[ / / / / / / / / / / / / / ] [ dir / animu / asmr / ausneets / cafechan / leftpol / qanon / strek / zenpol ]

/qresearch/ - Q Research Board

Research and discussion about Q's crumbs
Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


Pro Aris et Focis

File: 5c9835155c57276⋯.jpg (27.13 KB, 188x168, 47:42, michael-t-mckibben-wcmh-tv.jpg)

ce7763 No.514554

4 years of evidence collected and compiled against the deepstate by Michael McKibben. Who is Michael McKibben you may be asking? He is the man who invented the tech behind facebook and had his patents stolen by deepstate. As payback he and his army of patent lawyers have been spending the past 6 years compiling a comprehensive irrefutable compendium of documents to put most of the deepstate away for treason. I figured Q and the researchers might want to take a gander at this, I apologize if this is not the proper way to do this but I think you all will find it very interesting, it allows you to type in names and it lists their crimes with docs to back it up.

The compedium of documents:

https:// www.fbcoverup.com/docs/cyberhijack/cyber-hijack-findings.html

McKibbens website:

https:// aim4truth.org/

b9f393 No.514572

File: dfe2026dcdb501b⋯.jpg (6.24 KB, 255x143, 255:143, bc.jpg)

>>512731

Bob Cummings???


ab0a17 No.515217

>/CM

Attention codemonkey (board programmer)

>Check code line 1183.

There's a vulnerability in your source code on line 1183

>Embed added 7:03pm EST.

>Embed string active in SATRREC.

A malicious actor posted something to the board with an embedded cross site scripting attack targeting the vulnerability

>Warning alerts 5-12.

The hack was detected by our scanning tools and tripped alerts 5-12

>Brute force will be necessary.

>T-2 warning.

The embedded hack is not an immediate threat, it will take the malicious actor 2 days to do damage using brute force methods

>Q


77bec5 No.517817

… vulnerable https:// 8ch.net/main.js?

… hm so lets diff http:// web.archive.org/web/*/8ch.net


77bec5 No.519001

https:// 8ch.net/main.js

line: 1183

changed on: Feb 24 2018

effect: js debug output removed. hm

compare

http:// web.archive.org/web/20180224031403if_/https:// 8ch.net/main.js

http:// web.archive.org/web/20180224175159if_/https:// 8ch.net/main.js

coincidence or not.


d7c765 No.525656

https:// youtu.be/6Sl9ZF1wcX4




[Return][Go to top][Catalog][Nerve Center][Cancer][Post a Reply]
[]
[ / / / / / / / / / / / / / ] [ dir / animu / asmr / ausneets / cafechan / leftpol / qanon / strek / zenpol ]