If this is true.. It will be the death blow. The house of cards must fall. I am skeptic as to wether it will be released in time to make a difference in the US elections,or if Barr will ever actually make a goddamn arrest but we shall see. MSM will silence and bury,social platforms will ban and delete anyone sharing info so if this drop does happen, keep your eyes peeled and checkc alternate platforms such as this one,do not let them keep their secrets buried. They tried it with hunter and failed, lets make sure if this is real,they fail again and achieve a streisand effect instead.

thumb_up10thumb_downchat_bubble14

More from Free_Range_Human

More posts coming soon. I have just learned that my two most beloved uncle and aunt both have cancer and have been so afraid that we only found out because my uncle is in ICU with a prosthetic throat/esophagus operated and part of his upper digestive tract removed. And my aunt did not sound hopeful about her cancer. In the meantime, my mother is dying. Not a sympathy post but this is why i am going to try at online business launch in 3 months because i have had to become a full time at home care giver.. from Commando/Jaeger , to private security, to home care provider. It's been a journey. In the meantime i had to delete over the last 2 years all of my social media profiles,apply and MUCH further my understanding of encryption,dual or triple VPN tunneling as i have had to defeat 11 and am still facing 2 more hate speech and inciting hatred charges for : being in favor of educated labour immigration, not the 90% adult violent male islamic immigration. Speaking out about gang violence. I had a stalker attempt to murder me (he is dead). Am not buckling under pressure, objective reality cannot be argued or altered by any force in the universe so one must instead learn and grow and move forward. I plan on doing more coverage regarding Online safety and security, encryption and easy ways a person with little or no skills beyond watching streaming services and tweeting can apply in order to make their computer essentially impossible to access. Teach methods i learned for memorizing long and complex passwords between 28-42 characters,symbols and numbers in length and how to use random iterations of said password to come up with up to 9 , entirely unique,random passwords based on no personal information. No words. No pin you use or used to use,no partial or full phone,address,zip code numbers or anything tied to you. An example of how i might write down a password on paper untill it sticks is. gki kgi ikg 76 84 89 - 4+4 Each letter represents 8-9 random letters that flow easily and in my head i attach a word to each so i can say it to myself like a sentence untill it sticks. Change the order of any of the three letters and you come up with 9 iterations,all hugely random and distinct. Then you add the numbers. In even more possible iterations. The numbers have no meaning to me or my life or any number i have ever had a connection to. 4+4 just means to use the number 4, 4 times. A basic easy to remember (work on memorizing it for a week to three weeks before using,then never leave it written down or anywhere else but inside your mind). so; gki 76 84 89 4+4 = Gdtnismh76Ktsdpguo84IluoSbicd89@4444 kgi 76 84 89 4+4 = @4444Ktsdpguo84Gdtnismh89Iluosbicd76 each letter is a word in my head and the three letters that build the password form nonsensical but easy to remember and organic sentences allowing me to easily memorize. You can to. Obviously use your own methods but use nothing that has or ever had a meaning or connection to yourself. I will be talking about Veracrypt and consider DoD level 2 encryption (can take 12 hours to 3 days for it to encrypt your main drive and boot partition). Entering Bios and enabling legacy mode and disabling UEFI and force decryption pre-boot , thus locking out anyone from ever accessing without the full computing power of the cloud and a million years. other measures should be taken too. I will talk about secure usb sticks with pin codes,which you can then create an encrypted file or even a partition and a hidden boot system. How to effectively use Tor, Tails, and how it works to Force Wifi to connect through VPN as your computer has booted, thus ensuring it does not first connect openly before re-routing to the VPN. How to force said VPN or use a VPN that provides multi-hop (it sends your new address encrypted,to one or two or three additional hops/servers re-encrypting and re-issuing new IPs) making back tracing all but impossible and how to even setup a Router with built in VPN to be your protection towards your service provider,especially when combined with Tor. I look forward to engaging more in the next 24 hours and starting to become more active here. I have to outline my texts and recommendations,collect all my links for guides by better proffessionals than I. Write alot. I am thankful to have recieved followers already and so many views. Rest assured,i will also meme and post comedy and partake in all forms of discussion. Be warned i have a dark sense of humour and consider nothing to be beyond the reach of a joke in good or poor taste. :) Be well,stay safe, mind your privacy and your OPsec. Especially if you are in any way controversial or going against the grain (the left agenda). Jon Kovach, Signing off for now.
1.26k views · Oct 26th, 2020

More from Free_Range_Human

More posts coming soon. I have just learned that my two most beloved uncle and aunt both have cancer and have been so afraid that we only found out because my uncle is in ICU with a prosthetic throat/esophagus operated and part of his upper digestive tract removed. And my aunt did not sound hopeful about her cancer. In the meantime, my mother is dying. Not a sympathy post but this is why i am going to try at online business launch in 3 months because i have had to become a full time at home care giver.. from Commando/Jaeger , to private security, to home care provider. It's been a journey. In the meantime i had to delete over the last 2 years all of my social media profiles,apply and MUCH further my understanding of encryption,dual or triple VPN tunneling as i have had to defeat 11 and am still facing 2 more hate speech and inciting hatred charges for : being in favor of educated labour immigration, not the 90% adult violent male islamic immigration. Speaking out about gang violence. I had a stalker attempt to murder me (he is dead). Am not buckling under pressure, objective reality cannot be argued or altered by any force in the universe so one must instead learn and grow and move forward. I plan on doing more coverage regarding Online safety and security, encryption and easy ways a person with little or no skills beyond watching streaming services and tweeting can apply in order to make their computer essentially impossible to access. Teach methods i learned for memorizing long and complex passwords between 28-42 characters,symbols and numbers in length and how to use random iterations of said password to come up with up to 9 , entirely unique,random passwords based on no personal information. No words. No pin you use or used to use,no partial or full phone,address,zip code numbers or anything tied to you. An example of how i might write down a password on paper untill it sticks is. gki kgi ikg 76 84 89 - 4+4 Each letter represents 8-9 random letters that flow easily and in my head i attach a word to each so i can say it to myself like a sentence untill it sticks. Change the order of any of the three letters and you come up with 9 iterations,all hugely random and distinct. Then you add the numbers. In even more possible iterations. The numbers have no meaning to me or my life or any number i have ever had a connection to. 4+4 just means to use the number 4, 4 times. A basic easy to remember (work on memorizing it for a week to three weeks before using,then never leave it written down or anywhere else but inside your mind). so; gki 76 84 89 4+4 = Gdtnismh76Ktsdpguo84IluoSbicd89@4444 kgi 76 84 89 4+4 = @4444Ktsdpguo84Gdtnismh89Iluosbicd76 each letter is a word in my head and the three letters that build the password form nonsensical but easy to remember and organic sentences allowing me to easily memorize. You can to. Obviously use your own methods but use nothing that has or ever had a meaning or connection to yourself. I will be talking about Veracrypt and consider DoD level 2 encryption (can take 12 hours to 3 days for it to encrypt your main drive and boot partition). Entering Bios and enabling legacy mode and disabling UEFI and force decryption pre-boot , thus locking out anyone from ever accessing without the full computing power of the cloud and a million years. other measures should be taken too. I will talk about secure usb sticks with pin codes,which you can then create an encrypted file or even a partition and a hidden boot system. How to effectively use Tor, Tails, and how it works to Force Wifi to connect through VPN as your computer has booted, thus ensuring it does not first connect openly before re-routing to the VPN. How to force said VPN or use a VPN that provides multi-hop (it sends your new address encrypted,to one or two or three additional hops/servers re-encrypting and re-issuing new IPs) making back tracing all but impossible and how to even setup a Router with built in VPN to be your protection towards your service provider,especially when combined with Tor. I look forward to engaging more in the next 24 hours and starting to become more active here. I have to outline my texts and recommendations,collect all my links for guides by better proffessionals than I. Write alot. I am thankful to have recieved followers already and so many views. Rest assured,i will also meme and post comedy and partake in all forms of discussion. Be warned i have a dark sense of humour and consider nothing to be beyond the reach of a joke in good or poor taste. :) Be well,stay safe, mind your privacy and your OPsec. Especially if you are in any way controversial or going against the grain (the left agenda). Jon Kovach, Signing off for now.
1.26k views · Oct 26th, 2020