U.S. Riots of May 2020 over George Floyd and others - ITT: a bunch of faggots butthurt about worthless internet stickers

Status
Not open for further replies.
>defund the police
>gets slightly inconvenienced
>HELP, POLICE!

Change her name from Jo to Karen.

It bugs me how people running the show are privileged to live life not under policies THEY run.
All politicians are NIMBYs. Pretty much every politician that's a "champion of diversity" lives in a neighbourhood that's almost entirely White, East Asian or Jewish.
 
Last edited:
The indy10people twitter, BLM INDY is kind of a crapshoot for information. I think they figured out that they were being watched.

Saw this

and


I like this one

As for "lifting up" the family of Dreasjon Reed, maybe they shouldn't have raised him to be a criminal. Just a thought.
There's a GoFundMe for Sean Reed. 33K of 500K raised already. Fuck.
 
Honestly, the fact that these dumb niggas getting the retarded to donate to them (which they will blow on drugs and new kicks ASAP) is a good thing.

The economy wins, nothing changes and both faggots lose. Its a beautiful cycle.

I mean, yeah, the money could be used for a real charity, but luxury good vendors and car salesmen need to eat too.
 
What am I missing here? Someone was able to identify these people by accessing the free wi fi? They used their phone and not a Laptop?
They ran a hotspot, a bunch of tards connected to it and did a bunch of incriminating stuff in cleartext, because their security practices are either non-existent, or laughable to the point cargo-cultishness.
 
Maybe I've missed something but question on the wardriving thing:

They drove around with an open AP yes? And ios+android connect to an open one by default? (mine of both oses dont but I think I'm the one who shut that off)

So how did they get names from that? How did they get more than a wifi mac address and knowledge that phones with particular macs connect to particular facebook/google/reddit/netflix whatever services? Some specific app's traffic (that all the commies had) that's unencrypted and a real name is part of that traffic?


edit to add: Android, starting at version ___ will by default use a fake randomized mac address every time it connects to an ap other than the ap that was used during initial setup. If one connects to the same non-setup ap 100x it will use 100 fake macs one for each connect. Since they're getting real names somehow I doubt mac addresses play into this at all but in my little babby infosec knowledge, mac addresses real or fake as well as servers a person's phone connects to are the only pieces of info *I* with my knowledge today could gain from driving around with an open ap. (unless of course unencrypted traffic from popular-app x,y and z is a normal thing in 2020)
There is also a thing called "Device name", depending on the network it will also take that info, most people (and cell carriers if bought online/over the phone a la Comcast's cellphone service) name their iphones/phones <Owner's name> <Device>.
E.g. "Mc1FootPinus iPhone"
 
There is also a thing called "Device name", depending on the network it will also take that info, most people (and cell carriers if bought online/over the phone a la Comcast's cellphone service) name their iphones/phones <Owner's name> <Device>.
E.g. "Mc1FootPinus iPhone"

Ah I didnt think of that, ios by default gives it first name's-iphone but that is only a first name and at least all the nexus and pixel phones I've had only used "pixel 2xl" or "nexus 6" as the name unless you change it yourself. I think everyone uses samsungs now for android and I don't know how they do it.
 
  • Thunk-Provoking
Reactions: spiritofamermaid
Status
Not open for further replies.
Back