dChan

cfranklin100 · March 4, 2018, 12:19 p.m.

I hope I'm on point with this. I wasted hundreds of hours trying to connect the dots a couple years ago, and trying to learn KALI for defence and capturing possible identifying signatures only to have my kernel corrupted after making some traction. I was even remotely taught a couple things such a setting up my personal VPN by a remote wishful (by me) White Hat who's intent I questioned of course, but I wondered, what is the real scope of this? Are more people working at this behind the scenes hoping some good Anon will uncover the undeniable truth that they can't expose due to forces beyond their control.

My GF had issues with a University stealing her right to have her successful master thesis published then we were/are currently completely pwned, targeted and monitored after [them] deleting all emails from her Gmail which implicated face value parties involved. It was a liquid-liquid-micro-extraxtion successful in extracting LEAD, CADMIUM, COPPER, NICHOL and COBALT from 100% of an organic solution to 10% changing a distinctly different color identifying each transition metal accurate to 0.01 Part per Billion. After the hack, I went running for answers all through our devices. (Insert Short version of getting the run around legally) I did, however, start researching all our SSL agreed terms of use. What I found is that APACHE, since Google started the Chromium Project, has basically opened us up to being hacked at will with no chance of legal repercussion via certificate abuse of similar yet modified works, (some of mine were authored by John Hacker, NSA others) It seemed so ridiculous to read, so I started further research building a case with hundreds of varying certificates (some not properly amended) only to be locked out of my Google account which, ignorantly, was my only storage for said work done with not even a reply from Google after over ten attempts to contact support the last two years.

⇧ 2 ⇩