User Controls
Word on the street is...
-
2018-05-05 at 7:33 PM UTCMossad has an open S3 bucket with intercepted data from an Android app with over 400k users. Apparently it's mostly info on kebab. Pictures, contacts, and geolocation.
Now if you want me to frustrate The jedi you need to help me find this open S3 bucket. -
2018-05-05 at 7:41 PM UTCOh shit.
-
2018-05-06 at 8:24 PM UTCMossad/Israeli's be hardcore in this field, my nigga. Apple vs FBI forced an Israeli team to break Apple's encryption. That forced them to redesign their encryption methods which they claim is unbreakable now. Saying all of that to say, Mossad is fucking hardcore powerful and they got some smart-ass jedis working for them.
-
2018-05-06 at 8:33 PM UTCIf they knew the muds methods and where they share their stuff it sure would be easy to false flag stuff, but they wouldn't do that though, would they goyim?
(also on the syria/russia chemical weapons thing, if we've got samples we can plant them or fake them) -
2018-05-06 at 11:02 PM UTC
Originally posted by Grimace Mossad/Israeli's be hardcore in this field, my nigga. Apple vs FBI forced an Israeli team to break Apple's encryption. That forced them to redesign their encryption methods which they claim is unbreakable now. Saying all of that to say, Mossad is fucking hardcore powerful and they got some smart-ass jedis working for them.
I know but apparently The jedi that coded the API that connects to the S3 bucket was high on the blood of the goyim or something. Because someone simply unpacked the APK, and it has this fucking jedi's own cell phone number as some value in the source code. The guy that reverse engineered it said, finding the S3 bucket in the source wasn't hard. But he won't reveal the name of the app, because he is a (((Responsible Disclosure Faggot)))