This is important.

This is important. I am hearing about more and more transcript leaks coming from Portals.  I am not the source of these leaks, whatever some might think.  However, I'm beginning to suspect that some work I did a couple years ago might have facilitated the exploit that's making these leaks possible.  

I fully support the person releasing this data -- especially now that Hank Johnson has been silent for a while and the 1959 Protocol have been implemented.  As for the efficacy of that, I don't know...  I'm on the fence.  What do you think?

Comments

  1. It is a sticky wicket. Do you think it is a backdoor or a completely embedded entity?

    ReplyDelete
  2. "Protocol 1959"? Don't make me laugh. It could be "Protocol 4000BC" based on cuneiform script and still it won't work.
    If more then one person knows a secret then it's not longer a secret.

    ReplyDelete
  3. Im only getting Ingress Obsessed and Ingress Report media from my hacks ... 3 in a row today, and the IO ones were old stuff o_O

    ReplyDelete
  4. What if the leaker is ADA? Does that mean you support her efforts to undermine herself?

    ReplyDelete
  5. We do have the 59 memo. Its imperfections are apparent but their exposure night not be to the same entities.

    ReplyDelete
  6. I think the leaker is playing both you and Hank, and he knows exactly where hank is. Wake up, leak the leaker.

    ReplyDelete
  7. The leaking exploit. Interesting. That implies to me it is an entity external to ADA gaining access to her through a backdoor you've implemented. Very interesting.

    ReplyDelete
  8. We have thought for awhile that she might as we have seen references to multiple ADA versions

    ReplyDelete
  9. And there was that pmnivore hack document a while back

    ReplyDelete
  10. Protocol 1959 and Faraday Cages? Will need good HUMINT operators enhanced with sensors to close in on surveillance target. Or Trojan the person creating that content, whatever he/she say/write will be automatically captured for transmission when the originator surface from shielded areas.

    ReplyDelete
  11. Derek Longbow​​ and CM granules. Since the #ShaperData transmission we can't trust Faradai Cages alone.

    ReplyDelete

Post a Comment

Popular posts from this blog