Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: bagster

I found this tweet reassuring:

@jcreechy 2h2 hours ago
Replying to @WWG1WGA

Google technician here. I can confirm.

The Q team are using a set of Virtual Machines (VM) to “hop” from device to device, keeping the source and location secure.

So they use one computer to access another computer at a different location, and so on down the chain.


777 posted on 04/03/2018 8:11:55 AM PDT by 9YearLurker
[ Post Reply | Private Reply | To 752 | View Replies ]


To: 9YearLurker

Thanks for explaining.


781 posted on 04/03/2018 8:18:16 AM PDT by STARLIT (Trust The Plan.)
[ Post Reply | Private Reply | To 777 | View Replies ]

To: 9YearLurker

...So they use one computer to access another computer at a different location, and so on down the chain.
____________________________________________________________________________

So essentially, this information could be used to further support Q’s authenticity. If Q’s fake why would there be such an effort to stop him/them.


888 posted on 04/03/2018 10:54:59 AM PDT by Kalam (<: The answer is 42 :>)
[ Post Reply | Private Reply | To 777 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson