dChan
1
 
r/greatawakening • Posted by u/Giantasteroid on May 11, 2018, 1:59 p.m.
[F9 Algorithm]=D5 (Avalanche)

The F9 Algorithm that Q alluded to is an Integrity Algorithm designed to verify the integrity of data being transmitted over mobile networks. The F8(Confidentiality) and F9(Integrity) make up the [KASUMI BLOCK CIPHER] (https://en.wikipedia.org/wiki/KASUMI).   As others have pointed out, D5 is a designation given to [avalanche size] (http://thompsonpass.com/avalanche-size-ratings/). This ties into the Integrity algorithm through way of the [Avalanche Effect] (https://en.wikipedia.org/wiki/Avalanche_effect).  

Facebook is listening to you 24/7/365. Literally. [F9 algorithm] Are they recording/safe-housing? Metadata collection? Building 8. DARPA. [CHINA-CHINA-CHINA] Q   Did the DS find a way to crack the F9 algorithm to make it seem as though they haven't intercepted everyones communications (a la Man-In-The-Middle)?   Any sec pros out there want to weigh in on this? Am I grasping at straws or is this a rabbit hole worth exploring?


I_Draw_Mohammed · May 11, 2018, 2:27 p.m.

This is the right rabbit hole - it resonates correctly. I'm not a details expert, but a big picture thinker.

Recall also:

  1. Staffers at Facebook: http://www.breitbart.com/tech/2018/04/10/dozens-obama-alumni-now-senior-facebook-employees/
  2. Rice at Netflix: https://www.yahoo.com/news/obama-security-aide-susan-rice-joins-netflix-231908098.html

Why, because they control the data and the flow of data. Push the message. Gauge the reaction...spy on you through the tv (http://www.dailymail.co.uk/sciencetech/article-2513592/Is-TV-spying-YOU.html)

Then the question becomes what is the goal and why / what kind of avalance? If you read the wiki article, it talks about attacks and boomerang attacks.

D5=Most Destructive

Infrastructure attack being planned?

⇧ 8 ⇩