UK government wants a backdoor into encryption to decrypt and censor. Signal refuses.
Then all funding is pulled.
Based on this, I an thinking, Tucker was hacked in a different way. He may very well have a keyscore (Wolfcreek; Angelfire) on his device.
see Q2998, Q1877, Q1876
How would one know? Rootkits are very problematic. Normally, rootkits are used " maliciously, to control a device. But for data collection, control is not necessary, as the only thing you want is to know what happens, as an observer.
There is a reason for considering that whatever we do on the internet, the spread of these type of things usually happens based on our own behavior. In certain cases, these rootkits can probably be planted via other means. Tucker is often very naive. And it would not surprise me that he is rather lax on OPSEC with his devices.
The thing is, hacked by whom? It seems like Tucker would be a high enough level asset that he'd have awareness of Q, or am I overestimating him? Surely he knows the NSA/cabal/Signal battle lines?
I figured he was just being used to deliver a message/reminder in a public manner.
Well, I have followed him for these last 24 years. At the very least, his act has always been asking questions, be the agnostic. Although he has been flirting with libertarianism, treated Ron Paul well, Ii always got the sense that he has a hard time confronting the fact that his worldview differs from the facts.
And only these last two years sees him making moves.
And, I forgot what exactly the matter was, but he was sending or had been send some USB sticks with data .... he lost it.
It shows a clear and present failure in OPSEC. I think this is based on his worldview. The government cannot be this bad. Impossible. The very fact he acknowledged to find out he was hacked, is a shocker to him in and of itself, and part of the moves he has made.
Who is saying they did? What they did is divulge they have information on him. That fact alone leave the question of: how? How did they come by it?
Means and methods.
While NSA is tremendous capabilities, it not by default means they did actively hack him/ his devices.
It may very well be it was done by someone working in his team. I would not put it pass Tucker to be totally oblivious on how these things work. But let' s assume for a moment, it was done by someone working on his team, whistling on him to his bosses at FOX. This creates a different digital stream of data, to which the NSA then could become privy.
This video speaks of rootkithunters. The reason I post this video is not because of that, but because of another issue the maker of the video points out: many, including himself, having knowledge of penetration testing and attacking other devices, are often oblivious of their own vulnerabilities.
In a schematic of communication, you not always need to hack the device itself, but rather the central communication hub. This then is also the value of what Q posted. How do you deploy a capability? Directly or indirectly. For a spook, indirectly is much more rewarding.
With this, again, I am not saying he was NOT hacked. All I am saying is that the means and methods may have been different.
Oh agree it may have not been Signal itself, and lord knows there are thousands of vulnerabilities on any given system. I don't think the "how" is what's important here though.
Maybe another way of looking at it: maybe the white hats knew Tucker was being monitored by the cabal through Signal and wanted to make him aware that he was being watched, and also send a message to the cabal that they could read Signal at any time?
Nothing firm but thought it was worth putting eyes on. I'd be shocked if cabal was operating under assumption that Signal was secure...but who knows maybe they're desparate?
Looks like Q is suggesting that organized BLM protestors/antifa/firestarters used it as coordination. I'm sure many of the people using it thought it was secure at the time, which may be a useful tool for convincing some criminals to sign up, even if the higher-ups knew it isn't actually secure.
Wow, only 34 upvotes and no sticky? This is some high quality research here. Post 2998 is our keystone to understanding I think, at least as to the 'we have it all' part of the movie.
A few possibly relevant details on Signal (paraphrasing Wikipedia some here):
It was initially released 9 years ago (29 July 2014)--so pre-Trump! Indicates plan pre-dates Trump by a good amount and that cabal was already suspicious of NSA and elements of the military.
July 29 is a big day if you're digging for deltas.
Signal is the successor to something called RedPhone and the TextSecure encrypted texting program. They were launched in May 2010 by Whisper Systems, founded by Moxie Marlinspike (former head of security @ Twitter) and Stuart Anderson. So digs related to RED may relate to Signal through that.
Q frequently talks about FISA as the start. So if Signal was the tool used to coordinate FISA, it stands to reason that Signal will be discussed intensely once the FISA court collusion is made public.
Note however the following:
Based on this, I an thinking, Tucker was hacked in a different way. He may very well have a keyscore (Wolfcreek; Angelfire) on his device.
see Q2998, Q1877, Q1876
How would one know? Rootkits are very problematic. Normally, rootkits are used " maliciously, to control a device. But for data collection, control is not necessary, as the only thing you want is to know what happens, as an observer.
https://wikileaks.org/vault7/
https://linuxsecurity.expert/security-tools/linux-rootkit-scanners
There is a reason for considering that whatever we do on the internet, the spread of these type of things usually happens based on our own behavior. In certain cases, these rootkits can probably be planted via other means. Tucker is often very naive. And it would not surprise me that he is rather lax on OPSEC with his devices.
for reference: u/#q2998
u/#q1877
u/#q1876
The thing is, hacked by whom? It seems like Tucker would be a high enough level asset that he'd have awareness of Q, or am I overestimating him? Surely he knows the NSA/cabal/Signal battle lines?
I figured he was just being used to deliver a message/reminder in a public manner.
Well, I have followed him for these last 24 years. At the very least, his act has always been asking questions, be the agnostic. Although he has been flirting with libertarianism, treated Ron Paul well, Ii always got the sense that he has a hard time confronting the fact that his worldview differs from the facts.
And only these last two years sees him making moves.
And, I forgot what exactly the matter was, but he was sending or had been send some USB sticks with data .... he lost it.
It shows a clear and present failure in OPSEC. I think this is based on his worldview. The government cannot be this bad. Impossible. The very fact he acknowledged to find out he was hacked, is a shocker to him in and of itself, and part of the moves he has made.
You understand though that Q posts indicate NSA is white hat run though? So why would white hats hack him and expose the fact they did?
Who is saying they did? What they did is divulge they have information on him. That fact alone leave the question of: how? How did they come by it?
Means and methods.
While NSA is tremendous capabilities, it not by default means they did actively hack him/ his devices.
It may very well be it was done by someone working in his team. I would not put it pass Tucker to be totally oblivious on how these things work. But let' s assume for a moment, it was done by someone working on his team, whistling on him to his bosses at FOX. This creates a different digital stream of data, to which the NSA then could become privy.
https://invidious.io.lol/watch?v=sFOKz_fd0SA
This video speaks of rootkithunters. The reason I post this video is not because of that, but because of another issue the maker of the video points out: many, including himself, having knowledge of penetration testing and attacking other devices, are often oblivious of their own vulnerabilities.
In a schematic of communication, you not always need to hack the device itself, but rather the central communication hub. This then is also the value of what Q posted. How do you deploy a capability? Directly or indirectly. For a spook, indirectly is much more rewarding.
With this, again, I am not saying he was NOT hacked. All I am saying is that the means and methods may have been different.
Oh agree it may have not been Signal itself, and lord knows there are thousands of vulnerabilities on any given system. I don't think the "how" is what's important here though.
Maybe another way of looking at it: maybe the white hats knew Tucker was being monitored by the cabal through Signal and wanted to make him aware that he was being watched, and also send a message to the cabal that they could read Signal at any time?
Bingo!
u/#q633
u/#q667
u/#q4670
u/#q4672
Nothing firm but thought it was worth putting eyes on. I'd be shocked if cabal was operating under assumption that Signal was secure...but who knows maybe they're desparate?
Looks like Q is suggesting that organized BLM protestors/antifa/firestarters used it as coordination. I'm sure many of the people using it thought it was secure at the time, which may be a useful tool for convincing some criminals to sign up, even if the higher-ups knew it isn't actually secure.
I'm sure many different groups used it.
#633 explicitly suggests the FISA traitors coordinated over it. Expand the references.
https://anontools.xyz/?d=633
I never can read these, its it the VPN blocking them ?
Do you mean the "u/..." links?
Those do not work, if you have "Community Styling" turned off in settings.
I know that because I have it turned off, since I feel it clutters the display with lots of coloring (some slowly fading in and out) and icons.
These and them. Be specific pede and we’ll help.
Are you referring to the original Twitter link or the embedded Q posts? I'm on VPN with no issues for either, but results may vary.
Wow, only 34 upvotes and no sticky? This is some high quality research here. Post 2998 is our keystone to understanding I think, at least as to the 'we have it all' part of the movie.
Ehh the OP itself is not worthy of a sticky but I hope some good discussion might emerge from it.
Also Byrne just said Putin invited Byrne to receive whatever Tucker is about to get, and we're "going to see the number 90%" in it.
https://twitter.com/PatrickByrne/status/1754169543109619861
Fun connections on 90 and 90%:
https://anontools.xyz/?text=90%25&whole=true&adv=true&or=text%3D90%26refs%3Dfalse%26whole%3Dtrue%26case%3Dfalse&refs=false
A few possibly relevant details on Signal (paraphrasing Wikipedia some here):
It was initially released 9 years ago (29 July 2014)--so pre-Trump! Indicates plan pre-dates Trump by a good amount and that cabal was already suspicious of NSA and elements of the military.
July 29 is a big day if you're digging for deltas.
u/#q3537
Signal is the successor to something called RedPhone and the TextSecure encrypted texting program. They were launched in May 2010 by Whisper Systems, founded by Moxie Marlinspike (former head of security @ Twitter) and Stuart Anderson. So digs related to RED may relate to Signal through that.
u/#q262
#1589 for instance talks about a RED LINE used to communicate to activists.
u/#q1589
Q frequently talks about FISA as the start. So if Signal was the tool used to coordinate FISA, it stands to reason that Signal will be discussed intensely once the FISA court collusion is made public.