Message from @SirW00f
Discord ID: 556041722602323968
triggering event - forces fb to be primary source of news since one of the shooters streamed live from it....while fb stock is in free fall from fed raids on it's servers
it's cause and effect to the sheepie
but to the awakened..it's a ff narrative with real deaths to try to sway the un-awakened away from the awakened movement
he saod he went to nz to train
that means contacts with guns
because logically australia is a better place to shoot stuff without being noticed
once in nz he supposedly just decided nz was the better place to do it
for this i'd go with symbolic place and time, information control/1 pr guy, changing storyline and facts, conflicting eyewitnesses, and gun control now!
to get bingo
yeah no bingo on that card
as more 'info' comes out ....it will look more and more like a ff
yeah but with real bodies they made sure of that
well they made a mistake with the plane crash
Can Q drops be updated please because NZ was mentioned as not big enough to take away the headlines
open source isn't hack proof
it's hack inviting
hackers can proof it
closed source code means nobody can hack it at least for a while til they figure it out on their own
"open source"
hardware doesn't control the hack, it's the software thats hackable
software controls the hardware
no
chips have instructions that can leave them open for attacks
hardware with embedded instructions is still software inside the hardware
even the embedding can be hacked
using standard issue hardware with known embedding leaves open points for attacks via hacks
custom hardware has to be made to resist such attacks
as well as custom software to diagnostic the hardware and other software even embedded custom code in the hardware
close source software means you don't give away the tools to read the code ..in an open internet no body will use that. It doesn't mean the code when in use isn't safe.. on the contrary by allowing hackers to check the code it becomes more secure
not all hackers share their code discoveries
for money they will
malicious hackers will only keep their back door entry points to themselves..only patriot hackers will expose the problems
there is serious money involved
theres always some form of money involved..either for malicious or the patriot
I trust the bakers
in the short run, the patriot hacker will prove themselves for the money...but in the long run, the malicious hackers will exploit the system for the money
how would you do it?