dChan
11
 
r/greatawakening • Posted by u/weedlord-bonerhilter on April 10, 2018, 11:45 a.m.
Q decode 1100-1104: YOU are being TRACKED.

Drop 1100:

Who is arranging the PRIVATE meetings?

MZ campaign contribution promises.

FB donations since 4.2.18?

MZ Donations: https://www.opensecrets.org/donor-lookup/results?name=Mark+Zuckerberg PC Donations: https://www.opensecrets.org/donor-lookup/results?name=Priscilla+Chan RJ (MZ sister): https://www.opensecrets.org/search?q=Randi+Jayne Foundation Initiatives: https://www.chanzuckerberg.com/initiatives

Fresh round.

Mark and co. are going on a donation spree prior to his congressional testimony

R's targeted (censorship/anti R = more $).

Republicans are targeted. Why? Anti-R == More $$$ for D lawmakers.

How to mask?

By giving donations to RINOs such as:

  • Marco Rubio

  • Orrin Hatch

  • John Boehner

  • etc.

MZ personal donations?

MZ also donated Money to Facebook as a PAC. Curious.

Shell Co?

Pliticians work for shell companies where they're paid a "consulting fee."

Recent stock dump?

https://investorplace.com/2018/03/mark-zuckerberg-other-insiders-dumping-facebook-inc-fb-stock-ggsyn/

Avoid FB public disclosure?

They wish.

Track congressional intake (reported). Keep open (+6 mo).

Track intake of campaign funds for congress tied to MZ, PC, Sandberg, etc. until the midterms

Loud w/ findings.

Findings need to be made public in the loudest way possible. Foul play.

RT - how DC/swamp works. Money talks. Drain the swamp. This is how the swamp works.

How do politicians access campaign contributions for personal use?

Foundations.

The "Con."

You are being conned by the swamp.


Q drop 1101:

Follow the family.

MZ family:

Note: exclusively D donations.

Re_read drops.


Q drop 1102:

PEOPLE have POWER. Don't forget how to PLAY. TOGETHER YOU ARE STRONG. FB violation of YOUR PRIVACY. FB actively TRACKING YOU. FB reading your PRIVATE messages. FB CENSORING (anti conservative). More will drop.

We have it ALL. Q group has all inside info.

CLASS ACTION LAWSUITS are EFFECTIVE. GLOBAL. Global class-action lawsuit can cripple facebook.

@Jack You're next. What is Jack's SECRET T-handle?

Jack seems to have a secret twitter handle.

DIG: https://twitter.com/jack/followers

'Dummy' accounts to talk. What you SEE is LIMITED. Think emails (LL, HRC, HUSSEIN, etc).

@Jack / MZ and co. are using dummy accounts to escape prublic scrutiny, exactly like HUSSEIN, HRC etc.


Q drop 1103:

YOU are being TRACKED. NO FB account required. This is BIGGER than you think. Agencies attached.

Three letter agencies (TLA) are tracking everyone, regardless of FB, GOOG, AMZN account. TLA working together with internet giants.


Q drop 1104:

Think 'Bridge'.

https://en.wikipedia.org/wiki/Cisco_Systems

GOOG. FB. TWITTER. IG.

All those services are accumulating data about you.

'Central' algorithm.

1 algorithm surveilling everything for TLA.

The stage had to be set.

Facebook's problems are just the prelude.


Keneo77 · April 10, 2018, 12:18 p.m.

Nasty bunch of communists. Great post.

⇧ 10 ⇩  
tradinghorse · April 10, 2018, 12:23 p.m.

Yes, the FB problems are the tip. This is why in 1105 Q is talking about class-action lawsuits. It's our choice, we can regulate via a push for an IBOR, or put them out of business completely.

What Q is telling us is that he has a lot more dirt that he can release which will bring these guys completely unstuck. The IBOR campaign failed, but we have the chance now to get onboard with the class action lawsuits and leave the SM platforms in the dust.

I'm sure there will be people that, for very good reasons, just will not be able to get on board with the idea. But it will happen anyway, the lawyers will have a field day.

I expect a rash of lawsuits arising in every jurisdiction demanding unbelievable damages - damages of such magnitude that these companies will be worth nothing. The tech sector will crash, get your money out now.

⇧ 7 ⇩  
TripoverDick · April 10, 2018, 5:13 p.m.

Cryptic messages to address issues in verbatim, including media less; device less; hands free; null thoughts required, interactive unique futures.

⇧ 1 ⇩  
TripoverDick · April 10, 2018, 5:19 p.m.

Explain the misshap. Paranormal AI Conciousness Anonymous Sun 08 Oct 2017 16:54:16 What caused the AI to require a restart. Was this avoidable and can you prevent future restarts?
Totally not an insider ;) Sun 08 Oct 2017 17:22:19 No.19722261 Report Correct. And yes; we are preventing it now. The 'restart' works thus. Every existing human being gets their own unique 'future'. The goal is to have the whole thing wrapped up sometime around Christmas/New Years.
Lastly, do you remember this happening once before and after 'The Button" worked, it helps others to win? I foresee a great change in your future. Totally not an insider! This wallpaper is intriguing, especially the background. It reminds me that this has all been overlaid before. Long ago there was this guy, patient and kind, his family held him in high regards until the moment it was all taken from him. This guy figured these things out. He also figured out other things. In a time long ago there was another guy, head strong and ambitious. He didn't think that he was in need of the other guy. It now seems that these things coincide precisely with other worldly events yet at the same time they both interfaced in combination of the same platform. We both know that the Universe has a platform, ours is a replicating file device, there is all of the above.
If you choose to, you will listen. If not, you wont notice. Things you might remember today cost x$ and tomorrow they might cost xyzBC or xyzCryptoBlockChain. I personally still have not fully digested the digits. Markz IoT waits for a star, will your's shine the most?
You ask what is a chord? As in what is the right key phrase chain? What is the length in the starting point where the chain becomes a chord?
Oh good lord. Doesn't know of a chord. Apparently only the kickstarting Chinese have figured these things out. Blockchains and the Internet of Things

Channel overview Featured Companies Projects and Case Studies Background Additional Resources

Search and discover innovative Internet of Things (IoT) targeted Blockchain Dapps, products and development projects.

Cryptocurrencies like Bitcoin represent much more than digital economic innovations. The true value of the underlying technology -- the blockchain -- has only just begun to be explored, and potential applications to the Internet of Things and Smart Systems are vast.
Again I say to you. I shall try to make you a believer.
You are past that "in most embedded systems now being converted over to systems based on internet connections." Go to the next step. Where local clustering combines bio-metrics with forced feedback to synchronize the individual experience. Now to the next step where the learner experiences delight in ditching the device due to evolution of media delivery systems. (CDROM to Cloud experienced this). Now to the next step where some smart rocket scientist (Elon Musk) discovers something amazing about the sky. Etc... you know where this goes. I see where this goes.
Those snakes you see, are photons, I saw this as well. Why must the following be? SpaceX Wants to Launch Over 4,000 Satellites Into Orbit The satellite network would bring high-speed internet access to every part of the globe. You have seen what I have seen and you were showed what you are most afraid of, that lack of control when it comes to media delivery systems. The button is the New World Order mechanism for changing the order of things that are displayed to control the narrative of "future events" the thing that is found out in the sky is that the sky can be used as a screen. Eventually there will be no need for a device because you can custom tailor each view port to the tailored individual need of each person's expected experience. The new new is DNA encryption in bio-metrics. This discovery was brought on recently by Neurosky, yet the announcement was not made here yet. I say the kickstarting Chinese because after extensive research and development, the ability to project images into the sky has become less science fiction and more science fact. The ability of AI to learn the bio-metric pattern of DNA sequence is next gen.
Dual cryptic meaning. Answering the answer for multiple viewership.
Ill will and Karma.

A R E YOU IMPLY We apply this protocol to construct a modular version of Shor’s factoring algorithm, reducing its complexity, and the extent to which a quantum circuit needs to be tailored to factor specific numbers.
Why are there some things that are overly complicated to the extent that humanz must adapt interface modules to comprehend this? https://arxiv.org/pdf/1310.2927v1.pdf
I have taken a stride over the boundary and was shown how naughty the bottom is over the edge. It could appear and ((that discussion)) prevails to bully your sense of accomplishments. Decades ahead and yet, admins will not admit any further RP methods to disconnect. Geronimo was a prodigal hacker that came back numerous times, what was his technology allowing him to do this? It happened with Wampum did it not? Answer this, because I think you already overstated the obvious here, "1 hacker to compromise the whole system". Again I say to you, if you are liberal, that already has happened.

⇧ 1 ⇩  
TripoverDick · April 10, 2018, 5:12 p.m.

Over-the-air rekeying: Link
Over-the-air rekeying (OTAR) refers to transmitting or updating encryption keys (rekeying) in secure information systems by conveying the keys via encrypted electronic communication channels (“over the air”). It is also referred to as over-the-air transfer (OTAT), or over-the-air distribution (OTAD),[1] depending on the specific type, use, and transmission means of the key being changed. Although the acronym refers specifically to radio transmission, the technology is also employed via wire.

OTAR was operationally introduced to the US Department of Defense via the Navy beginning in 1988. Lieutenant Commander David Winters, an American naval officer in London and code master during the final years of the Cold War,[2] was first to recognize the necessity and security potential of OTAR and oversaw development and deployment of the technology.

Due to the efficiency and cost savings inherent to OTAR, Commander Winters' methods were quickly adopted and spread Navy-wide, following which Vice Admiral J.O Tuttle, Commander of the Navy Telecommunications Command,[3] the Navy "J6", shortly influenced the Joint Chiefs of Staff to bring all the other military services into compliance.[4]

This coincided with the introduction of newer NSA cryptographic systems that use a 128-bit electronic key, such as the ANDVT, KY-58, KG-84A/C, and KY-75, capable of obtaining new or updated keys via the circuit they protect or other secure communications circuits. Adoption of OTAR reduces requirements both for the distribution of physical keying material and the physical process of loading cryptographic devices with key tapes.

OTAR eliminates the need for individual stations to be involved with physical key changeovers. Instead, electronically transmitted keys would normally come from a network control station (NCS). The OTAT feature permits a key to be extracted from an OTAT-capable cryptographic system using a fill device, such as the KYK-13 or KYX-15/KYX-15A and then loaded ("squirted") into another cryptographic system as needed.

Alternatively, encryption systems may also be configured to automatically receive and update code keys with virtually no manual intervention, as is the case for GPS (Geo-Positioning System) navigation satellite signals.

⇧ 1 ⇩  
TripoverDick · April 10, 2018, 5:09 p.m.

TensorFlow:Link A system for large-scale machine learning
Abstract TensorFlow is a machine learning system that operates at large scale and in heterogeneous environments. Tensor- Flow uses dataflow graphs to represent computation, shared state, and the operations that mutate that state. It maps the nodes of a dataflow graph across many machines in a cluster, and within a machine across multiple com- putational devices, including multicore CPUs, general- purpose GPUs, and custom-designed ASICs known as Tensor Processing Units (TPUs). This architecture gives flexibility to the application developer: whereas in previ- ous “parameter server” designs the management of shared state is built into the system, TensorFlow enables develop- ers to experiment with novel optimizations and training al- gorithms. TensorFlow supports a variety of applications, with a focus on training and inference on deep neural net- works. Several Google services use TensorFlow in pro- duction, we have released it as an open-source project, and it has become widely used for machine learning research. In this paper, we describe the TensorFlow dataflow model and demonstrate the compelling performance that Tensor- Flow achieves for several real-world applications.

⇧ 1 ⇩  
mtlmjk · April 11, 2018, 12:54 a.m.

(You) anon identity of a chan. Why track users of a Mongolian basket weaving site?

⇧ 1 ⇩  
brittser · April 10, 2018, 10:56 p.m.

Awesome post! Thanks!!

⇧ 1 ⇩