Penetration Testing & Auditing
It's something such as the Man in the middle attack but doesn't concerns the original networked concept. The scenario is something like, a server lying around in the room but that's not the only server we're dealing with. Because according to my calculations on my neighbors house, there are/were atleast 28 different dimensions containing the same person. Now if ever the real person shows up in the camera if installed is highly unlikely. It could be possible that one person does something but the other clones wouldn't and in the morning the culprit could register the case and it'll become like that in all the dimensions.
Similarly we have the TV and Telcom networks lying around everywhere. We can trust the networked owner for being legitimate but it's all going the other way round, seems it doesn't matter, legit or not.
So, one simple solution would be to takeout those dimensions containing the culprits, and the set-up would obviously leave. Or we can install our own personnel dealing with them but that would be time staking and they wouldn't know how to handle except for the mouth service.
Let Trump build the Wall and we gonna' see how the Americans deal with that. Eventually cleaning up the mess and owning the telecasts would had to stop one way or the other.
Foedus Operandi
Keeping in mind the more than 28 pages with the golden book & it's pages or dimensions in mind. The second thing is:
It needs to be hit at 4 points. IN, PK here IN, PK there. IN, PK original site IN, PK original site. Otherwise impossible to get them. Even if one bullet is fired it needs to be fired at 4 locations at one time. Tried & Tested.
Comments