• Xenforo is upgrading us to version 2.3.7 on Tuesday Aug 19, 2025 at 01:00 AM BST (date has been pushed). This upgrade includes several security fixes among other improvements. Expect a temporary downtime during this process. More info here

Law Trump says the Epstein list is a conspiracy created by Obama and Clinton

Do you believe Trump is in the Epstein List?

  • Yes, absolutely.

    Votes: 220 55.6%
  • Yes, probably.

    Votes: 113 28.5%
  • No, he's not on the list.

    Votes: 28 7.1%
  • No, there is no list. So of course he's not on it.

    Votes: 18 4.5%
  • I'm on the fence.

    Votes: 17 4.3%

  • Total voters
    396
The dems attach it to stupid bills, why not do a singular bill ?
4 days ago, MTG said the GOP vote it down only because of a procedural issue. She was on Benny Johnson's podcast, you can see it for yourself, but doubt you will because that would cause you to question your team. The GOP controls the House, so they have now had 4 days to bring it to vote, guess what no vote. If it was a tax cut for billionaires, the GOP would have brought it to vote yesterday. Maybe some in the GOP are worried those same billionaires they constantly give tax cuts to; some might be on that list and the GOP don't want to expose their bosses or stop that money train from rich dudes who like really young girls.
 
My best self is no where near this place lol , I've always taken long brakes and I will again .

Sorry but you can't prove it beyond a reasonable doubt , even if you followed all the data to its source and that was let's say Iran or Belarus or Ukraine you couldn't prove definitively there wasn't Russian money or influence somewhere along the way and let's be honest, theres a good chance there was .

Russia is trying to fuck with most western countries, it makes sense from their standpoint, great bang for the buck .
Right on man I get that and of course Russia hacks USA all day every day. Ill give you one sample to read through if you wanna take the time.

A Russian IP was used , which is literally my point of anyone that "hacks" won't use their own geo IP.


https://www.wordfence.com/blog/2016/12/russia-malware-ip-hack/


https://nypost.com/2017/08/15/new-report-claims-dnc-hack-was-an-inside-job-not-russia/


The United States government earlier this year officially accused Russia of interfering with the US elections. Earlier this year on October 7th, the Department of Homeland Security and the Office of the Director of National Intelligence released a joint statement that began:

The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts.

Yesterday the Obama administration announced that they would expel 35 Russian diplomats and close two Russian facilities in the United States, among other measures, as punishment for interfering with the US 2016 election.

In addition, yesterday the Department of Homeland Security (DHS) and the Office of the Director of National Intelligence (DNI) released a Joint Analysis Report, or JAR, compiled by the DHS and FBI, which they say attributes the election security compromises to Russian intelligence operatives that they have codenamed ‘GRIZZLY STEPPE‘.

The report that DHS and DNI released includes in its first paragraph: “This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The report contains specific indicators of compromise, including IP addresses and a PHP malware sample.

At Wordfence our focus is WordPress security. Our security analysts spend a lot of time analyzing PHP malware, because WordPress is powered by PHP.

As an interesting side-project, we performed analysis on the PHP malware sample and the IP addresses that the US government has provided as “…technical details regarding the tools and infrastructure used by Russian civilian and military intelligence services (RIS)”. [Source]

We used the PHP malware indicator of compromise (IOC) that DHS provided to analyze the attack data that we aggregate to try to find the full malware sample. We discovered that attackers use it to try to infect WordPress websites. We found it in the attacks that we block. Here it is.

PAS 3.1.0


The above is the header and here is the footer. The middle contains an encrypted block of text.

PAS 3.1.0 footer


This is PHP malware that is uploaded to a server. An attacker then accesses the file in a browser and enters a password. The password also acts as a decryption key and decrypts the encrypted block of text which then executes. Once an attacker enters their password, it is stored in a cookie and they don’t need to enter the password again to access the malicious application.

We managed to capture a request from an attacker that contained their password. It was ‘avto’ without quotes. We used the password to decrypt the block of encrypted text.

This is what the decrypted PHP looks like. It is a big chunk of PHP code that is a web shell.

PAS 3.1.0 decrypted

We installed the web shell on a sandboxed environment. This is what it looks like:

PAS Web Shell

This is the kind of web shell that we see all the time in our day-to-day forensic operations. It includes the following basic features:

  • File browser/explorer
  • File search function
  • A database client to download the contents of a hacked site database
  • Network tools including a port scanner and the ability to bind a service to a port
  • A tool to brute force attack passwords on FTP and POP3 services.
  • A command line client to run arbitrary operating system commands
  • A utility to view server configuration info
By viewing the source code, we could find the name of the malware and the version. It is P.A.S. 3.1.0.

We googled it and found a website that makes this malware. You can find the site at this address: http://profexer.name/pas/download.php

PAS Website


You can enter a password that you will use to access your malware once it’s installed and then hit ‘download’ and a ZIP file downloads.

The ZIP contains a text file and the malware. The text file looks like this:

PAS malware text file


The website claims the malware is made in Ukraine and the date at the bottom has the Ukraine country code UA.

This malware is version 3.1.7 which is newer than the malware that the DHS indicator of compromise identifies. It is almost identical including it’s indentation:

PAS 3.1.7 malware header


And the footer:

PAS 3.1.7 malware footer


But PAS has evolved even further since 3.1.7. It is now version 4.1.1 which you can get from the same website:

PAS 4 Download


The 4.1.1b info.txt file:

PAS 4 info.txt


And the code has changed in 4.1.1 quite substantially. This is the header:

PAS4 header


The PAS malware is user friendly. It has an About page:

PAS About malware


They also have a helpful FAQ:

PAS malware FAQ




How does PAS infect WordPress websites?​

This is a typical infection attempt for PAS 3.1.0 which is the DHS sample:

PAS 3.1.0 malware infection attempt


The above request is an attempt to install a plugin in the WordPress CMS through the normal file upload method. What surprised us is that this request had a full set of cookies that indicates that the user or bot doing this was signed in and this probably was an actual web browser.

It also includes the WordPress nonce which is a security feature, also indicating this is a user. Only about 25% of the attacks that we see include the WordPress nonce, which suggests that many of these attempts fail.

The vast majority of attacks we see that try to infect with PAS 3.1.0 use this kind of request. Here are a few theories:

  • WordPress website owners have malware installed on their workstations and that malware attempts to install PAS 3.1.0 on their WordPress websites.
  • This is CSRF, or cross site request forgery attack, that installs the malware. This is unlikely because the nonce is present in many requests. A nonce is a security feature that prevents CSRF attacks.
  • Users are voluntarily installing this on their own websites after downloading it from a malicious website thinking it is safe. Unlikely because the file that is uploaded is plain text PHP and it is clearly suspicious if you examine the file contents.
  • Attackers are compromising websites through some other means and then using the compromised credentials to manually sign in and install PAS 3.1.0 with a standard browser. These sign-ins could be partially or fully automated.

Malware Conclusions​

DHS and DNI have released a joint statement that says:

This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The report contains specific indicators of compromise, including IP addresses and a PHP malware sample.

The PHP malware sample they have provided appears to be P.A.S. version 3.1.0 which is commonly available and the website that claims to have authored it says they are Ukrainian. It is also several versions behind the most current version of P.A.S which is 4.1.1b. One might reasonably expect Russian intelligence operatives to develop their own tools or at least use current malicious tools from outside sources.


As you can see they are globally distributed with most of them in the USA.

Lets look at who the top ISP’s are who own the IP addresses:

Hosting companies that own malicious IPs


There are several hosting companies in the mix including OVH SAS, Digital Ocean, Linode and Hetzner. These are hosting companies that provide low cost hosting to WordPress customers and customers who use other PHP applications. A common pattern that we see in the industry is that accounts at these hosts are compromised and those hacked sites are used to launch attacks around the web.

Out of the 876 IP addresses that DHS provided, 134 or about 15% are Tor exit nodes, based on a reverse DNS lookup that we did on each IP address. These are anonymous gateways that are used by anyone using the Tor anonymous browsing service.

Tor exit nodes


We examined our attack data to see which IP addresses in the DHS data are attacking our customer websites. We found a total of 385 active IP addresses during the last 60 days. These IP addresses have launched a total of 21,095,492 complex attacks during that 60 day period that were blocked by the Wordfence firewall. We consider a complex attack to be an attack that tries to exploit a vulnerability to gain access to a target.

We also logged a total of 14,463,133 brute force attacks from these IP addresses during the same period. A brute force attack is a login guessing attack.

The chart below shows the distribution of the number of attacks per IP address. It only takes into account complex attacks. As you can see, a small number of the IP addresses that DHS provided as IOC’s are responsible for most of the attacks on WordPress websites that we monitor.

Attack distribution from IPs


The following shows the list of the top 50 IP addresses in the DHS report sorted by the number of complex attacks we saw from each IP during the past 60 days.

screen-shot-2016-12-30-at-4-35-33-am


As you can see, many of the top attacking IP addresses are Tor exit nodes. There is also a relatively small number of IP addresses launching most of the attacks on websites we monitor.

Conclusion regarding IP address data

What we’re seeing in this IP data is a wide range of countries and hosting providers. 15% of the IP addresses are Tor exit nodes. These exit nodes are used by anyone who wants to be anonymous online, including malicious actors.

Overall Conclusion

The IP addresses that DHS provided may have been used for an attack by a state actor like Russia. But they don’t appear to provide any association with Russia. They are probably used by a wide range of other malicious actors, especially the 15% of IP addresses that are Tor exit nodes.




 
4 days ago, MTG said the GOP vote it down only because of a procedural issue. She was on Benny Johnson's podcast, you can see it for yourself, but doubt you will because that would cause you to question your team. The GOP controls the House, so they have now had 4 days to bring it to vote, guess what no vote. If it was a tax cut for billionaires, the GOP would have brought it to vote yesterday. Maybe some in the GOP are worried those same billionaires they constantly give tax cuts to; some might be on that list and the GOP don't want to expose their bosses or stop that money train from rich dudes who like really young girls.
MTG is a retard I don't listen to anything she says but glad you're a fan .
 
4 days ago, MTG said the GOP vote it down only because of a procedural issue. She was on Benny Johnson's podcast, you can see it for yourself, but doubt you will because that would cause you to question your team. The GOP controls the House, so they have now had 4 days to bring it to vote, guess what no vote. If it was a tax cut for billionaires, the GOP would have brought it to vote yesterday. Maybe some in the GOP are worried those same billionaires they constantly give tax cuts to; some might be on that list and the GOP don't want to expose their bosses or stop that money train from rich dudes who like really young girls.
Made me laugh that someone was saying MAtt Gaetz needs to be the head of the investigative team, considering why he isn't AG.
 
Why does it have to be on the plane? Why couldn't it be in NYC or FLA?

Is it possible we don't have all the flight logs?

Possible. You're still reaching though based on no actual evidence. You're coming to a conclusion first and then looking for details to confirm what you want to be true.

Stop trying to analyze this shit based on your feelings. Instead look at the facts objectively.

How can our position be "without any concrete evidence, we can't say that to be true", but also - "Hey there is a dark underworld of billionaires trying to suppress the Epstein files".

We are both obv speculating here but I truly feel my stance is Occam's Razor.

The Occam's razor is that there are indeed powerful people trying to suppress this shit. Fucking obviously.

But I think you're doing some sleight of hand here -

The idea is, once again, not that "Trump's not beholden to people". Maybe I'm wrong, but it sounds like you're claiming that he's beholden to cover up the billionaires diddling kids.

And I think you're trying to suggest that it's more likely that multiple people, who have no public connection to Epstein, are trying to cover up THEIR crimes with him than it is that Epstein's former bestie might just be covering his own ass.

It's not just billionaires. Mossad has a public connection to Epstein. One of the survivors said a Hollywood Director (think it was Michael Bay) and actor was there. The list goes on and on.

So who knows how many other people. Here are some prominent ones.

Alexander Acosta: The former US Attorney played a role in negotiating a plea deal for Epstein in 2008 that allowed him to avoid federal sex trafficking charges. Acosta later resigned as Labor Secretary amidst the controversy.

Bill Richardson: The late former Governor of New Mexico was named in victim testimonies but denied the allegations.

Business executives:
  • Les Wexner: The founder of L Brands (Victoria's Secret, Bath & Body Works) was a long-time client of Epstein, who managed his money. Wexner has stated he severed ties with Epstein after his initial arrest.
  • Leon Black: The co-founder and former CEO of Apollo Global Management, hired Epstein as a financial advisor, paying him substantial fees. Black has since expressed regret for the association.
  • Joi Ito: The former director of the MIT Media Lab resigned after revelations he accepted anonymous donations from Epstein through Epstein's foundations.
Entertainment and other figures:
  • David Copperfield: The magician's name was revealed in unsealed documents and he was reportedly seen at Epstein's house, though no wrongdoing on his part has been alleged.
  • Kevin Spacey: The actor was also mentioned in connection with Epstein and has been accused of sexual assault himself. He denied knowing Epstein well, despite flying on his private plane.
  • Michael Jackson: The late singer was mentioned in victim testimonies as having been seen at Epstein's Florida home, but no allegations of wrongdoing against him were made.
  • Stephen Hawking: The late scientist was mentioned in connection with Epstein through an email sent by Epstein regarding a baseless claim.

"Trump wouldn't have done some retarded shit" - disagree lol but especially so if he simply had anticipated being able to cover up or manipulate it.

I think it's more likely a few powerful presidents who used to be homies with Epstein got away with a conspiracy involving covering up crimes and murdering a guy in federal jail, more than it is that the CEO of Nestle and Ford or whatever did so.

Your theory makes zero sense. This dude was telegraphing that he would release and reveal all the Epstein shit for months. Even after he got into office.

Why the fuck would he do that if he knew he diddled one of the underage girls?

The much more likely scenario is that influential people didn't want their name dragged through the mud.

Remember that a lot of these influential people didn't actually take part on the diddling and most likely didn't know it was going on. But they still don't want their name associated with Epstein at all because it would be career suicide.
 
MTG is a retard I don't listen to anything she says but glad you're a fan .
She said the GOP voted down the release of the Epstein files 4 days ago because of a procedural issue. Well its been 4 days that the GOP could have brought releasing the files to vote, but strangely have not. Did the GOP forget how to introduce a bill or are they too exhausted from bringing up bills to give tax breaks to the Elite. The same Elite it appears they are running cover for over Epstein.
I get it, you don't give a fuck about the abuse those young girls went through if it harms your party. Do better man.
 
What are you basing this claim on? You obviously haven't looked very hard and are very oddly eager to defend a :eek::eek::eek::eek:phile without doing any due diligence. The Trump administration has and is releasing the "Epstein Files". Some of the recent files released include grand jury transcripts that indicate many underage victims testified to various degrees of sexual abuse by Epstein. The FBI has also provided financial restitution to many underage victims after confirming their claims.
🤣
No female (of age or underage) went to that island gagged and bound. All females went willingly and were paid top dollar for it. They knew exactly what they were getting into. If there was a problem, why did they not notify the police at the time? Where was the police after all these incidents happened? These women are making money both ways. First, as willing participants, and later as victims. That is why the "MeToo" movement is now dead.

You are talking about this FBI?

. Political Bias:
Some whistleblowers have alleged that the FBI has a "systemic culture of unaccountability" and that its actions are influenced by political considerations.

. Misuse of Authority:
There have been accusations of the FBI using its law enforcement powers for political purposes, including targeting specific groups or individuals based on their political affiliations or beliefs.

. Corruption and Bribery:
Some former FBI agents have been convicted of accepting bribes in exchange for sensitive information or favors.

. Controversies and Scandals:
The FBI has been involved in numerous controversies, including allegations of improper surveillance, mishandling of informants, and attempts to undermine political opponents.
 
My best self is no where near this place lol , I've always taken long brakes and I will again .

Sorry but you can't prove it beyond a reasonable doubt , even if you followed all the data to its source and that was let's say Iran or Belarus or Ukraine you couldn't prove definitively there wasn't Russian money or influence somewhere along the way and let's be honest, theres a good chance there was .

Russia is trying to fuck with most western countries, it makes sense from their standpoint, great bang for the buck .
Mate, you're one of the good ones in this mess.
 
She said the GOP voted down the release of the Epstein files 4 days ago because of a procedural issue. Well its been 4 days that the GOP could have brought releasing the files to vote, but strangely have not. Did the GOP forget how to introduce a bill or are they too exhausted from bringing up bills to give tax breaks to the Elite. The same Elite it appears they are running cover for over Epstein.
I get it, you don't give a fuck about the abuse those young girls went through if it harms your party. Do better man.
Perhaps you should start another thread about how Trump grabbed the wheel of the beast

And stop assuming my opinions and stop assuming there is 100+ genders
 
Sure, the narrative shifts, but core beliefs don't, right? Right?
Actually now that I'm thinking about it, it's AI that rules the Reptilians.

Humans are harder to control with AI due to our virus like behavior.
 
Perhaps you should start another thread about how Trump grabbed the wheel of the beast

And stop assuming my opinions and stop assuming there is 100+ genders
Where have you discussed genders? I'm obviously missing a conversation here.

The wheel of the beast? Explain.
 
This is the kind of comment that gets me jealous. :(


Always in my head. They were at a record store opening in a very small town I grew up in, I went during my school lunch break much to my mum's chagrin, she didn't know till it was in the local paper.
The owner had a record stall at the local market every week and used to put special editions by for me of Simple Minds, U2, Then Jerico and and stuff.
 
Trump f#cked Meliania on that plane for the first time. Let's not pretend that this was some plain jane airline.
trump also paid to fuck Stormy Daniels when his wife was pregnant and has repeatedly talked fondly and sexually about his daughter.


Are we pretending he has some higher sense of morality around females family members in his life?


ivanka-donald-trump-at-a-beach-boys-concert-palm-beach-1996-v0-woj6cz63huob1.jpg
 
Back
Top