Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Cboldt

Interesting. I tried it by deleting the “?utm_term= ...” portion. The article came up but inserted a new “?utm_term= ...” ending. In fact, it does this each time so yes, it’s logging each access.

Example:
https://www.washingtonpost.com/news/politics/wp/2018/08/03/theres-a-virus-in-trumpland/?utm_term=.73cb6867bf8c

I would infer, however, based on Q’s previous posts showing knowledge of cybersecurity, that Q is accessing behind some sort of VPN or higher level security such as perhaps a ‘packet hopping’ encoder. From my SBI clearance days in satellite security, there are levels of DOD security that not even CIA knows.


814 posted on 08/03/2018 8:53:55 AM PDT by Hostage (Article V (Proud Member of the Deranged Q Fringe))
[ Post Reply | Private Reply | To 800 | View Replies ]


To: Hostage
-- ... there are levels of DOD security that not even CIA knows. --

The best (maybe only) way to keep a secret is not tell it.

820 posted on 08/03/2018 8:58:17 AM PDT by Cboldt
[ Post Reply | Private Reply | To 814 | View Replies ]

To: Hostage; Cboldt

utm_xxxxx are attributes used for marketing people to track the spread of their content. Somebody publishes an article and then posts to their twitter feed, for example - they add the utm_ parameters so that then when people click on a link somewhere and bring up the article they can accumulate data on how people found + got to the article (”we got x hits from Twitter post”) I previously considered that “Q” team might even have been putting their own values there to track their own things i.e. people who grabbed or clicked URLs from “Q” posts.


822 posted on 08/03/2018 9:03:16 AM PDT by Steven W.
[ Post Reply | Private Reply | To 814 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson