Ok CodeMonkeyZ. You have the data. What is PACKET HDQ-7309217392?
(media.greatawakening.win)
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (13)
sorted by:
Hold up a bit, you would never see something like that in a PCAP (not as a header, tag, label or embedded Wireshark decode)... unless it was "text" in the payload of a packet. Which would necessarily mean it came from the dataplane of the machines being analyzed.
I don't necessarily interpret this message as having anything to do with the current set of PCAPs, but let's go with the "big if true" scenario:
If there is such a payload, given the date on that drop, could only mean two things:
or 2. That payload was deliberately injected (by whom, IDK) as a signal to be handled differently. Could be a trace/tag, or control embedded within the data. Attribution matters here- could mean nothingburger, whitehats have it all, or holy shit- everything is completely compromised.
I go with they are that stupid. The CEO, John Poulos, states in committee that no one can access the voting machines. IN PUBLIC while being videoed = stupid
The 3 yr delta with exact nomenclature is what has me scratching my head thinking there's a likely correlation. It could be a anything. A router SN, a signature specific to certain data. Who knows.
they have images from 2016, what if it is some sort of header information for some file in particular? maybe that's how Q knew about it before.. it s was something they used in 2016/2018 as well..