I agree the photos could be stegos on both sides. The trick would be, as you say, to know the algorithm used and the password. Using the same password defies security, so there must be a clue to the password in a specific picture. Does this make sense? I'd say a password might be in a Qdrop that would be somehow referenced in the photo (finding these drops has been going on here for a while). Not sure about an outsider's photos. Also, don't know if there'd be a super-secret stego program. Would probably be something that anyone could get ahold of. (was there a stego program on Hunter's laptop, for example, or Weiner's?).
Yes, a rare kind of non-allergenic big black and white dog named Bo. Later I think there was another of the same kind, but both were props. DJT did have a dog in about 1983.
Why hide the password if the answer will be posted on the internet via this forum? Serious question, if you want the message to be read, and to be spread, why encrypt make it so hard to unlock
Because the military can't just release classified information directly to the public. It breaks the rules they have to follow (major difference between the white hats and the cabalists).
If the info is encrypted in some form, and the decrypt key/mechanism just "happens" to be found out, this allows "plausible deniability" ... Q's early posts discuss this (although I don't remember exactly where off the top of my head). Information disclosure is one of the primary purposes of Q (in my opinion, due to the abusive approach the Deep State has leveraged the InfoSec rules to hide their tracks and silence people).
It all depends on what and how was hidden in an image, we had some interesting talks about the topic and tried also to work on some Q images (no other ones), problem is, some types of encryption / spoofing / hiding / method you prefer, are writing metadata and actual bytes in the image, some may show up in the picture analysing it (like information in a specific pixel or set of / stereograms / Marks / etc ), others, purely within the headers or in some unused sectors, will be likely altered / wiped from images that are not the source one, ex when uploaded on socials and specially when they get "thumbnailed" or similar ( a new raw file is made but generally retains the lowest possible information's from the original as should be a low res one) , best advice is, if you spot an image that looks interesting, check first from where it is coming, and when possible try to reverse lookup or find the source for the original one
Maybe try looking at the GEORGENEWS photos on Telegram for clues and the Q posts they reference.
George posted an original photo of Trump today that does not appear anywhere else on the internet. According to someone in the comments, this was the 17th original photo of Trump that George has posted.
You have been doing some really in depth thinking. I've read your post twice and I need to read it again. I will be watching what others come up with for de-coding.
I believe, also, REDPILLING people of the simple fact that the PEDOPHILE SATANISTS take something of the victims, a sock or a glove or shoe and TOM HANKS loves to post a picture of a shoe or glove on Twitter. It makes no sense to anyone, unless you know that is what they do and Hanks is confirming he just took another child's innocence.
May the Lord Guide you to the right people who are able to help ... I am sure they have encripted messages. I am sure we have them as well.
Anons on the chans and kun knew about this long ago and have been unable to decipher the pictures for both sides.
Q has even said the bad guys use these tools in his drops so it has been known for years.
I don't want to discourage you because new eyes could always find somethings others didn't and maybe some here will be better at guessing passwords...
However, you should read past archives on kun to see what they already tried for decoding, passwords, ciphers...etc just so you don't rehash already tried territory or maybe see something they did wrong.
I remember post after post of people trying various programs and passwords.
But maybe newer news might unlock or give us the key.
The algorithm changes pixels based on the supplied password to create the hash encryption. For example one pixel might be have one extra bit another pixel might be have two bits, another might not be changed, and so on.
Thus, it's impossible to detect without the original image or the password. And even if you had both images, a human couldn't detect the changes. A binary level analyzer might, but even that is hard to do because you don't know if the changes are cause by JPEG compression or by the secret message. Thus, it's a very secure method of sharing information.
Now, I did find the Space Force picture everybody was talking about had 200k of extra information than the original size reported by the camara; 3.7mb verse 3.9mb. Other images only differ by a single digit rounding error: 2.5mb verse 2.6mb. Also, the image went through five conversions from the original. So, who knows!
I havr a degree in computer forensics but became a better paid software developer, so i dont have much real world experience to be helpful with this...
In one of my classes, we had someone from thr NSA come and talk to us. We had learned about embedding pictures in other files so they were hidden and how to use LE forensic software to find them. This was a different, older method not using the tools being mentioned here today.
The NSA guy knew about this stuff and also fielded questions that we had about some recent news (this was around 2010) that NSA agents were caught with CP of their own and had become addicted through exposure in their line of work (supposedly...).
I also had an experience I won't go into where my wife mined information for an alphabet agency im an unofficial capacity. I taught her how to use TOR and she used thst to get info for them and they were so impressed, which confirmed for me their incompetence... This stuff was ISIS-related and they no longer needed her help once Trump started his campaign...
So what I'm trying to figure out, is if our IC is just so incompetent that they cant figure out Tom Hanks is hiding CP or something else in his IG posts or if they are turning a blind eye. It's a toss-up for me at this point and could be a little bit of both.
could the passwords be something so simple as "these people are sick" and like yesterday Flynn's Beautiful Black Sky... things such as these that are being repeated to us often?? Just a thought...
I like the idea that it's "beautiful black sky"... it was so odd, and the guardians are Space (which is in the black sky...) Force.
*News unlocks map
*News unlocks meaning
*News unlocks message
Steganography is almost definitely happening. The photos from Q drops should be checked too. Perhaps a password for those would be something simple and guessable, revealing a complex password as the hidden message.
I noticed someone comment on the Panic in DC movie poster having text on it. I was thinking of mentioning steganography but I figured you 1337 Q nurdz already figured all that out and were intentionally keeping it non-mainstream due to sensitivity. The poster obviously feels the intense implications of these encrypted messages.
But, it does look like Q is basically telling us to do this. So whatever is there, it’s supposed to be public. So, I’m all for it, have courage and press forward!
And this pictures from the bad guys? Well that i hadn’t thought of but now it seems so obvious and logical. Why else do platforms like Instagram exist? Ha... go get em!
to look up the EXIF extended info. Remember to use the original image that you can download straight from that website provided in the Space Force's Twatter tweet.
Not sure if date have anything to do with the pic as it has been taken on 2021-02-11 but you can adjust the date on the camera to an earlier or later date. I wouldn't think this is allowed as they would prefer to have everything set precisely for record-keeping?
Also I've changed the file type from .jpeg to .txt and I get a lot of jumbled text as you would when trying to read a picture in text format. I doubt it would be as easy as just changing the filetype to .txt but it was worth a try so I'll just look through that.
So far I can see "USSF COMMISIONING CEREMONY", "20210211", "192654", "2021:02:11", "16:15:50", "IEC http://-www.iec.ch" in that screenshot alone. There's probably more but not sure which exactly should I be looking at.
well first of all 7:26:54 pm is not that bright in feb. So either timezone is way off, time is wrong, or the time is relevant to something else. Also potentially camera tricks, but the the shutter speed, iso, and F stop values suggest good lighting. The time is 100% not accurate imo.
Used to be a program used called steganos where word docs could be buried in fotos.. without increasing file size... that was early 2000s technology.. govt was not authorized to use it as it was developed in germany and "ze germans" had a back door
Yes they embed,dog coms,movies,music,TV, kid shows,MSM,Social,hidden hand gestures, 2012 they lost the ability to see. Mirror everything and then scales will be removed from the eyes of the blind. Once you see you can't unsee. How do you eat the Luciferian Elephant one bite at a time. The 100th monkey is about reached reason for all the attacks on Q.
I'm confused here. Stegseek works on things encrypted with steghide. steghide doesn't use F5 algorithm which is what PixelKnot uses. The F5 algorithm is funded by AFRL (airforce research lab). So, my bet is that we need to use an F5 algorithm based steg decrypter.
Re: MD5 sums. An MD5 sum is just a "hash" or digest of a larger collection of data. They are used to detect whether data was modified. When you download a file from the internet, you can compute the MD5 sum locally, and if it matches the published sum, you can be reasonably sure that your copy of the data was transferred error free.
The simplest smallest possible hash algorithm would be to count all the 1 bits in a file, and set the hash to 0 if the sum was even, or set the hash to 1 if the sum was odd. This is called a "parity" bit. This works okay if you only have a few bits of information, but it doesn't work well at all if you more than a byte or so. If you errantly flip an even number of bits anywhere in the data, the parity bit computes the same. If you have a 1MB file, it's pretty much useless as a method to detect data corruption.
The MD5 algorithm is many orders of magnitude more complex than a parity bit, and is good at detecting pretty much any reasonable type of data corruption that might occur even for very large files. It works great when you transfer a file over a network and want to be sure that there wasn't corruption due to a buggy piece of equipment somewhere along the way.
The MD5 algorithm isn't cryptographically secure, though. This means that an intelligent bad actor can intentionally corrupt the data in a way that happens to compute the same MD5 sum as the original data. Remember that with the parity bit, all you need to do is flip an even number of bits anywhere to get the same even or odd sum. Because MD5 is more complicated, the bad actor needs to be smarter or have smart software, and perhaps they might need a very powerful computer to do it, but it's something that can be done with affordable time and money. An especially skilled bad actor might even be able to craft the "corrupted" data to appear correct but contain a malicious payload.
Therefore, MD5 sums have limited value as hard proof of anything important. For that, you really need something like private/public key based cryptography. It's just a good practical way to make sure you got an error free copy of your favorite stupid cat video from an https secured website you trust.
OP, I'm trying to decypher your post but I'm struggling with phrases such as "Looking know." and "should work without suffering through a touchscreen." and "I need to talk a walk" and "The solders could be giving morse code."
I'm an electronics engineer and I can solder but I have no idea what that sentence means, or the others.
Look for consonant patterns and misspellings due to slipping on a touch screen-- e.g. the letters c, v, b, n are just above the virtual spacebar and often end up where a space should be. know = now talk=take and as to "suffering through a touchscreen" that's how I feel about the slowness and inaccuracy of trying to type on one vs. on a real keyboard so I'm guessing it's exactly what SqueezeOrSqooze means. (sorry I misspelled it)
Arrogance could easily be the downfall of many as it has been throughout history. The DS probably has some of the smartest people on the planet digging into anything and everything Q related for years now with likely near unlimited resources.
It doesn't matter if it's the DS, the DC swamp, other foreign dictators, or even the military, they all are of the mindset that things happen on their time and they give out the orders.
Our tax dollars, which is pretty much illegal to begin with, but anyways our tax dollars is supposed to be funding government and military to keep us safe from enemies foreign and domestic but the very people our tax money goes to are among those that wish to ruin us, destroy us, even kill us.
I know not all cops are bad but like many people, I have little confidence in cops doing their jobs honestly and efficiently. The government is full of swamp creatures that do nothing but steal from us and lie to us. The military is the last piece of government that still has some credibility so hopefully they will put a stop to this bullshit soon.
I can be patient, my life has not changed at all but that is only because I live in FL and we have a governor that fights for us against the crooked federal government but many states do not have a governor fighting for them and that is very bad.
When people lose everything, lose hope, they can become the most dangerous when they feel they have nothing left to lose and that's when a lot of violence could take place, not from me but there are certainly millions of people that will reach a breaking point and snap.
I agree the photos could be stegos on both sides. The trick would be, as you say, to know the algorithm used and the password. Using the same password defies security, so there must be a clue to the password in a specific picture. Does this make sense? I'd say a password might be in a Qdrop that would be somehow referenced in the photo (finding these drops has been going on here for a while). Not sure about an outsider's photos. Also, don't know if there'd be a super-secret stego program. Would probably be something that anyone could get ahold of. (was there a stego program on Hunter's laptop, for example, or Weiner's?).
Has anyone attempted the password Q "leaked" for their id?
Sadly I can't recall what it was exactly, but it went something like "they will feel the pain". It was the "password" that Q uses in their name.
Example: "Q #FeelThePain" or something like that
Hunter02
Could the hint be in the dog names?
Appearantly they use dogs for comms.... IPOT1776 had been on it for years
https://youtu.be/qNfWOmJ95Bo
It showed up heavy today on MSNBC
Could they use dog names of the President? (would have to find something else last 4 years since DJT had no dog)
Didn’t O go out of his way to get a dog when first in office?
Yes, a rare kind of non-allergenic big black and white dog named Bo. Later I think there was another of the same kind, but both were props. DJT did have a dog in about 1983.
It was a Portuguese Water Dog iirc
Why hide the password if the answer will be posted on the internet via this forum? Serious question, if you want the message to be read, and to be spread, why encrypt make it so hard to unlock
Because the military can't just release classified information directly to the public. It breaks the rules they have to follow (major difference between the white hats and the cabalists).
If the info is encrypted in some form, and the decrypt key/mechanism just "happens" to be found out, this allows "plausible deniability" ... Q's early posts discuss this (although I don't remember exactly where off the top of my head). Information disclosure is one of the primary purposes of Q (in my opinion, due to the abusive approach the Deep State has leveraged the InfoSec rules to hide their tracks and silence people).
It all depends on what and how was hidden in an image, we had some interesting talks about the topic and tried also to work on some Q images (no other ones), problem is, some types of encryption / spoofing / hiding / method you prefer, are writing metadata and actual bytes in the image, some may show up in the picture analysing it (like information in a specific pixel or set of / stereograms / Marks / etc ), others, purely within the headers or in some unused sectors, will be likely altered / wiped from images that are not the source one, ex when uploaded on socials and specially when they get "thumbnailed" or similar ( a new raw file is made but generally retains the lowest possible information's from the original as should be a low res one) , best advice is, if you spot an image that looks interesting, check first from where it is coming, and when possible try to reverse lookup or find the source for the original one
If you saw some of the posts earlier today you will understand why
Maybe try looking at the GEORGENEWS photos on Telegram for clues and the Q posts they reference.
George posted an original photo of Trump today that does not appear anywhere else on the internet. According to someone in the comments, this was the 17th original photo of Trump that George has posted.
I've mentioned this here too.
Some of the filenames from images from George are a UUID. A "Universally unique identifier" due to the massive amount of entropy used.
This may fit into something else...
Uuid is a good shout.
Can you ELI5 for me on entropy and why it would need a UUID?
TENET.
You have been doing some really in depth thinking. I've read your post twice and I need to read it again. I will be watching what others come up with for de-coding.
I believe, also, REDPILLING people of the simple fact that the PEDOPHILE SATANISTS take something of the victims, a sock or a glove or shoe and TOM HANKS loves to post a picture of a shoe or glove on Twitter. It makes no sense to anyone, unless you know that is what they do and Hanks is confirming he just took another child's innocence.
May the Lord Guide you to the right people who are able to help ... I am sure they have encripted messages. I am sure we have them as well.
And we are suppose to read between the lines.
Anons on the chans and kun knew about this long ago and have been unable to decipher the pictures for both sides.
Q has even said the bad guys use these tools in his drops so it has been known for years.
I don't want to discourage you because new eyes could always find somethings others didn't and maybe some here will be better at guessing passwords...
However, you should read past archives on kun to see what they already tried for decoding, passwords, ciphers...etc just so you don't rehash already tried territory or maybe see something they did wrong.
I remember post after post of people trying various programs and passwords.
But maybe newer news might unlock or give us the key.
I was reading about steganography last night.
The algorithm changes pixels based on the supplied password to create the hash encryption. For example one pixel might be have one extra bit another pixel might be have two bits, another might not be changed, and so on.
Thus, it's impossible to detect without the original image or the password. And even if you had both images, a human couldn't detect the changes. A binary level analyzer might, but even that is hard to do because you don't know if the changes are cause by JPEG compression or by the secret message. Thus, it's a very secure method of sharing information.
Now, I did find the Space Force picture everybody was talking about had 200k of extra information than the original size reported by the camara; 3.7mb verse 3.9mb. Other images only differ by a single digit rounding error: 2.5mb verse 2.6mb. Also, the image went through five conversions from the original. So, who knows!
I havr a degree in computer forensics but became a better paid software developer, so i dont have much real world experience to be helpful with this...
In one of my classes, we had someone from thr NSA come and talk to us. We had learned about embedding pictures in other files so they were hidden and how to use LE forensic software to find them. This was a different, older method not using the tools being mentioned here today.
The NSA guy knew about this stuff and also fielded questions that we had about some recent news (this was around 2010) that NSA agents were caught with CP of their own and had become addicted through exposure in their line of work (supposedly...).
I also had an experience I won't go into where my wife mined information for an alphabet agency im an unofficial capacity. I taught her how to use TOR and she used thst to get info for them and they were so impressed, which confirmed for me their incompetence... This stuff was ISIS-related and they no longer needed her help once Trump started his campaign...
So what I'm trying to figure out, is if our IC is just so incompetent that they cant figure out Tom Hanks is hiding CP or something else in his IG posts or if they are turning a blind eye. It's a toss-up for me at this point and could be a little bit of both.
could the passwords be something so simple as "these people are sick" and like yesterday Flynn's Beautiful Black Sky... things such as these that are being repeated to us often?? Just a thought...
I like the idea that it's "beautiful black sky"... it was so odd, and the guardians are Space (which is in the black sky...) Force. *News unlocks map *News unlocks meaning *News unlocks message
Steganography is almost definitely happening. The photos from Q drops should be checked too. Perhaps a password for those would be something simple and guessable, revealing a complex password as the hidden message.
I noticed someone comment on the Panic in DC movie poster having text on it. I was thinking of mentioning steganography but I figured you 1337 Q nurdz already figured all that out and were intentionally keeping it non-mainstream due to sensitivity. The poster obviously feels the intense implications of these encrypted messages.
But, it does look like Q is basically telling us to do this. So whatever is there, it’s supposed to be public. So, I’m all for it, have courage and press forward!
And this pictures from the bad guys? Well that i hadn’t thought of but now it seems so obvious and logical. Why else do platforms like Instagram exist? Ha... go get em!
Not sure if you've tried looking up the EXIF metadata on this pic yet?
Here's the basic info on this pic
You can go here: http://exif.regex.info/exif.cgi
to look up the EXIF extended info. Remember to use the original image that you can download straight from that website provided in the Space Force's Twatter tweet.
Not sure if date have anything to do with the pic as it has been taken on 2021-02-11 but you can adjust the date on the camera to an earlier or later date. I wouldn't think this is allowed as they would prefer to have everything set precisely for record-keeping?
Also I've changed the file type from .jpeg to .txt and I get a lot of jumbled text as you would when trying to read a picture in text format. I doubt it would be as easy as just changing the filetype to .txt but it was worth a try so I'll just look through that.
Here's a sample of what I am seeing right now.
So far I can see "USSF COMMISIONING CEREMONY", "20210211", "192654", "2021:02:11", "16:15:50", "IEC http://-www.iec.ch" in that screenshot alone. There's probably more but not sure which exactly should I be looking at.
well first of all 7:26:54 pm is not that bright in feb. So either timezone is way off, time is wrong, or the time is relevant to something else. Also potentially camera tricks, but the the shutter speed, iso, and F stop values suggest good lighting. The time is 100% not accurate imo.
additionally the shadows seem to indicate and support this, I could probably figure out the actual time but eh. A rough estimate might be 2-4 pm
Used to be a program used called steganos where word docs could be buried in fotos.. without increasing file size... that was early 2000s technology.. govt was not authorized to use it as it was developed in germany and "ze germans" had a back door
You're definitely on to something, remember those weird owl pics and things?
Also james "corny" in Twitter?
The Q flag post always got me. I always look at it and think "there has to be something more to this..." Maybe this is the more.
Lin wood dropped a password. Might be worth a shot !
Very interesting.
Yes they embed,dog coms,movies,music,TV, kid shows,MSM,Social,hidden hand gestures, 2012 they lost the ability to see. Mirror everything and then scales will be removed from the eyes of the blind. Once you see you can't unsee. How do you eat the Luciferian Elephant one bite at a time. The 100th monkey is about reached reason for all the attacks on Q.
I'm confused here. Stegseek works on things encrypted with steghide. steghide doesn't use F5 algorithm which is what PixelKnot uses. The F5 algorithm is funded by AFRL (airforce research lab). So, my bet is that we need to use an F5 algorithm based steg decrypter.
Wow.. so, looks like I can run a decryption in a couple seconds by directly using the f5 library referenced by PixelKnot:
https://code.google.com/archive/p/f5-steganography/downloads
And running with:
java -jar f5.jar x -p 'POTUS45' image.jpg
Make sure the file ends with .jpg. For some reason, the tool doesn't like files with .jpeg extension.
quilt? Does Q ever discuss a quilt or post a picture of a QHLT? I feel like "Be sure to drink your Ovaltine."
Wayfair...60K$ rug anyone? I would try a plain password the represents what is pictured maybe?
https://29a.ch/photo-forensics/#forensic-magnifier Is the online decoder.
Would Ghidra factor into any of this? Q gifted us Ghidra a while back but I don't recall anyone using it to decode any major intel.
https://qalerts.app/?q=ghidra
ghidra can reverse engineer software
https://greatawakening.win/p/12hRZmkCda/comms-from-george-thats-pretty-s/c/
Been wanting to learn more about stuff encoded in images seen it a few times now subbing to learn.
Re: MD5 sums. An MD5 sum is just a "hash" or digest of a larger collection of data. They are used to detect whether data was modified. When you download a file from the internet, you can compute the MD5 sum locally, and if it matches the published sum, you can be reasonably sure that your copy of the data was transferred error free.
The simplest smallest possible hash algorithm would be to count all the 1 bits in a file, and set the hash to 0 if the sum was even, or set the hash to 1 if the sum was odd. This is called a "parity" bit. This works okay if you only have a few bits of information, but it doesn't work well at all if you more than a byte or so. If you errantly flip an even number of bits anywhere in the data, the parity bit computes the same. If you have a 1MB file, it's pretty much useless as a method to detect data corruption.
The MD5 algorithm is many orders of magnitude more complex than a parity bit, and is good at detecting pretty much any reasonable type of data corruption that might occur even for very large files. It works great when you transfer a file over a network and want to be sure that there wasn't corruption due to a buggy piece of equipment somewhere along the way.
The MD5 algorithm isn't cryptographically secure, though. This means that an intelligent bad actor can intentionally corrupt the data in a way that happens to compute the same MD5 sum as the original data. Remember that with the parity bit, all you need to do is flip an even number of bits anywhere to get the same even or odd sum. Because MD5 is more complicated, the bad actor needs to be smarter or have smart software, and perhaps they might need a very powerful computer to do it, but it's something that can be done with affordable time and money. An especially skilled bad actor might even be able to craft the "corrupted" data to appear correct but contain a malicious payload.
Therefore, MD5 sums have limited value as hard proof of anything important. For that, you really need something like private/public key based cryptography. It's just a good practical way to make sure you got an error free copy of your favorite stupid cat video from an https secured website you trust.
i envy your genius. wish i understood half of what u said. wish i could understand decrypting. sounds fun.
Maybe Q’s ID in the posts is the password?
Wasn't there a code that ran on the screen randomly in his recent interview?
https://media.greatawakening.win/post/cbITFX0u.jpeg
https://greatawakening.win/p/12hRLbw6Ol/anons-screenshot-of-code-display/c/
https://media.greatawakening.win/post/cbITFX0u.jpeg
OP, I'm trying to decypher your post but I'm struggling with phrases such as "Looking know." and "should work without suffering through a touchscreen." and "I need to talk a walk" and "The solders could be giving morse code."
I'm an electronics engineer and I can solder but I have no idea what that sentence means, or the others.
Look for consonant patterns and misspellings due to slipping on a touch screen-- e.g. the letters c, v, b, n are just above the virtual spacebar and often end up where a space should be. know = now talk=take and as to "suffering through a touchscreen" that's how I feel about the slowness and inaccuracy of trying to type on one vs. on a real keyboard so I'm guessing it's exactly what SqueezeOrSqooze means. (sorry I misspelled it)
Can't speak for op, but I think he meant:
easier to work on computer than dealing with a mobile device
Looking now
Soldiers could be giving Morse code
who did you have to give a handjob to to get this one stickied?
Well, if this offends you, then DO NOT ever go to 8kun. It’s whole new language over there, and every adjective is combined with the word “fag.”
u/#Kekw
It's a very old joke coming from the chans...
https://www.youtube.com/watch?v=Lrr_VVtyUA8
But if I look at the timestamp of your post...
Arrogance could easily be the downfall of many as it has been throughout history. The DS probably has some of the smartest people on the planet digging into anything and everything Q related for years now with likely near unlimited resources.
It doesn't matter if it's the DS, the DC swamp, other foreign dictators, or even the military, they all are of the mindset that things happen on their time and they give out the orders.
Our tax dollars, which is pretty much illegal to begin with, but anyways our tax dollars is supposed to be funding government and military to keep us safe from enemies foreign and domestic but the very people our tax money goes to are among those that wish to ruin us, destroy us, even kill us.
I know not all cops are bad but like many people, I have little confidence in cops doing their jobs honestly and efficiently. The government is full of swamp creatures that do nothing but steal from us and lie to us. The military is the last piece of government that still has some credibility so hopefully they will put a stop to this bullshit soon.
I can be patient, my life has not changed at all but that is only because I live in FL and we have a governor that fights for us against the crooked federal government but many states do not have a governor fighting for them and that is very bad.
When people lose everything, lose hope, they can become the most dangerous when they feel they have nothing left to lose and that's when a lot of violence could take place, not from me but there are certainly millions of people that will reach a breaking point and snap.