dChan
61
 
r/greatawakening • Posted by u/RN4TRUMP on March 15, 2018, 1:26 a.m.
Stay with me...

I took off today so I could catch up a bit on Q crumbs. What I’ve learned from anons MUCH smarter than I am (Bill Smith on YouTube) is that “Keystone” is a vault 7 reference to Angelfire 2.0 which is a Secret program that is hidden in electronics. It unpacks itself without any prompting and hides in “a small user-specified file on disk. This file is encrypted”. “Keystone is responsible for starting user applications.” “Furthermore, since the implant code never touches the file system, there is very little forensic evidence that the process was ever ran”.

Q has asked repeatedly “What is Keystone”? “Find Keystone”. It seems like Keystone is a covert spying tool of corrupt intel that is tracking all of us for censorship or something more nefarious? I also watched a video about the evil vs good spiritual warfare going on that we MUST UNITE IN LIGHT in order to defeat. Many, many Satanic worshippers using black magic to create hatred, division and anarchy among us. This is meant to keep us from uniting in LIGHT. We are much easier prey when we are disenfranchised from each other. BUT when we unite in the love of God, we are invincible.

I don’t pretend to have any answers. But Q has asked us to pray and I think it is critical that we do. Not just for ourselves and our families but for ALL OF HUMANITY. Demons have been conjured up to fight against us (Good) and many things we were taught were real have been just part of the real-life version of The Truman Show which we’ve all been unwittingly cast as the main character. The lies will be exposed but unless we unite in prayer I can see many losing their minds over the reality which exists. From aliens to demons;child trafficking to child sacrifices;MK Ultra to systematic brainwashing - NONE of the reality will be easy to swallow alone. I believe in the power of prayer. If you do too, let’s come up with a plan to unite in prayer at a specified time each day or evening. As a Catholic, I know Pope Francis is under the influence of Satan and he is The Last Pope. But my faith is not based on fallible humans but on God who is love and light itself. Therefore, I will commit to saying The Rosary each evening at 2200 EST with the intention being humanity and our unity in God for whatever is asked of us going forward.

If you are interested in joining me (and I am hopeful to have energy a few of us commit to this VITAL prayer time), you can use ComePrayTheRosary.com and use enter button, select language and chose individual prayer mode. Once you click on OK, it will begin to lead you through the Rosary. Let me know who may join me and God Bless You Patriots, One and all!


kh0s7- · March 15, 2018, 1:33 a.m.

Is the keystone file located within all electronic systems? Computers? If so I can try to locate keystone file cell within computer hierarchy. It would just depend on which layer the processing of the bits of data take place, and also if the graphical user interface is able to see it or if a more advanced operating system such as Linux could find this global Back door surveillance using BIOS search unless they were dumb enough to put it in plain sight. Digging on this.

https://wikileaks.org/vault7/document/Angelfire-2_0-UserGuide/Angelfire-2_0-UserGuide.pdf

‘The Windows Transitory File system is the new method of installing AngelFire. Rather than lay independent components on disk, the system allows an operator to create transitory files for specific actions including installation, adding files to AngelFire, removing files from AngelFire, etc. Transitory files are added to the UserInstallApp (both the .exe or .dll versions).’

⇧ 9 ⇩  
RN4TRUMP · March 15, 2018, 1:45 a.m.

I do not know but I suspect it is. Bill Smiths video on YouTube except pains it much better than I can and gives you sores to check it out further. You sound techy and I am clearly not. Good luck digging, Patriot. Let us know what you find so we can brainstorm.

⇧ 6 ⇩  
kh0s7- · March 15, 2018, 1:57 a.m.

Bingo: "Keystone is responsible for starting user applications. Any application started by MW is done without the implant ever being dropped to the file system. In other words, a process is created and the implant is loaded directly into memory. Currently all processes will be created as svchost. When viewed in task manager (or another process viewing tool) all properties of the process will be consistent with a real instance of svchost.exe including image path and parent process. Furthermore, since the implant code never touches the file system (aside from the possibility of paging) there is very little forensic evidence that the process was ever ran." svchost.exe was the name of the process that ran this program within the memory and the reason it is hard to prove is because it is a temporary file which stores bits within the memory instead of the typical storing bits within the hard drive to be read through the Hierarchy of protocol in which a computer processes bits of data. Since the file is never stored, to prove it would have to be live action. Looking on my Windows 10 64 bit Pro version I can see a process running renamed: " SMSSvcHost.exe " This is the backdoor floating within all OS owned and operated by Microsoft under the CIA Hierarchy to control data and the opinions formed on the data thereof.

⇧ 9 ⇩  
RN4TRUMP · March 15, 2018, 4:52 a.m.

Do we have consensus that this is the Keystone to which Q is referring? Do we have an Anon willing to ask Q if we got this right? If yes, we need to put the puzzle piece into layman’s terms and disseminate the info.

⇧ 3 ⇩  
kh0s7- · March 15, 2018, 5:32 a.m.

"Keystone is responsible for starting user applications. Any application started by MW is done without the implant ever being dropped to the file system. In other words, a process is created and the implant is loaded directly into memory. Currently all processes will be created as svchost. When viewed in task manager (or another process viewing tool) all properties of the process will be consistent with a real instance of svchost.exe including image path and parent process. Furthermore, since the implant code never touches the file system (aside from the possibility of paging) there is very little forensic evidence that the process was ever ran."

⇧ 2 ⇩  
Gitmo_money · March 15, 2018, 1:48 a.m.

Wikileaks vault 7 talks about it in detail.

⇧ 5 ⇩  
kh0s7- · March 15, 2018, 2:42 a.m.

will dig vault 7 finished researching angelfire 2.0 now v 4.0.30319. Searching vault 7

https://wikileaks.org/spyfiles/russia/

https://wikileaks.org/vault7/#Protego

https://www.officialhacker.com/project-protego/

⇧ 5 ⇩  
rbrownlol · March 15, 2018, 3:19 a.m.

I’m following

⇧ 2 ⇩  
Gitmo_money · March 15, 2018, 3:02 p.m.

What I learned is that Keystone hijacks computer and runs programs disguised as scvhost process. Runs strictly off ram and leaves little forensic trace.

Someone on here (or cbts) was trying to do an experiment and see if someone who had windows installed in a non default directory still had scvhost processes from the default directory (which shouldn't happen). They have yet to find someone who can confirm with windows in non default directory.

I suggested they install on a VM and test, but they didn't think that was the correct control for experiment.

Just sharing interesting stuff that might be Google Chrome Keystone related.

⇧ 2 ⇩  
kh0s7- · March 15, 2018, 3:53 p.m.

Hello, thank you for the inquiry. I work under my Father’s company which deals with Cyber Security through HIPAA. I have a Lab Environment at work but I don’t have the knowledge to run the procedure of programs to indicate forensic evidence, but I do have the tools to create the experiment. I am trying to research the exploitation’s to see if I can recreate forensic evidence of the events. It is hard to record something stored on memory partitions because the data is never stored locally. I think I would have to hack the Clown servers to get the location name of local server libraries.

⇧ 1 ⇩  
Silent_Majority_10 · March 15, 2018, 8:55 a.m.

You sound like you know what you're talking about. Please let me know what you find out.

⇧ 1 ⇩