>>16542582 (PB)
>He resigned in November 2020
he resigned under the Joe Biden presidency anon?
Joe Biden was inaugurated on Jan 20th, 2020, anon
CodeMonkey resigned November2019
>>16542582 (PB)
>He resigned in November 2020
he resigned under the Joe Biden presidency anon?
Joe Biden was inaugurated on Jan 20th, 2020, anon
CodeMonkey resigned November2019
>CodeMonkey resigned November 2019
a week after 8kun went live
in September 2019
CodeMonkey literally NEVER admined 8kun
he was "here" for the first week and the re-verification of Q on 8kun
and then he wasAudi5000
on a boat
'The Monitor'
specifically
>His last post saying he was leaving was around the election in 2020
and when did 8kun go live?
>>16542591 (me, literally retarded)
>Joe Biden was inaugurated on Jan 20th, 2020, anon
>His [CM] last post saying he was leaving was around the election in 2020
>>16542630 (me, a retarded person)
>and when did 8kun go live?
>Oct 15th 2019?
>2019
confirmed
I amliterallyretarded
apparently I memory holed the entire year of 2019 in my own head
I'll wear the schizo hat for the rest of the bread
>doge correctly identifying a tit bread
>He kept the lights on thru a lot of shit.
agreed
I am bummed he is gone
Jim is not the same /obv
>Servers got fortified
thats not a one time thing
thats a 24/7 job
a stable setup one day
is broken as fuck the next
so much changes in network land
just basic updates break things ALL THE TIME
let alone keeping on top of exploit patching
which
new ones come out ALL THE TIME
log4j exploit anyone?
Its not like Ron locked a box and threw away the key
this place is a live deployment that exists in the real world
it needs daily management
>The HTML page format has the ID zeroed out but not the JSON. I don't know where the ID actually comes from.
its because TOR posting is broken in the site code
its "kind of" works
all kinds of glitches and unexplainable behavior
it NEVER got fixed properly
TOR postinghadbeen turning off for over a year now
it got turned on the day before (a few days before?) the first faked Q post
>[CodeMonkey]He did his part.
like secure TOR posting?
kek
>Trips make you seem knowledgeable
digits are the spirit of KEK speaking through anon
we are merely vessels for the message
>so does that mean the consensus of ITanons is that the recent Q posts are fake?
yes
what is even worse than the TOR fuckery?
the 8kun tripcode salt was rotated hours before the fist faked Q post
which had Q's "old" (now old, because the salt got rotated) tripcode
if the salt gets rotated
EVERYONEgets a different tripcode for the same password
many anons across multiple boards started reporting contemporaniously (completely un-related to the Q drop or trying to confirm/deny it) that their tripcode passwords were not working anymore
"hey! my tripcode password results in a different tripcode now! dafuq?!?!? no one ANNOUNCED a saly rotation?!"
Triple-A, the anon who maintains our notables thread here on /qresearch/ noticed
some anon I dont recognize from the /pen/ board noticed
Doge noticed on the /deepdigs/ board
kekbees noticed on his own provate board that he uses for verifying himself with a tripcode he maintains there
mutlitple anons on /hivemind/ noticed
8bit noticed and confirmed, absolutely, the 8kun tripcode salt had been rotated
SO
the first Q drop on friday
that had Q's old trip
should have had a brand new never before seen tripcode
if it was legit
because the entire website had a new salt for encrypting the "shared secret" (password) into the tripcode
this salt rotation was NOT announced by Jim (the site admin) who is the ONLY account with the priveleges to do so
/almonds
>how fast would it be to find a new salted trip same as q's old trip?
thats a great question
Fredderick Benson
aka Freddy
aka Hotwheel
aka CrippleCode
aka the orriginal coder who wrote the ENTIRE source code for what we are currently posting on right now
posted these on twitter
he claims they are in the source code
and it is a method to display whetever the fuck you want in the tripcode CSS
you are a codeanon no?
check it out
>you are a codeanon no?
oops, didnt check you UID
this is codeanon: >>16542756
bf2b37
see: >>16542916
what think?
>5:5 to what
exactly the question
its totally a 5:5
its totally a babyfist
babyfist posted those Q drops
5:5?
thethirdDan social media post of the babyfist.png (which was a re-tweet of the second babyfist.png post) has been deleted
in previous comms with Q team social media
a tweet gets deleted after the message is received
kek
the message I received are that the Q's are fake
and that they were done by the faggot known as babyfist
who was also responsible for the B post on /projectdcomms/
>thethirdDan social media post of the babyfist.png (which was a re-tweet of the second babyfist.png post) has been deleted
for anyone still questioning
3 babyfist Dan proof
>He is confirming that it was Q on Friday
thats not how confirmation works
pics rel is what actual confirmation looks like
very dasting anon
>What if the goal here is to prove this board is comp'd (idk how) in order for @Q to be verified on Truth.
that sounds plausible to me anon
to be honest
the only drop I am expecting from "real Q"
is going to be a version of picrel
>How baker did not mark as notable is beyond me.
apparently the entire subject is now considered "hivemind spam"
becauase many of the anons discussing it also post on the /hivemind/ board
kek
good times
I will have some appologizing to do
but in my obviously biased opinion that likelyhood is vanishingly small
if you want to CAP this
I will absolutely appologize loudly if Dan posts the watermellon
> if TOR
I dont think there are any "if TOR" flags
if I recall correctly from previous explanations
the 000000 UID is a feature of the IP address TOR anons have
AFAIK all TOR posters appear to have the same IP address
and yet they are all being served on different broswer instances with different cookies
(You)'s track with cookies
UID per bread tracks with your unique IP hash
the conflict of mutiple (You)'s attached to the same IP hash creates the 00000 display
for example
if you had 100 different anons posting from TOR in a bread
when you were in the bread
EVERYONE would have 00000 UID
but, in the next bread
when you hovered over links back to that bread
everyone would have a UID instead of the 000000's
except
all 100 TOR users would have the same UID
the UID you are seeing when you hover (I think) is the actual UID generated by the global TOR IP address hash, that EVERY SINGLE TOR poster shares
>Both formats are derived from a master source which contains a flag to indicate that the post originated from Tor
how does that flag get attached to a TOR poster?
>Is it just "some" exit nodes that are banned, or are many/most banned?
thats a very good question anon
I think its many/most
I have also tried posting through the i2p darknet (through a clearnet exit node hosted on the overlay netwok)
same result
IP already banned
there are only a few public clearnet exit nodes on i2p so its not exactly surprising
>the server knows that the post came through Tor
ohhh yeah
TOR.onion link
duhhhhhh
I was thinking clearnet -TOR -> exit node back to clearnet -> 8kun
with the .onion link you are sending your request to the .onion hosted version of 8kun
carry on
>Any luck with it?
use it for torrenting
postman.i2p tracker
works way bettern than attempting to torrent over TOR
and i2p users dont frown on torrenting over i2p
the network was designed more fore p2p traffic within the network
so i2p gets faster with more torrent users, not slower
on popular torrentz I can hit 1-2 mbps
but a more common average is 300-500 kbps
more good questions anon
I know a few actual anons were able to figure out TOR posting
OSS was able to get it working for some period of time
kek
>Is it even POSSIBLE to securely torrent over TOR
no
not really
and it kills their network latency for other traffic
so TOR users generally hate people for torrenting over the network
>If so, how dreadful would the speed be given the three hops down PLUS three hops up
I have no idea how they do it
but i2p gets me 300-500kbps average
sometimes up to 1-2 mbps
using 6 hop tunnels
and you have DIFFERNT tunnels for incomming messages than you do for outgoing messages
the tunnels auto-expire every 10 minutes
but there is tunnel bonding
so I might get 20+ tunnels connected to the same client, maybe more
each client a seperate discrete route through the network using at least 6 hops (that is my set minimum, you can set it as low as 1 hop if you are looking for speed over anonymity)
>(don't use windows AT ALL, only linux, mostly security distros (hate SystemD btw))
then i2pd is the way to go
i2p exists in two codebase forms
the first development was ALL in Java (yaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaay)
so you would need the runtime environmentโฆ.
then, some lovely Russian decided to fork in native C++
FOR THE WIN!
the c++ version is i2pd
start here: https://i2pd.website/
code here: https://github.com/PurpleI2P/i2pd
I built from source because thats fun
but they have a package for most distros
>hate SystemD btw
sounds like your a build-from-source kind of guy
READ THE DOCS!
https://i2pd.readthedocs.io/en/latest/
building from source: https://i2pd.readthedocs.io/en/latest/user-guide/install/#building-from-source
>Can you suggest a link where I can get up to speed
read the DOCS page I linked
once you get it going
zzz.i2p is the main developers forum site
"zzz" is the main developer right now for Java i2p
and you will find "Original" the main developer of C++ i2p on the irc chatroom which I am forgetting right now, but you will find if you do the reading I have suggested above
>the I2P stuff
have a peak at muh webconsole
I have i2pd running on a raspberry pie (gen 1 Rev B 512mb) in the electrical box in my garage where all the ISP equipment is
I mostly forget about it until I use it to torrent something
kek
uptime of 105 days and counting
niceโฆ
nice
oops
I am currently "idle" on the network
I am not actually doing anything over i2pd right now
the traffic there is all i2pd network traffic running through my node
>I'm one or two steps above a script kiddie
the docs for i2pd are remakably good
AND
you can shitpost with the currect code developer on his irc chatroom as soon as you get your instance up and running
I have made some suggestion that already got implemented
and ran into 2 fatal errors that he corrected in the source code like 3-4 hours after I posted them on irc
the dude 'Original' is fucking legit
>There are those who are paid to try to prevent people from seeing
yeah
they delete and ban
anons cant delete and ban
DART can delete and ban
FLINT can delete and ban
JIM can delete and ban
reconcile?
hm spam = /hivemind/ spam