Anonymous ID: cae511 July 24, 2018, 9:11 p.m. No.2274299   🗄️.is 🔗kun   >>4318 >>4332 >>4352 >>4371 >>4374 >>4416 >>4460 >>4468 >>4486 >>4507 >>4621 >>4628 >>4670 >>4681 >>4766

Ok Anons, here's what I think might be going on with this most recent Q post where Q draws our attention back to NZ and Five Eyes:

 

FVEY in NZ seems to have access to ALL US Intel. However, when you access data in NZ, there are no logs of it (or so they thought).

 

So let's say you're a former dignitary like John Brennan. You still have security clearance and you want to get in the system, get the data, and leak it. The problem is you know you'll be logged and you know they're watching you like a hawk.

 

So instead, you go over to NZ and get the data from there since you won't be logged. But what if they were being logged….for over a year? What if the whitehats knew they would use NZ to download, sell and leak? What if they took it a step further - what if blackhats were fed disinformation unique to the NZ download site? If both of these things were true, you could prove:

 

A. The person downloaded the data

B. The data leaked was unique to that downloaded piece of data