>>10303882
Here is my theory on the KEYSTONE.
I believe that it is a small amount of data
Probably totally innocuous, may a book or something like that.
There are torrent servers around the world that want this KEYSTONE torrent, but nobody is seeding it.
These torrent servers are special
Because they are set up using a system like Port knocking. When the KEYSTONE is seeded, they will of course download it, and in turn seed it. But something in the keystone is a key, and they will recognize that key, and begin seeding another torrent that they do not have.
This other torrent is the big one. The damning evidence that is hidden in plain sight on the Internet, but nobody can discover it.
Let me ask you this question. If I have an internet site, and on that site I have the Frazzled Rip video at a URL that begins http://www.exaple.com/ followed by 23 more characters, can you get it? Can you even discover its existence? Can a web crawler find it and put it in Google?
NO!!!
Because if nobody knows the URL and the URL is not in some web document somewhere on the Internet, then that video cannot be downloaded. Even the spies who watch all Internet traffic cannot find it, because nobody is downloading it even secretly. The file arrived on a thumb drive or hidden in other encrypted torrents that are long gone. It was placed on the web server and the only record of its existence is in the KEYSTONE.
I believe the keystone contains a list of web seeds for this non-existent torrent, and once these special servers see the keystone, they will create a new torrent that mainly web seeds. This means that when the torrent suddenly appears, all the servers seeding it initially, have the full data. And even if ISPs decide to block all torrents, as soon as people have the list of web seeds, they can begin to download the data via HTTP if they wish.
https://en.wikipedia.org/wiki/Port_knocking
But it can go much deeper. The modern web is filled with virtual servers. They are not even real machines that can be shut down. In fact, virtual servers can be moved from one physical location to another while they are running and serving data. Not only that, if they are turned off, they can be hiding anywhere on cloud storage, full of encrypted data, only waiting for a master who has the encryption keys to fire up one or more clones of the hidden server.
There could suddenly be thousands of these web seeds all over the world on AWS and Azure and Oracle and Openshift, OVHhost, IBMCloud, BlueHost, LiquidWeb and hundreds of other cloud hosting companies.
It is simple to write code that spins up new servers whenever the traffic to existing ones drops off showing they are filtered. The seed list can continually be updated because that is what happens naturally in the torrent protocol.
I doubt that Millie Weaver has the KeyStone or even understands what it actually is. And remember, the event that triggers it all, is SEEDING of the KeyStone, meaning offering it as a Torrent download.
What if the Keystone is discoverable and openly available? What if the kind of people who can solve Cicada 3301 puzzles, can find the KeyStone? In an EMERGENC-EEE any Cicada could seed the KeyStone.
What if they already received their WAKEUP call?
CounterInsurgency rhymes with EMERGENC-EEE