How can it be done in that case? I would be interested to know. I did hear that Killary has the encryption keys for "the internet" but that was 4 odd years ago.
Targeted DDoS attacks on infrastructure, physical infrastructure attacks, military occupation of key infrastructure are three scenarios that come to mind that would not be helped by host files.
All Internet is through a handful of companies who presumably work with the government. I'm sure they can just whitelist certain IPs so you can only see "trusted" websites
How can it be done in that case? I would be interested to know. I did hear that Killary has the encryption keys for "the internet" but that was 4 odd years ago.
I would bet the Q team knows everything about & has accounted for whatever she might have ;)
Targeted DDoS attacks on infrastructure, physical infrastructure attacks, military occupation of key infrastructure are three scenarios that come to mind that would not be helped by host files.
All Internet is through a handful of companies who presumably work with the government. I'm sure they can just whitelist certain IPs so you can only see "trusted" websites