Message from @SirW00f
Discord ID: 634253107509067798
NEW Filing in the Flynn case today https://www.usatoday.com/documents/6473783-Compel/
Compel
where is it ? it's terrible the man lost his foot.
22 stars in external ring, 1 in center ring ...23 in total
2 layers of stars
with total of 23 stars ...think mirror = 322
demoncrap symbol is leviathan
combined with the goat of mendez
i thought this one was supposed to be uber block chain tech?
and wtf does hotwheels mean? is that somebody's nick?\
So 8kun not gonna come up today?
it's bait..
also hotwheels showed his true colors
the thing about doing a ddos ...u can't do it solo...u need a team of ppl...horde if possible to do a global 'Distributed Denial Of Services' attack
so unless hotwheels made a deal with the patriots to lure out the ds operators performing global ddos attacks on servers across the world, he's just as guilty as those doing it...ppl that do ddos attacks are cyber terrorists and are criminals under most laws around the planet...some of them have death penalties for it
and twitter is providing a record of orchestrating such attacks and and providing target ip's to attack
so if he was under surveillance prior to 8chan going down the first time, he'd still be under it and subject to any laws eventually in any country he operates in soon as all the other operatives that took part in the ddos' were tracked down to their relative nations and arrested
btw, twitter subpoenas cover public, private and even dm's of the subject...user deletion only hides the content from users and the public, not the twitter ops
zebond, i could use any website to say i'm working for the dod...or irs, it's an old fxp trick
But what good is a subpoena if people can just bleach bit and smash hard drives with impunity
Leaves me wondering if someone is spoofing hot wheels IP to make it appear as guilt when it's not
especially when the consequence of violating a subpoena is far less than the crime the subpoenaed material would prove
some of the remote transfer protocals can be used to give the illusion to the uniformed eye to think they're targeted by a specific website service ...but to the skilled eye can trace and sample the attack code to see who controls it thru the meta
the ip connection service(isp) keeps a record of who transfers what data streams and when..and it's tagged into the meta of the data
each router it passes thru leaves a meta tag...it's how traceroute works
Thanks guys