Message from @SirW00f
Discord ID: 502522052704469002
Someone needs to put the NPC face on Avanetti
https://twitter.com/MichaelAvenatti/status/1052294024961372162?s=19
Perfect video for it haha
Carilina?
Spelling errors on POTUS schedule?
source - 8 chans
JAY LIVE: US SECRETARY W/ D FROM SUMMIT https://twitter.com/JaySekulow/status/1052952486468710400?s=19
@Mr. Sofaking Fluffykins what's your take on the deep-fake stuff you posted in Q-gen? parallel to CS and the 'who done hacked us' jumps right out of that cake wearing a darpa hat.
What's worse than a deepstate, unacountable and beyond reproach posessing (tech that allows them to hack anyone or anything anywhere anytime)? That they also anoint themselves the arbitors of (which entities were hacked and who hacked them), and carry the power to make that appear any way they like.
We were told they'd try to get ahead of something coming out....
ha, more NPC
If we were to goto war with mexico, how quickly would the thought process be for you to enlist?
I wouldnt be surprised if the videos they may hope to front run are those on the Weiner laptop
what you mean?
Would you immediately enlist?
meant what token meant by the deep-fake weiner lappy suspicion
Its a war in our backyard basically, we have to win.
but, no
I would not enlist. Id arm up, and maybe head to TEXAS
Lol, based citizens military.
I dig it.
Ill never take an order from an organized military that isnt fully transparent, which is the only way they exist, so...
Im just saying, the last thing we want is for DARPA funded tech to be the only publicly (or less than) available tech for producing fake videos too real for the naked eye to discern, while simultaneously being the only tech capable of 'forensically' making this determination
@Mr. Sofaking Fluffykins the attack on gen miller shows how incompetent the sand niggers are
if we get that, we get the next iteration/evolution of this whole NSA hack tools mess, where CrowdStrike hires literally hundreds of ex gov and cronies with security clearences, and becomes the defacto, yet utterly opaque, explainer of any hack narrative, substituting at will whatever sounds convenient to their clients, for the target, hacker, and contents of the hack.
@Partyrocker true but unfortunately they got too close.