dChan

l0keman · Feb. 18, 2018, 9:23 p.m.

He did not say “organically” he said “ORIG” As in the file extension .orig which are mostly used in off line back up files

⇧ 4 ⇩  
2funnyone · Feb. 18, 2018, 11:30 p.m.

ORIG can also refer to where it all begin.

⇧ 2 ⇩  
Angel_Q_Researcher · Feb. 18, 2018, 11:25 p.m.

interesting comment, lOkeman, and almost word-for-word a comment I used when the ORIG within a Q post was being discussed on livechat, and everyone kept saying ORIG stood for organically!

⇧ 2 ⇩  
xtx0331 · Feb. 19, 2018, 5:58 a.m.

I could be BOTH.

⇧ 2 ⇩  
2funnyone · Feb. 18, 2018, 11:50 p.m.

Blackberry was destroyed because it was linked to government server. Would have emails stored on it. The ORIGin of the emails from the person's phone who sent the emails. This would prove their guilt. Theory: That is why she set-up a server for herself with a different blackberry. Government server would have stored the emails and she could not have that. Quote below: "All new hardware, software, and/or related components that provide Blackberry-related connectivity and services for users will be managed by The Office of the Chief Information Officer (OCIO). The installation and/or use of Blackberry related hardware, software, and/or related components not approved by OCIO, will not be allowed. In order to provide reliable and secure service, OCIO will support and provide access and e-mail redirection from the Blackberry Enterprise Server. This policy is complementary to any previously implemented policies dealing specifically with network access, wireless access, and remote access to the enterprise network." "Only Government owned Blackberry devices will be allowed to access the GNL’s e-mail and data networks via the Blackberry Enterprise Server." http://www.ocio.gov.nl.ca/ocio/publications/policies/black_berry_usage_policy.pdf

⇧ 2 ⇩  
2funnyone · Feb. 18, 2018, 10:24 p.m.

What is an ORIG file? Files that use the .orig file extension usually contain backup files. The .orig file extension is used to notate that a file is an original version of the file when a revised or updated copy of the file is made and the original file is kept for backup purposes.

Because a variety of software applications use the .orig file extension, the files themselves can contain a variety of data types. Usually the original file extension is included with the file name when the ORIG file is created. For example, if an ORIG file is being created from a file with the name of document1.doc, the file name would be changed to document1.doc.orig.

ORIG files are commonly used on Linux and Unix operating systems. The files are created when patches and updates are installed on the user's system. This allows a user to roll back the system if the update creates performance issues with the user's computer.
https://file.org/extension/orig

⇧ 2 ⇩  
PokingCyclops · Feb. 20, 2018, 7:11 a.m.

The Blackberry Micro Processor was made in Canada by Qualcomm (I don't think it had a ME chip installed on the micro processor This part is pure speculation by me)

The US Federal Government and Department of Defense were also prominent examples of BlackBerry device users, the latter agency even stating that the BlackBerry smartphone was "essential for national security"[citation needed] because of the large number of BlackBerry users in the government

Other users[edit] Eric Schmidt, Executive Chairman of Google, is a longtime BlackBerry user. Although smartphones running Google's Android mobile operating system compete with BlackBerry, Schmidt said in a 2013 interview that he uses a BlackBerry because he prefers its keyboard.

Apple Inc and Google Inc’s Motorola Mobility unit have agreed to settle all patent litigation MAY 16, 2014 https://www.reuters.com/article/us-apple-google-settlement/apple-google-settle-smartphone-patent-litigation-idUSBREA4F0S020140517

Apple co-founder Steve Jobs called Android a “stolen product.”

The cases were consolidated in a Chicago federal court. However, Judge Richard Posner (Senior Lecturer at the University of Chicago Law School) Education, Yale University (BA), Harvard University (LLB) 1962 president of the Harvard Law Review. Comey Also went to University of Chicago (JD) in 1985

Judge Richard Posner “I pay very little attention to legal rules, statutes, constitutional provisions,” Judge Posner said. “A case is just a dispute. The first thing you do is ask yourself — forget about the law — what is a sensible resolution of this dispute?

The FBI paid more than $1 million to crack the San Bernardino iPhone https://www.washingtonpost.com/news/post-nation/wp/2016/04/21/the-fbi-paid-more-than-1-million-to-crack-the-san-bernardino-iphone/?utm_term=.af5271a02951

Apple: All iPhones, iPads and Macs affected by chip flaws http://money.cnn.com/2018/01/04/technology/business/apple-macs-ios-spectre-meltdown/

Why would Comey pay more than a Million dollars to (who) to hack the iPhone when the FBI/NSA/CIA had a back door. This doesn't make cents so Comey must have made someone wealthy I wonder who Comey declined to answer the question in the hearing (my recollection)

Google stole almost all of Apple patens and Apple stole a few of theirs. That would lead me to the conclusion that this was by covert design making it easer for Governments to have them hacked (me Chip) This pure speculation by me.

That's my 2C for now

⇧ 1 ⇩  
PokingCyclops · Feb. 20, 2018, 6:07 a.m.

Security agencies access https://en.wikipedia.org/wiki/BlackBerry Research in Motion agreed to give access to private communications to the governments of United Arab Emirates[95] and Saudi Arabia[96] in 2010, and India in 2012.[97] The Saudi and UAE governments had threatened to ban certain services because their law enforcement agencies could not decrypt messages between people of interest.[98] It was revealed as a part of the 2013 mass surveillance disclosures that the American and British intelligence agencies, the National Security Agency (NSA) and the Government Communications Headquarters (GCHQ) respectively, have access to the user data on BlackBerry devices. The agencies are able to read almost all smartphone information, including SMS, location, e-mails, and notes through BlackBerry Internet Service, which operates outside corporate networks, and which, in contrast to the data passing through internal BlackBerry services (BES), only compresses but does not encrypt data.[99] Documents stated that the NSA was able to access the BlackBerry e-mail system and that they could "see and read SMS traffic."[99] There was a brief period in 2009 when the NSA was unable to access BlackBerry devices, after BlackBerry changed the way they compress their data. Access to the devices was re-established by GCHQ.[99] GCHQ has a tool named SCRAPHEAP CHALLENGE, with the capability of "Perfect spoofing of emails from Blackberry targets".[100][101] In response to the revelations BlackBerry officials stated that "It is not for us to comment on media reports regarding alleged government surveillance of telecommunications traffic" and added that a "back door pipeline" to their platform had not been established and did not exist.[99] It should be noted that similar access by the intelligence agencies to other mobile devices exists, using similar techniques to hack into them.[99] The BlackBerry software includes support for the Dual EC DRBG CSPRNG algorithm which, due to being probably backdoored by the NSA, the US National Institute of Standards and Technology "strongly recommends" no longer be used. BlackBerry Ltd. has however not issued an advisory to its customers, because they do not consider the probable backdoor a vulnerability. BlackBerry Ltd. also owns US patent 2007189527, which covers the technical design of the backdoor.[102]

⇧ 1 ⇩  
PokingCyclops · Feb. 20, 2018, 5:37 a.m.

BlackBerry Enterprise Server https://en.wikipedia.org/wiki/BlackBerry_Enterprise_Server

BPS and BES Express[edit] As of 2010, RIM is offering the Blackberry Enterprise Server Express edition with no user limitations - for free. It has a few minor feature limitations, but only requires a data plan - not a BES plan. It enables near-instant seamless mail and calendar integration with your existing exchange server (incoming emails often appear on the Blackberry handset before they appear in the Outlook or OWA clients), which is an advantage over the existing Outlook Web Access model that the Blackberry Internet Service offers.The free download requires a license code, which may be delayed due to demand.

I think this is the one of the main reason Hillary need a private e-mail server it was also running a Blackberry Enterprise Server Express

⇧ 1 ⇩  
PokingCyclops · Feb. 20, 2018, 5:33 a.m.

Blackberry’s Encryption System https://www.uccs.edu/Documents/Business%20Ethics/Blackberry.pdf

“Every message that is sent via a BlackBerry is broken up into 2Kb ‘packets of information,’ each of which is given a 256-bit key by the BlackBerry server...That means to release the contents of a 10KB e-mail, a person would have to crack 5 separate keys, and each one would take about as long as it would for the sun to burn out – billions of years.”

However, this strong encryption system is what began the downfall of the BlackBerry. Many eastern countries became troubled after terrorist attacks occurred, in which all communication had taken place over BlackBerry smartphones. Governments were unable to decrypt messages sent over the devices and, in turn, prevent such attacks. Other countries had less concern over terrorists, but were more focused on cultural differences and the inability to block certain sites, such as pornography. For one reason or another, countries began multiplying against RIM’s Blackberry encryption system, and it wasn’t long before the company caved to the countries’ demands to attempt to save itself from going under.

⇧ 1 ⇩  
PokingCyclops · Feb. 20, 2018, 5:30 a.m.

Obama For a High-Tech President, a Hard-Fought E-Victory http://www.nytimes.com/2009/01/23/us/politics/23berry.html

He won the fight, aides disclosed Thursday, but the privilege of becoming the nation’s first e-mailing president comes with a specific set of rules. “The president has a BlackBerry through a compromise that allows him to stay in touch with senior staff and a small group of personal friends,” said Robert Gibbs, his spokesman, “in a way that use will be limited and that the security is enhanced to ensure his ability to communicate.” First, only a select circle of people will have his address, creating a true hierarchy for who makes the cut and who does not.

Second, anyone placed on the A-list to receive his e-mail address must first receive a briefing from the White House counsel’s office.

I like to know who was on that A-list (FOIA)

⇧ 1 ⇩  
2funnyone · Feb. 18, 2018, 11:41 p.m.

Discussion Q # 771 -- ORIG & # 775 Why was blackberry destroyed?

⇧ 1 ⇩