Anonymous ID: 601c29 March 8, 2019, 3:04 p.m. No.5580371   🗄️.is 🔗kun   >>0489

>>5580228 lb

No pardons.

Cohen isn't acting. He's just fucking stupid. The guy would have been able to avoid most of this mess if he didn't try to play along with the democrats. He thought it was the safe play, and played ball with the team that wanted to use him to twist the truth.

 

Now he suffers the consequences.

Anonymous ID: 601c29 March 8, 2019, 3:16 p.m. No.5580543   🗄️.is 🔗kun

>>5580380

Some of us are equipped with a very good memory. Shill jamming tactics are only effective against anons three generations older than the current one.

 

All tracks are accurate. Assigning track Dirka-066.

Anonymous ID: 601c29 March 8, 2019, 3:31 p.m. No.5580772   🗄️.is 🔗kun   >>0996

>>5580489

The result of eating the fruit of the tree of knowledge was the understanding of the difference between good and evil actions. Meditate on that idea for a bit.

 

Further, the recipe to financial success is discipline. Being able to perform simple arithmetic to invest in profits is not rocket science. Algorithms on the stock market do it. Unthinking, unfeeling computers can turn a profit on assets.

 

Intelligence can come in many flavors and is independent of the quality of discipline. Cohen was well trained in how to make money, and he was very effective at implementing that strategy.

Outside of that … Eh. A smart person would not pay off Stormy's lawyer without consulting the client in question. There is no way that was going to play out to his advantage, even if he meant it as a trap for DJT to use later.

Anonymous ID: 601c29 March 8, 2019, 3:47 p.m. No.5581011   🗄️.is 🔗kun   >>1093

>>5580690

It isn't so much the camera at that point as it is the computer/server the camera feeds to. In principle, yes. All of them can be tapped into - although whether or not the tools have been made to and deployed is questionable. Large data collection is probably less focused on security cameras because …..

 

Your phone has cameras, yes? Facial recognition technology runs locally on your phone. Could I set a facial recognition hash via the FB app (or others) for phones to be on the lookout for?

What about GPS bounding boxes to activate cameras of all phones in those areas and to upload pictures at various gyroscope/accelerometer orientations?

 

"Learn to code" wasn't a joke. Ghidra. Dig into what the programs running on our computers and phones are doing.

 

Almost all browsers are built on Chromium. Opera, Edge, Firefox… Chromium has built in ad service handling that activates attached webcams. Ostensibly, this is to see where your eyes are looking for ad services and marker research. Of course, they aren't limited to those uses.

 

Android is built on Chromium for its browsers. I am skeptical of whether or not the permission settings actually do anything, but I have some hope that Motorola (in my case), has written interventions into their android distribution to make sure that app permissions are adhered to… But… Until I actually lith my own chips for my own phone and can look at the OS source code it uses, I generally assume the device to be compromised and that any particular event during the day is on someone's servers for review.

 

I have come to look at this as an opportunity, however. Their entire data engine is geared toward the idea that people do not know they are being watched and that what is recorded is an accurate representation of the extent of their life.