Years ago I became suspicious of Signal after I read that it's "the most secure communications app in existence." That's exactly what the tech industry would tell people to ensnare them.
I used Skype for a prior business venture frequently and on there it says in the chat whom added whom. Signal chat DM groups don't have the same feature?
Groups have admins.
Admins add people to groups.
It shows a message who added who.
Remember: this is Alex Jones.
There are a host of people having a hard time getting their heads around the fact they've been had with this Alex Jones guy.
pass-codes to a signal account?
It is exactly as you say: when knowledge is not present, those who are featured as in the know, have nice talk.
So, what do you do? You research. And the first item on the list is the threat analysis from google, and what it means.
Any software can be hacked, any system can be hacked. If it is designed by people, it can be hacked. All a man can do is decrease the attack vector and the impact of an attack by remedial action in depth.
Simply consider a Templar Castle and you get the concept.
It seems like someone may have intentionally added the cabal's stooges to see if they would leak the info. Leaking attack info could bring a charge of treason.
Years ago I became suspicious of Signal after I read that it's "the most secure communications app in existence." That's exactly what the tech industry would tell people to ensnare them.
I used Skype for a prior business venture frequently and on there it says in the chat whom added whom. Signal chat DM groups don't have the same feature?
Groups have admins. Admins add people to groups. It shows a message who added who.
Remember: this is Alex Jones.
There are a host of people having a hard time getting their heads around the fact they've been had with this Alex Jones guy.
pass-codes to a signal account?
It is exactly as you say: when knowledge is not present, those who are featured as in the know, have nice talk.
So, what do you do? You research. And the first item on the list is the threat analysis from google, and what it means.
Any software can be hacked, any system can be hacked. If it is designed by people, it can be hacked. All a man can do is decrease the attack vector and the impact of an attack by remedial action in depth.
Simply consider a Templar Castle and you get the concept.
Hacked?
I'm not so sure.
It seems like someone may have intentionally added the cabal's stooges to see if they would leak the info. Leaking attack info could bring a charge of treason.
Everything is rigged.