Anonymous ID: bae5c7 May 13, 2022, 8:03 a.m. No.16267136   🗄️.is 🔗kun   >>7179 >>7203

>>16266837

 

As a programmer and network engineer my gut has always told me there is more to this than most realize. I only got 1 person in the entire world to have interest in my application that would have been similar to twitter but instead of posts (pic and words) fully editable customized crud data driven pages/sites.

 

I know the level of censoring starts from the home router, ISP account, and goes through entire cabal eco systems (dns, search/google, credential systems, etc…). If I couldn't organize people before this chaos how could these people organize and go from city to city burning, looting, and murdering without obstruction.

 

The only way they could is by an heir architectural authoritative domains that put out orders by a top down approach. Each domain needs to be dynamic lifetimes, isolated, with visibility constraints.

 

I always suspected that they used Twitter applications as private boo table service as their domain partitions. In a few seconds they could pop up a clone on any of their DS cloud providers such as AWS. Azure, or GCloud. Then after say a city was burnt they could copy the security domain, spin down the current service, and then create anew.

 

When you see something like LinkedIn, remember that is one of their permanent clones that has public visibility yet they blacklist people right in front of their faces and attack conservatives all day. The more you know.