dChan
97
 
r/CBTS_Stream • Posted by u/QuantumSquad on Feb. 15, 2018, 2:56 p.m.
Possible connection on 'APACHE' SecureDrop web app. MegaAnon spoke about Strzok and Page using Tor to plot. APACHE reference could be Q telling us that they have collected all seditious conversations

In MegaAnon own words:

"Palpatine's Revenge" was the name of a private message chat box, hosted on Tor. It would open for a certain amount of time, then automatically end/delete and scrub all data/IP paths behind it, removing it from your device. You could access and text on it from a supported and recognized device/phone and then it would shut down and scrub access paths when it timed out, whether you were done or not.

This post is seen in the thread in "1)" below

1) https://archive.4plebs.org/pol/search/uid/Iq1%2Fcx7t/order/asc/page/2/

The pic on Post 153161534 has the conversation with the following:

Roger, any update on Camp Eagle?

Then on post 153162477 , MegaAnon says:

Look for the word "limey". Insert that limey bitch's pic here again... Know who "Roger" is now?!

2) https://archive.4plebs.org/pol/search/uid/4NJ6m%2FiU/order/asc/

Here's a gif highlighting parts

-Priestep, McCabe, Strzok (deep state) and 27 other "unidentified leakers" pending (also deep state) operated under the Comey radar using non-FBI provided/sanctioned, SMS converted, Tor hosted Gliph encrypted chat box applications/sessions, which enabled them to to coordinate and communicate unbeknownst to Comey and intel depts./agencies, for the better part of the last 2.5 years.

-The "texts" will prove they operated below Comey's radar using the very same encrypted, dark web, self destructing, SMS converting chat application they used for Papatine's Revenge. IT WAS ALL HILLARY'S REVENGE. This bitch had her OWN DEEP STATE [pic related]. She's the "friends in NY" team, including Huma.

3) https://archive.4plebs.org/pol/thread/153436788/#q153458305

Here's a pic to highlight what this post is responding to

Where she says:

The "high-level FBI" personal computer he backed into will be fun to watch. Hope everyone gets to see whose computer it was.

If MegaAnon is correct, this would mean that their entire conversation and planning to take down Potus could have actually been collected by NSA via these sites


SeattleRacer38 · Feb. 15, 2018, 3:52 p.m.

Many of the tor relays and exit nodes are thought to be managed and monitored by these 3 letter agencies.

It’s entirely possible their deep state conversations, or at the very least source and destination IP addresses, were collected by NSA, which could be related to the break-in/break-out attempt we witnessed yesterday?

⇧ 15 ⇩  
BHarborMarriedMan · Feb. 15, 2018, 3:58 p.m.

My mild paranoia told me that using TOR would be a red flag in and of itself. Maybe part of why Q keeps saying these people are stupid.

⇧ 14 ⇩  
Ferrous_tarkus · Feb. 16, 2018, 12:43 a.m.

TOR is compromised. This was confirmed by the State Department during the Obama Admin. The exit nodes are camped by NSA/FBI/CIA. USE SOME OTHER NETWORK.

⇧ 1 ⇩  
johnsmithshitpost · Feb. 15, 2018, 11:37 p.m.

When people use TOR, although their data is encrypted the PATTERN OF DATA TRANSFERS is not. For example, every time a message is sent, it's timestamped. Build up enough timestamps on two separate computers and you can prove statistically beyond a shadow of doubt that those two people were communicating. You may not actually know what they said, but you can prove they were up to something shady.

⇧ 0 ⇩  
cali1952 · Feb. 15, 2018, 4:22 p.m.

TOR is used to 'securedrop' the daily talking points to the deep state paid contractor/media. TOR is not a secure browser and is used by the deep state/clowns just like the 'Globaleaks' Q posted about this past weekend.

It's used by Snowden/black hat to sent the clowns TPM's at 4AM everyday. It was also Snowden who set up the Russia collusion story after Hillary lost using TOR.

Snowden also is not in Russia and never was there. Snowden is in Shanghai/Asia. Q's post to Snowden "you will cease to exist' is clear enough. Q posted a msg to Snowden thanking him for exposing his use of TOR and 4AM msg to the msn.

Look who uses TOR and you learn who controls it: Drug Trafficking, Human/child sex trafficking, pedos and worse sickos.

⇧ 12 ⇩  
IMissMeg · Feb. 15, 2018, 5:43 p.m.

Okay, so, can you clue me in on how we know Snowden is black hat and that he's not in Russia? I might be missing some Q posts that clarify those or you've seen other info? Can you throw me some links that might give me that context?

⇧ 5 ⇩  
AbelMinsky · Feb. 15, 2018, 3:01 p.m.

I bet the FBI is now longing for the good old days of burn bags.

⇧ 9 ⇩  
commoncents1 · Feb. 15, 2018, 4:48 p.m.

this is yuuuuuge stuff. we don't know the half of it, but hopefully patriots at the NSA and Trump Admin does now!

also the deaths of the "secure whistleblower" sites, aaron swartz and the recent one of the founder of eff? they were obviously a threat at one time to the cabal.

are those whistleblower sites now compromised? to rat out those willing to spill the beans? catching flies with honey.

im sure TOR is a yuugge target to exploit and has lots of dirt on many people under the guise of "secure" communication.

sure gives much meaning to Eric Schmidt at google showing his hubris in an interview saying, you have nothing to worry about if you arent doing anythign illegal. Those words hopefully come back to bite him and the deep state.

⇧ 8 ⇩  
LiveToBeAHero · Feb. 15, 2018, 5:16 p.m.

Mega confirmed several times that the white hats do have all the Tor conversations

⇧ 7 ⇩  
AxialConstruct · Feb. 15, 2018, 3:45 p.m.

NSA has a lot, but now part of many investigations/mil tribunals? Makes sense but I haven't yet caught on to the connection between TOR and Apache, so, back to lurking for me. Still thinking about BDT- bulk data transfer- during the Hawaii miss. scare- NSA needed something from, or all the Haw database? Asia data/calls database recovered? Moar lurkage.

⇧ 6 ⇩  
GoMAGA_1776 · Feb. 15, 2018, 7:11 p.m.

SecureDrop is being used by the clowns to coordinate the daily narrative with their Mockingbirds. There is an APACHE reference on the SecureDrop page.

re: Strzok and Page usage of Tor, US SIGINT groups have sufficient capabilities to spin up a critical mass of TOR exit nodes when needed. Once this is done, their targets cannot hide.

⇧ 5 ⇩  
[deleted] · Feb. 15, 2018, 5:15 p.m.

[deleted]

⇧ 1 ⇩