Anonymous ID: eeff7e April 15, 2018, 9:36 a.m. No.1051856   🗄️.is 🔗kun

>>1051782

>Well, I remember at the time, they needed the backdoor to bypass a locked phone but what is more interesting is they really don’t need it because they can listen to all comms anyway

 

WL is not REAL because they could always see everything anyway.

 

Which brings new meaning to Q's post 4/4/18:

No investigation into WL receipt of information?

No pull down of NSA metadata trace/C to WL?

No pull down of NSA metadata period?

Nothing transferred across web?

Direct-to-Direct bypass dump?

No 'direct' investigation into DNC computer/software?

No 'direct' investigation into CS?

FBI/SC/DOJ/FED G simply TRUST CS's report on data breach?