I found this tweet reassuring:
@jcreechy 2h2 hours ago
Replying to @WWG1WGA
Google technician here. I can confirm.
The Q team are using a set of Virtual Machines (VM) to hop from device to device, keeping the source and location secure.
So they use one computer to access another computer at a different location, and so on down the chain.
Thanks for explaining.
...So they use one computer to access another computer at a different location, and so on down the chain.
____________________________________________________________________________
So essentially, this information could be used to further support Q’s authenticity. If Q’s fake why would there be such an effort to stop him/them.