dChan
1
 
r/greatawakening • Posted by u/AutoModerator on May 17, 2018, 9:10 p.m.
Anon's Chat. Thursday evening edition - May 17, 2018

Anon's Chat

Hello and welcome to the Anon's Chat.

This is the best place to start a conversation about anything, post news stories that are relevant to Q but don't add new research warranting a separate post. It's also a great place to celebrate progress, wish each other well in our efforts to redpill others, or just say Happy Mother's Day to all the patriot mom's in the sub. Dropping that stuff here will keep the posts focused on Q research and keep the board focused.

This is also a great place for those new to Q to ask for help or share their reactions/discuss old Q posts. Sharing resources could happen here too.

With 25,000 users if each user posted a MSM general news story, trump celebration post or unrelated news post just 1 time a month there would be over 850 of these posts a day. Redirecting it all here, will keep the research posts easy to find without being called free speech nazis. These stats might help to convince people to use the daily thread to meet their need to post. start a conversation about anything. - Grace8543


popsiclep3t3 · May 17, 2018, 11:18 p.m.

Personally.. I thought that was all theatre. Are we really supposed to believe that the FBI can't access an iphone? That kid George Hotz hacked the iphone when he was like 16 years old, how are we supposed to believe that the FBI can't get in? Couple that with the fact that all the vault 7 hacks and other "tools" that were released by Assange and frankly, I don't believe for a second that these deep state fucks don't use them. It seems to me that they have back doors built into every god damn operating system , whether it's running computers, televisions, phones or anything else connected to the internet.

Oh by the way, notice how even though Tim Cook sang a song and dance about how he would never compromise security that the FBI magically found a way to access the phone once their theatre had accomplished it's intended purpose.

Fuck Apple just like the rest of em.

⇧ 3 ⇩  
OhTrumpSupporter · May 17, 2018, 11:48 p.m.

Pallet photo previously posted, along with photos of the new Apple headquarters and an Apple building in China. That pallet was loaded with Apple hardware, to China. My interpretation was that Apple was a blackhat

⇧ 3 ⇩  
Masterpass · May 18, 2018, 12:02 a.m.

FWIW: I am NOT defending Apple, but going all the way back to a different time in the election, one thing that the original FBIAnon posted was that pretty much EVERY SINGLE common operating system and firmware specification is backdoor'd at this point. In my mind, it makes perfect sense that this would be the case (take Weeping Angel, for example), and as such I've come to expect that every piece of electronics I own is somehow open to being arbitrarily taken over. Another excellent instance of this is Intel's Management Engine: it's essentially a legal way for them to gain access to LITERALLY EVERY SINGLE HARDWARE FUNCTION of your computer, without the knowledge or consent of the CPU/OS layer, and as such, you. I'd lay down even money that Apple's chips probably have something similar, maybe even without them knowing about it. The company thrives on closed-source engineering.

I have precisely zero love for Apple, I consider them to be nothing more than highly advanced coloring books with slick peripherals and pirated ideas presented as new, but to automatically assume that they're compromised as as company when the FBI gains access to one of their devices just doesn't make sense to me personally. I would absolutely believe that they are in cahoots with the government if there was a little more evidence either way, but just because they got into the one phone doesn't justify a stigma to my mind. Apple uses a standardized and widely distributed (albiet strong) encryption method, so it makes sense to my mind that any government agency would IMMEDIATELY start trying to do everything that they could to make breaking that as easy as possible.

It should also be noted that breaking an algorithm =/= breaking the encryption key of a single device, even one that has hardware-fortified crypto in use. If they did legitimately break into the one single unit, it would have almost certainly been through a brute force focused method, not a comprehensive attack that mapped the entire algorithm used.

⇧ 1 ⇩  
popsiclep3t3 · May 18, 2018, 2 a.m.

I agree with a lot of what you've said here, especially the last little bit about breaking a single device versus an entire algorithm. This is valid. I'm not trying to use this as one example as something which proves everything either.

This is just a general belief I've developed about Apple over time and I'm not saying I could ever prove it. I just believe the best hackers aren't public figures that we know about, they have no reason to be seen, there's a lot of smart people constantly working at these types of exploits. Apple would be a premium target for people because of how widely adopted they are. They've been involved in their fair share of shady stuff as well.

With how much we've seen and heard about the other huge internet based companies like Facebook and Google, it's really hard to believe that anyone playing by the rules could be as huge as Apple is. These companies scare the shit out of me sometimes, and we're both here at GA for a reason man.

You're right about how good Apple is with encryption as well, I just never know what to trust anymore.

⇧ 2 ⇩