2336
04-Oct-2018 2:22:53 PM PDTQ !!mG7VJxZNCI8ch/patriotsfight
Archived links:
1
DHQ27100.png
T_ah2810.jpg
>>333
DaHEgSOVwAEG-8h.jpg
DdcamI6WAAEyROC.jpg
DcPsu1PV0AEtzNc.jpg
https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies
"Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships."
"Multiple people familiar with the matter say investigators found that the chips had been inserted at factories run by manufacturing subcontractors in China."
"One official says investigators found that it eventually affected almost 30 companies, including a major bank, government contractors, and the world’s most valuable company, Apple Inc."
"One country in particular has an advantage executing this kind of attack: China, which by some estimates makes 75 percent of the world’s mobile phones and 90 percent of its PCs."
"But that’s just what U.S. investigators found: The chips had been inserted during the manufacturing process, two officials say, by operatives from a unit of the People’s Liberation Army. In Supermicro, China’s spies appear to have found a perfect conduit for what U.S. officials now describe as the most significant supply chain attack known to have been carried out against American companies."
The More You Know…
Q
3 year delta
2883
22-Feb-2019 8:38:07 PM PSTQ !!mG7VJxZNCI8ch/qresearch
Archived links:
1
2
3
(1) Info
https://www.ncc.gov.ng/documents/297-understanding-internet-infrastructure-emerging-issues/file
(2) Remove Control from Gov't and provide to CA (who controls CA?)
https://www.forbes.com/sites/jodywestby/2016/09/24/7-days-before-obama-gives-away-internet-national-security/#2129f20b30d4
(3) Significant Risk? Cover? Control?
https://www.icann.org/news/announcement-2019-02-22-en
Why would [HUSSEIN] transfer US Gov't control of the internet to a non-profit CA co?
You are the news now.
Q
Name
shadow - shadowed password file
Description
shadow is a file which contains the password information for the system's accounts and optional aging information.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains 9 fields, separated by colons (":"), in the following order:
236407-Oct-2018 12:24:43 PM PDTQ !!mG7VJxZNCI8ch/patriotsfight
https://twitter.com/ValerieJarrett/status/1048323034745098240
[CHAGE IS COMING]
>>>
https://www.judicialwatch.org/blog/2015/06/communism-in-jarretts-family/
Goodbye, Valerie Jarrett.
Q
chage(1) - Linux man page
Name
chage - change user password expiry information
Synopsis
chage [options] [LOGIN]
Description
The chage command changes the number of days between password changes and the date of the last password change. This information is used by the system to determine when a user must change his/her password.
Options
The options which apply to the chage command are: