Anonymous ID: adf9cc July 9, 2025, 8:24 a.m. No.23300723   🗄️.is 🔗kun

May 08, 2018 7:50:40 PM EDT1323

Q !4pRcUA0lBE ID: 000000 No. 71

We made a mistake on /qresearch/ exposing the password.

We did not input "Q #" in the beginning which exposed the password.

Error corrected.

Safe.

Q

 

May 19, 2018 6:10:28 PM EDT1418

Q !CbboFOtcZs ID: f68852 No. 1472525

May 19, 2018 6:07:12 PM EDT

Q !4pRcUA0lBE ID: ed23c9 No. 1472472

PASSWORD exposed?

>>1472472

Mistake or on purpose?

Q

 

May 20, 2018 3:19:05 PM EDT1430

Q !CbboFOtcZs ID: 902859 No. 1483388

Clarification.

We exposed the PASSWORD [#91] on purpose [23].

Subsequent posts [on here] were then made by Anons.

Timestamps verify.

Use Logic.

Understood?

Be careful who you follow.

Q

 

Jun 06, 2020 8:43:52 PM EDT4437

Q !!Hs1Jq13jV6 ID: 57aa1b No. 9511197

Jun 06, 2020 8:42:01 PM EDT

Anonymous ID: ac933c No. 9511175

Q you really need to walk that last one back…..

The same reason a thumbnail of a gray clapboard shows up on a YouTube video when it's been deleted…

The thumbnail is CURRENT (obama.org main image)……… but the content is OLD.

Q you really need to retract that………………………………………………….

>>9511175

def visit_twitter_and_log_in

visit 'https://cards-dev.twitter.com/validator '

find('input.js-username-field').set(ENV['TWITTER_USERNAME'])

find('input.js-PASSWORD-field').set(ENV['TWITTER_PASSWORD'])

click_on('Log in')

end

def enter_url_and_click_preview(url)

find('input.FormControl').set(url)

click_on('Preview card')

result = has_content?('Page fetched successfully')

visit 'https://cards-dev.twitter.com/validator '

end

end

Q