I know you are simply copy the Q-drop, but it gives an opportunity to pass along the fact that the "utm_term" is a property of the exact instance of a browser, not the server.
Good observation & I have thought the same thing - the attributes are often there and never removed by “Q”. The values can be anything, though - and I’ve often wondered why anons haven’t searched using those though most likely they are true points of origin (which is a possibly unintended exposure)
Interesting. I tried it by deleting the “?utm_term= ...” portion. The article came up but inserted a new “?utm_term= ...” ending. In fact, it does this each time so yes, it’s logging each access.
I would infer, however, based on Q’s previous posts showing knowledge of cybersecurity, that Q is accessing behind some sort of VPN or higher level security such as perhaps a ‘packet hopping’ encoder. From my SBI clearance days in satellite security, there are levels of DOD security that not even CIA knows.
Gotcha. My screw up. Sorry
Hey did.you see that old southern classic to kill a mockingbird? I must have watched it 10 times. Ok I am seeing things FITFLOL maybe it’s that red pill. LOL
If mockingbird reference is to msm, Gergory Peck is Session. Is this how the Q personal are giving clues?
I could be horribly wrong but it works. I am getting this Q personal, I think.
And I still don’t have a link, friends to Q.