This is important.
This is important. I am hearing about more and more transcript leaks coming from Portals. I am not the source of these leaks, whatever some might think. However, I'm beginning to suspect that some work I did a couple years ago might have facilitated the exploit that's making these leaks possible.
I fully support the person releasing this data -- especially now that Hank Johnson has been silent for a while and the 1959 Protocol have been implemented. As for the efficacy of that, I don't know... I'm on the fence. What do you think?
I fully support the person releasing this data -- especially now that Hank Johnson has been silent for a while and the 1959 Protocol have been implemented. As for the efficacy of that, I don't know... I'm on the fence. What do you think?
It is a sticky wicket. Do you think it is a backdoor or a completely embedded entity?
ReplyDelete"Protocol 1959"? Don't make me laugh. It could be "Protocol 4000BC" based on cuneiform script and still it won't work.
ReplyDeleteIf more then one person knows a secret then it's not longer a secret.
Im only getting Ingress Obsessed and Ingress Report media from my hacks ... 3 in a row today, and the IO ones were old stuff o_O
ReplyDeleteWhat if the leaker is ADA? Does that mean you support her efforts to undermine herself?
ReplyDeleteWe do have the 59 memo. Its imperfections are apparent but their exposure night not be to the same entities.
ReplyDeleteI think the leaker is playing both you and Hank, and he knows exactly where hank is. Wake up, leak the leaker.
ReplyDeleteThe leaking exploit. Interesting. That implies to me it is an entity external to ADA gaining access to her through a backdoor you've implemented. Very interesting.
ReplyDeleteWe have thought for awhile that she might as we have seen references to multiple ADA versions
ReplyDeleteAnd there was that pmnivore hack document a while back
ReplyDeleteProtocol 1959 and Faraday Cages? Will need good HUMINT operators enhanced with sensors to close in on surveillance target. Or Trojan the person creating that content, whatever he/she say/write will be automatically captured for transmission when the originator surface from shielded areas.
ReplyDeleteDerek Longbow and CM granules. Since the #ShaperData transmission we can't trust Faradai Cages alone.
ReplyDeleteI do like the slightly panicked ADA...
ReplyDelete