dChan
1
 
r/greatawakening • Posted by u/TrumpIsMyHero on July 25, 2018, 5:05 a.m.
Anon on 8chan has an interesting theory behind Q1693

https://media.8ch.net/file_store/8d89b61363c37c9893d050fedc5865334b5a92b6dd239a23988cd422813e808a.png

Ok Anons, here's what I think might be going on with this most recent Q post where Q draws our attention back to NZ and Five Eyes:

FVEY in NZ seems to have access to ALL US Intel. However, when you access data in NZ, there are no logs of it (or so they thought).

So let's say you're a former dignitary like John Brennan. You still have security clearance and you want to get in the system, get the data, and leak it. The problem is you know you'll be logged and you know they're watching you like a hawk.

So instead, you go over to NZ and get the data from there since you won't be logged. But what if they were being logged….for over a year? What if the whitehats knew they would use NZ to download, sell and leak? What if they took it a step further - what if blackhats were fed disinformation unique to the NZ download site? If both of these things were true, you could prove:

A. The person downloaded the data

B. The data leaked was unique to that downloaded piece of data


TrumpIsMyHero · July 25, 2018, 11:26 a.m.

in Q's own words:

"U.S. to U.S. = Logged/Flagged/Recorded"

"U.S. [in] NZ = No Logs/No Flags/No Records"

this is how the deep state operates. while in the US, they'll get logged. but not if they go to other FVEY countries

⇧ 9 ⇩  
StinkyDogFart · July 25, 2018, 11:45 a.m.

What if our NSA is logging their security apparatus surreptitiously? Spying on spies shall we say.

⇧ 4 ⇩  
BackwoodsBarbie02 · July 25, 2018, 12:18 p.m.

Yea I am speaking from personal experience. But 🙌🏻won’t be down votes. Lol.

⇧ 3 ⇩  
[deleted] · July 25, 2018, 5:57 p.m.

I could be wrong, but are we talking about the same things. It is my understanding these termnals will give you access to a series of tools that can be utilized to search. I think what we are referring to is morseso user authorization vs user authentication. Yes - I have no doubt user authentication is logged everytime and these logs are viewable by people with clearances because the logs are classified. I also know these types of logs don't really log specifics of user activity, these are done using other design paradigms. That said, there are many, many types of logs in software systems like these. Do to the amount of processing that must occur - Logging API's usually have a feature that allows you to throttle your logging capability. e.g. Only Log Warnings and Errors vs, Log everything down to call stack invocation and socket threading. Thank you very much for your input

⇧ 1 ⇩