May 08, 2018 7:50:40 PM EDT1323
Q !4pRcUA0lBE ID: 000000 No. 71
We made a mistake on /qresearch/ exposing the password.
We did not input "Q #" in the beginning which exposed the password.
Error corrected.
Safe.
Q
May 19, 2018 6:10:28 PM EDT1418
Q !CbboFOtcZs ID: f68852 No. 1472525
May 19, 2018 6:07:12 PM EDT
Q !4pRcUA0lBE ID: ed23c9 No. 1472472
PASSWORD exposed?
>>1472472
Mistake or on purpose?
Q
May 20, 2018 3:19:05 PM EDT1430
Q !CbboFOtcZs ID: 902859 No. 1483388
Clarification.
We exposed the PASSWORD [#91] on purpose [23].
Subsequent posts [on here] were then made by Anons.
Timestamps verify.
Use Logic.
Understood?
Be careful who you follow.
Q
Jun 06, 2020 8:43:52 PM EDT4437
Q !!Hs1Jq13jV6 ID: 57aa1b No. 9511197
Jun 06, 2020 8:42:01 PM EDT
Anonymous ID: ac933c No. 9511175
Q you really need to walk that last one back…..
The same reason a thumbnail of a gray clapboard shows up on a YouTube video when it's been deleted…
The thumbnail is CURRENT (obama.org main image)……… but the content is OLD.
Q you really need to retract that………………………………………………….
>>9511175
def visit_twitter_and_log_in
visit 'https://cards-dev.twitter.com/validator '
find('input.js-username-field').set(ENV['TWITTER_USERNAME'])
find('input.js-PASSWORD-field').set(ENV['TWITTER_PASSWORD'])
click_on('Log in')
end
def enter_url_and_click_preview(url)
find('input.FormControl').set(url)
click_on('Preview card')
result = has_content?('Page fetched successfully')
visit 'https://cards-dev.twitter.com/validator '
end
end
Q