841
Comments (35)
sorted by:
45
The_Bugout_Bag 45 points ago +45 / -0

Sounds interesting. Would read but its vice. No clicks or views for u

44
TruthyBrat 44 points ago +44 / -0

Yeah, fuck those guys. They just got caught photoshopping pics of about to die victims of the Khmer Rouge Cambodian genocide, to make them look happy.

https://patriots.win/p/12i4MiJqWx/getting-murdered-by-commies-its-/c/

16
The_Bugout_Bag 16 points ago +16 / -0

At first I thought you were talking about the FBI. Then i remembered seeing that. Its crazy, to me about these traitors. I knew of fake news back in the days of newspapers. I always hated seeing the ... inserted within quotes. I would be like. Nobody says dot dot dot. WTF. But to go as far enough as they have these days. Needs to be put to a stop.

2
TruthyBrat 2 points ago +2 / -0

Fuck them too. A totally compromised deep state operation.

2
Uzaka123 2 points ago +3 / -1

The ... Is how you write in a pause.

6
WhyIsThisSOHard 6 points ago +6 / -0

It's also how you cut out important details. "There were good people on both sides...of the argument." Here the ... became fuel to compare Trump to Hitler and his supporters to Nazis.

4
Uzaka123 4 points ago +4 / -0

You're entirely not wrong. Obama allowing propaganda to be used against the American people legally is the biggest fucking sin ever committed by an American politician.

2
The_Bugout_Bag 2 points ago +2 / -0

LoL. What!!?? No its not. Its how they use to interject "their" truth.

Uzaka123 said "he likes...guys with big muscles"

In reality it was Uzaka123 said "he likes cute girls and works out because they like guys with big muscles"

Yes I assumed your gender. Deal with it ; )

1
Uzaka123 1 point ago +1 / -0

Yes, it is also used that way, but it is also used to insert a pause when quoting someone.

8
RivalPipe 8 points ago +8 / -0

To me, it sounds like a legal defense for the Deep State.

“Your honor, this could have been placed on my client’s laptop by a hacker or Trump-supporting FBI agent!”

39
8
Amplitude 8 points ago +8 / -0

Thank you!!!

17
datahog1776 17 points ago +17 / -0

Umm, isn't this "unauthorized use of a computer system"? AKA illegal? Christ.

12
walt 12 points ago +12 / -0

For you, yes.

2
_Eric_Ciaramella_ 2 points ago +2 / -0

Rigging an election is also illegal but here we are

14
Wolverine 14 points ago +14 / -0

Every pede should be looking to migrate to Linux.

If I can get my 85 year old grandfather to switch then so can you.

4
Brulz_Lulz 4 points ago +4 / -0

Thank you for the motivation fellow. My Gam Gam is going to be so happy with her new OS.

1
Wolverine 1 point ago +1 / -0

PopOS made by System76 is a really great version for old timers.

2
th3colon3l 2 points ago +2 / -0

TempleOS ftw

2
kornesque 2 points ago +2 / -0

I've heard Linux has succumbed to the cuck, something about systemd being pozzed like Windows. Anyone have any insights into this?

2
Wolverine 2 points ago +2 / -0

Sorry, could someone translate this for me?

I don't believe most distros conduct any telemetry in the background.

1
kornesque 1 point ago +1 / -0

This is where I'd like someone trustworthy to discuss, I'm not knowledgable enough about the guts but I think the gist is certain low level components have been essentially made vulnerable due to an ideological shift within the dev team. Which is funny because one of the ideas of big-Linux is that there is no dev team, but there is.

2
Wolverine 2 points ago +2 / -0

I would need to see more evidence of that, Linus Torvalds is fairly based no-nonsense developer and I don't believe the core kernel has been compromised in a manner your alleging.

However different distros have different teams working with them, but I haven't seen any evidence of your claims in Debian or Arch.

7
VinCarver 7 points ago +7 / -0

More like removing planting evidence for when they “discover” a white supremacy plot and round up a bunch of conservatives to initiate their great purge

4
seektruth2021 4 points ago +4 / -0

Get off microsoft and move to Linux.

2
th3colon3l 2 points ago +2 / -0

Move to TempleOS

3
rowdyamerican 3 points ago +3 / -0

“secure your router” lol

I’d bet every dollar I have that they possess, utilize and likely had a hand in ensuring zero day exploits were embedded in hardware like this

3
ChyNahAzzWhole 3 points ago +3 / -0

Mr. Political Prisoner.. Was your computer under you control 100% of the time since you purchased it? PP: No How do you know that? The US Courts gave the FBI authorization to ACCESS.

2
Skills 2 points ago +2 / -0

They've been doing this forever. Remember when all those Tor users got busted for cp? They bought a browser javascript 0-day, confiscated the servers hosting the hidden services, and hosted three huge cp websites for six months. Everyone who visited those sites with javascript on (which is the default setting) had a Trojan/RAT installed on their computer, courtesy of the FBI.

I think those people are sick and deserve prison time but they always use the most egregious crimes to justify what would otherwise be highly illegal and inexplicably invasive methods, which will ultimately become SOP for everything from minor offenses to thought crimes.

P.S. Most of the people made plea bargains but a few didn't, they lawyered up and fought it and were ultimately acquitted because, suprisingly (/s) they didn't secure even a single warrant throughout the entire operation.

1
GODwins76 1 point ago +1 / -0

That's fine, they fucked up everything else, they will fuck up again this time.

1
Based_in_Space 1 point ago +1 / -0

Trying to learn more about stuff like this. Is there a way to log changes to your system not authorized by you? Like use a token that authorizes changes and if token is not present it is presumed that change was made by someone else?

1
kornesque 1 point ago +1 / -0

Linus has opposed it and if I recall correctly Debian was one of the first to embrace it. I dunno, I don't trust what comes up in searches, I'd need to do digging. To be fair I'm not really knowledgeable in the matter, just have come across info here and there.

1
Striganos 1 point ago +1 / -0

Would a vpn help protect from this?

2
CantStumpTheTrump 2 points ago +2 / -0

No, and this has nothing to do with you; you don't run a compromised exchange server do you?

0
catsfive 0 points ago +1 / -1

Secure your router

#LOL