HERE"S THE KRAKEN!!!! | |
fiftybagger
(OP) User ID: 75810200 United States 11/17/2020 09:51 AM Report Abusive Post Report Copyright Violation | https://imgur.com/a/RTxPB4Y Behold, he cometh with clouds; and every eye shall see him, and they also which pierced him: and all kindreds of the earth shall wail because of him. Even so, Amen. I am Alpha and Omega, the beginning and the ending, saith the Lord, which is, and which was, and which is to come, the Almighty - Jesus |
diverdan01
User ID: 39516942 United States 11/17/2020 09:52 AM Report Abusive Post Report Copyright Violation | |
Russian Hacker
User ID: 78569304 United States 11/17/2020 09:53 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 73477180 United States 11/17/2020 09:56 AM Report Abusive Post Report Copyright Violation | [imgur] [link to imgur.com (secure)] Quoting: fiftybagger Exactly, it's over and you're back to 4chan. |
fiftybagger
(OP) User ID: 75810200 United States 11/17/2020 09:58 AM Report Abusive Post Report Copyright Violation | https://imgur.com/745CZqx Behold, he cometh with clouds; and every eye shall see him, and they also which pierced him: and all kindreds of the earth shall wail because of him. Even so, Amen. I am Alpha and Omega, the beginning and the ending, saith the Lord, which is, and which was, and which is to come, the Almighty - Jesus |
Anonymous Coward User ID: 77222797 United States 11/17/2020 10:00 AM Report Abusive Post Report Copyright Violation | actually it's a a gnu app available for most nix distributions, it can be used to intercept packets, and derive their origin, as well as their destination, basically.. if say i wanted to gain access to an encrypted network (lets just pretend for a second, a wireless encrypted network, like you use in your home) first thing i'd do is start capturing all packets sent and received accross said network. then i'd pick the packet apart and derive origin and destination, from the packet header. then i'd figure out what form of encryption is in use, brute force it if necessary, put myself on the subnet that i intend to snoop. then i capture packets again, with raw unencrpyted data now... then it's a matter of plugging that data into emulation of whatever i plan to now. make my own. |
fiftybagger
(OP) User ID: 75810200 United States 11/17/2020 10:15 AM Report Abusive Post Report Copyright Violation | actually it's a a gnu app available for most nix distributions, it can be used to intercept packets, and derive their origin, as well as their destination, basically.. if say i wanted to gain access to an encrypted network (lets just pretend for a second, a wireless encrypted network, like you use in your home) first thing i'd do is start capturing all packets sent and received accross said network. then i'd pick the packet apart and derive origin and destination, from the packet header. then i'd figure out what form of encryption is in use, brute force it if necessary, put myself on the subnet that i intend to snoop. then i capture packets again, with raw unencrpyted data now... then it's a matter of plugging that data into emulation of whatever i plan to now. make my own. And then create a database of those "foreign IP addresses" which accessed those election machines. See Trumps executive order: Behold, he cometh with clouds; and every eye shall see him, and they also which pierced him: and all kindreds of the earth shall wail because of him. Even so, Amen. I am Alpha and Omega, the beginning and the ending, saith the Lord, which is, and which was, and which is to come, the Almighty - Jesus |
President-Elect Revbo™
User ID: 79418380 United States 11/17/2020 10:18 AM Report Abusive Post Report Copyright Violation | |
fiftybagger
(OP) User ID: 75810200 United States 11/17/2020 10:19 AM Report Abusive Post Report Copyright Violation | https://imgur.com/a/SOcEyDs Behold, he cometh with clouds; and every eye shall see him, and they also which pierced him: and all kindreds of the earth shall wail because of him. Even so, Amen. I am Alpha and Omega, the beginning and the ending, saith the Lord, which is, and which was, and which is to come, the Almighty - Jesus |
Anonymous Coward User ID: 77544818 Switzerland 11/17/2020 10:23 AM Report Abusive Post Report Copyright Violation | Right. It's a very simple program. But what about people using VPNs? Any hostile actor would undoubtably be smart enough to proxy themselves behind multiple vpns. So unless the actors committing this are complete morons (which they might actually be), then this software would not help much. |
Mist Walker
User ID: 79127210 United States 11/17/2020 10:30 AM Report Abusive Post Report Copyright Violation | |
President Elect - Justmeok
User ID: 76148484 United States 11/17/2020 10:41 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77222797 United States 11/17/2020 10:46 AM Report Abusive Post Report Copyright Violation | Right. It's a very simple program. But what about people using VPNs? Any hostile actor would undoubtably be smart enough to proxy themselves behind multiple vpns. Quoting: Anonymous Coward 77544818 So unless the actors committing this are complete morons (which they might actually be), then this software would not help much. it would because, say you knew something bad was happening on a local network (like, the network any of these voting machines accross the country were connected to during the process.... you could sniff all traffic there, and if there is connections to the outside... you would see them, you'd see active traffic on certain ports that are getting routed, outside of that local network. that right there, blows it wide open. then you track down where this outside traffic was bouncing too AND MORE IMPORTANTLY you analyze those packets, on that outbound port, you break it down, is that election data these machines are sending OUT!!! and if it is, what exactly is the reason, and what exactly is that data looking like on THE OTHER SIDE of where it's going. |
Anonymous Coward User ID: 79480067 Sweden 11/17/2020 10:49 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77222797 United States 11/17/2020 10:49 AM Report Abusive Post Report Copyright Violation | yep that ones just a coincidence.. this other thing though.. lol i'm not even biased, i realized how fake and corrupt, and completely for sale the entire political system/justice system is..and has been.. i used to get my kicks in the *carding game...a true pirate. now i work in high level nix security/virtualization... :) to anyone who is not sure yet what's about to happen, listen, it's happening. they're breaking out gnu packet sniffers, and talking about the traffic coming out of those machines, sniffing those suspect ports (that's gonna find the backdoors)(that anyone who knows anything, has been aware of for a while now) |
Anonymous Coward User ID: 77222797 United States 11/17/2020 10:51 AM Report Abusive Post Report Copyright Violation | Kraken is the name of the world most vicious malware botnet that gets through unnoticed > 10% of fortune 500 corporate firewalls. Quoting: Anonymous Coward 79480067 I don't think that's the thing either. I think it's a metaphor. i think so to. I think Trump and Guiliani and Powell, do in fact, have the goods... they also have some IT wizards.. those IT wizards are explaining (quite unsuccessfully so far i should say) to this team, exactly what they have on their hands here. powell was trying to relay it, but she dont know jack about jack when it comes to anything IT, so it came out... as.. we're releasing the kracken lol.. |
Anonymous Coward User ID: 77222797 United States 11/17/2020 10:59 AM Report Abusive Post Report Copyright Violation | really it's gonna be about this... ok, so there was knowledge election shennanigans may take place (this is obvious if you're even remotely tech savvy, election fraud is real, there are ppl who could have pulled this off easily) ok... so scenario; It was known some election fraud was gonna go down.. if Trump was smart he'd have hired a team of IT ppl right then.. get some knowledge about how exactly this fraud could have happened. 2. at this point Dominion soft would be all over the map, we'd be looking and finding exactly what has been found now, that yes Dominion did have a backdoor, it was well domumented, and in fact, old news. 3. you figure out the strategy that would be most likely used, the vote shaving algo. 4. you figure out you could catch that. 5. you refer again to the dominion software manual, and see that the tool, expects the user to sit remotely, and monitor the vote, and then run the algo.... the algo works, and you get your result, then you cover your tracks.. 6. Unless someone had been sitting there with a kracken all along, capturing all traffic, and ready to pick apart packets... 7. here we are. |
President Elect - Justmeok
User ID: 76148484 United States 11/17/2020 11:41 AM Report Abusive Post Report Copyright Violation | yep that ones just a coincidence.. this other thing though.. lol i'm not even biased, i realized how fake and corrupt, and completely for sale the entire political system/justice system is..and has been.. i used to get my kicks in the *carding game...a true pirate. now i work in high level nix security/virtualization... :) to anyone who is not sure yet what's about to happen, listen, it's happening. they're breaking out gnu packet sniffers, and talking about the traffic coming out of those machines, sniffing those suspect ports (that's gonna find the backdoors)(that anyone who knows anything, has been aware of for a while now) Yes, I was just teasing those that try to tie irrelevant bits of stuff together. Always adding up letter's numerical equivalents and then proving somehow that the devil did it. :) And therefore... Satan. QED. :) Obviously, it is a metaphorical Kraken. Last Edited by JustmeTX on 11/17/2020 11:47 AM Justme |
Anonymous Coward User ID: 73195410 United States 11/17/2020 11:49 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 79648115 Canada 11/17/2020 11:50 AM Report Abusive Post Report Copyright Violation | |
fiftybagger
(OP) User ID: 75810200 United States 11/17/2020 11:54 AM Report Abusive Post Report Copyright Violation | Behold, he cometh with clouds; and every eye shall see him, and they also which pierced him: and all kindreds of the earth shall wail because of him. Even so, Amen. I am Alpha and Omega, the beginning and the ending, saith the Lord, which is, and which was, and which is to come, the Almighty - Jesus |
Anonymous Coward User ID: 66459697 United States 11/17/2020 12:13 PM Report Abusive Post Report Copyright Violation | |
fiftybagger
(OP) User ID: 75810200 United States 11/17/2020 01:14 PM Report Abusive Post Report Copyright Violation | Objects do seem larger in the mirror... Like her balls are way bigger than yours will ever be!!!! Maybe even literally https://imgur.com/j8EBcZd Behold, he cometh with clouds; and every eye shall see him, and they also which pierced him: and all kindreds of the earth shall wail because of him. Even so, Amen. I am Alpha and Omega, the beginning and the ending, saith the Lord, which is, and which was, and which is to come, the Almighty - Jesus |