I have experienced a series of technological attacks that started within minutes of the following exchange. First, let me say that, depsite claims to the contrary, I have not threatened to dox anyone. I have a huge databse of publicly available information that helps me do research into high level corruption and to make money. I have already started working with ISP's to get the to bottom of this, with the help of people close to me, who do not believe in Pizzagate, at all.

I am also not a LARP. I have, in my 3 years of posting, never attempted to deceive anyone into anything, purposely leaving a massive trail of research so that anyone may double check my facts. This is true for all of my social media and I challenge anyone to check.

The additional accusation is that I am trying to get someone banned or get rules in /v/Pizzagate changed. I am not. In three years, I have never complained about my posts getting deleted off of pizzagate. I simply don't care. But, I am always looking for people to file whistleblower forms on, where you get 10% of the return from the IRS. So, let's look at what happened and see if we can start to figure out who did the hacking.

https://voat.co/v/pizzagate/3122773/17683806

Vindicator claimed my text post violated this rule:

If majority of the links you submit are to sites you are associated with, your domains may be globally banned from Voat. To be on the safe side, if you submit 10 links to various subverses on Voat, at most 5 of the 10 submitted links may be to the sites you are associated with.

/v/Pizzagate DOES NOT ALLOW LINK POSTS. If the thousands of posts I made, this is one of less than a dozen that includes links to my site, but also provides an imaged alternative if you wanted to stay within Voat. Originally, I even provided the links to the chans, where my site is not mentioned, but presents the same exact material, images and words. I am not "whoring" my site out. I am ambivalent about the number of visitors.

I submitted a text post.

Vindicator additionally said my post was/included:

Useless self-aggrandizement. massive, baffle-with-bullshit posts.

Vindicator said this within minutes of the first attack ever on my site. Generally, it is completely ignored and has had maybe a couple of hundred visitors. I don't show up in Google for most people. My domain is autobanned on reddit. Previously, the same exact material was presented in a different way and was marked "share this."

Vindicator, then attempts to bad jacket me with David Brock; whom I have reported extensively on in a negative light because his behavior is negative and illegal.

We've been spammed with similar long, link-riddled posts from the earliest days of the sub compliments of David Brock, designed to lead researchers down dead end rabbit holes.

I can tell some of you, based on your posting history, who comes to my site and all the referrals are from Voat.

This is how few suspects there are:

https://i.imgur.com/N3rto6v.png

My site has barely any traffic. The last day is 33% of my hits from all time from the one post.

The attacks include a standard list of drop table injections and other injections, as well as bash attacks, wordpress attacks... basically everything someone can throw at it, followed by a DDOS:

ModSecurity. Pattern match "^Mozilla/5.0 \\(Windows NT 6.1; WOW64; rv:40.0\\) Gecko/20100101 Firefox/40.1$" at REQUEST_HEADERS:User-Agent. [] [] [] [msg "Malicious Bot UA"] [hostname "webofslime.com"] [uri "/wp-login.php"] [unique_id "XJtkc2vY4UbR9srnW4ECGAAAAAo"]

ModSecurity. Pattern match "^Mozilla/5.0 \\(Windows NT 6.1; WOW64; rv:40.0\\) Gecko/20100101 Firefox/40.1$" at REQUEST_HEADERS:User-Agent. [] [] [] [msg "Malicious Bot UA"] [hostname "webofslime.com"] [uri "/wp-login.php"] [unique_id "XJtuQzKiaWNVJSoqTyWAlQAAAAQ"]

The logs are massive, but you can see that on some of the basic attacks, we are given a great deal of information about the source of the attack; the device, the operating system, etc.

So, if a person who visited my site from /v/pizzagate has the same OS, Device, etc, also has the same listed in the credentials of the first attacks, we can further narrow down the list of likely suspects. It appears started with their basic probes on their home PC, then switched to remote attacks when they turned up nothing.

Personally, I don't make any attempt to track. This is Google doing this to you. I could implement a much more detailed tracking of visitors, if I wanted to, but I really don't want to do that to people. Whoever scanned my site probably noticed that I don't really have any kind of back end and likely thought that my knowledge was limited, rather than just trying to keep it simple and safe.

My next step is to confirm any location data I can find from people who came to my site. That merely means running all of your usernames through my database which is huge. (Interesting that some usernames coincide with usernames on "Zambian Meat," an online cannibal hangout. Antithetical to "the cause," one might say.) Everyone's data is available publicly. I downloaded all publicly available information not limited to these hacks, but includes them. I am a collector of these collections and the tools used to acquire them.

https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/

That is Collection #1. Everyone you and I know are in it.

I have all of the Collections.

https://www.intego.com/mac-security-blog/collection-1-and-2-5-are-the-latest-massive-password-dumps/

Plus, I have the dot govs hack:

https://www.nextgov.com/analytics-data/2015/12/why-federal-government-tracks-who-visits-dot-gov-sites/124428/

Plus, I automatically database (without my intervention) thousands of articles. It comes out like this:

https://i.imgur.com/qb83yX0.png

Plus, if I visit a page, it all gets scraped and added to a database.

Then, I can run a query on terabytes of information for your usernames which can reveal passwords and ALL KINDS OF STUFF. Birthdays, Locations, etc.

I am not even that good at it. I'm not even a programmer. I'm just a hard-headed problem solver. Imagine what the people at the NSA can do. One lesson is that none of your online data is safe.

So, right now, I am comparing evidence and I will get help analyzing it to present results, so I don't talk out of my ass. I have already started working with the IPs.

However, you can all understand that I am looking hard at literally the only person who was giving me hard time in that moment, who might be at a similar location (IPs only go to the ISP, generally) with a similar browser, OS, etc.

Does that make sense? I've literally been telling everyone this is how I operate since day 1. I've offered to share my database. I've offered to help others start databases or feeds. Not a single person has been interested in using this information to help expose corruption. So, I carry on as one person. I am not affiliated to anyone. I am not claiming to be an insider. I have repeatedly stated this and proved this. My three years of posting speaks for itself.

Vindicator responded to this post by calling me a LARP.

I think it is also interesting to note that the attacks stopped as soon as I made the accusation.