Message from @crystalclear
Discord ID: 554168798916116488
Is this the main room for text?
when we are using it? @sainted anon haha we kinda jump around... whatever voice we are all in we use the attached text channel
Your not livestreaming are?
no
we dont stream from our channels and would be more than vocal if we were even thinking of doing so
Remember this one :
Still laughing
Biological warfare release coming ... or will be caught
What about tomorrow, do you think we'll get a false flag? Q says be vigilant
@Lee I think it will be C L O S E .....
Hope not
New Q
Q !!mG7VJxZNCI
https://twitter.com/hrtablaze/status/1104437148864798720
The Great Awakening.
Attempts to DIVIDE will FAIL.
Patriots have no skin color.
Q
@Lee - if a person is willing to rape, murder , sell body parts of children.... what wouldn't they do to stop knowledge of it coming out?
Is Antifa scheduled for tomorrow?
Me thinks we are finally in for a big week
https://qmap.pub/
https://qanon.pub/
We should be stay away from public high populated places tomorrow
Bingo
Keking out right now. Pretty sure I found something. Rip me apart if Iām wrong though. So many shills on here. Youāre missing crumbs. Look here, not [here]. Responding to post 2996 Q says, āhow is that possible for a āsupposedā non_gov entity?ā
How is it possible that FB tracks data even when the app is deleted? In post 2993 (3/7/109) Q is calling out @Snowden. So I used the filter to find posts relating to WikiLeaks. Qās post from July 31, 2018 is a screenshot of the Wikileaks Vault 7ā¦ released MARCH 7. Sounds confusing just trying to show you my thought process, stay with me, it makes sense.
āUnlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.ā FROM VAULT 7
Links below that direct you to user forums on how to not leave a digital fingerprint that can be associated with the CIA, and how to construct an imitation fingerprint. Using Facebook as their āfingerprintā they are able to install malware on peoplesā phones, tablets, and computers which relay all data back to a central server using HIVE.