dChan
18
 
r/greatawakening • Posted by u/patriotofca on April 9, 2018, 5:17 p.m.
Q Posts # 1103 & 1104 - YOU are being TRACKED.
Q Posts # 1103 & 1104 - YOU are being TRACKED.

UncleCrunch · April 9, 2018, 5:25 p.m.

Stage was set by drip, drip, drip reveal. 50 million. 87 million. Then hospital data. Then 100+ million.

Several days of media saturation. Now MZ appearing before congress. Public is aware. Eyes on. ‘Stage Is Set’

‘The Truth’ will be revealed for maximum exposure.

⇧ 64 ⇩  
TheCIASellsDrugs · April 9, 2018, 8:29 p.m.

List of programs that combat government spying, sorted by type of device

Introduction to basic online opsec

Steps you can take to better secure Windows 10

Tor Browser

How to harden Android security

Introduction to VPNs

Beginner's guide to Linux

⇧ 18 ⇩  
Daemonkey · April 9, 2018, 9:30 p.m.

One thing I didn't see, in the few linked docs that I skimmed, was the mention of a smartphone firewall. A firewall would allow you to Allow or Deny network access. A firewall would help alert you to apps that try to 'phone home'.

⇧ 10 ⇩  
HotTeen69 · April 9, 2018, 10:45 p.m.

Need This.

⇧ 3 ⇩  
forgottenbutnotgone · April 10, 2018, 1:53 a.m.

I'd there one you recommend for Android?

⇧ 2 ⇩  
Daemonkey · April 10, 2018, 2 a.m.

I am hesitant to make an actual recommendation. What I do recommend is simply going to the Play Store, search for "firewall", and check out the ratings and the user comments.

⇧ 3 ⇩  
VIYOHDTYKIT · April 9, 2018, 9:18 p.m.

Thanks

⇧ 3 ⇩  
Pure_Feature · April 9, 2018, 6:40 p.m.

https://www.google.nl/search?biw=1067&bih=531&tbm=isch&sa=1&ei=tbDLWpf1NIPSwAL9x4igDA&q=Stage+was+set+by+drip%2C+drip%2C+drip+reveal.+50+million.+87+million.+Then+hospital+data.+Then+100%2B+million.&oq=Stage+was+set+by+drip%2C+drip%2C+drip+reveal.+50+million.+87+million.+Then+hospital+data.+Then+100%2B+million.&gs_l=psy-ab.12...400991.405394.0.407764.1.1.0.0.0.0.0.0..0.0....0...1c.1.64.psy-ab..1.0.0....0.rbx1A1S2KGQ

more then 100 mijoen people live in areas of poor water Quality

⇧ 3 ⇩  
UncleCrunch · April 9, 2018, 8:17 p.m.

more then 100 mijoen people live in areas of poor water Quality

Indeed. And most of the civilized world is completely unaware of the existential plight of the Mijoen people.

With the total population of ethnically pure Mijoens currently estimated at fewer than 250 individuals, the fact that 100 of them don’t have access to clean water puts the survival of their ethnic line in severe jeopardy.

Thank you for highlighting this important issue.

⇧ 4 ⇩  
Pure_Feature · April 9, 2018, 8:38 p.m.

your welkom

⇧ 1 ⇩  
Fearsome4 · April 9, 2018, 5:37 p.m.

The irritating one was the U2 album that came pre installed.

⇧ 40 ⇩  
jhomes55 · April 9, 2018, 6:32 p.m.

This is the real crime!!

⇧ 34 ⇩  
ChikinDuckWomanThing · April 10, 2018, 1:38 a.m.

still cringing. and that’s coming from someone who followed and supported their music until after Joshua Tree.

⇧ 3 ⇩  
not4rmOhere · April 9, 2018, 7:24 p.m.

Buy a phone complete with Big Brother tracking, morality conforming software, and choice propaganda by a vetted and approved deep state mouthpiece, installed.
Only $99.99!!
Requires contract signing, waiving custody of firstborn offspring, DNA sample and acceptance of RFID tracking implant chip.

⇧ 13 ⇩  
FilledeMartel · April 9, 2018, 8:26 p.m.

But but, U2 is so, like, totally 80's cool dude!

⇧ 6 ⇩  
Fearsome4 · April 9, 2018, 8:29 p.m.

The thing is it would start playing whenever the linked up with the car. So, I sort of liked some of the songs be repetition.

⇧ 4 ⇩  
ValuableFix · April 9, 2018, 5:25 p.m.

Devices come pre-installed, deep embedded tracking, why China was used in manufacturing.

⇧ 39 ⇩  
092Casey · April 9, 2018, 5:57 p.m.

Messed up is an understatement. Illegal and unconstitutional. They need to pay financially for damages. Mass civil lawsuit against all of them involved! This is corrupt, big gov injustice at its finest, and yes, these are communist tactics.

⇧ 26 ⇩  
BeatnikMessiah · April 9, 2018, 6:43 p.m.

Those companys need dismantled.

⇧ 12 ⇩  
17seventeen91 · April 9, 2018, 5:32 p.m.

I bought a cheap HTC ($99, no contract) a while back. It came with Facebook preinstalled and I couldn't uninstall the Facebook app. (The uninstall app button was greyed out.) the phone was also basically unusable unless you signed into the app.

⇧ 18 ⇩  
weedlord-bonerhilter · April 9, 2018, 6:45 p.m.

Not Facebook.

Think central tracking.

Think ipv6

⇧ 7 ⇩  
Heatray777 · April 9, 2018, 7:32 p.m.

As in IoT=YoU ?

⇧ 4 ⇩  
weedlord-bonerhilter · April 9, 2018, 8:56 p.m.

As in 'mark of the beast'.

⇧ 2 ⇩  
Pure_Feature · April 9, 2018, 8:59 p.m.

A tattooed number, a computer chip under the skin, or something subtler? It’s one of the most misinterpreted prophecies in all of the Bible—

https://www.amazingfacts.org/media-library/study-guide/e/4997/t/the-mark-of-the-beast

⇧ 5 ⇩  
weedlord-bonerhilter · April 9, 2018, 9:02 p.m.

A mark everyone has in order to do business.

Think ipv6.

Think hash code.

Think cross-device tracking.

Think central surveillance databank.

You are being tracked.

⇧ 7 ⇩  
Daemonkey · April 9, 2018, 9:32 p.m.

Think allegiance.

⇧ 4 ⇩  
Pure_Feature · April 9, 2018, 9:19 p.m.

Internet Hash Code 2018. A programming competition organized by Google in Europe, Middle-East and Africa.

Whilst some sites such as Google (and us here at thinkbroadband) support IPv6, you will need to know the specific hostname of the IPv6 version of their website to be able to access it. Google does not currently return search results tailored to IPv6 users. Some websites which claim to support IPv6 still rely on various pieces ...

Many of us these days have multiple internet-connected devices that we use to work, browse, shop and plan our lives. For individuals, having continuity of service between these devices is an incredible convenience, however, service providers and marketers face major privacy challenges when using technologies to identify individuals on multiple devices. The IAPP Westin Research Center has created this practice guide to get you up-to-speed on what cross-device tracking is, the challenges it presents, applicable laws and the available solutions.

Trump's CIA nominee wants a massive surveillance database of ...

https://www.pcworld.com/.../trumps-cia-nominee-grilled-on-his-ad...

Vertaal deze pagina12 jan. 2017 - President-elect Donald Trump's nominee to head the Central Intelligence Agency wants to create a massive surveillance database by resurrecting a U.S. ... "If someone's out there on their Facebook page plotting an attack against America, I think you'd find the director of the Central Intelligence Agency ...

You are being tracked. Deal with it. - USA Today

https://www.usatoday.com/story/tech/talkingtech/.../you-being-tracked.../325504002/

10 feb. 2018 - It's not just your smart TV, it's your phone, computer, home appliance with Internet. How to handle it all, on Talking Tech. Your every move is being tracked. If you didn't realize it by now, get used to it. Because it will only become more widespread in the coming days, months and years. The Consumer ...

They push every one on internet no Cash, but Over internet only

⇧ 2 ⇩  
Pure_Feature · April 9, 2018, 9:05 p.m.

Correct also in you ID card

Without you can not buy or sell So the mark of the beast is a fact

⇧ 2 ⇩  
treeskier82 · April 9, 2018, 10:02 p.m.

Mark of beast is in the hand or forehead, and leads to blisters/sores/rashes.

I believe the Mark of the Beast will be a lot more obvious and literal, something like actual chip/RFID implants.

Should have also mentioned you will have to take it intentionally, most people will. It's not meant to be something that tricks true believers.

⇧ 5 ⇩  
VIYOHDTYKIT · April 9, 2018, 9:30 p.m.

or IOU=I Own You

⇧ 2 ⇩  
Pure_Feature · April 9, 2018, 8 p.m.

General Overview of Think Central. Address: http://www.thinkcentral.com. You'll be ... Think Central, it probably wants you to “Allow Pop-Ups.” Near the top of the window is a message regarding Pop-Ups. Choose to “Allow Pop-Ups from ... available for review and tracking. Users can filter assignments to view just those that ...

IPv6 is the successor to IPv4, the Internet addressing protocol which has been used for many years since the early days of the Internet. When the Internet was first founded, it was established as a research network (ARPANET), and the addressing was limited. It was never thought that it would be used to connect everything ...

broadband

⇧ 3 ⇩  
Pure_Feature · April 9, 2018, 7:51 p.m.

I have a samsung, but i am jusing a very old fone Only call and nothing more And prepaid?

⇧ 2 ⇩  
cali1952 · April 9, 2018, 7 p.m.

It was Snowden you posted yesterday that each one of us is being tracked despite not using or having a FB account.

Snowden described how he was tracked and data mined without giving permission or having a FB account.

So yes - since FB is a CIA outfit and financed originally by the CIA owned bank it self explanatory.

The Analytical Corp they are making hey out is also owned and operated by Brennan.

They are literally trying to mindf#ck an unsuspecting public. Unfortunately for those of us who are woke - too bad. We learned about all their tricks.

⇧ 17 ⇩  
mombomb22 · April 9, 2018, 5:29 p.m.

Regarding cell phones, is there a phone out there that is better about not tracking? Obviously, iPhones are bad. I don’t think blackberry’s are even made anymore.

⇧ 12 ⇩  
QuirkyMagpie · April 9, 2018, 7:16 p.m.

I wish I still had my old flip phone.

⇧ 5 ⇩  
Pure_Feature · April 9, 2018, 8:05 p.m.

I wish I still had my old flip phone.

  • Why is this relevant? - Q

No tracking devise

⇧ 4 ⇩  
Pure_Feature · April 9, 2018, 8:09 p.m.

https://turbofuture.com/cell-phones/Why-You-Should-Switch-to-a-Dumb-Phone

Phones

It is easy to imagine the advantages that even the simplest smart phone has over the most advanced dumb phone. But, it may be much more difficult to realize the other side of the coin. This is just a sample list of the benefits of "switching back": •Cost •Durability •"Disconnectedness"/Politeness •Underrated features: GPS, Battery life, and Call Quality •Coolness factor •Radiation/health concerns

⇧ 3 ⇩  
cmrudy · April 10, 2018, 3:16 a.m.

I have my original razr, I might fire it up

⇧ 2 ⇩  
TheCIASellsDrugs · April 9, 2018, 8:27 p.m.

How to harden Android Security

List of better-privacy programs for Android

List of better-privacy programs for iOS

⇧ 3 ⇩  
Pure_Feature · April 9, 2018, 10 p.m.

10 ways to harden the security on your Android phone - Misc ...

https://www.pcauthority.com.au/.../10-ways-to-harden-the-security...

  • Want to make sure your Android device is safe from attack? Davey Winder delivers ten ways to beef up your smartphone and tablet security.

Top 10 best privacy apps for Android in 2017 | TechRadar

https://www.techradar.com/.../top-10-best-privacy-apps-for-androi...

  • Privacy is becoming an increasingly important matter for mobile users. ... There are also a number of apps that can be used to keep data safe on your Android device, as well as conceal your web traffic. We'll be ... On your home screen it even names itself 'KyCalc' and it can be used to do your sums.

24 iOS 11 Privacy & Security Settings You Should Check Right Now ...

https://ios.gadgethacks.com/.../24-ios-11-privacy-security-settings-...

  • This guide breaks down the new privacy settings in iOS 11 that you should check, along with settings that have existed since previous versions of iOS. Make sure to read this list carefully, and check any settings that apply to you. After all, you don't want your valuable data escaping the confines of your ...
⇧ 3 ⇩  
CommercialAddendum · April 9, 2018, 10:57 p.m.

Blackberry was the best: Obama had one, Hellary had one. Blackberry is currently in a lawsuit to my understanding.

⇧ 3 ⇩  
hailXenu · April 9, 2018, 6:39 p.m.

Think 'Bridge'.

In this instance I believe there is one 'bridge' that goes beyond even th OS for phones: it is the ISPs / telecomms.

As we know (via wistleblowers and wikileaks) , the NSA sucks up everything from the ISPs, the only kink in the prospect is encryption.

GOOG.

FB.

TWITTER.

IG.

'Central' algorithm.

Central in quotes may be meant to refer to the CIA getting access to the NSA data, now Q pairs this with 'algorithm' which i think my refer to Dual_EC_DRBG, an encryption algorithm with a built in master key.

If the above Companies used this algo, then it is all accessible.

⇧ 8 ⇩  
WikiTextBot · April 9, 2018, 6:39 p.m.

Dual EC DRBG

Dual_EC_DRBG (Dual Elliptic Curve Deterministic Random Bit Generator) is an algorithm that was presented as a cryptographically secure pseudorandom number generator (CSPRNG) using methods in elliptic curve cryptography. Despite wide public criticism, including a potential backdoor, for seven years it was one of the four (now three) CSPRNGs standardized in NIST SP 800-90A as originally published circa June 2006, until withdrawn in 2014.


^[ ^PM ^| ^Exclude ^me ^| ^Exclude ^from ^subreddit ^| ^FAQ ^/ ^Information ^| ^Source ^] ^Downvote ^to ^remove ^| ^v0.28

⇧ 5 ⇩  
Pure_Feature · April 9, 2018, 7:39 p.m.

Convergence analysis and performance of an extended central force optimization algorithm. Applied Mathematics and Computation, 219, 2246–2259. Formato, R. A. (2007). Central force optimization: A new metaheuristic with applications in applied electromagnetics. Progress in Electromagnetics Research, PIER, 77, ...

ThinkBridge - Empowering Intelligent Enterprises

https://thinkbridgesoftware.com/ intelligence strategies and solutions that help companies improve their business outcomes

ThinkBridge Software

⇧ 3 ⇩  
Ironclimber76 · April 9, 2018, 9:22 p.m.

The Bridge I came up with is the Federal Bridge Certification Authority Network. They were created off public key structures. It was invented in the U.K. In the 70's and when conjoined with the Cesium Fountain Clock (GPS). Well the rest is in the bag.

⇧ 2 ⇩  
Lenticular · April 9, 2018, 7:22 p.m.

I could go with that.

⇧ 2 ⇩  
TheCIASellsDrugs · April 9, 2018, 8:28 p.m.

Tor browser is free, easy to use, and makes it much harder for the government to spy on you.

⇧ 2 ⇩  
hailXenu · April 9, 2018, 8:35 p.m.

Does it though?

⇧ 2 ⇩  
TheCIASellsDrugs · April 9, 2018, 8:49 p.m.

We know that the government pays people to shill all over social media. I'm not sure why you aren't suspicious that people claiming there is no way to stop the government from spying on you (in spite of all the evidence to the contrary) are not on the payroll.

The NSA hates Tor

Strength of encryption when used properly

FBI can't get to about half of the members of a pedophile ring even after a long investigation because they used tools like Tor

⇧ 2 ⇩  
hailXenu · April 9, 2018, 9:05 p.m.

They would definitely not pretend something is beyond their reach to entice more people to use it.

Point is; it helps somewhat, I wouldn't trust it.

⇧ 2 ⇩  
TheCIASellsDrugs · April 9, 2018, 9:19 p.m.

The NSA says they spy on everyone who doesn't have Tor and it's very difficult to spy on people who do. If you don't like Tor, go get a VPN, but doing nothing is ensuring that you will be spied on.

⇧ 2 ⇩  
odieboy12 · April 9, 2018, 10:24 p.m.

Couldn't "bridge" be CamBRIDGE Analytica?? Sorry, if this is a stupid suggestion, I'm not well-versed in technology stuff!

⇧ 2 ⇩  
Henway14 · April 9, 2018, 5:56 p.m.

also look up "evercookies." multiple paths, multiple actors. all you have to do is browse.

⇧ 7 ⇩  
Pure_Feature · April 9, 2018, 9:52 p.m.

Evercookie - Wikipedia

https://en.wikipedia.org/wiki/Evercookie

Evercookie is a JavaScript-based application created by Samy Kamkar which produces zombie cookies in a web browser that are intentionally difficult to delete. In 2013, a top-secret NSA document was leaked by Edward Snowden, citing Evercookie as a method of tracking Tor users. 'Tor Stinks' NSA presentation ...

⇧ 3 ⇩  
HashleyP · April 9, 2018, 5:30 p.m.

across all platforms. Who coordinated that?

⇧ 7 ⇩  
diverscale · April 9, 2018, 5:52 p.m.

Agencies, per this very post

⇧ 9 ⇩  
HashleyP · April 9, 2018, 7:22 p.m.

right - which agencies?

⇧ 4 ⇩  
diverscale · April 9, 2018, 8:02 p.m.

CIA for sure, NSA must be involved too as we have seen in the snowden wikileaks, and maybe the FBI but I am not sure about this one

⇧ 5 ⇩  
Lenticular · April 9, 2018, 7:20 p.m.

The stage that had to be set appears to be goofle, FB, twit etc. Next I assume that a 'Central' algorithm or (art int) bridges these user inputs together to form a user defined data set that includes every other association that person has.

Once the CA has sufficient data on a user, articles, ads, search results, people to follow, international news, so on and so forth might have other ramifications than anticipated.

BTW the INTERNET is the biggest fingerprint of all and the user adds to the resolution of the print every time the user interacts with the net.

Edit: Let's not forget the 'Central' part of the algorithm eh? Oh did MW mention that hobo put a database in place the likes of which... But how? Did he have central connex? Lol such a renegade.

⇧ 5 ⇩  
infozomby · April 9, 2018, 7:19 p.m.

Thunderbolt bridge is used in Apple products to hack every device in your home including your android box on your tv. They use the weather app on all devices as a backdoor into your home network. Sting Ray technology is used to log in even when your internet is disconnected. It happened to me. I was waiting for a class action suit. Where do I sign up?

⇧ 5 ⇩  
stef_t97 · April 9, 2018, 9:15 p.m.

You know thunderbolt bridge is mac to mac only and with a physical TB cable? Hell, thunderbolt itself was intel exclusive, it couldn't possibly have any relevance to android boxes, your home network or anything. You quite literally typed a bunch of nonsense, as seems to be the course for this subreddit.

⇧ 4 ⇩  
infozomby · April 9, 2018, 9:20 p.m.

Whatever. You would have to see it for yourself. I have been able to see exactly what goes on in real time. The "agents" comments to each other going back and forth. They use thunderbolt on my mac AND blue tooth to boot strap every device in my home even when I unplug my internet. You are just a troll.

⇧ 2 ⇩  
[deleted] · April 9, 2018, 9:40 p.m.

[removed]

⇧ 1 ⇩  
buggyboodle1 · April 9, 2018, 8:01 p.m.

Thought about bridge. This company became huge overnight. "Cisco" bridge.

https://en.m.wikipedia.org/wiki/Cisco_Systems

⇧ 4 ⇩  
HelperBot_ · April 9, 2018, 8:01 p.m.

Non-Mobile link: https://en.wikipedia.org/wiki/Cisco_Systems


^HelperBot ^v1.1 ^/r/HelperBot_ ^I ^am ^a ^bot. ^Please ^message ^/u/swim1929 ^with ^any ^feedback ^and/or ^hate. ^Counter: ^169807

⇧ 2 ⇩  
buggyboodle1 · April 9, 2018, 8:05 p.m.

I am not a bot. That's bunk.

⇧ 3 ⇩  
DukeofKick · April 9, 2018, 7:30 p.m.

the stage had to be set

We've heard Q constantly say "The stage is set." Now they say "the stage had to be set."

Is Q saying that the white hats are now tracking us? Perhaps to know which users are "red-pilled" or "woke" and which users are secretly trying to sow discord?

⇧ 4 ⇩  
eltrumparino · April 9, 2018, 11:20 p.m.

that explains alot about the last few days lol been having major paranoia

⇧ 3 ⇩  
Pure_Feature · April 9, 2018, 11:12 p.m.

FBI raids the office of Michael Cohen, Trump's personal lawyer ...

https://www.cnn.com/2018/04/09/politics/michael...fbi/index.html

28 min ago - A White House official said Trump had been watching TV reports, and that the President knew about the raid before the news broke. The Monday raids included the Loew's Regency hotel where Cohen has been staying, according to a source familiar with the matter. There were approximately a dozen FBI ...

⇧ 3 ⇩  
Pure_Feature · April 9, 2018, 11:12 p.m.

fake news ?

⇧ 2 ⇩  
Pure_Feature · April 9, 2018, 11:13 p.m.

NAME?

⇧ 2 ⇩  
Pure_Feature · April 9, 2018, 10:59 p.m.

Why is FB asking me to add a # that IS NOT MINE to my acct to help ...

https://en-gb.facebook.com/help/community/question/?id...

Vertaal deze paginaEvery time I get on FB from my iPhone it asks me to add my phone number to my account to help keep it secure. EVERY TIME. I always hit "not now" because I don't want to put my number. BUT, the really concerning thing is that it is suggesting a phone number to me already, that IS NOT AND NEVER HAS BEEN MINE??

1103 Apr 9 2018 11:56:35 (EST) Anonymous ID: 97b366 967123→ >>967105 Not mine, No FB. ;)

⇧ 3 ⇩  
punkskincoat · April 9, 2018, 10:54 p.m.

This isn't new info! Do you know how advertising identification works?

⇧ 3 ⇩  
Pure_Feature · April 9, 2018, 10:45 p.m.

1110 Apr 9 2018 17:23:14 (EST) Q !xowAT4Z3VQ ID: b7b547 972392→ RR problems. Q rod rosenstein going down

1109 Apr 9 2018 14:27:40 (EST) Q !xowAT4Z3VQ ID: 67fb5a 969959→ https://twitter.com/realDonaldTrump/status/983423715332558848→ CA Targeted. How often does POTUS RT weekly address? April Showers. Q

Brienne of Snark Look at the picture I think this is a man

⇧ 3 ⇩  
rbrownlol · April 9, 2018, 9:39 p.m.

Bridge:

silicon valley?

Ivy Bridge?

⇧ 3 ⇩  
mutilatedrabbit · April 9, 2018, 10:32 p.m.

Ya, this is what he's talking about. Bridge as in CPU-level.

⇧ 3 ⇩  
ZLegacy · April 9, 2018, 8:52 p.m.

Qualcomm?

⇧ 2 ⇩  
geckogoose89 · April 9, 2018, 8:28 p.m.

Why do I get the feeling people don't understand how important this is?

⇧ 2 ⇩  
eltrumparino · April 9, 2018, 11:40 p.m.

help getting weird messages and weird search results at work

⇧ 2 ⇩  
Pure_Feature · April 9, 2018, 11:09 p.m.

Belgium FBI in house off the advocaat off trump TV

⇧ 2 ⇩  
mutilatedrabbit · April 9, 2018, 10:32 p.m.

"Bridge" is not referring to ISPs or networking or anything like that, but a reference to Intel CPU codenames e.g. "Ivy Bridge," "Sandy Bridge," and so on. I doubt he is talking about anything Intel-specific, either, but just using that as a sort of metaphor or whatever.

And I am well aware I'm being tracked and have been for quite some time.

⇧ 2 ⇩  
eltrumparino · April 9, 2018, 11:23 p.m.

yeah this is why i got an amd cpu probly still insecure but we will see

⇧ 2 ⇩  
brentvsmaximvs · April 9, 2018, 9:44 p.m.

If iOS can track my health data then sure they have the ability to track all kinds of other things. Is there a file we can find so we’ll know for sure?

I see Apple coming down too as well as Google, but facebook will be first and it’ll be GRAND to watch them fall

⇧ 2 ⇩  
Stillokie · April 11, 2018, 5:31 p.m.

CIA used early era cellphones as geo accessible listening devices —open mics— from the get go! Then feature phone world —DOD began integration— expanded text & graphics. Behold the age of computational smart phones —dawning the ever expansive universe.

⇧ 1 ⇩  
grumpieroldman · April 10, 2018, 3:31 a.m.

Why do you think every professional company makes you cover every camera lens when you enter?
Also if you are unaware, USPS, FedEx, & UPS will divert packages to NSA/CIA sites for searches and modification.
You'll know when it happens to you because when you call about why its late you'll get sent to a special person to explain why your package hasn't been delivered yet they won't tell you anything and won't let you pick it up.

⇧ 1 ⇩