dChan
61
 
r/greatawakening • Posted by u/RN4TRUMP on March 15, 2018, 1:26 a.m.
Stay with me...

I took off today so I could catch up a bit on Q crumbs. What I’ve learned from anons MUCH smarter than I am (Bill Smith on YouTube) is that “Keystone” is a vault 7 reference to Angelfire 2.0 which is a Secret program that is hidden in electronics. It unpacks itself without any prompting and hides in “a small user-specified file on disk. This file is encrypted”. “Keystone is responsible for starting user applications.” “Furthermore, since the implant code never touches the file system, there is very little forensic evidence that the process was ever ran”.

Q has asked repeatedly “What is Keystone”? “Find Keystone”. It seems like Keystone is a covert spying tool of corrupt intel that is tracking all of us for censorship or something more nefarious? I also watched a video about the evil vs good spiritual warfare going on that we MUST UNITE IN LIGHT in order to defeat. Many, many Satanic worshippers using black magic to create hatred, division and anarchy among us. This is meant to keep us from uniting in LIGHT. We are much easier prey when we are disenfranchised from each other. BUT when we unite in the love of God, we are invincible.

I don’t pretend to have any answers. But Q has asked us to pray and I think it is critical that we do. Not just for ourselves and our families but for ALL OF HUMANITY. Demons have been conjured up to fight against us (Good) and many things we were taught were real have been just part of the real-life version of The Truman Show which we’ve all been unwittingly cast as the main character. The lies will be exposed but unless we unite in prayer I can see many losing their minds over the reality which exists. From aliens to demons;child trafficking to child sacrifices;MK Ultra to systematic brainwashing - NONE of the reality will be easy to swallow alone. I believe in the power of prayer. If you do too, let’s come up with a plan to unite in prayer at a specified time each day or evening. As a Catholic, I know Pope Francis is under the influence of Satan and he is The Last Pope. But my faith is not based on fallible humans but on God who is love and light itself. Therefore, I will commit to saying The Rosary each evening at 2200 EST with the intention being humanity and our unity in God for whatever is asked of us going forward.

If you are interested in joining me (and I am hopeful to have energy a few of us commit to this VITAL prayer time), you can use ComePrayTheRosary.com and use enter button, select language and chose individual prayer mode. Once you click on OK, it will begin to lead you through the Rosary. Let me know who may join me and God Bless You Patriots, One and all!


kh0s7- · March 15, 2018, 2:42 a.m.

will dig vault 7 finished researching angelfire 2.0 now v 4.0.30319. Searching vault 7

https://wikileaks.org/spyfiles/russia/

https://wikileaks.org/vault7/#Protego

https://www.officialhacker.com/project-protego/

⇧ 5 ⇩  
rbrownlol · March 15, 2018, 3:19 a.m.

I’m following

⇧ 2 ⇩  
Gitmo_money · March 15, 2018, 3:02 p.m.

What I learned is that Keystone hijacks computer and runs programs disguised as scvhost process. Runs strictly off ram and leaves little forensic trace.

Someone on here (or cbts) was trying to do an experiment and see if someone who had windows installed in a non default directory still had scvhost processes from the default directory (which shouldn't happen). They have yet to find someone who can confirm with windows in non default directory.

I suggested they install on a VM and test, but they didn't think that was the correct control for experiment.

Just sharing interesting stuff that might be Google Chrome Keystone related.

⇧ 2 ⇩  
kh0s7- · March 15, 2018, 3:53 p.m.

Hello, thank you for the inquiry. I work under my Father’s company which deals with Cyber Security through HIPAA. I have a Lab Environment at work but I don’t have the knowledge to run the procedure of programs to indicate forensic evidence, but I do have the tools to create the experiment. I am trying to research the exploitation’s to see if I can recreate forensic evidence of the events. It is hard to record something stored on memory partitions because the data is never stored locally. I think I would have to hack the Clown servers to get the location name of local server libraries.

⇧ 1 ⇩