reposting:
>>4346883 pb
an old q crumb decode, how it relates to shill chatbots and "APACHE"
look at the attached q post.
The marked text explains the behavior of the so called spam chatbots.
my experiment is described here:
here i trolled the spam chatbot with a reply:
>>4345440 pb
and what do you know?
it gave me an automatically generated text pasta reply:
>>4345586 pb
and posted another 4 posts with a random delta that is in the range [10-30 minutes]:
>>4345586 pb
>>4345666 pb
>>4345825 pb
>>4345962 pb
exactly as q told us more than a year ago!
What they did manage to do during this year is to update their automatic post pattern to be triggered by a reply. Notice that the bot posts a first "common drive post", like q called it, and the subsequent 4 posts will all tap into this one.
To summarize, lets get back to the q post.
similarly to what is written in the q post, the spambot uses a 5 prong pre packaged injection, only this time it has a precursor post serving as bait. After an anon takes the bait and replies, the bot searches for "negative" keywords ("bot", "r2d2", "spam", "shill", etc). If it found these words, then the 5 prong pre packaged delivery is injected, meaning 5 automatic posts are inserted, with the first one auto generating the other 4 posts at random designated times with deltas in a range of 10 to 30 minutes.
Then, as q said, "shills log and send new info back to ASF for instruction. " with ASF probably refering to the APACHE SOFTWARE FOUNDATION.
see attached snip taken from:
https://www.apache.org/foundation/
Also as you may or may not remember, Q used "APACHE" as a signature, and told us to dig it. An anon found out before that it is connected to the Securedrop whistleblower honeypot fiasco, but it could have multiple meaning, or in fact the ASF can be connected to it as well (see attached q snip).