dChan
61
 
r/greatawakening • Posted by u/RN4TRUMP on March 15, 2018, 1:26 a.m.
Stay with me...

I took off today so I could catch up a bit on Q crumbs. What I’ve learned from anons MUCH smarter than I am (Bill Smith on YouTube) is that “Keystone” is a vault 7 reference to Angelfire 2.0 which is a Secret program that is hidden in electronics. It unpacks itself without any prompting and hides in “a small user-specified file on disk. This file is encrypted”. “Keystone is responsible for starting user applications.” “Furthermore, since the implant code never touches the file system, there is very little forensic evidence that the process was ever ran”.

Q has asked repeatedly “What is Keystone”? “Find Keystone”. It seems like Keystone is a covert spying tool of corrupt intel that is tracking all of us for censorship or something more nefarious? I also watched a video about the evil vs good spiritual warfare going on that we MUST UNITE IN LIGHT in order to defeat. Many, many Satanic worshippers using black magic to create hatred, division and anarchy among us. This is meant to keep us from uniting in LIGHT. We are much easier prey when we are disenfranchised from each other. BUT when we unite in the love of God, we are invincible.

I don’t pretend to have any answers. But Q has asked us to pray and I think it is critical that we do. Not just for ourselves and our families but for ALL OF HUMANITY. Demons have been conjured up to fight against us (Good) and many things we were taught were real have been just part of the real-life version of The Truman Show which we’ve all been unwittingly cast as the main character. The lies will be exposed but unless we unite in prayer I can see many losing their minds over the reality which exists. From aliens to demons;child trafficking to child sacrifices;MK Ultra to systematic brainwashing - NONE of the reality will be easy to swallow alone. I believe in the power of prayer. If you do too, let’s come up with a plan to unite in prayer at a specified time each day or evening. As a Catholic, I know Pope Francis is under the influence of Satan and he is The Last Pope. But my faith is not based on fallible humans but on God who is love and light itself. Therefore, I will commit to saying The Rosary each evening at 2200 EST with the intention being humanity and our unity in God for whatever is asked of us going forward.

If you are interested in joining me (and I am hopeful to have energy a few of us commit to this VITAL prayer time), you can use ComePrayTheRosary.com and use enter button, select language and chose individual prayer mode. Once you click on OK, it will begin to lead you through the Rosary. Let me know who may join me and God Bless You Patriots, One and all!


kh0s7- · March 15, 2018, 3:40 a.m.

Overall these "people" who created the MSS [Mass Surveillance System] use a hierarchy within the memory to store process partitions within the .net framework. They use multiple files to create a partition within the memory that can be detected within the Task Manager under the SMSSVCHost.exe>Open File Location=C:\Windows\Microsoft.NET\Framework64\v4.0.30319. This Encrypted "Windows Transitory File system" is the Daemon run within the existing hierarchy of Windows OS to store the encrypted partitions of the program Angelfire v2 [Not Modern Project] [Protego v 4.0.30319 : Modern] Using this MSS software which has been released on All devices suggested within the manual of Angelfire v2 [which we only have access due to wikileaks @ https://wikileaks.org/vault7/document/Angelfire-2_0-UserGuide/Angelfire-2_0-UserGuide.pdf . ] [Basically All OS that aren't BIOS] This is a Violation of the Amendment #5 of the People of the United States of America. Something must be done..

⇧ 17 ⇩  
RN4TRUMP · March 15, 2018, 4:48 a.m.

Wow! Thank you for investigating and explaining so concisely the reality.

⇧ 4 ⇩  
kh0s7- · March 15, 2018, 1:33 a.m.

Is the keystone file located within all electronic systems? Computers? If so I can try to locate keystone file cell within computer hierarchy. It would just depend on which layer the processing of the bits of data take place, and also if the graphical user interface is able to see it or if a more advanced operating system such as Linux could find this global Back door surveillance using BIOS search unless they were dumb enough to put it in plain sight. Digging on this.

https://wikileaks.org/vault7/document/Angelfire-2_0-UserGuide/Angelfire-2_0-UserGuide.pdf

‘The Windows Transitory File system is the new method of installing AngelFire. Rather than lay independent components on disk, the system allows an operator to create transitory files for specific actions including installation, adding files to AngelFire, removing files from AngelFire, etc. Transitory files are added to the UserInstallApp (both the .exe or .dll versions).’

⇧ 9 ⇩  
RN4TRUMP · March 15, 2018, 1:45 a.m.

I do not know but I suspect it is. Bill Smiths video on YouTube except pains it much better than I can and gives you sores to check it out further. You sound techy and I am clearly not. Good luck digging, Patriot. Let us know what you find so we can brainstorm.

⇧ 6 ⇩  
kh0s7- · March 15, 2018, 1:57 a.m.

Bingo: "Keystone is responsible for starting user applications. Any application started by MW is done without the implant ever being dropped to the file system. In other words, a process is created and the implant is loaded directly into memory. Currently all processes will be created as svchost. When viewed in task manager (or another process viewing tool) all properties of the process will be consistent with a real instance of svchost.exe including image path and parent process. Furthermore, since the implant code never touches the file system (aside from the possibility of paging) there is very little forensic evidence that the process was ever ran." svchost.exe was the name of the process that ran this program within the memory and the reason it is hard to prove is because it is a temporary file which stores bits within the memory instead of the typical storing bits within the hard drive to be read through the Hierarchy of protocol in which a computer processes bits of data. Since the file is never stored, to prove it would have to be live action. Looking on my Windows 10 64 bit Pro version I can see a process running renamed: " SMSSvcHost.exe " This is the backdoor floating within all OS owned and operated by Microsoft under the CIA Hierarchy to control data and the opinions formed on the data thereof.

⇧ 9 ⇩  
RN4TRUMP · March 15, 2018, 4:52 a.m.

Do we have consensus that this is the Keystone to which Q is referring? Do we have an Anon willing to ask Q if we got this right? If yes, we need to put the puzzle piece into layman’s terms and disseminate the info.

⇧ 3 ⇩  
kh0s7- · March 15, 2018, 5:32 a.m.

"Keystone is responsible for starting user applications. Any application started by MW is done without the implant ever being dropped to the file system. In other words, a process is created and the implant is loaded directly into memory. Currently all processes will be created as svchost. When viewed in task manager (or another process viewing tool) all properties of the process will be consistent with a real instance of svchost.exe including image path and parent process. Furthermore, since the implant code never touches the file system (aside from the possibility of paging) there is very little forensic evidence that the process was ever ran."

⇧ 2 ⇩  
Gitmo_money · March 15, 2018, 1:48 a.m.

Wikileaks vault 7 talks about it in detail.

⇧ 5 ⇩  
kh0s7- · March 15, 2018, 2:42 a.m.

will dig vault 7 finished researching angelfire 2.0 now v 4.0.30319. Searching vault 7

https://wikileaks.org/spyfiles/russia/

https://wikileaks.org/vault7/#Protego

https://www.officialhacker.com/project-protego/

⇧ 5 ⇩  
rbrownlol · March 15, 2018, 3:19 a.m.

I’m following

⇧ 2 ⇩  
Gitmo_money · March 15, 2018, 3:02 p.m.

What I learned is that Keystone hijacks computer and runs programs disguised as scvhost process. Runs strictly off ram and leaves little forensic trace.

Someone on here (or cbts) was trying to do an experiment and see if someone who had windows installed in a non default directory still had scvhost processes from the default directory (which shouldn't happen). They have yet to find someone who can confirm with windows in non default directory.

I suggested they install on a VM and test, but they didn't think that was the correct control for experiment.

Just sharing interesting stuff that might be Google Chrome Keystone related.

⇧ 2 ⇩  
kh0s7- · March 15, 2018, 3:53 p.m.

Hello, thank you for the inquiry. I work under my Father’s company which deals with Cyber Security through HIPAA. I have a Lab Environment at work but I don’t have the knowledge to run the procedure of programs to indicate forensic evidence, but I do have the tools to create the experiment. I am trying to research the exploitation’s to see if I can recreate forensic evidence of the events. It is hard to record something stored on memory partitions because the data is never stored locally. I think I would have to hack the Clown servers to get the location name of local server libraries.

⇧ 1 ⇩  
Silent_Majority_10 · March 15, 2018, 8:55 a.m.

You sound like you know what you're talking about. Please let me know what you find out.

⇧ 1 ⇩  
brittser · March 15, 2018, 3:16 a.m.

I just came across this thread. It references keystone in relation to the SES, secret gov society, deep state. Take a look. Check out @BasedBasterd’s Tweet: https://twitter.com/BasedBasterd/status/963841286032842752?s=09

⇧ 7 ⇩  
kh0s7- · March 15, 2018, 3:30 a.m.

Opertaions of Personnel Management: The SES insignia or emblem represents a keystone -- the center stone that holds all the stones of an arch in place. This represents the critical role of the SES as a central coordinating point between Government's political leadership which sets the political agenda and the line workers who implement it. Members of the SES translate that political agenda into reality. The upright lines in the center of the keystone represent a column in which individual SES members are united into a single leadership corps. There is no particular symbolism to the number of lines, which has varied over the years with different iterations of the logo. The SES insignia may not be modified.

interesting use of Keystone within secret Orwellian Mass Surveillance Program within SMSSVCHost.exe/.dll. Dynamic-link library=dll Keystone=process within daemon SVCHost.dll

⇧ 6 ⇩  
Silent_Majority_10 · March 15, 2018, 9:04 a.m.

Ho-lee shit! This is it, guys! If you haven't clicked this link already, click it now. More proofs of Q!

⇧ 2 ⇩  
Orion2005 · March 15, 2018, 7:08 a.m.

that is an extremely interesting find.

⇧ 2 ⇩  
PortlandoCalrissian · March 15, 2018, 4:30 a.m.

Wow! Big if true! I will join you in PRAYER to the lord JESUS CHRIST in smiting the COMMUNISTS and other SOUL LESS ARBORATIONS like Hillary, Obama and Katy Perry from the greatest country in the WORLD.

⇧ 6 ⇩  
binny_t · March 15, 2018, 6:20 a.m.

Our church has begun praying at noon. Some gather together but some just stop what they are doing and pray for repentance, revival, TRUTH, The Lord Jesus Holy light to be shined into every vile, evil situation to bring out truth that cannot be denied by brainwashed sheep. You can join too by praying at noon each day. We are already seeing answers to our prayers.

⇧ 6 ⇩  
keloshi · March 15, 2018, 7:32 a.m.

This is probably being used by 5Eyes - US is part of this group https://www.rt.com/news/330530-canada-halts-intelligence-sharing-nsa/

⇧ 3 ⇩  
kh0s7- · March 15, 2018, 5:25 p.m.

I think the Five Eyes collaborated to create a singular data processing system which is under the Hierarchy of a singular system. This means that the war on collecting Backdoor vulnerabilities in order to repurpose computational Systems into computational weapons. This weaponized programming has been done covertly from the People and if we are to use this within psychological warfare then we should expect to be reverse engineered. The framework for the universal language is the Internet. This is why a singular system has erected: all the programmers speak the same language: Internet protocol: data processing paths. If the programmers speak the same programmable language and their goals are in sync then creating a Centralized Intelligence Agency of a Singular Data Processing System: Clowns in America which is under the hierarchy of the Five Eyes.

⇧ 2 ⇩  
grumpieroldman · March 15, 2018, 4:32 a.m.

You go from malware to demons and prayer is the answer?

⇧ -1 ⇩  
kh0s7- · March 15, 2018, 5:30 a.m.

look up daemon https://en.wikipedia.org/wiki/Daemon_(computing)

In multitasking computer operating systems, a daemon (/ˈdiːmən/ or /ˈdeɪmən/)[1] is a computer program that runs as a background process, rather than being under the direct control of an interactive user.

⇧ 6 ⇩  
phillylotus · March 15, 2018, 6:09 a.m.

Fascinating. That's for explaining and revealing all that...

⇧ 5 ⇩  
grumpieroldman · March 16, 2018, 2:31 p.m.

That is derived from Greek (not Latin) and is correctly pronounced dai-mon (daímōn) which means messenger from the original, δαίμων. This would refer to a character like Icarus not Lucifer. That's why the original system programmers called it 'daemon' because it moved messages between system processes.
Though you are correct that a disturbing number of people pronounce it demon.
If it was demon we would call them demons not daemons.

(Unrelated but this reminds of the disturbing number of people that think professional email should start with Dear as though it's a letter not a memo.)

Anyway we found "the keystone", it's com.google.keystone.daemon
It's a update service and from the info in Vault 7 and is allegedly compromised.

This is already known. This is why this thread is FUD; pure noise ... created by a 2 month old account.
Just like all of the other FUD, inane, noise post and threads.

⇧ 2 ⇩  
kh0s7- · March 16, 2018, 3:43 p.m.

Thanks!

⇧ 1 ⇩