Message from @Transformative Visions
Discord ID: 554167878438486036
Scavino
Is this the main room for text?
when we are using it? @sainted anon haha we kinda jump around... whatever voice we are all in we use the attached text channel
Your not livestreaming are?
no
we dont stream from our channels and would be more than vocal if we were even thinking of doing so
Remember this one :
Still laughing
@Transformative Visions more rope!!!
Biological warfare release coming ... or will be caught
What about tomorrow, do you think we'll get a false flag? Q says be vigilant
@Lee I think it will be C L O S E .....
Hope not
New Q
Q !!mG7VJxZNCI
https://twitter.com/hrtablaze/status/1104437148864798720
The Great Awakening.
Attempts to DIVIDE will FAIL.
Patriots have no skin color.
Q
@Lee - if a person is willing to rape, murder , sell body parts of children.... what wouldn't they do to stop knowledge of it coming out?
Is Antifa scheduled for tomorrow?
Me thinks we are finally in for a big week
https://qmap.pub/
https://qanon.pub/
We should be stay away from public high populated places tomorrow
Bingo
Keking out right now. Pretty sure I found something. Rip me apart if I’m wrong though. So many shills on here. You’re missing crumbs. Look here, not [here]. Responding to post 2996 Q says, “how is that possible for a ‘supposed’ non_gov entity?”
How is it possible that FB tracks data even when the app is deleted? In post 2993 (3/7/109) Q is calling out @Snowden. So I used the filter to find posts relating to WikiLeaks. Q’s post from July 31, 2018 is a screenshot of the Wikileaks Vault 7… released MARCH 7. Sounds confusing just trying to show you my thought process, stay with me, it makes sense.
“Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.” FROM VAULT 7