To: Cboldt
To: Steven W.
Didnt Julian Assange drop an encryption key late Dec, early Jan that no one has been able to find out why he dropped it? Related?
To: Steven W.
Regarding the missing key:
Was watching a film on the work of Turing on Netflix to decode the ENIGMA machine in wwII.
They built the machine but didn't have enough time to decode the sequence as the codes were changed every day.
A key clue was during a meeting at a bar with some clerks from another department.
The clerk mentioned that the Germans always sent a weather forecast concluded with a Heil Hitler.
Bingo....the header of the morning message was "weather"...followed by a "heil hitler"
This clue enabled Turing and his team to decode the remaining message.
239 posted on
05/03/2018 8:50:27 AM PDT by
spokeshave2
(Formerly as spokeshave...now restarted after computer issues.)
To: Steven W.
Key to VAULT 7?
For sh*ts and grins try....
NBIIXXVUZAFLBC-UHFFFAOYSA-M
269 posted on
05/03/2018 9:35:17 AM PDT by
smoky415
(Corporal Smoky - Smallest WWII Hero Dog)
To: Steven W.
To: Steven W.
289 posted on
05/03/2018 10:31:41 AM PDT by
RitaOK
(Viva Christo Rey! Public Ed/Academia are the farm team for more Marxists coming, infinitum.)
To: Steven W.
Building on this theory... which BTW I think is spot on.
excerpt from Q drop #1287
Cohen raid by FBI?
Public context: re: payment to Stormy Daniels?
SC & FBI raided POTUS attorney to pull Stormy Daniels payment info?
RR signed off?
What other docs were collected?
How many places raided?
Raid on the President of the United States attorney for payment details re: private case re: Stormy Daniels?
Think logically.
How do you introduce evidence into an investigation (legally)?
Who has everything?
Methods which info collected/ obtained?
Admissible in the court of law?
another excerpt from Q drop #1182
How do you legally inject/make public/use as evidence?
again in Q drop #1228
How do we legally
..
Win.
This platform is more than simply pushing the TRUTH.
Q
Notice how legally is bracketed each time... Could Q be saying to us ('legally') is relative in these instances. How has secret data been "injected legally" in the past?
WikiLeaks.... Could JA already have the data but they need the anons to get him the encryption keys?
On October 15, 2017 JA tweeted the code
4767 5774 6a7a 4d6c 6330 666b 314a 3453 0000 0907 84b4 f787 7616 86f7 a737 5707 5736
Could JA have been sending a signal that he's looking for a key in that particular format? It wasn't long after that the Ecuadorians cut off his access to the internet. Coincidence??
Don't know if this is plausible but maybe WL is Q's way of "storing everything offline". And/or if some anon finds the hidden encryption key in the Q drops, JA will ('legally') inject it into the public domain.
To: All
334 posted on
05/03/2018 11:45:14 AM PDT by
Squidpup
("Fight the Good Fight of Faith")
To: Steven W.
To: Steven W.
Sounds a lot more than plausible.
389 posted on
05/03/2018 1:29:01 PM PDT by
JockoManning
(http://www.zazzle.com/brain_truth for hats T's e.g. STAY CALM & DO THE NEXT LOVING THING)
To: Steven W.; RitaOK
It is a very good post. I wonder how many encryption experts hang out on FR.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson