It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
This action nullified the original purpose of the "Gang of 14". "Gang" member John McCain (R-AZ) told reporters "This changes everything, this changes everything." Three years later, after Republicans regained control of the Senate, McCain voted in favor of the nuclear option in order to get Neil Gorsuchconfirmed to the Supreme Court. Today, judicial nominations can no longer be filibustered, although the filibuster still exists in general.
originally posted by: RelSciHistItSufi
a reply to: DJW001
DJ,
To look at what you' seem to be suggesting from another angle:
This is a global swamp spanning countries, political parties, sexes and religions.
Are you seriously suggesting that we cannot follow up leads on any people who are Jewish???
So has anyone else found it odd or unlikely that Qs tripcode hasnt been hacked a bajillion times? If it was so easy to do, they why hasnt he had to change it a ton of times? Wouldnt you think enemies of him would be working day and night trying to figure out who they are, where they are?
Just seems odd to me, since several people have said its so unsecure.... It must be secure enough for Q to be doing this for over a year now...
Frustrated by lack of actions. New Revelations meanining less and less.
originally posted by: savagediver
Greek to me. I looked this up and my brain just cant process it. I am amazed at anyone who can. Is this something you could use to figure it out.....with time that is.
theasciicode.com.ar...
Brute-forcing of user credentials
Denial of services
Session replay
Spoofed packet injection
You can provide additional protection for hidden attributes by using Internet Protocol security (IPsec) with Encapsulating Security Payload (ESP) and an encryption algorithm, such as Triple DES (3DES) in order to provide data confidentiality for the entire RADIUS message. Follow these guidelines:
originally posted by: pheonix358
a reply to: toysforadults
It is also a case of allowing the best intrusions to seemingly get through so you can trace the hostiles.
Resetting codes is simple IF you are prepared.
They reset their codes very quickly.
It is a game, a very serious game with some great outcomes.
P
originally posted by: Whereismypassword
www.engadget.com...
This is good, and up to date with what is going on now
The problem isn't just that QAnon is impersonating Anonymous. It's that QAnon is nothing like Anonymous