Anonymous – We Told You Something is Coming and Now It’s Here… (2017-2018)

22 Comments

  • Mr.BlackFox
    Posted November 26, 2017 7:50 pm 0Likes

    Why does no one listen!

    • Gypsy
      Posted May 21, 2018 2:56 am 0Likes

      Gave up social media as a new year resolution. Cutting back on internet use. Strictly for research and weather. Taking a huge step back to a time I was here for. When people actually had cellular uninterrupted conversations. Where reality was something you can touch, smell, taste, not the virtual world everyone seems to have moved to.

    • securax
      Posted November 24, 2018 7:30 am 0Likes

      Hello, are you in need of hacking services? Then contact , ([email protected]) or via text +1(424) 248-5351 ].
      whatsapp +1 (209) 278-0939
      If you need to
      *hack into email accounts,
      *all social media accounts,
      *school database to clear or change grades,
      *Retrieval of lost file/documents
      *DUIs
      *company records and systems,
      *bank accounts, 
      he is really the best. His services are affordable. Don’t waste your time with fake hackers
      + Credit cards hacker
      + he can drop money into bank accounts.
      + Blockchain and coinbase funding.
      + credit score hack
      + blank credit card sale
      + Hack and use Credit Card to shop online
      + Monitor any phone and email address
      + Tap into anybody’s call and monitor their
      conversation
      ([email protected]) or via text +1(424) 248-5351
      whatsapp +1 (209) 278-0939

  • MessengersMind
    Posted November 26, 2017 8:50 pm 0Likes

    God. Its November! freaking out

  • 13thSlave
    Posted November 27, 2017 12:35 am 0Likes

    Just been looking on Google earth, has anybody looked at the ice caps, I think there may be trouble a head?

    • Jackie
      Posted November 27, 2017 3:54 am 0Likes

      Do you have a link or website I can check out?

    • Hacker
      Posted November 29, 2017 4:02 am 0Likes

      Yeah they look pretty bad

  • Anonymous
    Posted November 27, 2017 2:40 am 0Likes

    Interesting video… makes me want to take down the internet to keep boundaries.

  • Fran
    Posted November 27, 2017 6:10 am 0Likes

    Who is the man making the speech about the 4th Industrial Revolution?

    • MrPuffyfluff
      Posted November 29, 2017 7:14 pm 0Likes

      I think it’s a pastor delivering a sermon. This is merely a portion of it.

  • nema
    Posted November 27, 2017 7:37 am 0Likes

    Mark of the beast: eyes everywhere buy only with its mark on the hand or front head

  • Nicholas Shields
    Posted November 27, 2017 9:56 am 0Likes

    Using email is one of my favorite ways of breaking into an organization!

    Usually, I will send out 10 emails to different employees. Out of those 10 people, 5 will click the link that I included. Of the 5 people, two or three will tell me their real work username and password. Pretty scary, isn’t it?

    Why are they so interested? Why would they give me their passwords? The email that I send does not look like a scam from a rich prince in an African nation. Instead, it looks like a professional email from a company conducting a survey on behalf of the employee’s organization.

    Who wouldn’t be interested in filling out a survey about Salary Satisfaction?

    Once they click on the link, they are taken to a login page. It is then than an average of 25% of the people emailed submit their passwords.

    This is where the fun begins!

    If the company is using Microsoft Exchange (email server), I can use their credentials to synchronize a copy of their email onto my computer.

    Once it is synchronized, I can create a client-side rule that runs a program every time a certain email is received.

    This rule will synchronize over Exchange across all the computers that use that persons account.

    Once they receive the special email, my program runs on the victim’s computer.

    Another option in which i can use to Hack a computer through email is to send a user a malicious Word document. However, that usually requires building up a context where it would make sense for that attachment to be opened.

    Recently, I received a very interesting attachment. It was an obvious attempt to break into my computer using a malicious Word document.

    It came at a time where I was needing a more effective payload to send to my potential victims.

    I was so grateful to the hacker for introducing me to a new technique that I replied with a thank you note.

    The Word document contained an embedded object that appeared to be a another document. But in reality, it was a VB Script that would launch a malicious payload. Fascinating!

    FOR URGENT PROFESSIONAL HACKING ADVICE & HACKING SERVICES, you can reach out to me via [email protected]
    Image may contain: text

  • Brady
    Posted November 27, 2017 5:10 pm 0Likes

    I want to bring YouTube down

  • Anonymous
    Posted November 27, 2017 5:14 pm 0Likes

    I want to kill trump

  • Pumpkin
    Posted November 27, 2017 9:43 pm 0Likes

    What’s the name of the man with the green background who is giving a speech throughout this video?

  • FELIX
    Posted November 29, 2017 1:19 am 0Likes

    People keep asking “can we?”. They don’t ask “should we?”. Human nature will come into play on a level too high for anyone to comprehend. The more we advance in technical fields, the less caution is taken into account with regards to whether it can be manipulated or not. Any decent hacker can come up with a device that allows them to hack into these chips embedded into people. Will just need to walk around the block, and there you have it, all those whom you have passed are now broke and their funds in that hackers account. I’ll exclude identity theft because people will just shoot me down for that. The term ” you watch too many movies” is a joke. Movies come from imagination, and more often than Not, these movies come to light in different form. AI will destroy humans, or use us as a resource due to our capabilities. Look at what humans do to animals. Why? Because we can

  • Christie
    Posted November 30, 2017 4:13 am 0Likes

    I want to help

  • Wells Invest
    Posted December 4, 2017 9:10 pm 0Likes

    we offer the best in Auto, RV, Visa Credit Card, Home Equity, Mortgage, Personal loans, Line-of-Credit loans & Business Loans.

    If in any way i could be of help to prior to your funding needs, do not hesitate to get in touch with me as soon as possible via: [email protected]

  • James
    Posted December 7, 2017 11:45 pm 0Likes

    Please delete this comment as soon as you read it. I’m the second coming. I have all the proof for you. Please reach out to me.

  • JSON formatter
    Posted December 23, 2017 8:10 am 0Likes

    freaking out

  • rahul
    Posted January 19, 2018 11:35 pm 0Likes

    Indian Business Man Ratan Tata. Who donates 66% of his profit every year that is why he is not in list of top rich persons. But still more than 600k people work under his Company. When other business tycoons understand it.

  • securax
    Posted November 24, 2018 7:30 am 0Likes

    Hello, are you in need of hacking services? Then contact , ([email protected]) or via text +1(424) 248-5351 ].
    whatsapp +1 (209) 278-0939
    If you need to
    *hack into email accounts,
    *all social media accounts,
    *school database to clear or change grades,
    *Retrieval of lost file/documents
    *DUIs
    *company records and systems,
    *bank accounts, 
    he is really the best. His services are affordable. Don’t waste your time with fake hackers
    + Credit cards hacker
    + he can drop money into bank accounts.
    + Blockchain and coinbase funding.
    + credit score hack
    + blank credit card sale
    + Hack and use Credit Card to shop online
    + Monitor any phone and email address
    + Tap into anybody’s call and monitor their
    conversation
    ([email protected]) or via text +1(424) 248-5351
    whatsapp +1 (209) 278-0939

Leave a comment