How many coincidences before it becomes mathematically impossible?...
How did Q Predict Mike Lindell’s Cyber Symposium 3 years ago, TO THE DAY?...
How many coincidences before it becomes mathematically impossible?...
This is highly impossible — unless the plans were prepared many, MANY years ago!...
FUTURE PROVES PAST...
"Packet Capture is a networking term for intercepting a data packet that is crossing a specific point in a data network. Once a packet is captured in real-time, it is stored for a period of time so that it can be analyzed, and then either be downloaded, archived or discarded."...So IMO its referring to that packet number that was captured...
Forgive me for asking, but I'm technologically-challenged.
Does the 'packet' ever reach its original destination? If it doesn't wouldn't the destined receiver know it was intercepted and someone was on to them?
Packet captures basically work as a logger. It'd be like writing down the license plate of every car to drive down a roadway and what time it happened and additional details about that given vehicle, origin, destination, etc. As it passes through, you capture the information about it, and then it continues on its way. The 'capture' doesn't actually stop anything; just records what's happening.
That's a great explanation of packet captures, I think I'm going to snatch that for my less tech inclined friends.
We have the best network analogists.
Ah, I see. Thank you for the explanation!
Capturing process does not alter the packet in anyway. It gets copied. The correct original terminology was Packet Sniffing. But Capture became widely accepted in the industry.
Always changing the language, the better to obfuscate!
Come to think of it, in the original Unix/Linux days it was always sniffing / dumping /logging. The capture came into usage when Windows started being used to do this stuff, first with Ethereum and then Wireshark - the driver was called Packet Capture Driver (PCAP) - not sure if it was intentional obfuscation. Never actually thought of it that way ...
Your router "sees" every byte of data you send and receive by necessity. Several more routers in the world must also "see" your data to get it where you intended. Every single one of these routers could be saving(capturing) copies of your data. This is why encryption is so important. If you are wireless, I can capture all your data if I'm in wireless signal range of you.
Wouldn't the 'packets' that Mike and the gang got be encrypted? How were they able to un-encrypt the data to see what they had?
All this new-fangled tech stuff is so confusing for an old dinosaur like me! 🤪😄