179
posted ago by sleepydude ago by sleepydude +179 / -0

Okay, so, hear me out, because this is a reach.

What if the Military and Lindell have arranged to track and destroy the source of all DDOS attacks having been perpetrated by the DeepState over the last decade?

How might they do that? How could they get the complete list of all compromised burner computers being hacked to attack various sites over the last few years and trace them back to a source?

Well, announcing a competitor to Twitter and YouTube would be good bait. FrankSpeech has been worked on for 4 years in secrecy with no apparent investors? All hosted on privately owned servers? No leaks?

Hmm... Sounds to me more like a Military operation.

Wire in some of those fancy shmancy high tech super computers that traced all the IPs during the election which were shown in Absolute Proof and bobs-your-uncle -- you just revealed a road map to every blackhat hacking node in the world that works for the DeepState.

How could they resist the bait? If successful, FrankSpeech would be the death knell to their social media narrative control.

I had my doubts about FrankSpeech from the start being a "perfect" outlet for conservatives and also a competitor to YouTube and Twitter. You can't just force something like that to work, others have tried and failed for years. Now I think I see the plan, they've anticipated the site will be attacked.

My theory is that it isn't essential to succeed as a competitor, even though it still might. It was meant to put a giant target dummy on the world's biggest hacker tracing operation.

What do you guys think?