Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: tomkat

“Imho, the vagueness could well be a security layer.”

I keep hearing that argument but it makes no sense:

If you want information kept secret, you don’t post it on social media sites, vague or not vague.

Rather, you encrypt it and send it privately to “need to know” recipients who have been cleared and provided with the encryption key. If the information falls into the wrong hands and is decoded, usually there are very serious negative consequences for both the sender and the recipient.

The case of Q is different. The use of vague and cryptic language, intended to be understood only by those clever enough to figure out the clues - this method of passing secret information is more commonly found in games, such as treasure hunts, puzzles, cryptograms, etc..

Here, the intention is not really to hide the information, and there are no negative consequences if the clues are solved, nomatter who solves them. In fact, the one who solves the clues may win a prize, or be made to feel smart, feel special, feel like a winner.

Several examples of vocations that employ vague and cryptic references are palm readers, con artists, cult leaders and the writers of astrology columns and Chinese fortune cookie messages.

They know that vagueness and crypticism are their friends if they do not wish to be held accountable for their predictions.

Here is my prediction:

Something will happen in the near future that will involve possibly a family member or someone close to someone in the audience. It has to do with the letter “J” and something green, or perhaps blue.


333 posted on 01/27/2018 6:59:59 AM PST by enumerated
[ Post Reply | Private Reply | To 53 | View Replies ]


To: enumerated
If I were Q, privy to high level intel myself or via a 3rd party source, and my goal was the intel's broad dissemination, I would likely employ vagueness:

Case 1 - Covert access
 1) Primarily, to protect my and/or the source's identity and intel access
 2) Secondarily, to obfuscate the intel to a degree that would reduce the chance of anyone's pinpointing the source

Case 2 - Overt access
 3) As above, to protect my and/or the source's identity/access if deemed tactically disadvantageous to publicly reveal same
 4) Again, to obfuscate the intel sufficiently to minimize the likelihood of an enemy operator pinpointing and attempting to neutralize the source

In either case:
 5) Q's stated goal is to promote citizen involvement via crowdsourcing further research into, and unmasking of, the black hats
 6) Encrypting the clues/intel and sending it privately only to 'need to know' allies would work directly against the stated aim of (5)

Lastly:
 7) I remain agnostic re Q's product, yet hopeful that it may aid in unmasking the deep state treason
 8) That snark will win you few converts

341 posted on 01/27/2018 8:36:03 AM PST by tomkat
[ Post Reply | Private Reply | To 333 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson