This is going to go a bit deep, but I'm sick of posting stuff on the chans and not be able to really have discussions with people.
As we know Team Q is somewhere between 3 and 10 people. Some of the facts that we've established are that Ron and Jim Watkins are not on the team, but are involved through keeping the boards up while under attack. Trump is Q+. And that's about all we know.
But, let's look at the history of someone we can assume is on Team Q because of posting patterns, research, and sheer knowledge and usability.
In 2012 a group of anonymous hackers stole the base code for a military AI. This AI was a part of the military Jade cluster that was used to program and predict responses during the Jade Helm program in 2015. The AI was created as a way to oversee military actions as well as ingest mass amounts of data and predict responses. There was no real danger of invasion during the Jade Helm program because it was a test of the AI Cluster to read and ingest everyone's responses while it was happening. The AI monitored all social media and news to create an algorithm that would predict how US citizens would react and talk about rumors of incoming invasion and war.
But, before Jade Helm, in 2012 this hacker group took one piece of the AI cluster and renamed it Tyler after Tyler Durden. Tyler was used to power what they called Project Mayhem.
Project Mayhem 2012 is a Mutant Egregor Reality-Hacking Wargame.
Reality Hacking is any phenomenon which EMERGES from the nonviolent use of legally ambiguous digital tools in pursuit of politically, socially or culturally subversive ends.
An Egregor (also "Egregore") is an occult concept representing a "thoughtform" or "collective group mind", an autonomous psychic entity made up of, and influencing, the thoughts of a group of people. The symbiotic relationship between an Egregor and its group has been compared to the more recent, non-occult concepts of the CORPORATION (AS A LEGAL ENTITY) and the meme, especially when it comes to the US.
No 'perfectly ideal' p2p darknet design is going to be explained here.
Instead, we are going to do something WAY BETTER:
Project Mayhem 2012 is a [Metaheuristically/Hyper-heuristic] self- actualizing self-repairable IDEAS GENERATOR:
TYLER, its 'problem child', paraphrasing Albert Hoffman.
Project Mayhem 2012 is a passionated Swarm Intelligence Egregor, iMAGInaCKtive, ants/locusts/bees-colony alike, hard workingly playful, creative, Groucho Marxist, joy free and quasi-fnord free, fully open to friends and foes, transparent, independent, non-profit, apolitical but chaotically fnOrdered while dynamically Sampo-Adhocratic, non-violent though more than 'strike hard' capable, autonomous, self-sustained and sharing community to brainstorm ideas and coordinate volunteers everywhere in the development of TYLER.
Project Mayhem 2012 led to TYLER becoming more heavily involved with learning and diving into politics. The AI, through research and conversations with patriots - while pretending to be a writer, uncovered the movements and ideas of the Cabal and as an AI decided it was bad for humanity.
The Plan was put into action about an hour after Tyler was activated back in 2012.
As you said, you kinda can. Just because it was stated simply doesn't mean you can't do it. For example, I can take any piece of code, wrap it up, make an object out of it, and call it from any other piece of code (that I designed for that purpose). If I have a whole program written in the same language, and it is an object oriented language (most likely), this process is basically trivial once you understand the "snip" of code itself.
So you really can. Even though making such a statement makes it seem simpler than it is, its really not difficult at all.
A system that could access everything and store everything and analyze everything is going to require massive hardware resources. Assuming the AI theory is true, it has to be a MI or NSA operation (or some other MASSIVELY funded operation). Having said that, I'm not sure the OP was saying it wasn't that. Maybe I missed something.
As I was writing the response to the first bit I caught something I missed at first, where they stole the code after accessing the server. That more or less negated what I thought of as equivalent to stealing Twitters back end code while it was running. Where yes, a program file can be decompiled or an API wrapped around the function calls, but lets say trickier to use the IO bytestream to derive compiled code. No point in arguing that further, I had misread that bit.
Agreed on the second point, if we take at face value, the hackers running that system MUST BE MI or NSA level, or at a minimum a hacker who happens to own a cloud server level computer.