Message from @Maga gal

Discord ID: 634332411743830016


2019-10-16 00:45:18 UTC  

@SirW00f need a don’t tread on me symbol.

2019-10-16 10:49:45 UTC  

where is it ? it's terrible the man lost his foot.

2019-10-16 15:22:14 UTC  

22 stars in external ring, 1 in center ring ...23 in total
2 layers of stars
with total of 23 stars ...think mirror = 322

2019-10-16 15:38:59 UTC  

demoncrap symbol is leviathan

2019-10-16 15:39:24 UTC  

combined with the goat of mendez

2019-10-17 04:55:24 UTC  

https://vch.moe/tv/res/36225.html

2019-10-17 06:41:45 UTC  

i thought this one was supposed to be uber block chain tech?

2019-10-17 06:43:44 UTC  

and wtf does hotwheels mean? is that somebody's nick?\

2019-10-17 10:10:32 UTC  

So 8kun not gonna come up today?

2019-10-17 11:07:09 UTC  

it's bait..

2019-10-17 11:07:33 UTC  

also hotwheels showed his true colors

2019-10-17 11:09:06 UTC  

the thing about doing a ddos ...u can't do it solo...u need a team of ppl...horde if possible to do a global 'Distributed Denial Of Services' attack

2019-10-17 11:11:59 UTC  

so unless hotwheels made a deal with the patriots to lure out the ds operators performing global ddos attacks on servers across the world, he's just as guilty as those doing it...ppl that do ddos attacks are cyber terrorists and are criminals under most laws around the planet...some of them have death penalties for it

2019-10-17 11:13:24 UTC  

and twitter is providing a record of orchestrating such attacks and and providing target ip's to attack

2019-10-17 11:15:44 UTC  

so if he was under surveillance prior to 8chan going down the first time, he'd still be under it and subject to any laws eventually in any country he operates in soon as all the other operatives that took part in the ddos' were tracked down to their relative nations and arrested

2019-10-17 11:16:41 UTC  

btw, twitter subpoenas cover public, private and even dm's of the subject...user deletion only hides the content from users and the public, not the twitter ops

2019-10-17 11:19:14 UTC  

@SirW00f is it possible to use a VPN to spoof someone else's IP?

2019-10-17 11:20:21 UTC  

zebond, i could use any website to say i'm working for the dod...or irs, it's an old fxp trick

2019-10-17 11:20:48 UTC  

But what good is a subpoena if people can just bleach bit and smash hard drives with impunity

2019-10-17 11:22:12 UTC  

Leaves me wondering if someone is spoofing hot wheels IP to make it appear as guilt when it's not

2019-10-17 11:22:23 UTC  

especially when the consequence of violating a subpoena is far less than the crime the subpoenaed material would prove

2019-10-17 11:22:48 UTC  

some of the remote transfer protocals can be used to give the illusion to the uniformed eye to think they're targeted by a specific website service ...but to the skilled eye can trace and sample the attack code to see who controls it thru the meta

2019-10-17 11:24:02 UTC  

Got it. Thank you @SirW00f

2019-10-17 11:24:35 UTC  

the ip connection service(isp) keeps a record of who transfers what data streams and when..and it's tagged into the meta of the data

2019-10-17 11:25:03 UTC  

each router it passes thru leaves a meta tag...it's how traceroute works

2019-10-17 12:56:07 UTC  

Thanks guys

2019-10-17 13:10:31 UTC  

in the old days, traceroute have to trace manually thru the internet to the target location then report back...via ip4, basic meta back then,..but when ip6 got introduced..it got alot easier to trace the server thru the meta with routes, vpn's and user gps and other info..in some cases even twitter/fb tags or other platform acc info

2019-10-17 14:18:29 UTC  

This report is from.2015
https://www.usaid.gov/documents/1863/changing-corrupt-behaviors-assessment-addressing-everyday-corruption-ukraine
Changing Corrupt Behaviors Assessment: Addressing Everyday Corrupt...
The 2014 Revolution of Dignity presented a critical opportunity for Ukraine to implement sweeping reforms, which would bring the country’s development up to the standards of the European Union. The European Association Agreement, which Ukraine signed following the Revolutio...
Here, we will focus on low-level bribes since this is the corruption that mass behavior
change can impact most. For the purposes of this study, we have developed a typology of
the types of bribes that are most common in Ukraine by highlighting their systemic
functions: 1) market compensation bribes; 2) exhortation/responsibility avoidance
bribes; 3) bureaucratic roadblock bribes; and 4) bribes to gain socio-economic advantage.
None of these categories are mutually exclusive, and all of these factors are at work in
most bribing schemes, which more generally reinforce each other, but this typology
provides insight into how and why bribes persist in the Ukrainian public sector as well as
into the ways they might be curtailed.
https://media.discordapp.net/attachments/420910126401323019/634384948664729602/Screenshot_20191017-093912_Drive.jpg?width=400&height=205