We know ES put a new twist on double agent fucking the NSA and duping the public with a brilliant (yes evil, but sadly also pretty damn smart) Clown plan which not only fucked the NSA, but managed to trick people into trusting ES endorsed/involved things like Signal and Secure Drop.
So what else can we take from this? Signal was supposed to be end to end encryption with no middle server where it is unencrypted. So either the server hands out the private keys to the clowns, or the encryption itself is insecure, or the app delivers the messages elsewhere unencrypted, or the app delivers the private keys, or etc. We need to know the how because the subtleties matter!
Q said secure comms important:
>RATS everywhere.
>EVIL everywhere.
>TRAITORS everywhere.
>NO SUCH AGENCY - VITAL.
>RAW INTEL - VITAL.
>US MIL - VITAL.
>SAFE COMMS - VITAL.
>YOU, THE PEOPLE - VITAL.
>>>/greatawakening/22 (#537 on qanonmap.github.io from 1/14/2018)
Is sha256, sha512, etc. useless altogether even if done right with an app that isn't compromised? Wikileaks knew and so isn't using SecureDrop, but is still using encryption, TOR, etc. for drops.
What about other things ES endorsed? Qubes-OS is an awesome concept & OS. Was it also compromised from the beginning or just tainted unjustly now by his endorsement? Maybe XEN is comp'd and so all the effort in Qubes is for not? Is Joanna Rut___ska also a clown? She's done great work trying to expose the Intel Management Engine (ME) for years and to disable it long before the leaks showed the world that ME vulnerabilities "leave millions of PCs exposed".
So should we assume AMD got in bed with the Clowns too and has a similar weakness?
Is there anything safe to use that doesn't aid the 'we see you; we hear you' rights violation?
Sorry that this post is only questions without answers, but they are all stones to turn over down the road and important thoughts for people to realize now.