Godlike Productions - Discussion Forum
Users Online Now: 2,126 (Who's On?)Visitors Today: 480,209
Pageviews Today: 782,874Threads Today: 261Posts Today: 4,250
09:27 AM


Back to Forum
Back to Forum
Back to Thread
Back to Thread
REPORT ABUSIVE REPLY
Message Subject Update Google Chrome NOW: Hackers could hijack your computer using a flaw in the browser that lets them install malware without you knowing
Poster Handle Proud Trump Supporter
Post Content
I saw this earlier and wondered if it is even possible to keep any computer or phone same from prying eyes.

Anonymous 03/08/19 (Fri) ID: 9a6a8f No. 5565314

"Keking out right now. Pretty sure I found something. Rip me apart if I'm wrong though. So many shills on here. You're missing crumbs. Look here, not [here]. Responding to post 2996 Q says, "how is that possible for a 'supposed' non_gov entity?"

How is it possible that FB tracks data even when the app is deleted? In post 2993 (3/7/109) Q is calling out @ Snowden. So I used the filter to find posts relating to WikiLeaks. Q's post from July 31, 2018 is a screenshot of the Wikileaks Vault 7 ... released MARCH 7. Sounds confusing just trying to show you my thought process, stay with me. It makes sense.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years aft it has reached its 'target'. CIA malware does not "explode on impact: but rather permanently infests its target. In ore to infect targets's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information so CIA command and control "called them bombs not suspicious packages: Q responds in 2974 with "Fire".

I went into Vault 7 Projects, searched for "fire"...

"Angelfire is an implant comprised of 5 components: Solartime, Wolfcreek, Keystone (previously MagiccWand), BadMFS and the Windows Transitory File system"

F**KING KEYSTONE KEK

"Keystone is part of the Wolfcreek implant and responsible for starting malicious user applications. Loaded implants never touch the fire system, so there is very little forensic evidence that the process was ever ran." This makes post Q381 much easier to understand.

"We Won't telegraph our moves to the ENEMY.
We will however light a FIRE to flush them out."
Q

Q is saying that they are using the Angelfire to predict the Deep State's moves without being detected. In the user files it says a key must be used to open magic wand (keystone). In Q post 270 he says that ADMR/NSR (W&W) + POTUS/USMIL = Apply the Keystone. Paint the Picture. In post 167 Q says POTUS opened the door of all doors. Expand your thinking. What is the keystone? Now this could be confirmation bias but based off of what we just read we can now infer that Q was saying trump gave Admiral Rogers permission to use Keystone and Activate malware in order to collect data on DS. Furthermore who uses a magicwand? A wizard. (W&W)"
 
Please verify you're human:




Reason for reporting:







GLP