QAnon: It's on, don't panic ii | |
PiccoloGal
User ID: 76190053 United States 05/05/2020 01:10 PM Report Abusive Post Report Copyright Violation | [link to twitter.com (secure)] Quoting: The Natural One Matthew T McDonald, Writer at BLP @BLPMatthewMac I can now 100% confirm that on Friday Maine's @GovJanetMills was served papers by AG Bill Barr (@TheJusticeDept) and she is due in Federal Court in two weeks. #mepolitics Quote Tweet Matthew T McDonald, Writer at BLP @BLPMatthewMac · May 3 #BREAKING Sources have reached out to me and informed me that Maine Governor Janet Mills has been served papers. Lawsuits are coming. BIG LAWSUITS. #mepolitics 5:53 PM · May 3, 2020 This is such good news. Thanks for brightening my day, as usual, TNO! |
keybored
(OP) User ID: 77443882 Belgium 05/05/2020 01:12 PM Report Abusive Post Report Copyright Violation | Q !!Hs1Jq13jV6 [link to about.fb.com (secure)] "We removed 5 Pages, 20 Facebook accounts, and 6 Groups that originated in the US and focused domestically. Our investigation linked this activity to individuals associated with the QAnon network known to spread fringe conspiracy theories. We found this activity as part of our internal investigations into suspected coordinated inauthentic behavior ahead of the 2020 election in the US." Information Warfare. Q /qresearch/•Today at 19:11 |
KnightsoftheRoundTable
User ID: 78881991 United States 05/05/2020 01:32 PM Report Abusive Post Report Copyright Violation | |
keybored
(OP) User ID: 77443882 Belgium 05/05/2020 01:48 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78854700 United Kingdom 05/05/2020 02:07 PM Report Abusive Post Report Copyright Violation | Britain records 693 more coronavirus deaths taking official toll past 29,000 - but separate grim figures show the UK has Europe's HIGHEST fatality count as data suggests the TRUE number of victims could be at least 40,000 [link to www.dailymail.co.uk (secure)] |
Anonymous Coward User ID: 77765653 United States 05/05/2020 02:07 PM Report Abusive Post Report Copyright Violation | BOOM! [link to www.foxnews.com (secure)] |
Anonymous Coward User ID: 78851247 United States 05/05/2020 02:14 PM Report Abusive Post Report Copyright Violation | |
Paranoid Chick
User ID: 65553286 United States 05/05/2020 02:19 PM Report Abusive Post Report Copyright Violation | Does anyone by chance have any decent sauce on Ghidra? Been looking everywhere and can't seem to find anything more than the basics. Granted it's only been half a day since that drop but something tells me it's a HUGE deal. Quoting: Luminous Epinoia The sauce is the NSA. Q has dropped it before, when the NSA tweeted out a link to it. It is open-source. Help yourself to doing whatever non-Luddites - like myself - do with programming and software. |
Anonymous Coward User ID: 78851247 United States 05/05/2020 02:36 PM Report Abusive Post Report Copyright Violation | Does anyone by chance have any decent sauce on Ghidra? Been looking everywhere and can't seem to find anything more than the basics. Granted it's only been half a day since that drop but something tells me it's a HUGE deal. Quoting: Luminous Epinoia The sauce is the NSA. Q has dropped it before, when the NSA tweeted out a link to it. It is open-source. Help yourself to doing whatever non-Luddites - like myself - do with programming and software. Appreciate ya PC. I was looking too hard. |
_Trey_
User ID: 75651418 United States 05/05/2020 02:40 PM Report Abusive Post Report Copyright Violation | [link to twitter.com (secure)] Quoting: The Natural One Matthew T McDonald, Writer at BLP @BLPMatthewMac I can now 100% confirm that on Friday Maine's @GovJanetMills was served papers by AG Bill Barr (@TheJusticeDept) and she is due in Federal Court in two weeks. #mepolitics Quote Tweet Matthew T McDonald, Writer at BLP @BLPMatthewMac · May 3 #BREAKING Sources have reached out to me and informed me that Maine Governor Janet Mills has been served papers. Lawsuits are coming. BIG LAWSUITS. #mepolitics 5:53 PM · May 3, 2020 This is such good news. Thanks for brightening my day, as usual, TNO! I hope to God that is true. Maine is being held hostage with 61 deaths of elderly people. Nothing in the local papers about Mills being served...would love more confirmation... |
Anonymous Coward User ID: 78854700 United Kingdom 05/05/2020 02:40 PM Report Abusive Post Report Copyright Violation | Does anyone by chance have any decent sauce on Ghidra? Been looking everywhere and can't seem to find anything more than the basics. Granted it's only been half a day since that drop but something tells me it's a HUGE deal. Quoting: Luminous Epinoia Ghidra was released by the NSA in 2019, you can download it for free, anti-hacking software tools, should be able to find a link on a search engine. |
Clair_Voyant
User ID: 61021459 United States 05/05/2020 02:42 PM Report Abusive Post Report Copyright Violation | Does anyone by chance have any decent sauce on Ghidra? Been looking everywhere and can't seem to find anything more than the basics. Granted it's only been half a day since that drop but something tells me it's a HUGE deal. Quoting: Luminous Epinoia Ghidra was released by the NSA in 2019, you can download it for free, anti-hacking software tools, should be able to find a link on a search engine. TNO posted this earlier: 2019 - Ghidra - An Open Source Reverse Engineering Tool Quoting: anonFree and Open Source Software Conference (FrOSCon) e.V. [link to www.youtube.com (secure)] How the NSA open-sourced all software in 2019 The NSA released a tool called Ghidra both for free usage as well as in source code format. It is a software reverse engineering framework with advance capabilities like a powerful decompiler. This lecture will give a short introduction into Ghidra and cover examples of both benign executables as well as malware with a focus on the Windows operating system. Reverse engineering - more specifically software reverse engineering - is the process of deconstructing computer programs with the purpose of understanding their feature set. This especially includes software that is not available as source code but only as binary executables. These files can be analyzed by executing them, which is often referred to as "dynamic analysis" or by translating them into another language, like assembly, which the reverse engineer then tries to reason about. The second approach is often referred to as "static analysis". While it is - in principle - possible for a human to fully understand and statically analyze a binary by reading raw assembly, this approach does not scale well: The x86 assembly language for example - which is used in most desktop computers and servers - is made up of thousands of different instructions. Each of these instructions only performs a very small task, like adding two integers. One can imagine that a binary - even as mundane as a tool to list the current directory content - is made up of a large number of these instructions. In practice, the reverse engineering therefore heavily relies on tooling. The Vault 7 leak by WikiLeaks in 2017 suggested that the NSA owns or develops a reverse engineering tool called "Ghidra". Two years later, at the RSAConference in 2019, the NSA released the tool to the public, first as ready-to use software, then even all its source code. For the reverse engineering community, this is a huge thing: All tools available until that point in time where either very expensive or lack advanced capabilities. While this lecture will only cover executables for the Microsoft Windows operating system, Ghidra also supports a very wide variety of platforms reaching from ARM - used in many IoT devices - over DEX - for Android-based devices to more exotic architectures as PowerPC, MIPS or SPARC. This versatility is a huge pro for Ghidra when compared to its main competing software product like the Hex-Rays decompiler. A lot of people think, that reverse engineering is a dark art only a few selected individuals are chosen to be gifted in. I honestly think that it is just another skill and would even go as far as saying that maintaining a legacy software product without good documentation - which is a common scenario in the software development industry - is much harder than understanding how WannaCry worked. larsborn "Time hustles those who wait to die" "The eyes are useless when the mind is blind" GOD WINS! |
Anonymous Coward User ID: 78880623 United Kingdom 05/05/2020 02:43 PM Report Abusive Post Report Copyright Violation | Q !!Hs1Jq13jV6 Quoting: keybored [link to about.fb.com (secure)] "We removed 5 Pages, 20 Facebook accounts, and 6 Groups that originated in the US and focused domestically. Our investigation linked this activity to individuals associated with the QAnon network known to spread fringe conspiracy theories. We found this activity as part of our internal investigations into suspected coordinated inauthentic behavior ahead of the 2020 election in the US." Information Warfare. Q /qresearch/•Today at 19:11 This is excellent. I can smell the fear and panic, fakebook, twatter, pootube all in panic mode and damage control. There was a time when they would let literally anything ride as they thought they were in control. Hunters become the hunted. |
Anonymous Coward User ID: 78851247 United States 05/05/2020 02:45 PM Report Abusive Post Report Copyright Violation | Red Cross dirty money. Click the video then check out above and below the video as well. [link to mobile.twitter.com (secure)] |
Paranoid Chick
User ID: 65553286 United States 05/05/2020 02:46 PM Report Abusive Post Report Copyright Violation | Does anyone by chance have any decent sauce on Ghidra? Been looking everywhere and can't seem to find anything more than the basics. Granted it's only been half a day since that drop but something tells me it's a HUGE deal. Quoting: Luminous Epinoia Ghidra was released by the NSA in 2019, you can download it for free, anti-hacking software tools, should be able to find a link on a search engine. TNO posted this earlier: 2019 - Ghidra - An Open Source Reverse Engineering Tool Quoting: anonFree and Open Source Software Conference (FrOSCon) e.V. [link to www.youtube.com (secure)] How the NSA open-sourced all software in 2019 The NSA released a tool called Ghidra both for free usage as well as in source code format. It is a software reverse engineering framework with advance capabilities like a powerful decompiler. This lecture will give a short introduction into Ghidra and cover examples of both benign executables as well as malware with a focus on the Windows operating system. Reverse engineering - more specifically software reverse engineering - is the process of deconstructing computer programs with the purpose of understanding their feature set. This especially includes software that is not available as source code but only as binary executables. These files can be analyzed by executing them, which is often referred to as "dynamic analysis" or by translating them into another language, like assembly, which the reverse engineer then tries to reason about. The second approach is often referred to as "static analysis". While it is - in principle - possible for a human to fully understand and statically analyze a binary by reading raw assembly, this approach does not scale well: The x86 assembly language for example - which is used in most desktop computers and servers - is made up of thousands of different instructions. Each of these instructions only performs a very small task, like adding two integers. One can imagine that a binary - even as mundane as a tool to list the current directory content - is made up of a large number of these instructions. In practice, the reverse engineering therefore heavily relies on tooling. The Vault 7 leak by WikiLeaks in 2017 suggested that the NSA owns or develops a reverse engineering tool called "Ghidra". Two years later, at the RSAConference in 2019, the NSA released the tool to the public, first as ready-to use software, then even all its source code. For the reverse engineering community, this is a huge thing: All tools available until that point in time where either very expensive or lack advanced capabilities. While this lecture will only cover executables for the Microsoft Windows operating system, Ghidra also supports a very wide variety of platforms reaching from ARM - used in many IoT devices - over DEX - for Android-based devices to more exotic architectures as PowerPC, MIPS or SPARC. This versatility is a huge pro for Ghidra when compared to its main competing software product like the Hex-Rays decompiler. A lot of people think, that reverse engineering is a dark art only a few selected individuals are chosen to be gifted in. I honestly think that it is just another skill and would even go as far as saying that maintaining a legacy software product without good documentation - which is a common scenario in the software development industry - is much harder than understanding how WannaCry worked. larsborn I have no idea how to do any of this, but I certainly hope anons are using this tool RIGHT NOW, as it seems relevant with all of the recent Gates chatter in the news... |
Anonymous Coward User ID: 78851247 United States 05/05/2020 02:47 PM Report Abusive Post Report Copyright Violation | Does anyone by chance have any decent sauce on Ghidra? Been looking everywhere and can't seem to find anything more than the basics. Granted it's only been half a day since that drop but something tells me it's a HUGE deal. Quoting: Luminous Epinoia Ghidra was released by the NSA in 2019, you can download it for free, anti-hacking software tools, should be able to find a link on a search engine. TNO posted this earlier: 2019 - Ghidra - An Open Source Reverse Engineering Tool Quoting: anonFree and Open Source Software Conference (FrOSCon) e.V. [link to www.youtube.com (secure)] How the NSA open-sourced all software in 2019 The NSA released a tool called Ghidra both for free usage as well as in source code format. It is a software reverse engineering framework with advance capabilities like a powerful decompiler. This lecture will give a short introduction into Ghidra and cover examples of both benign executables as well as malware with a focus on the Windows operating system. Reverse engineering - more specifically software reverse engineering - is the process of deconstructing computer programs with the purpose of understanding their feature set. This especially includes software that is not available as source code but only as binary executables. These files can be analyzed by executing them, which is often referred to as "dynamic analysis" or by translating them into another language, like assembly, which the reverse engineer then tries to reason about. The second approach is often referred to as "static analysis". While it is - in principle - possible for a human to fully understand and statically analyze a binary by reading raw assembly, this approach does not scale well: The x86 assembly language for example - which is used in most desktop computers and servers - is made up of thousands of different instructions. Each of these instructions only performs a very small task, like adding two integers. One can imagine that a binary - even as mundane as a tool to list the current directory content - is made up of a large number of these instructions. In practice, the reverse engineering therefore heavily relies on tooling. The Vault 7 leak by WikiLeaks in 2017 suggested that the NSA owns or develops a reverse engineering tool called "Ghidra". Two years later, at the RSAConference in 2019, the NSA released the tool to the public, first as ready-to use software, then even all its source code. For the reverse engineering community, this is a huge thing: All tools available until that point in time where either very expensive or lack advanced capabilities. While this lecture will only cover executables for the Microsoft Windows operating system, Ghidra also supports a very wide variety of platforms reaching from ARM - used in many IoT devices - over DEX - for Android-based devices to more exotic architectures as PowerPC, MIPS or SPARC. This versatility is a huge pro for Ghidra when compared to its main competing software product like the Hex-Rays decompiler. A lot of people think, that reverse engineering is a dark art only a few selected individuals are chosen to be gifted in. I honestly think that it is just another skill and would even go as far as saying that maintaining a legacy software product without good documentation - which is a common scenario in the software development industry - is much harder than understanding how WannaCry worked. larsborn Thank you, not sure how I missed this post! |
alwaysme
User ID: 78712694 United States 05/05/2020 02:51 PM Report Abusive Post Report Copyright Violation | 6576 pages of impeccably modded threads in total. Recall that, that is a lot of pages on GuLP. Let the Mod do her task, which is wearisome. Don't bicker with one another, it ends up seeming puerile. Although I do enjoy the quilting family feud myself. Lol... there are ground rules to have people that you might not like to read, barned. It's isn't rocket appliances. We are either in this together, WWG1WGA!, or there is 'no-thing'... Quoting: Lance Roseman From BC <snip> Haha, I enjoy it too! I love it, red devil & quilts! It helps me remember the neat relationship and good times I had with my brother... before he became a pompous drunk asshole! |
quilts
User ID: 78305667 United States 05/05/2020 02:59 PM Report Abusive Post Report Copyright Violation | 6576 pages of impeccably modded threads in total. Recall that, that is a lot of pages on GuLP. Let the Mod do her task, which is wearisome. Don't bicker with one another, it ends up seeming puerile. Although I do enjoy the quilting family feud myself. Lol... there are ground rules to have people that you might not like to read, barned. It's isn't rocket appliances. We are either in this together, WWG1WGA!, or there is 'no-thing'... Quoting: Lance Roseman From BC <snip> Haha, I enjoy it too! I love it, red devil & quilts! It helps me remember the neat relationship and good times I had with my brother... before he became a pompous drunk asshole! I'm glad we can entertain you. This isn't a feud - it is our usual banter. And BTW, it took me a long time to get him on here! |
Anonymous Coward User ID: 78854700 United Kingdom 05/05/2020 02:59 PM Report Abusive Post Report Copyright Violation | Red Cross dirty money. Click the video then check out above and below the video as well. Quoting: Luminous Epinoia [link to mobile.twitter.com (secure)] That was insane how they gave a billion dollars in cash, wouldn't surprise me if they gave the Iranians a really small amount of it and just pocketed the rest, rumours Hilary moved a billion dollars to Saudi or was that the Clinton foundation |
Anonymous Coward User ID: 78854700 United Kingdom 05/05/2020 03:01 PM Report Abusive Post Report Copyright Violation | Does anyone by chance have any decent sauce on Ghidra? Been looking everywhere and can't seem to find anything more than the basics. Granted it's only been half a day since that drop but something tells me it's a HUGE deal. Quoting: Luminous Epinoia Ghidra was released by the NSA in 2019, you can download it for free, anti-hacking software tools, should be able to find a link on a search engine. TNO posted this earlier: 2019 - Ghidra - An Open Source Reverse Engineering Tool Quoting: anonFree and Open Source Software Conference (FrOSCon) e.V. [link to www.youtube.com (secure)] How the NSA open-sourced all software in 2019 The NSA released a tool called Ghidra both for free usage as well as in source code format. It is a software reverse engineering framework with advance capabilities like a powerful decompiler. This lecture will give a short introduction into Ghidra and cover examples of both benign executables as well as malware with a focus on the Windows operating system. Reverse engineering - more specifically software reverse engineering - is the process of deconstructing computer programs with the purpose of understanding their feature set. This especially includes software that is not available as source code but only as binary executables. These files can be analyzed by executing them, which is often referred to as "dynamic analysis" or by translating them into another language, like assembly, which the reverse engineer then tries to reason about. The second approach is often referred to as "static analysis". While it is - in principle - possible for a human to fully understand and statically analyze a binary by reading raw assembly, this approach does not scale well: The x86 assembly language for example - which is used in most desktop computers and servers - is made up of thousands of different instructions. Each of these instructions only performs a very small task, like adding two integers. One can imagine that a binary - even as mundane as a tool to list the current directory content - is made up of a large number of these instructions. In practice, the reverse engineering therefore heavily relies on tooling. The Vault 7 leak by WikiLeaks in 2017 suggested that the NSA owns or develops a reverse engineering tool called "Ghidra". Two years later, at the RSAConference in 2019, the NSA released the tool to the public, first as ready-to use software, then even all its source code. For the reverse engineering community, this is a huge thing: All tools available until that point in time where either very expensive or lack advanced capabilities. While this lecture will only cover executables for the Microsoft Windows operating system, Ghidra also supports a very wide variety of platforms reaching from ARM - used in many IoT devices - over DEX - for Android-based devices to more exotic architectures as PowerPC, MIPS or SPARC. This versatility is a huge pro for Ghidra when compared to its main competing software product like the Hex-Rays decompiler. A lot of people think, that reverse engineering is a dark art only a few selected individuals are chosen to be gifted in. I honestly think that it is just another skill and would even go as far as saying that maintaining a legacy software product without good documentation - which is a common scenario in the software development industry - is much harder than understanding how WannaCry worked. larsborn Sorry! goldfish memory here, I'm reading in a ton of places, find it hard to remember what is where. |
_Trey_
User ID: 75651418 United States 05/05/2020 03:06 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 69642725 United States 05/05/2020 03:07 PM Report Abusive Post Report Copyright Violation | Or, Wray flipped and told them everything? Quoting: keybored Good afternoon to you. POTUS at the lincoln memorial town hall said stuff will be coming out, stuff will be released and you'll understand. Not exact wording but what we heard. If the judge doesn't exonerate flynn we'll know something is amiss. There was a guy on with I think Laura who basically said that the evidence doesn't matter because this is how the intelligence agencies have done things like forever and everyone is used to it so flynn is guilty and that's that. It's sort of the "what would a reasonable man do" idea used in insurance and the law. The lawyer opposite him made a very good case that this was complete bullchit but, it's what the left is handing their hat on. |
Anonymous Coward User ID: 78851247 United States 05/05/2020 03:10 PM Report Abusive Post Report Copyright Violation | |
bobobibi
User ID: 75310973 United States 05/05/2020 03:11 PM Report Abusive Post Report Copyright Violation | @QAnonNotables · 14m New York will work with the Bill & Melinda Gates Foundation to “reimagine” the state’s school system as part of broader reforms in the wake of the pandemic [link to twitter.com (secure)] link Zoinx |
Anonymous Coward User ID: 78851247 United States 05/05/2020 03:12 PM Report Abusive Post Report Copyright Violation | Red Cross dirty money. Click the video then check out above and below the video as well. Quoting: Luminous Epinoia [link to mobile.twitter.com (secure)] That was insane how they gave a billion dollars in cash, wouldn't surprise me if they gave the Iranians a really small amount of it and just pocketed the rest, rumours Hilary moved a billion dollars to Saudi or was that the Clinton foundation The Red Cross are some evil mf-ers who you know straight rob gullible people blindly and keep it in the pocket. I've just never seen the proof that obvious before. As far as HRC goes I'm pretty sure the Saudi move was through the CF but nothing surprises me anymore. |
Anonymous Coward User ID: 78851247 United States 05/05/2020 03:15 PM Report Abusive Post Report Copyright Violation | @QAnonNotables Quoting: bobobibi · 14m New York will work with the Bill & Melinda Gates Foundation to “reimagine” the state’s school system as part of broader reforms in the wake of the pandemic [link to twitter.com (secure)] link My goodness. Mass exodus of NY, IL, CA and OR now. Rotten to the core. |
Anonymous Coward User ID: 69642725 United States 05/05/2020 03:19 PM Report Abusive Post Report Copyright Violation | The sauce is the NSA. Q has dropped it before, when the NSA tweeted out a link to it. It is open-source. Help yourself to doing whatever non-Luddites - like myself - do with programming and software. Quoting: Paranoid Chick Our condolences PC. Always been praying for you and yours so added some extra prayers. |
Anonymous Coward User ID: 78317302 United States 05/05/2020 03:22 PM Report Abusive Post Report Copyright Violation | Ghidra was released by the NSA in 2019, you can download it for free, anti-hacking software tools, should be able to find a link on a search engine. Quoting: Anonymous Coward 78854700 The dems, via mccrystal, who bo fired, are using some computer program that we paid for, the American people, ostensibly to fight the q anon army. Are they able to do that because it is open source now? If so, Pascale should be using it against them. Heck, my friend was saying pascale needs to set up a site where folks can report particularly heinous lies being sold to the people so that folks know to go there and counteract the damage being done in real time. |
keybored
(OP) User ID: 77443882 Belgium 05/05/2020 03:25 PM Report Abusive Post Report Copyright Violation | Q !!Hs1Jq13jV6 [link to pubmed.ncbi.nlm.nih.gov (secure)] [link to www.thelancet.com (secure)] When the protein sequence of the SARS-CoV-2 receptor binding site was analyzed, an interesting result was found. While SARS-CoV-2 is overall more similar to bat coronaviruses, the receptor binding site was more similar to SARS-CoV. [link to www.cell.com (secure)] Both SARS-CoV-2 and SARS-CoV use the same host cell receptor. It also found that, for both viruses, the viral proteins used for host cell entry bind to the receptor with the same tightness (affinity). Knowledge is power. Q /qresearch/•Today at 21:24 |
Anonymous Coward User ID: 75577885 Netherlands 05/05/2020 03:25 PM Report Abusive Post Report Copyright Violation | Red Cross dirty money. Click the video then check out above and below the video as well. Quoting: Luminous Epinoia [link to mobile.twitter.com (secure)] [link to www.youtube.com (secure)] |