Shill chatbot behavior analysis - connection to early q posts and "APACHE"
look at the attached q post.
The marked text explains the behavior of the so called spam chatbots.
my experiment is described here:
here i trolled the spam chatbot with a reply:
>>4345440 pb
and what do you know?
it gave me an automatically generated text pasta reply:
>>4345586 pb
and posted another 4 posts with arandom delta that is in the range [10-30 minute]:
>>4345586 pb
>>4345666 pb
>>4345825 pb
>>4345962 pb
exactly as q told us more than a year ago!
What they did managed to do during this year is to update their automatic post pattern to be triggered by a reply. Notice that the bot posts a first "common drive post", like q called it, and the subsequent 4 posts will all tap into this one.
To summarize, lets get back to the q post.
as written in the post, the spambot uses a 5 prong pre packaged injection, with the first post serving as bait, and the other 4 posts triggered by a reply to the first post, and are posted at random designated times with delta in a range of 10 to 30 minutes.
Then, as q said, "shills log and send new info back to ASF for instruction. " with ASF probably refering to the APACHE SOFTWARE FOUNDATION.
see attached snip taken from:
https://www.apache.org/foundation/
Also as you may or may not remember, Q used "APACHE" as a signature, and told us to dig it. An anon found out before that it is connected to the Securedrop whistleblower honeypot fiasco, but it could have multiple meaning, or in fact the ASF can be connected to it as well (see attached q snip).
https://www.apache.org/foundation/