User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 116
  6. 117
  7. 118
  8. 119
  9. 120
  10. 121
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429

Posts by Sophie

  1. Sophie Pedophile Tech Support
    Originally posted by Solstice It's when something is soaked in liquid

    I think that's "saturate" though.
  2. Sophie Pedophile Tech Support
    Originally posted by Quick Mix Ready over and over and over again

    but people like us never get a break if we fucked up. not even half the level of evil that these people have done.

    anyone not rich, powerful, famous etc unless they lashed out at others and are new money. then and only then to they get treated like the rest.

    Jeffy Epstein was arrested around 2000 for trying to have underage girls come to him for sex and he was allowed to pay for his own jail cell which was the size of a one-bedroom apartment and able to come and go outside in the yard.

    there is no doubt in my mind that the stories of Bill Clinton as Gov of Arkansas and the Mena connections is fabricated. non at all. him and his wife are sick sick people with a power trip.

    Hilary punched a Secret Service agent. or threw something at him. Why wasn't she charged? thats fucking insane.

    FBI give little fucks "And you can't just call us whenever you feel like it" but Jennifer Lawrense and her stolen phone has dozens of these agents coming to her rescue.

    Obama, Clinton, Cuomo and the Weather Ground Organization

    James Comey and Jeff Hunter. Same time, Same Company. Full Transparency clause. 2013. Ray Daleo. now his daughter is on this case?

    it's laughably obvious.

    the hand picks have full control


    The FBI is a domestic intelligence agency, they are not a law enforcement agency. Maybe not de jure but de facto. And they have been for a long time. Of course they would be very interested in J-Law's phone, contacts, compromat, dirt, you know, the works.

    This is also why the FBI will never ever ever willingly give up all the evidence they collected from MUH NAME A JEFF's Island/Home/Office/whatever. It gives them leverage over too many important pieces on the board for them to do that. In fact it's so fucking bad, that they are fully aware and cognizant that no one believes JEFF offed himself and that everyone knows Maxwell's trial is a show trial. They would rather have the justice system which they are supposed to serve take a huge credibility hit than give up that leverage.

    At least the mask is off, but good God, imagine what you could do with this power. They guard it jealously against all moral fiber, against all 'common sense' against all the negative PR, against everything.

    This is why this whole situation is so rife with fuckery.
  3. Sophie Pedophile Tech Support
    Chris Hanson from TV or Chris Hanson from Redfern? I'd be cool with either tbh. I will in fact take a seat while i await an answer.
  4. Sophie Pedophile Tech Support
    The original 2channel isn't western.
  5. Sophie Pedophile Tech Support
    At this point i am convinced Wario is a well executed troll/gimmick account.
  6. Sophie Pedophile Tech Support
    Originally posted by maddie im not sure if its possible, but could you possibly use a small solar panel to supply the energy that a raspi would take up mining? i find that the solar panel might not be sufficient enough though.

    I got an rPi zero with two USB HATs, you know the little extension boards you can put on if you need something extra, and while an rPi zero is pretty smol and light in energy consumption compared to other models. I have a USB powerbank with a solar panel built in that'll last more than 24 hours on a sunny day running my rPi zero off of it. Like obbe mentioned though in order to find out for sure though you should probably calculate all the things.
  7. Sophie Pedophile Tech Support
    The euro ones are encoded with a private RSA key it would seem. Some analysis shows the following encoding/signing schemes to be the most likely


    [+] SHA-1
    [+] Double SHA-1
    [+] RIPEMD-160


    When you decode the barcode element the text data that comes up kind of looks like it was encoded with GPG, like a certificate. If it has to make some sort of API call for verification it could be the data contained within is a little like a binary payload. The authentication app might only be there to decode said payload, and verify it was encoded with a government approved private key.

    I'mma see if i can get Anbox up and running, and emulate scanning a valid QR Code, and MITM that bitch.
  8. Sophie Pedophile Tech Support
    Have we observed proton decay outside of the lab?
  9. Sophie Pedophile Tech Support
    No need to rape anyone if you're not socially retarded. If it's about power and control for you, get a gf that's into being controlled.
  10. Sophie Pedophile Tech Support
    Originally posted by Bradley Sophie I want to tell you that in regards to the anti Sophie alliance I am your staunchest supporter.

    Thank you Bradley, you a real G and real knows real nahmsayin.
  11. Sophie Pedophile Tech Support
    Barring that if you give me her snapchat username, i can search all social media for accounts/profiles with the same name.
  12. Sophie Pedophile Tech Support
    Originally posted by Wariat she claims to have no facbeook or instagram or doesnt want to give it.

    Ask her why.
  13. Sophie Pedophile Tech Support
    Originally posted by Grylls But aren’t most things starting to invade our privacy these days? One day you’re gonna have to move on and get with the programme

    They are, and no my dude. There is plenty you can do if you value your privacy it just takes some skill and work. I don't mind putting some of my time into that. But if you would mind doing the same, that's your choice.
  14. Sophie Pedophile Tech Support
    Originally posted by Wariat snapchat is pne weird app. i was tslking to this 16 yr old just now and it doesnt make sense. she claims that no boy her sge asked her out and shes never had a bf or sex and she sent me two pics where she looked about 20 and like a model. with curly hair and thick lips. weird ass shit. she kept trying to either tslk about sex or lesn toward it as we twlked she kept asking wt first maybe we could go on a diff subject? and kept saying you first. she is 16 or over the aoc tho so it makes no sense for it to be a fake account or sting but something is off with it. she kept saying thwt other guys on snap said she was ugly wnd im the first who accepted her. and she would give emojis or happy faces and reply just to me super wuickly. shit is weird. makes no sense. she even claimed i am beautigul and thwt she would lick me wll over too.

    If you'd like me to do a little digging i'm going to need a few data points to start with. Ask her about social media, where she's from. Play along, if you are capable of that and get her number. If you got some Social Media Profiles and her number i'll try to see if it's a honeytrap/catfish/sting/whatever.
  15. Sophie Pedophile Tech Support
    Originally posted by Grylls Not this fucking debate

    All I know is I have an iPhone and don’t care because it does everything I need and never had an issue with it so I’m happy with it

    That’s why I don’t need to whine about how much better and cheaper other products are

    I mean, have you been to the apple store and tested all the products yourself to know they suck? Or does the price keep you away?

    I’m guessing you just read shit about it online

    All smartphones affect your privacy to one degree or another. Doesn't matter whether you're an Apple fan boy or an Android lover.

    Which is why i have burner phones, use VOIP services(Which can have it's own issues) but when i do get a smartphone it's so that i can root it and run a custom ROM in the case of Android. I might run a modified kernel on it depending on what i want the phone to do.
  16. Sophie Pedophile Tech Support
    Originally posted by maddie linux knowledge, id say more advanced compared to people in the same job field (linux sysadmin for 5+ years) but im ready to transition into a more IT security role now. after learning pentesting and red/blue team concepts, i slowly started to realize that my interest kept going back to malware and viruses. I seem to catch onto ASM fairly easily (x86_64 so far, but i want to expand into other asm languages as well soon)

    Dope. Sounds a little like the way my interests developed although instead of Linux SysAdmin i started out learning to program on both Linux and Windows with a couple of langs with InfoSec and Security Automation as the overall goal. I realized a couple of things along the way, one of which being that malware was the way to go for OffSec operations, and that RE is a vehicle towards Exploit Dev and 0days, from that realization spawned an interest in all things low level, including Asm and stuff related to the kernel and firmware and even BIOS, Bootloaders and bootkits.

    I would have added OpSec somewhere in there, although i consider OpSec a soft skill, in the sense that before anyone even begins getting remotely involved with anything cyber security, OpSec proficiency should be in your basic skill set.
  17. Sophie Pedophile Tech Support
    Originally posted by Wariat none of the articles prove your point they all mention icloud like i said which it is an option to sync secondly this is being told ahead of time for ios15 not current versions and thirdly only for iphones and only ones produced for the us market.

    You are free to ignore all the good advice in the world.
  18. Sophie Pedophile Tech Support
    Here's a fun fact, during the times of the crusades the Muslim hoards thought Christians were some kind of weird polytheist barbarians because they didn't understand the concept of The Trinity.
  19. Sophie Pedophile Tech Support
    Originally posted by Wariat you still have no proof for any of your theories about how they are going to spy and sutomatically go through millions of iphones simuktaneously not connected to icloud.

    You deserve the full force of the state sponsored bio-security panopticon.
  20. Sophie Pedophile Tech Support
    As a rule of thumb you want a powerful GPU to run crypto calculations. So if you're looking for an 'out of the box' solution rPi ain't it.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 116
  6. 117
  7. 118
  8. 119
  9. 120
  10. 121
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429
Jump to Top