Anonymous ID: f934ba April 28, 2020, 7:38 p.m. No.8955525   🗄️.is 🔗kun   >>5832 >>6052 >>6168

>>8955403 (Q, lb)

Dig into and Graphic on the Origins of SARS-CoV-2 (COVID-19)

 

The new Epoch Times documentary goes through a lot of this, but I wanted to lay it out in a graphic with the sauce, an introduction and the newest information that came out of WaPo and FOX. The graphic is in chronological order, so you can go through it in order. The Wuhan Institute of Virology, where the outbreak started, is the main Level 4 Biosafety Laboratory in China which would is the place the SARS research was ongoing. It's run by the Chinese Academy of Sciences, so the Chinese Communist Party (CCP) knows everything that's going on there. The doctor who was running the SARS research was Zhengli Shi, who is every paper about the research done at the Wuhan Institute of Virology. AS far back as 2010, she and her team were researching ACE2 in different SARS-CoV virus using "HIV-based pseudotype" to modify the virus. Some of the bats used in their research were the horseshoe bat which is from Yunnan, China and not Wuhan; which is what SARS-CoV-2 comes from. In 2015, the research team "generated and characterized a chimeric virus", or a hybrid virus, that used ACE2 to be able to infect humans. A few days after the paper was published about that hybrid virus, another paper was published which criticized the research for being dangerous and that "If the virus escaped, nobody could predict the trajectory".

 

THIS IS EXACTLY WHAT SEEMS TO HAVE HAPPENED

 

The Wuhan Institute of Virology was researching hybrid SARS viruses that they created to infect humans, and it got out into the public in Wuhan, then spread around China, then the world. The recent news out of WaPo shows US officials knew the Institute's bad safety standards, despite being a Level 4 Biosafety Laboratory, could allow a deadly virus that they were researching to get out and start a pandemic. Then FOX broke the news, which anons were months ahead of, that "the COVID-19 outbreak likely originated in a Wuhan laboratory". The same researchers who made the hybrid SARS-CoV viruses "confirmed that 2019-nCoV uses the same cell entry receptor—angiotensin converting enzyme II (ACE2)—as SARS-CoV". The way their modified viruses infected humans is the same way SARS-CoV-2 infects humans.

 

Remember there are NO COINCIDENCES!

 

The fact that the Wuhan Institute of Virology was researching, creating, and modifying SARS-CoV viruses that could infect humans was a few miles from the epicenter of the global outbreak of SARS-CoV-2 that seems to be similar to those hybrid virus they were making is NOT A COINCIDENCE. Then of course China covered it up for a month or more, let their people travel all around the world, and spread disinformation to discredit the truth from coming out about the global pandemic THEY CAUSED. The CCP, Democrats, Deep State, and Cabal then seized on this apparently accidental pandemic to use it as a false flag to attack Trump, his reelection, and the American people's constitutional rights and freedom. China MUST be held accountable. Trump and Patriots have the pandemic under control now after this ATTACK as Trump says. There's nothing the CCP, Democrats, Deep State, and Cabal can do to stop the truth coming out about this false flag, and there's nothing they can do to stop what's coming.

 

Sauce:

 

Wuhan Institute of Virology

https://en.wikipedia.org/wiki/Wuhan_Institute_of_Virology

Zhengli Shi

https://www.ws-virology.org/dt_team/zhengli-shi/

Angiotensin-converting enzyme 2 (ACE2) proteins of different bat species confer variable susceptibility to SARS-CoV entry.

https://www.ncbi.nlm.nih.gov/pubmed/20567988

Isolation and characterization of a bat SARS-like coronavirus that uses the ACE2 receptor

https://www.nature.com/articles/nature12711

A SARS-like cluster of circulating bat coronaviruses shows potential for human emergence

https://www.nature.com/articles/nm.3985

Engineered bat virus stirs debate over risky research

https://www.nature.com/news/engineered-bat-virus-stirs-debate-over-risky-research-1.18787

A pneumonia outbreak associated with a new coronavirus of probable bat origin

https://www.nature.com/articles/s41586-020-2012-7

US officials were reportedly concerned that safety breaches at a Wuhan lab studying coronaviruses in bats could cause a pandemic

https://www.businessinsider.com/us-officials-raised-alarms-about-safety-issues-in-wuhan-lab-report-2020-4

Sources believe coronavirus outbreak originated in Wuhan lab as part of China's efforts to compete with US

https://www.foxnews.com/politics/coronavirus-wuhan-lab-china-compete-us-sources

Documentary that lays this out:

https://www.youtube.com/watch?v=Gdd7dtDaYmM

Anonymous ID: f934ba April 28, 2020, 8:10 p.m. No.8956041   🗄️.is 🔗kun

Don't forget Gmail Comms:

Gmail drafts and Pastebin: could they evade the email snoops?

 

The revelation that US intelligence agencies and GCHQ have been spying on email communications has prompted plenty of discussion within the information security community, as you might expect.

 

One of the more interesting debates took place between our very own Real World Computing editor Dick Pountain and an old friend of his, who happens to be a professor of criminology and is currently involved in a cybercrime study. Over a pint, the prof wondered whether internet snooping of the type highlighted by Edward Snowden might be thwarted by employing throwaway webmail accounts, in particular by using the "save as draft" facility these offer.

 

Here’s the theory: either Criminal A in the UK or Criminal B in the US sets up a Gmail account to which both have access via the same login. Criminal A composes a message that contains nefarious details of a proposed crime, meant for Criminal B’s eyes, but instead of hitting Send, he saves it as a draft. At some predetermined time in the future, Criminal B logs in to the same account and heads straight to the Drafts folder, where he reads the message. He then deletes the draft, removing any evidence of the message.

 

As such, the two criminals are able to communicate securely and confidentially in plain text, since their messages are never actually sent using normal email protocols across the open internet. Therefore, they remain invisible to surveillance agents.

 

Would this trick actually work in practice? It seems it’s pretty secure – until and unless you’re already being directly monitored by The Powers That Be. Take the case of former CIA director General David Petraeus and his "secret" extramarital affair.

 

It’s been widely reported that the FBI uncovered messages Petraeus and his girlfriend, Paula Broadwell, exchanged using Gmail drafts in order to avoid leaving a communications trail. Although both parties used disposable Gmail accounts under false names, the game was up when Broadwell used her account to "anonymously" email Jill Kelley, a socialite and family friend of Petraeus.

 

Kelley complained that she was being harassed, and turned her emails over to the FBI, which used US laws – similar to laws in the UK – pertaining to the investigation of communications that may be involved in the execution of a crime to access the account.

 

Since Broadwell didn’t employ proxy servers such as Tor to cover her tracks, merely using public Wi-Fi hotspots, she was easily identified as the anonymous account-holder by matching locations, dates and times with hotel guest names and personal movements.

 

I spoke to Andy Crocker, a former senior investigator at the UK National Hi-Tech Crime Unit, about the Gmail draft technique. Perhaps surprisingly, he admitted to using this kind of "dead-letter dropbox" himself. However, he warned that despite the emails never having been sent, and so apparently leaving no record, "everything is there for the authorities to see".

 

"If surveillance was being carried out on the individual, they would be monitoring his account, and the data [would still be] there and [could] be seen," he says.

 

Crocker pointed out that, in such cases, there’d be no need to intercept the emails in transit, since the account itself would be monitored, and so the Drafts folder would be visible to the people doing the monitoring. In short, the trick might work to avoid attracting surveillance in the first place, but it would fail once surveillance started.

 

In the Petraeus case, Broadwell was caught because she broke the trick by actually sending an email. This resulted in the FBI monitoring the account, making the status of the messages in the Drafts folder irrelevant: Google would have a record of them on its servers, where they’d be stored for a set period of time, and it would have no qualms handing the details over to the likes of the FBI when presented with suitable warrants or court orders.

 

Even using a "hide my IP"-type VPN service in an effort to obscure the harassing email that started this particular investigation would have made little difference: many of these are required to keep IP logs, which would also be accessible to investigators and would reveal the origin of a connection.

 

The idea is that you could use numerous disposable email accounts to send parts of an encrypted message to the recipient via equally numerous and disposable mailboxes. The whole message could then be pieced together offline and decrypted, after which it would be shredded using an application such as Eraser, which applies the 35-pass Gutmann method for secure-as-it-gets deletion.

 

https://www.alphr.com/realworld/384625/gmail-drafts-and-pastebin-could-they-evade-the-email-snoops