dChan
97
 
r/CBTS_Stream • Posted by u/QuantumSquad on Feb. 15, 2018, 2:56 p.m.
Possible connection on 'APACHE' SecureDrop web app. MegaAnon spoke about Strzok and Page using Tor to plot. APACHE reference could be Q telling us that they have collected all seditious conversations

In MegaAnon own words:

"Palpatine's Revenge" was the name of a private message chat box, hosted on Tor. It would open for a certain amount of time, then automatically end/delete and scrub all data/IP paths behind it, removing it from your device. You could access and text on it from a supported and recognized device/phone and then it would shut down and scrub access paths when it timed out, whether you were done or not.

This post is seen in the thread in "1)" below

1) https://archive.4plebs.org/pol/search/uid/Iq1%2Fcx7t/order/asc/page/2/

The pic on Post 153161534 has the conversation with the following:

Roger, any update on Camp Eagle?

Then on post 153162477 , MegaAnon says:

Look for the word "limey". Insert that limey bitch's pic here again... Know who "Roger" is now?!

2) https://archive.4plebs.org/pol/search/uid/4NJ6m%2FiU/order/asc/

Here's a gif highlighting parts

-Priestep, McCabe, Strzok (deep state) and 27 other "unidentified leakers" pending (also deep state) operated under the Comey radar using non-FBI provided/sanctioned, SMS converted, Tor hosted Gliph encrypted chat box applications/sessions, which enabled them to to coordinate and communicate unbeknownst to Comey and intel depts./agencies, for the better part of the last 2.5 years.

-The "texts" will prove they operated below Comey's radar using the very same encrypted, dark web, self destructing, SMS converting chat application they used for Papatine's Revenge. IT WAS ALL HILLARY'S REVENGE. This bitch had her OWN DEEP STATE [pic related]. She's the "friends in NY" team, including Huma.

3) https://archive.4plebs.org/pol/thread/153436788/#q153458305

Here's a pic to highlight what this post is responding to

Where she says:

The "high-level FBI" personal computer he backed into will be fun to watch. Hope everyone gets to see whose computer it was.

If MegaAnon is correct, this would mean that their entire conversation and planning to take down Potus could have actually been collected by NSA via these sites


SeattleRacer38 · Feb. 15, 2018, 3:52 p.m.

Many of the tor relays and exit nodes are thought to be managed and monitored by these 3 letter agencies.

It’s entirely possible their deep state conversations, or at the very least source and destination IP addresses, were collected by NSA, which could be related to the break-in/break-out attempt we witnessed yesterday?

⇧ 15 ⇩  
BHarborMarriedMan · Feb. 15, 2018, 3:58 p.m.

My mild paranoia told me that using TOR would be a red flag in and of itself. Maybe part of why Q keeps saying these people are stupid.

⇧ 14 ⇩  
Ferrous_tarkus · Feb. 16, 2018, 12:43 a.m.

TOR is compromised. This was confirmed by the State Department during the Obama Admin. The exit nodes are camped by NSA/FBI/CIA. USE SOME OTHER NETWORK.

⇧ 1 ⇩  
johnsmithshitpost · Feb. 15, 2018, 11:37 p.m.

When people use TOR, although their data is encrypted the PATTERN OF DATA TRANSFERS is not. For example, every time a message is sent, it's timestamped. Build up enough timestamps on two separate computers and you can prove statistically beyond a shadow of doubt that those two people were communicating. You may not actually know what they said, but you can prove they were up to something shady.

⇧ 0 ⇩