Search results
  1. Jan 4
    Replying to

    over at the cia they prefer star wars 🤓

  2. 28 Dec 2018

    Fab recap of the hoax behind with forensics to identify changes made to support false attribution for but trust the corp news who sold WMD lies because wouldn't use tools or deceive the public, right?

  3. Jan 1

    Dear every manufacturer: I avoid purchasing anything that is . So please stop including that ‘always listening’ wire tap of a feature. As someone experienced in tech myself, I simply don’t trust it.

  4. 12 Dec 2018

    Today, Dec 12 founder Julian Assange court hearing in Quito over his gagging and isolation after US government pressure following the release of Background - big picture: Background - this case:

  5. Jan 4

    NSA to publicly release reverse engineering / malware analysis tool in March 2019 after release by WikiLeaks in 2017 via CIA

  6. 28 Dec 2018

    For those who aren’t “tech savvy ”, Ray McGovern really clarifies significance of which shows how the US can make it look like Russia hacked the dnc emails.

  7. Jan 1
  8. 11 Dec 2018
    Replying to and

    The FBI has said as much. They set a perjury trap, which is far too easy to do. Ever heard of ? If the alphabet agencies want you, they can make up a crime & even create forensic-proof evidence if needed. I would like to see them investigate CRIMES vs. PEOPLE for a change!

  9. Jan 1

    5/5 What could the Leaks have to do with this important in the Capitalist Countries and the States Colonially Subjugated to Imperialism?! HINT: has something to do with giving credit where credit isn't due!

    Show this thread
  10. Jan 2
    Replying to

    I always cover web cams when not in use...the camera's on Smart TV's are particularly vulnerable to attack 😲

  11. Jan 4
    Replying to

    By contrast, to never ever mention again the teaser for Part B, Media Ops from 2 years ago. Like it never happened. Or like it was just a lame stunt.

  12. 30 Dec 2018

    -published leaks in also showed that the US fakes/forges its attacks, obfuscating to make it seem as though it's attacks come from Persians, Koreans, Russians etc.

  13. 16 Dec 2018
    Replying to

    Lmaooo I’m more worried about the CIA malware that’s unscrubbable from your firmware. As long as people aren’t leveraging zero-days (different based on OS) and you’re encrypting your comms, there’s only so much more one should be reasonably expected to watch out for.

  14. Replying to and

    Does anybody still believe in Russian hacks? For 2 years all the US intel agencies have been trying to prove the Russians hacked the DNC - and have come up empty-handed. Not a scrap of evidence. Though plenty of evidence ( etc) that CIA can do it and pretend to be Russian.

  15. 28 Dec 2018
    Replying to

    shows how Apple products are infected with Trojan viruses from the CIA . for more detail

  16. The mob, I mean and are liars. They are the true hostile intelligence agency and the truth hurts their sinister agenda.

  17. 21 Dec 2018
    Replying to

    What, may I ask Sajid, did Mr. Assange so wrong exactly? Are you for or against corruption being exposed? Would you rather NOT know about the CIA’s hacking tools and their backdoor into every single electronic? I think the public has every right to know.

  18. 19 Dec 2018
    Replying to

    Or it’s the C 👁 A’s own hacking tools that they let loose on the world. No one talks about

  19. 25 Dec 2018
  20. 4 Dec 2018

    We’ve seen with , , , and the OPM breach, that government can’t keep its secrets, well, secret. What happens when you force Apple to create a crypto backdoor, and then China or Russia steal the key? Would the govt inform Apple if that happened? Now what?

    Show this thread

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.