TYB!
Elon, let's do a test.
December 31, 2022 is 4, 10, 20 on the qclock.
Tweet something on new years eve using
4, 10, 20
50, 12 or 00 are also acceptable.
Can be content or timestamp.
o7
-clockfag
Note to shills: means nothing if he doesn't…
>or
Nothing. Just a test to see if he really wants to play.
Clockfags know he is in…but it will make a nice proof if he plays…..no?
>Are they shadow banning us again - sure feels like it?
Remember, Elon said they disconnected a sensitive server…(Fractal Rube Goldberg machine tweet…?)
I bet he disconnected it b/c he doesn't want the spooks going in and wiping it…(foolish idiots for waiting).
So, i bet the whole system is under attack now.
probably breaking out the sonic screwdriver or brutal kangaroo to see if they can capitalize on any latent server batteries for juice to wipe.
Brutal Kangaroo
22 June, 2017
Today, June 22nd 2017, WikiLeaks publishes documents from the Brutal Kangaroo project of the CIA. Brutal Kangaroo is a tool suite for Microsoft Windows that ''targets closed networks by air gap jumping using thumbdrives''. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, directory listings, and arbitrary executables.
The documents describe how a CIA operation can infiltrate a closed network (or a single air-gapped computer) within an organization or enterprise without direct access. It first infects a Internet-connected computer within the organization (referred to as "primary host") and installs the BrutalKangeroo malware on it. When a user is using the primary host and inserts a USB stick into it, the thumbdrive itself is infected with a separate malware. If this thumbdrive is used to copy data between the closed network and the LAN/WAN, the user will sooner or later plug the USB disk into a computer on the closed network. By browsing the USB drive with Windows Explorer on such a protected computer, it also gets infected with exfiltration/survey malware. If multiple computers on the closed network are under CIA control, they form a covert network to coordinate tasks and data exchange. Although not explicitly stated in the documents, this method of compromising closed networks is very similar to how Stuxnet worked.
>>18032588, >>18032598, >>18032622, >>18032630, >>18032651 Twitter shadowbanning or under attack?
NOTABLE
>>18032620 - BakZ, I think this is developing and notable (minibun above).
>>18031957 - dough
*updated screenshot from downdetector.
anyone having problems getting to Qalerts?
>No. I got on it earlier to verify muh
thanks bru
hung up on my end….usually if kun is hung up, qalerts is for me as well, so odd…