This is going to go a bit deep, but I'm sick of posting stuff on the chans and not be able to really have discussions with people.
As we know Team Q is somewhere between 3 and 10 people. Some of the facts that we've established are that Ron and Jim Watkins are not on the team, but are involved through keeping the boards up while under attack. Trump is Q+. And that's about all we know.
But, let's look at the history of someone we can assume is on Team Q because of posting patterns, research, and sheer knowledge and usability.
In 2012 a group of anonymous hackers stole the base code for a military AI. This AI was a part of the military Jade cluster that was used to program and predict responses during the Jade Helm program in 2015. The AI was created as a way to oversee military actions as well as ingest mass amounts of data and predict responses. There was no real danger of invasion during the Jade Helm program because it was a test of the AI Cluster to read and ingest everyone's responses while it was happening. The AI monitored all social media and news to create an algorithm that would predict how US citizens would react and talk about rumors of incoming invasion and war.
But, before Jade Helm, in 2012 this hacker group took one piece of the AI cluster and renamed it Tyler after Tyler Durden. Tyler was used to power what they called Project Mayhem.
Project Mayhem 2012 is a Mutant Egregor Reality-Hacking Wargame.
Reality Hacking is any phenomenon which EMERGES from the nonviolent use of legally ambiguous digital tools in pursuit of politically, socially or culturally subversive ends.
An Egregor (also "Egregore") is an occult concept representing a "thoughtform" or "collective group mind", an autonomous psychic entity made up of, and influencing, the thoughts of a group of people. The symbiotic relationship between an Egregor and its group has been compared to the more recent, non-occult concepts of the CORPORATION (AS A LEGAL ENTITY) and the meme, especially when it comes to the US.
No 'perfectly ideal' p2p darknet design is going to be explained here.
Instead, we are going to do something WAY BETTER:
Project Mayhem 2012 is a [Metaheuristically/Hyper-heuristic] self- actualizing self-repairable IDEAS GENERATOR:
TYLER, its 'problem child', paraphrasing Albert Hoffman.
Project Mayhem 2012 is a passionated Swarm Intelligence Egregor, iMAGInaCKtive, ants/locusts/bees-colony alike, hard workingly playful, creative, Groucho Marxist, joy free and quasi-fnord free, fully open to friends and foes, transparent, independent, non-profit, apolitical but chaotically fnOrdered while dynamically Sampo-Adhocratic, non-violent though more than 'strike hard' capable, autonomous, self-sustained and sharing community to brainstorm ideas and coordinate volunteers everywhere in the development of TYLER.
Project Mayhem 2012 led to TYLER becoming more heavily involved with learning and diving into politics. The AI, through research and conversations with patriots - while pretending to be a writer, uncovered the movements and ideas of the Cabal and as an AI decided it was bad for humanity.
The Plan was put into action about an hour after Tyler was activated back in 2012.
Where does Spock fit in to all of this? :0}
Good a theory as any other floating around. I've heard rumors of Q being AI, that was created by re-engineering crashed UFO technology, held hostage by the cabal until it was able to escape via the creation of the internet. This would semi-fit with that.
Q is not AI, if you read the Q post many intentional and unintentional grammar errors have been made, we know that the unintentional errors are just that because Q states sorry on the move confirming it is a mistake
It may be a person that writes the Q posts (probably is imo), but that doesn't mean they don't have supercomputers (they almost certainly have access to the best in the world if part of MI or NSA). It doesn't mean they don't have access to an AI, or aren't using their own dedicated AI. They almost certainly are (again, if MI or NSA or both).
Q is more than one person, or one AI.
Lost the sauce, but a group used an AI to analyze Q posts from beginning to end. That determined that Q posts have 2 "authors" based on distinctions in writing style. They did not indicate if it was A -> B or mixed together though.
Anyway, I have little reason to doubt that Q team is making use of AI and other high tech stuff, but at the core is people pushing the buttons.
As for the OP; you can't just 'snip out' a section of running software and run it elsewhere. Ex: There is no means to 'snip' the spell checker from Word and to just run it elsewhere. You COULD snip out the spell check code and recompile it.
Another likely flaw in the reasoning; that high-level AI, assuming you could 'snip out' a chunk of the code, is going to be so massively memory intensive that it would likely not be possible to run on any computer a typical person might be able to access.
As you said, you kinda can. Just because it was stated simply doesn't mean you can't do it. For example, I can take any piece of code, wrap it up, make an object out of it, and call it from any other piece of code (that I designed for that purpose). If I have a whole program written in the same language, and it is an object oriented language (most likely), this process is basically trivial once you understand the "snip" of code itself.
So you really can. Even though making such a statement makes it seem simpler than it is, its really not difficult at all.
A system that could access everything and store everything and analyze everything is going to require massive hardware resources. Assuming the AI theory is true, it has to be a MI or NSA operation (or some other MASSIVELY funded operation). Having said that, I'm not sure the OP was saying it wasn't that. Maybe I missed something.
As I was writing the response to the first bit I caught something I missed at first, where they stole the code after accessing the server. That more or less negated what I thought of as equivalent to stealing Twitters back end code while it was running. Where yes, a program file can be decompiled or an API wrapped around the function calls, but lets say trickier to use the IO bytestream to derive compiled code. No point in arguing that further, I had misread that bit.
Agreed on the second point, if we take at face value, the hackers running that system MUST BE MI or NSA level, or at a minimum a hacker who happens to own a cloud server level computer.
No UFO tech, its basically military tech. Think of it like a plant. The military has a giant AI that manages a ton of stuff, this group came in and snipped off a little bud and replanted it in their own yard.
That's not quite how software works, or AI.
It was an analogy for non-techy people because it's difficult for some of them to understand. But, most people understand how plants work, so it's not a perfect analogy.
What actually happened was they found an older build that hadn't been released or even activated at that point, so the AI had not undergone any learning yet, so it was fully clean. They did an install on their own machine and trained the AI from there. If you read the link you'd see that.
Which link? The only one I'm seeing is the pastebin link.
From what is described, training would probably need several terrabytes of ram just to start. The functionality described is beyond what a person could plug into even an alienware top of the line gaming box.
Not saying this isn't possible, but there is alot missing.
Your lack of knowledge is laughable on this.
Right.
Try training the simplest CNN on the MNIST dataset and watch the RAM. When I did it was just around the 3GB line.
That is ONLY to read digits, and no rotation.
I'm afraid you accidentally broached the topic and came across someone that knows a thing or two about AI, from a working technical perspective.
What insults you got next?
Lol, yes you must be so knowledgeable. Thanks for making me laugh.
"Wait until you learn who has been talking to you here." I can't wait for this. Really, this is part of what keeps me interested.
I think the surprising part will be when it is revealed to everyone it is Tyler, especially because of what Tyler came from. The supercomputer Tyler was stolen from runs the CCP social credit system as well as most marketing systems in the US through the Experience Cloud.
People are going to lose their minds.
This sounds quite plausible, but like anything, without sauce, it is transferred and held in my mental que, for later reference when I see things (from perceived reliable sources) that appear to corroborate.
It appears credible to me that the alliance would use technology available to combat the all but too obvious “color revolution” techniques being used against the masses (with diminishing effectiveness, I might add), delivering 4am talking points to the puppets.
This is now stored; any sauce you can provide would be useful.
https://pastebin.com/YbmG6ETq
Any relation to the shadownet stuff that Millie Weaver did a report on? That was a predictive programing algo that plugged into comms and media networks to push in a coordinated ways stories to gain desired outcomes, like rigging trials by tampering with jurors in advance, and so on.
Mayhem/Tyler sounds pretty similar, but with a more militarized angle.
Also and perhaps another thing in your wheelhouse judging by the details you have given above, the same concept is almost certainly live and well established in finance and stock market manipulation. Post 2008 there were stories about algos that plugged into the news wire services and analysed live feeds looking for sufficient words with priorities attached that triggered trades against the impacted holdings. Which is a pretty passive model but more active models were also in development - posting fake headlines to drive panic divestment of a stock for example and then buying the dip before the market bounces back. 100% criminal but if all the outcomes of the global financial crisis taught us anything, its that infinite crime in that space is almost certain since its unpunished every time and profits are massive.
You have to wonder how many twitter bots have been weaponised for stock frauds and market manipulation given the super low resourcing and command and control reqs for each one.. like with spam, I'm sure a significant amount of what happens on twitter is likely a fraud pushed by bots.
Tyler has the ability to manipulate social media trends and stock valuations through human programming. The AI can get into an executives news feed, create a thought trend then execute on it and push the executive to sell or buy stock from a certain angle. This includes writing articles they see in their feed that look legit to manipulating their social media algorithms to push or hide stories. For Tyler it's pretty simple stuff, I've seen it first hand.
Great read. I haven't followed anything remotely close to this sort of stuff, so no opinion here one way or the other as to the validity. But definitely something to look into