Anonymous ID: bd5a1b Nov. 25, 2019, 9:07 a.m. No.7370130   🗄️.is 🔗kun

Not complete list - "Complete List Of Clinton Associates Who Allegedly Died Mysteriously Or Committed Suicide Before Testimony"

 

"The documents described how Bill Clinton held a private party on Jeffrey Epstein’s pedophile island.

 

Clinton made at least 27 times trips on Jeffrey Epstein’s private plane. Most of those flights were with underage girls.

 

Despite a previous attempt on his life just three weeks ago the prison guards skipped the 30 minute required checks on Epstein’s cell last night.

 

Early yesterday morning they found him dead.

 

Jeffrey Epstein is the latest in a long list of Clinton family associates and acquaintances who died mysteriously or committed suicide before their public testimony.

 

In 2016 CBS Las Vegas posted a list of Bill and Hillary Clinton associates alleged to have died under mysterious circumstances.

 

Here is that list.

 

1- James McDougal – Clintons convicted Whitewater partner died of an apparent heart attack, while in solitary confinement. He was a key witness in Ken Starr’s investigation.

 

2 – Mary Mahoney – A former White House intern was murdered July 1997 at a Starbucks Coffee Shop in Georgetown .. The murder …happened just after she was to go public w:th her story of sexual harassment in the White House.

 

3 – Vince Foster – Former White House counselor, and colleague of Hillary Clinton at Little Rock’s Rose Law firm. Died of a gunshot wound to the head, ruled a suicide.

 

4 – Ron Brown – Secretary of Commerce and former DNC Chairman. Reported to have died by impact in a plane crash. A pathologist close to the investigation reported that there was a hole in the top of Brown’s skull resembling a gunshot wound. At the time of his death Brown was being investigated, and spoke publicly of his willingness to cut a deal with prosecutors. The rest of the people on the plane also died. A few days later the Air Traffic controller commited suicide.

 

5 – C. Victor Raiser, II – Raiser, a major player in the Clinton fund raising organization died in a private plane crash in July 1992.

 

6 – Paul Tulley – Democratic National Committee Political Director found dead in a hotel room in Little Rock , September 1992. Described by Clinton as a “dear friend and trusted advisor”.

 

7 – Ed Willey – Clinton fundraiser, found dead November 1993 deep in the woods in VA of a gunshot wound to the head. Ruled a suicide. Ed Willey died on the same day his wife Kathleen Willey claimed Bill Clinton groped her in the oval office in the White House. Ed Willey was involved in several Clinton fund raising events…….

…."

 

 

https://www.zerohedge.com/news/2019-08-11/complete-list-clinton-associates-who-allegedly-died-mysteriously-or-committed

Anonymous ID: bd5a1b Nov. 25, 2019, 9:15 a.m. No.7370180   🗄️.is 🔗kun

Reminder about all the NYPD officers involved in the Weiner laptop investigation that were murdered. Is it still 9 out of the 12 that saw the laptop?

 

NYPD cop kills himself in fourth officer suicide this month:

https://nypost.com/2019/06/27/nypd-cop-kills-himself-in-fourth-officer-suicide-this-month/

 

NYPD 4th suicide in 23 days?

https://twitter.com/pharoah_84/status/1144296437016141825

 

Also 46 people in the Clinton Dead Pool NOT including the NYPD officers!

 

ARKANCIDE: It looks like the mysterious NYPD deaths are connected to Clinton via Weiner’s laptop:

https://stillnessinthestorm.com/2019/07/arkancide-it-looks-like-the-mysterious-nypd-deaths-are-connected-to-clinton-via-weiners-laptop/

 

(if this posts - can't seem to post with pics last few days on Tor. Says server took too long and that post is likely submitted anyway, but it never posts)

Anonymous ID: bd5a1b Nov. 25, 2019, 9:32 a.m. No.7370262   🗄️.is 🔗kun

Getting Ahead of the Big Unveiling

Tried posting this, over the weekend. Nows a good tie as any. Sorry if this already was posted.

 

Looks like the known plan to get ahead of the "great unveiling" is starting. Why would NPR re-release an old podcast…

 

NPR RadioLabs

https://www.wnycstudios.org/podcasts/radiolab/articles/breaking-news

 

Today, we're re-releasing an old episode about how hard it is getting to decipher fact from fiction. Because next week, we’ll be putting out a story showing what happens when certain reality-altering tools get released into the wild.

 

Simon Adler takes us down a technological rabbit hole of strangely contorted faces and words made out of thin air. And a wonderland full of computer scientists, journalists, and digital detectives forces us to rethink even the things we see with our very own eyes.

This is to protect against any future legit info that comes out from Trump

 

https://futureoffakenews.com/

Anonymous ID: bd5a1b Nov. 25, 2019, 9:50 a.m. No.7370478   🗄️.is 🔗kun

>>7370269

 

projectDcomms ~ Project DeepMind?

 

Q post from 11/11/19:

 

Q !!mG7VJxZNCI ID: 9b601a No.7352944 📁

Nov 11 2019 19:30:45 (EST)

GOOG whistleblower

Project DeepMind?

“AI Manhattan Project.”

https://www.breitbart.com/tech/2019/10/14/whistleblower-google-is-developing-ai-for-planetary-surveillance/📁

[Feb 18 2018]

“Project DeepDream v2[A]?” Q

Do you believe in coincidences?

Q

 

(can't post pics in Tor)

Anonymous ID: bd5a1b Nov. 25, 2019, 9:51 a.m. No.7370479   🗄️.is 🔗kun

>>7370291

MIGA

praying for the ppl of Iran

Twitter anons, there are several "restart" accounts, follow and RT, hopefully they'll come back on line soon

https://twitter.com/Ali_Rst2

Anonymous ID: bd5a1b Nov. 25, 2019, 9:51 a.m. No.7370494   🗄️.is 🔗kun

>>7369252 PB

Yes, this is the pic. TY

pic of Valerie J. at Stanford, 1977

with a statement:

I am an Iranian by birth and of my Islamic faith.

I am also an American Citizen and I seek to help change America to be a more Islamic country. My faith guides me and I feel like it is going well in the transition of using freedom of religion in America against itself.

 

Is this FAKE?

Anonymous ID: bd5a1b Nov. 25, 2019, 10:21 a.m. No.7370740   🗄️.is 🔗kun   >>0747 >>0765 >>0828

The web site is under construction, while we work on the project

Dcomms.org - fully decentralized and secure communications

What is Dcomms?

Dcomms.org is a non-profit organization. We develop an open source framework to build decentralized cryptographic communication systems with full privacy. The framework is designed to build various customized messengers and applications; it also includes its own messenger.

Why Dcomms?

Users communicate without servers. No server is able to sniff contact book, by tracking sender and receiver IDs

Servers do not put limit on transmitted data size. Users can exchange huge data files directly, without servers

There is no link between user ID and phone number / email

Users are able to compile the messenger from source code, audit the source dode themselves, and run the messenger on Linux/Windows/Android/iOS

The protocol and implementation is done by a single developer, with help of team, with no rush and with high quality. The developer has 100% control and responsibility for the system

The project is developed with help of team: various cryptographers, penetration testers and security engineers. We discuss vulnerabilities and countermeasures since the very beginning

The project is open source, under MIT license. Everyone is able to create his own messenger, with own brand and customizations, and the messengers will be interoperable

Implementation is done in C# programming language, it avoids memory corruption vulnerabilities that are common to C++ implementations

User's personal data (private keys and contact book) is stored only at his own device. User can backup the personal data himself, store in safe place, restore to another device

Users or organizations can run same messenger via private IP networks and rendezvous peers, physically separate from public P2P network

The protocol includes automatic QoS tests, when the software checks quality of network and peers to select best path for messages across P2P network

The protocol automatically bypasses NAT and firewall

Users initiate connection via peer-to-peer network, via multiple paths. Downtime of a single element does not interrupt operation of entire network

End-to-end encryption is always turned on in the messenger. Unencrypted mode is not possible

How it works

The messenger is based on "Decentralized Routing Protocol". Here is general explanation of the protocol:

Users A and B generate key pairs: private key to sign messages, public key to verify messages

Users A and B exchange public keys over some secure channel and store them in contact book. There is also a special mode of key exchange over insecure channel.

Users get connected via a peer-to-peer (P2P) network (P2P like bittorrent, bitcoin, I2P)

The P2P network delivers "INVITE" requests between users. The "INVITE" requests do not contain any information about the users, only previously exchanged keys. The public keys can be different for every link A-B (for every item in contact boook)

When both users agree to communicate, they authenticate each other using public key (stored in contact book), generate a temporary session key, set up direct (serverless) communication channel, encrypt real communication with the session key

It is user's responsibility to store his personal data (keypair and contact book) in safe place, make backups and transfer the personal data to another device domms.org

Anonymous ID: bd5a1b Nov. 25, 2019, 10:24 a.m. No.7370767   🗄️.is 🔗kun   >>0781 >>0784 >>0877

>>7370760

PLEASE CHECK MY NOTABLE: Website dcomms.org I can not post picThe web site is under construction, while we work on the project

Dcomms.org - fully decentralized and secure communications

What is Dcomms?

Dcomms.org is a non-profit organization. We develop an open source framework to build decentralized cryptographic communication systems with full privacy. The framework is designed to build various customized messengers and applications; it also includes its own messenger.

Why Dcomms?

Users communicate without servers. No server is able to sniff contact book, by tracking sender and receiver IDs

Servers do not put limit on transmitted data size. Users can exchange huge data files directly, without servers

There is no link between user ID and phone number / email

Users are able to compile the messenger from source code, audit the source dode themselves, and run the messenger on Linux/Windows/Android/iOS

The protocol and implementation is done by a single developer, with help of team, with no rush and with high quality. The developer has 100% control and responsibility for the system

The project is developed with help of team: various cryptographers, penetration testers and security engineers. We discuss vulnerabilities and countermeasures since the very beginning

The project is open source, under MIT license. Everyone is able to create his own messenger, with own brand and customizations, and the messengers will be interoperable

Implementation is done in C# programming language, it avoids memory corruption vulnerabilities that are common to C++ implementations

User's personal data (private keys and contact book) is stored only at his own device. User can backup the personal data himself, store in safe place, restore to another device

Users or organizations can run same messenger via private IP networks and rendezvous peers, physically separate from public P2P network

The protocol includes automatic QoS tests, when the software checks quality of network and peers to select best path for messages across P2P network

The protocol automatically bypasses NAT and firewall

Users initiate connection via peer-to-peer network, via multiple paths. Downtime of a single element does not interrupt operation of entire network

End-to-end encryption is always turned on in the messenger. Unencrypted mode is not possible

How it works

The messenger is based on "Decentralized Routing Protocol". Here is general explanation of the protocol:

Users A and B generate key pairs: private key to sign messages, public key to verify messages

Users A and B exchange public keys over some secure channel and store them in contact book. There is also a special mode of key exchange over insecure channel.

Users get connected via a peer-to-peer (P2P) network (P2P like bittorrent, bitcoin, I2P)

The P2P network delivers "INVITE" requests between users. The "INVITE" requests do not contain any information about the users, only previously exchanged keys. The public keys can be different for every link A-B (for every item in contact boook)

When both users agree to communicate, they authenticate each other using public key (stored in contact book), generate a temporary session key, set up direct (serverless) communication channel, encrypt real communication with the session key

It is user's responsibility to store his personal data (keypair and contact book) in safe place, make backups and transfer the personal data to another device

Anonymous ID: bd5a1b Nov. 25, 2019, 10:33 a.m. No.7370824   🗄️.is 🔗kun   >>0854 >>0877

>>7370540

/projectdcomms/ (projectDcomms_prov)

 

>>7366783

Future trip(c) re_verify:

Notebook

Pen

Watch

Desk

——————

Anon interaction coming soon

Q

 

project direct comms _ provisional

 

define provisional

for the time being

Anonymous ID: bd5a1b Nov. 25, 2019, 10:40 a.m. No.7370865   🗄️.is 🔗kun

>>7370848

>Does anyone know for sure what these agencies are and do…

possibly the actors either involved in the coup d'etat OR the agencies bringing bad actors to justice. Just not enough info, but future will prove past.

Anonymous ID: bd5a1b Question for Q about AG Wm Barr & FOIA & Reputation Nov. 25, 2019, 10:44 a.m. No.7370898   🗄️.is 🔗kun

Q so far looks like AG Wm Barr is doing nothing about the FBI obstructing or slow walking FOIA requests for documents and records. Who is Attorney General William Barr anyhow? What is his resumé really?

btw, Jeffrey Eptein did NOT kill himself. BArr lied saying Epstein killed himself. The Dr allegedly examined him is questionable of character. .

>>7370403