1/4
>>11763047 (PB)
>>11763058 (PB)
Throwing Stuff at the wall. What is D5? Possibilities seem endless.
Anon searched some stuff related to Gen. Flynn's tweet as discused by Anons in previous bread. Searched various things "+ .gov" and found some interesting possibilities. Didn't really expect to find anything at all.
A search for "WNSRDD + .gov" produced17results but would only show me 6 of them (pic 1 and 2 related)..
WNSRDD + .gov - Pg. 1
https://www.bing.com/search?q=WNSRDD%20%2B%20.gov&qs=n&form=QBRE&sp=-1&pq=wnsrdd%20%2B%20.gov&sc=0-13&sk=&cvid=6F3BF70910AA41358DFF27F8A588BAA3
WNSRDD + .gov - Pg. 2 only had one result showing from this search. Something happened, when Anon archived page 2.
https://www.bing.com/search?q=WNSRDD+%2b+.gov&qs=n&sp=-1&pq=wnsrdd+%2b+.gov&sc=0-13&sk=&cvid=6F3BF70910AA41358DFF27F8A588BAA3&first=6&FORM=PERE&ajf=10
^ ^ ^
When Anon archived page 2 above, the archived page looked like pic 3 related. What's up with that?
Archive sauce below.
v v v
WNSRDD + .gov - Pg. 2 as archived
https://archive.md/JDRUE
The highlighted sites above mentionCGI.CGI is discussed as an election software vulnerability in the video posted in PB Notable.
v v v
>>11775102 (PB) Starting at 27min cyber security expert describes QSnatch in depth.
According toRussell Ramslandof Allied Security Operations Group,QSnatchis a CGI password logger. Start at 27:39 for specific CGI QSnatch discussion.
https://www.bitchute.com/video/dohtOkDixFsD/