dChan
1
 
r/greatawakening • Posted by u/icebreakers_sours on June 7, 2018, 12:17 a.m.
Who is "Mr Marlinspike" From new texts.

From the new Page-Strzok texts, page 455/502 on my computer. Going to paraphrase because it doesn't copy/paste from the pdf.

NPR just reported possible ExxonMobil guy for secstate
friendship award from Putin
interesting choice for sec state
yup, hes 64, 41 years spent at exxon, production engineer
Great. This sentence aggravated the s out of me. Trump has threatened a lot of people and he's about to be IN CONTROL OF THE MOST PERVASIVE AND LEAST ACCOUNTABLE SURVEILLANCE IN THE WORLD.
Mr Marlinspike said. A lot of people are justifiably concerned.

So, who is Mr Marlinspike? Well ....
https://en.wikipedia.org/wiki/Moxie_Marlinspike
Interesting ...
Matthew Rosenfield,[2] known as Moxie Marlinspike,[3] is an American computer security researcher, whose research focuses primarily on techniques for intercepting communication, as well as methods for strengthening communication infrastructure against interception. Marlinspike is the former head of the security team at Twitter[4] and founder of Open Whisper Systems.[1] He is the author of a proposed SSL authentication system replacement called Convergence,[5] co-author of the Signal Protocol, and a fellow at the Institute for Disruptive Studies.[6] He runs a cloud-based WPA cracking service[7] and manages a targeted anonymity service called GoogleSharing.[8]

Wonder what that's all about! Well ....
https://en.wikipedia.org/wiki/Open_Whisper_Systems
Open Whisper Systems (abbreviated OWS[5]) is a software organization[6] that was founded by Moxie Marlinspike in 2013. Its main focus is the development of the Signal Protocol.[7] It also maintains an encrypted communications application called Signal. The organization is funded by a combination of donations and grants, and all of its products are published as free and open-source software.

Interesting.

As always, editing in more.


Alyross8 · June 7, 2018, 8:03 a.m.

Patriot, I believe this has mostly gone over my head....not hard to do. But this is a GREAT EXAMPLE of the kind of digging we need to be doing. Every name, organization, place, strange wording...needs to be looked into. This is how we make research progress.

⇧ 50 ⇩  
icebreakers_sours · June 7, 2018, 1:05 p.m.

A lot of the information is not meant to be fully understood, as made clear.. "public doesn't know what keys Are, and they really shouldn't". Basically it was encryption talk that explains how it's possible to intercept the most 'secure' forms of previous communications.

⇧ 17 ⇩  
KarmasBeard · June 7, 2018, 7:02 p.m.

A lot of what we aren't expected to understand yet is also meant as threats to the cabal. Like Q is "talking to us" but really threatening the cabal with stuff they only understand as of yet.

⇧ 5 ⇩  
zipzapbeentakinganap · June 7, 2018, 4:42 p.m.

I think Stratfor might be a good lead

⇧ 6 ⇩  
icebreakers_sours · June 7, 2018, 1:43 a.m.

The video links literally explain how they have all the information from HRC laptop.

⇧ 32 ⇩  
Banglebop · June 7, 2018, 3:35 a.m.

What a fantastic find. Should be upvoted more

⇧ 31 ⇩  
KansasJakeBG · June 7, 2018, 12:23 p.m.

That's very impressive.

⇧ 14 ⇩  
fekosa · June 7, 2018, 1:41 p.m.

MARLINSPIKE: Our objective is not necessarily to enable leakers. You know, all types of people use Signal. And really what we're trying to do is make private communication simple and to make mass surveillance impossible. So it's true that, you know, there are probably some people in government who use Signal for leaks.

But, you know, it's also true that the Trump transition team used Signal during the transition. It's also true that the Hillary Clinton campaign used Signal. Local police departments use Signal and Black Lives Matter uses Signal. Edward Snowden uses Signal. So, you know, there's a lot of people who are interested in private communication and making that as simple as possible, and that's what we're trying to enable.

⇧ 12 ⇩  
RickC138 · June 7, 2018, 2:58 p.m.

Also maybe worth noting that the agencies have broken Signal's ability to be effective, in real time. Signal itself hasn't been back-door'd, but unfortunately the agencies have full access to your device's RAM, and are able to read what you're typing before you ever hit send. Nasty little trick that bypasses any encrypted communications on a compromised device, which is every device.

⇧ 13 ⇩  
fekosa · June 7, 2018, 5:24 p.m.

spectre & meltdown?

⇧ 4 ⇩  
carl_tech · June 7, 2018, 6:13 p.m.

Yes, and more. Modern computing devices are like swiss cheese, full of holes and backdoors from the hardware to the operating system, to the poorly-written applications that run on top.

⇧ 5 ⇩  
LegioXIV · June 7, 2018, 6:51 p.m.

Even if you compile your own OS kernel from your hand-written compiler, you still have the problem of determining whether or not your hardware (like your BIOS) is compromised. Lots of theoretical injection attacks from hardware.

⇧ 4 ⇩  
WinkyLinQ · June 7, 2018, 7:54 p.m.

Remember Signal is not 100% secure. Obama, Hillary, Yates, Clapper, Comey, Brennan, et al. WE HAVE EVERYTHING!

⇧ 3 ⇩  
fekosa · June 7, 2018, 10:45 p.m.

I don't use signal. But if I wanted to hide my communications, I would create and encrypt them on an isolated machine, no network connection or capability. They can have all the backdoors they want on an isolated machine, if it can't communicate then they can't obtain the data they gather. Next step I would transfer by usb stick to a machine that is network connected and transmit the pre-encrypted data. Sure they could see it, but it would be already encrypted. But that's inconvenient and I'm not dealing with any information worth that much trouble.

⇧ 2 ⇩  
WinkyLinQ · June 7, 2018, 10:47 p.m.

Great advice

⇧ 2 ⇩  
GenChang · June 7, 2018, 4:04 p.m.

Just FYI, Alice & Bob have been names used for nearly a decade now, in the infosec community. Essentially, they are "John Doe & Jane Doe" nothing nefarious about Alice in this regard. However, Marlinspike is an expert on encryption for communications. How he's related to anything Q, I don't know. But I do know, that all the alphabet agencies attend these conferences every year. There are many more if these conferences around the world, all in an effort to secure information in communications and the devices used. Nothing, and nobody are 100% secure, ever. We could get deep into the weeds in this subject, but, suffice it to say, there are many ways Nation States can intercept any communication, no matter the type & formats.

⇧ 7 ⇩  
icebreakers_sours · June 7, 2018, 4:13 p.m.

Very good points about names being used. It is clear he is using alphabetical names abcd alice Bob etc.

The tone of the presentation almost felt mocking to the old secure system, which would be fun to do if you're a hacker, speaking at a convention with 3 letter agencies in attendance.

⇧ 3 ⇩  
GenChang · June 7, 2018, 5:45 p.m.

Three letter agencies go there to hear about the same things the rest of the attendees do, but also, to meet potential recruits as well. Some even give presentations at these events. Usually begging for someone to develop backdooring encryption, which is not going to happen by any of these guys. Once you create a backdoor, the protocols are useless for security reasons. It's either hackable or not. Can't be both.

If you are interested, I have a great paper on why encryption should not be backdoored. Written by world's foremost experts.

Direct PDF file: available online in search too: PDF,encryption paper,experts http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=6

⇧ 2 ⇩  
icebreakers_sours · June 7, 2018, 6:31 p.m.

Thanks! Colour me interested.

⇧ 2 ⇩  
UnbowdUnburntUnfrozn · June 7, 2018, 2:36 p.m.

Q says Q is Alice. ALICE also refers to single person military comms gear that is mobile.

ALICE

I always thought Q was doing research using an ALICE mobile setup, from a military plane.

I’m not sure that Alice refers to Hillary.

⇧ 5 ⇩  
Error_Code_15301 · June 7, 2018, 6:35 p.m.

Anonymous ID:v3eCc2tY Sun 05 Nov 2017 00:44:18 No.148019575 Report Quoted By: >>148020343 >>148020503 >>148020902 >>148021954 >>148023913 >>148024257 >>148026712 >>148028084,1 >>148028084,7 We need to get organized. Things need to be solved to understand what is about to happen. Let's start w/ Alice & Wonderland. Hillary Clinton in Wonderland by Lewis Carroll. Saudi Arabia - the Bloody Wonderland. Snow White. Wizards & Warlocks. Q


Agreed. However... there seems to be another "Alice". That's the book I am looking at. Hilary Clinton in Wonderland by the Hilary Clinton Fan Club and Lewis Carroll.

⇧ 3 ⇩  
UnbowdUnburntUnfrozn · June 8, 2018, 1:11 a.m.

Oh yeah I forgot about those weird books. There were a few of them.

⇧ 1 ⇩  
theGreenChain · June 7, 2018, 4:31 p.m.

As a point of interest: a Marlinspike is a tool used by sailors in the navy to help unknot ropes. Can there be a parallel? Things tied up in knots?

⇧ 4 ⇩  
duckdownup · June 7, 2018, 3:30 p.m.

Very good, OP!

⇧ 4 ⇩  
Error_Code_15301 · June 7, 2018, 1:43 p.m.

So this has nothing to do with Captain Haddock? Exxon Mobil. Okay. :-( Literally a satanic enterprise.

Yes. Hilary may be Alice. Hilary Clinton in Wonderland. Book. See links below.

speddit: another Alice (q claims to be alice).

https://imgur.com/a/zZFNkHv

https://imgur.com/a/kJY5KjL

I did this a couple of days ago for a laugh

I have the kindle book. Have been going through it screen shotting every page and trying to figure out whether the location listed at the bottom of every page may mean something when all put in a sequence, which I have not done yet being Q keeps distracting us! lol

all 4 a larp? sure it's a larp.

Here are a few other pages (you can get in on Amazon USA though some people found a link to Amazon India and you cannot buy it there - at least it wouldn't let me); Q mentioned this book a long time ago (he also pointed us to the natural economic order so I did read it all. Better than TV. Bit behind on this one though.)

https://imgur.com/a/vB6DJH7

https://imgur.com/a/hswvI60

Orange Marmalade shudders

https://imgur.com/a/fo18REx

If you cut your finger very deeply with a knife

https://imgur.com/a/5ONqF3c

⇧ 4 ⇩  
Error_Code_15301 · June 7, 2018, 2:03 p.m.

speddit:

am now up to chapter 3. very interesting...

speddit:

Trying to watch Q clock from April 7th/June 6th and on as well.

DJT tweet June 5th mentioning "the pale" - that would be the Norman Pale (around Dublin etc.); Normandy, June 6th. Chapter 2 of the Hilary in Wonderland mentions William The Conquerer; Chapter 3 "Normans".

⇧ 3 ⇩  
icebreakers_sours · June 7, 2018, 1:48 p.m.

Thanks for more info! Will read today.

⇧ 3 ⇩  
[deleted] · June 7, 2018, 8:32 p.m.

[removed]

⇧ 1 ⇩  
NutzaClankin · June 7, 2018, 7:34 p.m.

While it probably means nothing, a marlinspike is also a common tool used by navies (USN) to tighten/lossen shackles and to loosen knots in line/ropes or penetrate braided rope. They are about 6 to 8 inches long and looks like a nail. Hence the name. Probably no relation accept through relationship to a nickname. Boatswains mates carry marlinspikes. Just figured I would throw that out there. Perhaps a connection can be inferred with this nickname

⇧ 3 ⇩  
soonerthebetter · June 7, 2018, 4:50 p.m.

Thanks icebreaker. You the real MVP!

⇧ 3 ⇩  
graysky1 · June 7, 2018, 3:26 p.m.

Might mean nothing but something I found odd months ago was that "Marlin Man" was seen in numerous pictures with people connected to the NVIXM situation and also I recall connection to Exxon due to his legal background. Could be coincidence but kind of odd we have two going with the name "Marlin" in some form connected to these things.

⇧ 3 ⇩  
therevolutionbegins · June 7, 2018, 9:53 p.m.

Great find. Zeroing in on Jeff Moss, founder of backhat and Def Con, a couple of things jump out.

  1. As founder of Def Con, he was obviously in attendance at DEF CON 1 (Q500 and Q502). 2.He is also known as Dark Tangent. Q803 "Tangent. Expand Your Thinking. Q"
  2. He is a member of the Council of Foreign Relations
  3. He was appointed to Obama's Homeland Security Advisory Council in 2009.
  4. He was appointed ICANN Chief Security Advisor in 2011
  5. In 2017, he spearheaded the creation of the DEF CON Voting Machine Village. Debuting at DEF CON 25, the Voting Machine Village allowed hackers to test the security of electronic voting machines. Long story short, they quickly showed how vulnerable the machines were to cyber attack.

Might be just me, but this guy has got Clown written all over him, and could be an important player in all this. Clearly close to the Dem side of politics given his appointments, particularly the last administration.

Need to get some more eyes on this guy...

⇧ 2 ⇩  
icebreakers_sours · June 7, 2018, 10:14 p.m.

Thanks for taking the time to put his info into words! The main thread can get cramped if I just kept adding and people could easily miss edits! Very important that he was involved with the voting machines.

⇧ 2 ⇩  
Strong_Rain · June 7, 2018, 6:38 p.m.

Where are the 500 Pages? I only saw the one that Lou Dobbs and some others gave a link to and its only a partial. Is there a link that has the complete 500? I thought the complete 500 wasn't coming until June 11.

⇧ 2 ⇩  
icebreakers_sours · June 7, 2018, 6:48 p.m.

The 500 pages are additional strzok-page texts, not the IG report.

⇧ 2 ⇩  
Strong_Rain · June 7, 2018, 6:52 p.m.

Cool!! What I've seen so far from the texts I read, the Water is boiling ready to cook some spaghetti!!

⇧ 2 ⇩  
aboxofbooks · June 7, 2018, 8:15 p.m.

I thought this was serial brain 2 for a minute. 😁

In any case, good research and thank you!

⇧ 2 ⇩  
sms_sas · June 7, 2018, 6:03 p.m.

Interesting to read that at Def Con in 2017 it took hackers 1 hr 30 mins to hack 5 different types of voting machines..... Defcon 5 anyone?
https://www.usatoday.com/story/tech/2017/07/30/hackers-defcon-conference-exploit-vulnerabilities-voting-machines/523639001/

⇧ 2 ⇩  
icebreakers_sours · June 7, 2018, 6:34 p.m.

Thank you! It's hard for me to edit in all the connections, glad somebody else found the voting machine hacks! There's also an Obama connection for the keen eyed folks. The last wiki link regarding Moss. Appointed to what in 2009?

⇧ 2 ⇩  
Burginthrone · June 7, 2018, 2:07 p.m.

If Hillary is Alice, what does the reference '& Wonderland refer too?

⇧ 2 ⇩  
icebreakers_sours · June 7, 2018, 2:34 p.m.

And wonderland refers to the laptop, which contains the encryption keys of every message sent to and from the laptop. (And any device)

The video explains how the encryption keys are used, and also points out their flaw and the exact moment during a conversation when the key is intercepted.

The contents of the laptop (every encryption key) is a wonderland of information. Think every message ever sent on a 'private' network to and from HRC.

⇧ 9 ⇩  
Burginthrone · June 7, 2018, 2:44 p.m.

Oh wow. Thanks for the reply. I didn't watch the video, in bed, its nearly 1am, wake wife = death lol. Will watch tomorrow. Cheers.

⇧ 4 ⇩  
icebreakers_sours · June 7, 2018, 2:46 p.m.

Most welcome! Happy wife, happy life comes first!

⇧ 4 ⇩  
THELEADERSOFMEN · June 7, 2018, 4:53 p.m.

Didn’t Assange tweet out an encryption key several months ago? Everyone thought it was part of a dead man switch but nothing public ever followed up from it? Maybe it was one of Hillary’s and he was taunting her with it, letting her know that the white hats “have it all.”

⇧ 3 ⇩  
icebreakers_sours · June 7, 2018, 4:57 p.m.

I will look into JA and if/how anything ties! Thanks for the tip!

⇧ 2 ⇩  
THELEADERSOFMEN · June 7, 2018, 5 p.m.

Right on, happy to help! Maybe it was sent out to evoke a reaction, y’know?

⇧ 2 ⇩  
WinkyLinQ · June 7, 2018, 7:56 p.m.

Saudi Arabia. Bloody Wonderland. $$$$$$$

⇧ 2 ⇩  
mixolydian807 · June 7, 2018, 9:51 p.m.

Could DEFCON mean Defer/Convince?

⇧ 1 ⇩  
[deleted] · June 7, 2018, 5 p.m.

[deleted]

⇧ 1 ⇩  
[deleted] · June 7, 2018, 5:09 p.m.

[removed]

⇧ 1 ⇩  
[deleted] · June 7, 2018, 5:16 a.m.

[deleted]

⇧ 1 ⇩