Anonymous ID: 8ff4b5 Sept. 6, 2021, 9:48 a.m. No.14530539   🗄️.is 🔗kun   >>0583

From the Joint Inquiry into Intelligence Community Activities before and after the Terrorist Attacks of September 11, 2001

---—-

"Hijackers In Contact With Persons of FBI Investigative Interest in the United States

--

5.g. The Joint Inquiry confirmed that at least some of the hijackers were not as isolated during their time in the United States as has been previously suggested. Rather, they maintained a number of contacts both in the United States and abroad during this time period. Some of those contacts were with individuals who were known to the FBI, through either past or, at the time, ongoing FBI inquiries and investigations. Although it is not known to what extent any of these contacts in the United States were aware of the plot, it is now clear that they did provide at least some of the hijackers with substantial assistance while they were living in this country."

 

 

 

---

 

Think deep.

Think bold.

Anonymous ID: 8ff4b5 Sept. 6, 2021, 10:02 a.m. No.14530583   🗄️.is 🔗kun   >>0627

>>14530539

Let me be clear.

 

Your operating system doesnt matter.

One is not more secure than the other, not really.

 

The CIA has multiple exploits for all of them*, including every knock-off version of Linux based OS you can find or create.

 

Take their OutlawCountry tool, exposed in the Vault7 leak published through Wikileaks.

-

The OutlawCountry Linux hacking tool consists of a kernel module, which the CIA hackers load via shell access to the targeted system and create a hidden Netfilter table with an obscure name on a target Linux user.

 

The new table allows certain rules to be created using the "iptables" command. These rules take precedence over existing rules, and are only visible to an administrator if the table name is known. When the Operator removes the kernel module, the new table is also removed," CIA's leaked user manual reads.

—-

Or any of these other exploits for other systems (And note, these are four years out of date. Many many many newer tools exist.)

 

Brutal Kangaroo – a CIA tool suite for Microsoft Windows that targets closed networks or air-gapped computers within an enterprise or organization without requiring any direct access.

 

Cherry Blossom – a CIA's framework, generally a remotely controllable firmware-based implant, used for monitoring the Internet activity of the target systems by exploiting flaws in WiFi devices.

 

Pandemic – a CIA's project that allowed the spying agency to turn Windows file servers into covert attack machines that can silently infect other computers of interest inside a targeted network.

 

Athena – an agency's spyware framework that has been designed to take full control over the infected Windows machines remotely, and works with every version of Microsoft's Windows operating systems, from Windows XP to Windows 10.

 

AfterMidnight & Assassin – Two apparent CIA's malware frameworks for the Microsoft Windows platform that is meant to monitor and report back actions on the infected remote host computer and execute malicious code.

 

Archimedes – A man-in-the-middle attack tool allegedly built by the spying agency to target computers inside a Local Area Network (LAN).

 

Scribbles – A piece of software reportedly designed to embed 'web beacons' into confidential documents, allowing the CIA hackers to track insiders and whistleblowers.

 

Grasshopper– A framework that allowed the CIA to easily create custom malware for breaking into Microsoft's Windows and bypassing antivirus protection.

 

☆☆☆ Marble – The source code of a secret anti-forensic framework, primarily an obfuscator or a packer used by the spying agency to hide the actual source of its malware.

(Marble Framework is special, it was actively used against all of you when Russian fingerprints were placed on the DNC servers to frame up the Russiagate narrative. I was one of the people who exposed this.)

 

Dark Matter– Hacking exploits the agency designed and used to target iPhones and Mac machines.

 

Weeping Angel – Spying tool used by the CIA to infiltrate smart TV's/phones, transforming them into covert microphones in target's pocket.

 

Year Zero – CIA hacking exploits for popular hardware and software.

 

-—

-—

 

Anyone telling you one system is more secure from the deep-state than the other, is selling you something; and it isn't truth.

-

Privacy is an illusion.

Anonymous ID: 8ff4b5 Sept. 6, 2021, 11:39 a.m. No.14530958   🗄️.is 🔗kun

A more accurate account of the Garden of Eden. For demon, read oversoul or guardian angel

“But of the fruit of the tree which is in the midst of the garden, God hath said, Ye shall not eat of it, neither shall ye touch it, lest ye die.

“And the serpent said unto the woman, Ye shall not surely die:

“For God doth know that in the day ye eat thereof, then your eyes shall be opened, and your dæmons shall assume their true forms, and ye shall be as gods, knowing good and evil.

“And when the woman saw that the tree was good for food, and that it was pleasant to the eyes, and a tree to be desired to reveal the true form of one’s dæmon, she took of the fruit thereof, and did eat, and gave also unto her husband with her; and he did eat.

“And the eyes of them both were opened, and they saw the true form of their dæmons, and spoke with them.

“But when the man and the woman knew their own dæmons, they knew that a great change had come upon them, for until that moment it had seemed that they were at one with all the creatures of the earth and the air, and there was no difference between them:

“And they saw the difference, and they knew good and evil; and they were ashamed, and they sewed fig leaves together to cover their nakedness.…”

 

As Lord Asriel says:

I’m sorry this is happening to you. But in war, there are casualties, and believe me when I tell you: this is a war, one that will free humanity forever.=