Message from @SirW00f

Discord ID: 635855315627278336


2019-10-20 20:31:54 UTC  

How the fuck don't people know that this is basially a Q server

2019-10-20 20:32:08 UTC  

how do they even find this place

2019-10-20 20:43:32 UTC  

his first day here and starting all that? He's is a Q disrupter.

2019-10-20 22:55:09 UTC  

https://cdn.discordapp.com/attachments/489836618207985670/635611996599091225/EHWt6f_XUAEexGc.png

2019-10-21 01:17:29 UTC  

We just need the IP address then and we can bypass the DNS servers

2019-10-21 14:27:17 UTC  

Prism

2019-10-21 14:27:23 UTC  

Everything is logged on the net

2019-10-21 14:27:50 UTC  

it's why they want to go after encryption because they can grab the encrypted traffic too, but cannot always decrypt it

2019-10-21 14:45:35 UTC  

Yup they log it all. Crack it on a bank of Cray Super Computers later.

2019-10-21 14:49:15 UTC  

They have ways to crack encryption to a degree but not always successfully. They have a method that can play an encrypted file through an audio stream, and it helps find the elliptical curves, which allow them to better guess the keys.

2019-10-21 14:52:26 UTC  

best encryption is no encryption ...send as raw data with no identifying prefix only person sending the raw data and the person getting the raw data knows what the data file type is

2019-10-21 14:53:00 UTC  

it would drive the decoders nuts trying to figure out the encoding

2019-10-21 14:53:25 UTC  

But data could be read easily enough in a hex editor

2019-10-21 14:54:25 UTC  

well i used to store my porn in few layers of data compression formats....would freak out my nephews when they took it to their tech schools to get it decoded

2019-10-21 14:54:56 UTC  

each compression layer had a password...1 word only(was 32bit)

2019-10-21 14:56:03 UTC  

the total pass phrase was 'you are not getting into my porn' ...so 7 layers of data compression with each one with a single password

2019-10-21 14:57:03 UTC  

was fun to know that mit couldn't crack it

2019-10-21 14:58:19 UTC  

so when they came back to visit after they were of legal age and complained that even mit couldn't crack it...i just decompressed each layer with proper order of the pass phrase and their reply was this - you bastard

2019-10-21 16:25:34 UTC  

>no encryption is best encryption
>"Here packet sniffers this is exactly what I'm doing!"
What

2019-10-21 16:30:48 UTC  

hex viewers need binary root language to understand the hex...if u change the binary root language, the hex viewers can't read it

2019-10-21 17:15:51 UTC  

https://cdn.discordapp.com/attachments/489836618207985670/635888998979600385/unknown.png

2019-10-21 17:23:18 UTC  

Yeet.
I'd still use a VPN just in case

2019-10-21 17:23:37 UTC  

https://cdn.discordapp.com/attachments/489836618207985670/635890952858501123/unknown.png

2019-10-21 17:23:45 UTC  

read the date of the reply

2019-10-21 17:24:02 UTC  

its a server test but still

2019-10-21 17:25:11 UTC  

>tries to use VPN
>Get this

https://cdn.discordapp.com/attachments/489836618207985670/635891345285709855/Screenshot_20191021-132450.png

2019-10-21 17:25:51 UTC  

ya,,,,got hit

2019-10-21 17:26:03 UTC  

i refreshed the page and saw that

2019-10-21 17:27:10 UTC  

Oy vey

2019-10-21 17:27:27 UTC  

Server is still online. I just pinged it

2019-10-21 17:28:28 UTC  

It is still on Alibaba IP (new one) which might explain DOD hop prior (offshore/Singapore)

https://cdn.discordapp.com/attachments/489836618207985670/635892174940143617/unknown.png

2019-10-22 16:32:32 UTC  

https://cdn.discordapp.com/attachments/489836618207985670/636240484796465162/EHd2_K3VAAIWjVZ.jpg

2019-10-22 17:02:45 UTC  

🤣

2019-10-23 03:00:25 UTC  

Wonder if Odin is going to be some type of distributed OS or as Jim hinted at distributed website instances

2019-10-23 03:01:24 UTC  

With all the states he has been going to could be setting up servers in multiple locations