Anonymous ID: 5f04cb June 24, 2021, 10:20 a.m. No.13973022   🗄️.is 🔗kun   >>3047 >>3079

Did McAfee Use Storj?

 

https://storj.io

 

Video overview:

 

https://link.dcs1.storjshare.io/s/jxqy2wdbf5qeaxo4a2eq6yw3gthq/videos/Storj%20Final.mp4?wrap=0

 

Is Storj filesharing the application in question, re:

 

>>13970134 (pb)

 

That post notes Ethereum EPSTEIN wallet activity seen on Etherscan.io,

 

and

 

some filesharing comments:

 

"AN NFT IS A PIC, FILE, VIDEO OR SONG CONVERTED INTO A CRYPTO TOKEN

AND ITS PERMANENTLY RECORDED ON THE BLOCKCHAIN WHEN ITS UPLOADED

THATS HOW JOHN IS GOING TO DO IT

THEY CANT TAKE DOWN THE ENTIRE ETHEREUM BLOCKCHAIN

JOHN KNOWS THIS SO HE'S USING IT FOR THE DEADMAN SWITCH FILE

THE NFT IS GOING TO BE A MAGNET URL

THE WHCKD TOKENS ARE ACTIVATING TONS OF SHITBOX VPS'S HE RENTED WITH CRYPTO AND LEFT TO IDLE TILL THEY RECEIVED A TRANSACTION

UNTRACEABLE UNSTOPPABLE REMOTE ACTIVATION

EVERYONE IS GOING TO TORRENT THIS FILE, MCAFEE LEFT SPREADING THE WORD TO EVERYONE ELSE THAT HATED THIS GLOBAL FUCKING DEMON MACHINE"

 

-

 

Storj uses the Ethereum blockchain for distributed, encrypted file storage. That matches the text above, generally. So is Storj the suspected host for the purported McAfee dead man's switch, or some other app?

 

-

 

"Storj (STORJ) is another cloud storage platform based on the Ethereum blockchain. Every member of a network called Tardigrade can offer free space on their local medium of storage. To become part of the Storj ecosystem, all you need is free disk space and adequate bandwidth to exchange information.

 

Storj, like other similar services, offers several advantages over traditional cloud storage solutions. As data is encrypted and sharded at the source, there is virtually no way for unauthorized third parties to access the information. Storage is naturally distributed, which in turn increases availability and download speeds through using multiple concurrent connections."

 

-

 

Also, a recent analysis of the Storj network, showing a theoretical vulnerability which Storj says could not actually be exploited in production:

 

"Exploring the Storj Network: a Security Analysis"

 

https://www.esat.kuleuven.be/cosic/publications/article-3275.pdf