Message from @della4

Discord ID: 416938419634176000


2018-02-24 12:39:22 UTC  

@Tina again I cannot provide a conclusive answer but

2018-02-24 12:39:46 UTC  

mechanical stickiness is feasible, therefore relatively innocent

2018-02-24 12:39:48 UTC  

Tina
....saw a post earlier about people losing data off there puters...so back up offline always

2018-02-24 12:39:58 UTC  

Their

2018-02-24 12:40:18 UTC  

but I have observed vids in which they have recorded their o/s being controlled by an outside source

2018-02-24 12:40:28 UTC  

i found out that Q- the storm began 10/28/17 and Trump had said a storm is about to happen on https://www.gq.com/story/trump-storm-is-coming

2018-02-24 12:40:35 UTC  

sharing a desktop or taking one over has been around a long time

2018-02-24 12:41:35 UTC  

the maliciousness described by the NSA and such makes it quite feasible a computer or its o/s can be hijacked

2018-02-24 12:41:42 UTC  

esp. a Windoze

2018-02-24 12:41:49 UTC  

hmm

2018-02-24 12:41:53 UTC  

which i do NOT use

2018-02-24 12:42:07 UTC  

have you ever used that stuff

2018-02-24 12:42:16 UTC  

so you see logically it can go wither way

2018-02-24 12:42:21 UTC  

either\

2018-02-24 12:42:46 UTC  

I have experimented at home here that's all

2018-02-24 12:43:03 UTC  

I have worked linux as an enthusiast for years

2018-02-24 12:43:18 UTC  

well I used to now I talk to @Tina by typo

2018-02-24 12:43:21 UTC  

what stuff have you used

2018-02-24 12:43:34 UTC  

what is out there

2018-02-24 12:43:54 UTC  

all i know is about ddos

2018-02-24 12:44:25 UTC  

you mean NSA CIA software?

2018-02-24 12:44:29 UTC  

yes

2018-02-24 12:44:45 UTC  

no I have not dealt with that myself

2018-02-24 12:44:51 UTC  

well, things that hackers use i guess is what i am asking

2018-02-24 12:44:58 UTC  

I have just watched vids about it on youtube

2018-02-24 12:45:20 UTC  

I have seen vids. in which someone's computer is just overtaken entirely

2018-02-24 12:45:40 UTC  

well, i know someone is on my computer with me now

2018-02-24 12:45:41 UTC  

and e.g. masses of content in the file / program begin to be deleted

2018-02-24 12:46:05 UTC  

that was an unambiguous extreme example

2018-02-24 12:46:25 UTC  

as I said a desktop can be shared

2018-02-24 12:46:58 UTC  

the 'theories' are that an o/s like Windows has back door codes set in place that allow infiltration

2018-02-24 12:47:09 UTC  

2018-02-24 12:47:54 UTC  

vids. that describe that the codes set within can be activated remotely and are preserved on reboots within the o/s

2018-02-24 12:48:12 UTC  

so yes most sinister

2018-02-24 12:48:34 UTC  

linux is not immune but far less infiltrated and infiltratable

2018-02-24 12:48:41 UTC  

that is all. follow ?

2018-02-24 12:49:01 UTC  

now I have you nervous because I can guarantee you have MS Windows

2018-02-24 12:50:05 UTC  

such vids. I have observed many months ago now, remembering the scope of vids. of interest I have observed has been VERY broad

2018-02-24 12:51:38 UTC  

@Tina control alt delete and open task manager and check users on your computer....i doubt anyone is there

2018-02-24 12:55:08 UTC  

i keep my temp monitoring software up, when the temp gets too high for something i'm not doing then i suspect something. sometimes if i wait a bit, i might get a antivirus check report in then the temp drops. but if it doesn't show up, i reboot the pc

2018-02-24 12:55:34 UTC  

hard reboot, not os reboot