracting information. May pose as IT support, a researcher, a new colleague, or a service provider. The pretext makes the request seem routine rather than suspicious.
"Hi, I'm from IT. We're doing a security audit and need to verify your login credentials."
Verify the person's identity through official channels before sharing any information, no matter how routine the request seems.
Elicitation
aka "Casual Extraction," "Conversational Intelligence"
Extracts sensitive information through seemingly casual conversation. Uses flattery, shared interests, deliberate mistakes (so you correct them with the real info), and reciprocity (sharing something about themselves to get you to share).
"I heard your company is working on that new project โ€” the one with the $5 million budget, right?" (It's actually $15 million, and now you've corrected them.)
Be aware of conversations that seem to steer toward specific details about your work, finances, or schedule.
Love Bombing
aka "Idealization Phase"
Overwhelms you with excessive attention, affection, gifts, and promises early in a relationship. Creates emotional dependency before revealing controlling or exploitative behavior. Used in romance scams, cults, and abusive relationships.
Constant messages, grand declarations of love within days, making you feel like the most important person alive โ€” then gradually increasing demands and control.
Genuine affection develops gradually. If it feels overwhelming and too fast, trust that instinct.
Isolation Tactics
aka "Divide and Conquer"
Separates you from your support network โ€” friends, family, advisors โ€” so you're dependent on the manipulator for information and emotional support. May badmouth your friends, create conflicts, or demand secrecy.
"Don't tell anyone about this. Your family wouldn't understand. I'm the only one who really gets you."
Any relationship that requires you to cut off other relationships is not healthy. Secrecy serves the person requesting it, not you.
Tailgating / Piggybacking
Follows an authorized person into a secure area, whether physically (holding the door) or digitally (using someone else's credentials). Exploits politeness and the human tendency to not challenge people who seem to belong.
"Oh, I forgot my badge. Could you hold the door? Thanks!" Then accesses restricted areas, networks, or information.
It's not rude to ask someone to use their own credentials. It's security.
๐Ÿ›๏ธ Political & Media Manipulation
Language Corruption
aka "Semantic Manipulation," "Doublespeak"
Systematically changing the meaning of words to serve political purposes. When "conservative" no longer means "conserve what works," when "liberal" no longer means "freedom," when "patriot" means unquestioning loyalty โ€” the language itself becomes a tool of control. People end up fighting over words that no longer mean what they think.
Using "freedom" to mean deregulation that benefits corporations. Using "reform" to mean cuts. Using "security" to mean surveillance.
Ask what the word actually means โ€” its root, its history. Then ask if the current usage matches. When words lose their meaning, thinking becomes harder.
Manufactured Outrage
aka "Outrage Machine," "Rage Bait"
Deliberately frames issues to provoke anger rather than understanding. Keeps people emotionally activated so they can't think clearly. Anger drives engagement, clicks, and donations โ€” but it prevents problem-solving.
"THEY want to DESTROY your way of life!" (without specifying who "they" are or what specifically is threatened)
When you feel outrage, pause. Ask: What specifically happened? Who benefits from my anger? Am I being informed or activated?
False Equivalence
aka "Both Sides," "False Balance"
Presents two positions as equally valid when they're not. Gives fringe or debunked positions equal airtime with well-established facts. Creates the appearance of "fairness" while actually distorting reality.
Giving equal time to climate scientists and climate deniers, creating the impression of genuine scientific debate where there isn't one.
Balance isn't about equal time โ€” it's about proportional representation of evidence. Look at the weight of evidence, not the volume of voices.
Firehose of Falsehood
aka "Information Warfare," "Flood the Zone"
Produces so many contradictory claims, lies, and distractions that fact-checkers can't keep up. The goal isn't to convince โ€” it's to exhaust and confuse until people give up trying to know what's true. Nihilism becomes the default.
Making five contradictory claims in one press conference, then denying all of them the next day.
Don't try to debunk everything. Focus on the core claims. Recognize that confusion IS the strategy.
Scapegoating
aka "Othering," "Enemy Construction"
Blames a specific group (immigrants, minorities, elites, foreigners) for complex systemic problems. Simplifies complicated issues into a villain narrative. Redirects anger from the actual causes to a convenient target.
"If it weren't for [group], you'd have better jobs, safer streets, and a better life."
Complex problems have complex causes. When someone offers a simple villain, they're selling you a story, not a solution.
Weaponized Humor
aka "Laughing At vs. Laughing With"
Uses humor to normalize cruelty and create in-groups and out-groups. Laughing WITH people recognizes shared humanity. Laughing AT people creates separation and establishes dominance. When challenged, retreats to "it's just a joke."
Mocking vulnerable groups for laughs, then saying "Can't you take a joke?" when called out.
Genuine humor brings people together. If a "joke" requires someone to be the butt, it's not humor โ€” it's a weapon in a comedy mask.
โš–๏ธ Zero-Sum Transaction Tactics
Information Asymmetry
One party deliberately withholds material facts that would change your decision. Buries important terms in fine print, uses jargon to obscure meaning, or simply lies by omission. In a win-win transaction, both parties have the information they need.
A contract where the auto-renewal clause and cancellation fees are buried on page 47 of 50.
If you can't understand the terms after an honest effort, the complexity may be the point. Ask for a plain-language summary. If they won't provide one, that tells you everything.
Vulnerability Exploitation
Targets people in desperate situations โ€” facing eviction, medical crises, grief, loneliness, or financial emergency. Offers "solutions" that extract maximum value from minimum delivery. The worse your situation, the more they stand to gain.
Payday loans at 400% APR targeting people who can't access traditional banking. "Miracle cures" marketed to the terminally ill.
When you're in crisis, that's when you're most vulnerable to bad deals. If possible, bring a trusted friend or advisor to any major decision made under duress.
Anchoring
aka "High-Ball / Low-Ball"
Sets an extreme starting point so any subsequent offer feels reasonable by comparison. A car listed at $40,000 "discounted" to $32,000 feels like a deal โ€” even if it's worth $25,000. The anchor distorts your perception of fair value.
"This normally sells for $10,000, but I can get you a special price of $4,500."
Research actual value independently BEFORE seeing anyone's price. Your own research is the anchor that protects you.
Sunk Cost Trap
aka "Throwing Good Money After Bad"
Once you've invested time, money, or emotion, the manipulator leverages that investment to get more from you. "You've already paid for the first module, it would be a waste not to complete the course." Your past investment becomes the chain.
"You've already driven an hour to get here, you might as well sign the contract today."
Past investment is gone regardless. The only question is: does this deal make sense RIGHT NOW, starting from zero?
Win-Win vs. Win-Lose: The Test
In a genuine win-win, both parties benefit and the total value grows. In a zero-sum extraction, one party's gain comes from the other's loss. The key test: if the other party knew everything you know, would they still agree? If transparency would kill the deal, it's not a deal โ€” it's a con.
Ask yourself: Would this offer survive full transparency? If either party would walk away with complete information, the arrangement isn't mutual โ€” it's extraction.

What is BullshitFinder?

BullshitFinder.fyi is a tool for identifying manipulation, fraud, and bad-faith tactics in everyday life. Paste any email, chat message, social media post, sales pitch, or news article and get an instant analysis of what's really going on.

It doesn't just tell you something's wrong โ€” it tells you exactly WHAT technique is being used against you, by name, with an explanation of how it works.

Why does this exist?

We live in an age where the average person encounters dozens of manipulation attempts every day โ€” scam emails, misleading ads, political spin, online trolls, predatory contracts, romance scams. Most people know something feels "off" but can't articulate what.

BullshitFinder gives you the vocabulary and the framework to name what's happening. Because once you can name it, you can stop it.

This tool is built on the principle that authentic exchange โ€” where both parties genuinely benefit โ€” is the only sustainable model. Everything else is extraction. The Bullshit Finder helps you tell the difference.

$25
per year โ€” unlimited use
  • Unlimited content analysis
  • All detection categories
  • Complete Field Guide access
  • New patterns added regularly
  • No ads, no data selling, ever

The Philosophy

The Bullshit Finder is part of the TransformativeArts Framework (TAF), developed over fifty years of work in education, psychology, and creative expression. TAF holds that the deepest part of every person is good, and that manipulation tactics exploit our best qualities โ€” trust, compassion, curiosity, generosity โ€” against us.

Understanding how these tactics work isn't about becoming cynical. It's about protecting your ability to trust genuinely by learning to recognize when that trust is being exploited.

Who made this?

BullshitFinder.fyi is a product of Shiny Penny Productions L3C, based in Burlington, Vermont. Built by Scott Thomas Carter, M.M. (Eastman School of Music), drawing on five decades of teaching, creative work, and the lived experience of knowing exactly what it's like when the systems that should protect you are running on bullshit instead.