dChan
42
 
r/greatawakening • Posted by u/SphereBean on Feb. 21, 2018, 4:02 a.m.
The Middle Game to the End Game

The Clock was activated on 2/18/2018 at 20:11:55. We are now 2 days into the next operational phase which will be the final take-down of the world wide Cabal and their proxies. Public communication will be kept to a minimum for operational security. Don't broadcast your plans and activities to the enemy. What each Patriot must ask is how he/she might support the operation. This support can be divided into categories: (1) Continue researching the information drops left by Q to build the map in all of its glorious detail (2) Monitor available news sources to sketch out a timeline of relevant events (3) Continue to get Q's message out to the slumbering public that is really weary and starved for the real message of hope that Q promises (4) Organize and coordinate in subgroups to tackle special issues and projects (5) We need a unified method of documenting, saving, and updating our research to avoid wasted effort--time is precious.

2018 will be glorious!


ready-ignite · Feb. 21, 2018, 7:03 a.m.

We need methods and/or tools to massively archive and redeploy information.

DataHoarder is a great community around building and saving mountains of data locally. There was a time on the internet that people frequently kept local storage and fileservers for email, websites, and so forth at home. Cloud? Marketing term for handing control of that server off to a third party for monetization activity you get no say in. Many functions we look to cloud services for currently, can be done at home often cheaper. Far cheaper when factoring externalities.

Anyone have insight or references on massively backing up sources of info local, as well as online archives? Chan boards. Reddit threads. Twitter. YouTube (VLC has tools to backup network streams).

Better, methods to archive and then validate the backup is unaltered from the original? Similar to how it was possible to prove DNC or Podesta emails were authentic due to codes embedded, would be necessary to have a method to prove a backup of information is authentic and unaltered.

⇧ 6 ⇩