Another Reason To Hate on the Chinese Government

  • 99 results
  • 1
  • 2
  • 3
Avatar image for ad1x2
ad1x2

8430

Forum Posts

0

Wiki Points

0

Followers

Reviews: 1

User Lists: 0

#51 ad1x2
Member since 2005 • 8430 Posts

Sometimes I wonder if people so adamantly defend China despite their issues and their obvious misinformation with the virus because they're afraid that making them mad will result in less cheap products from there in the future, especially if Trump gets reelected and wants to increase sanctions.

That's just me thinking out loud, nobody has to answer that although I'm sure someone will respond.

Avatar image for kadin_kai
Kadin_Kai

2247

Forum Posts

0

Wiki Points

0

Followers

Reviews: 5

User Lists: 0

#52 Kadin_Kai
Member since 2015 • 2247 Posts

@n64dd: ????

Avatar image for tenaka2
tenaka2

17958

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#53  Edited By tenaka2
Member since 2004 • 17958 Posts

A powerful dictatorship run by a despot held back information?

I'm shocked... shocked I tell you.

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#54 N64DD
Member since 2015 • 13167 Posts

@zaryia said:
@n64dd said:

@zaryia: Tell me how they targeted hillary and opponents with phishing?

I have all day.

You want ME to tell you why MY OWN citation (Republican SIC, HIC, Republican DOJ, CIA, DHS, NSA, and FBI) is wrong? That is quite literally YOUR job.............

https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume4.pdf

https://www.justice.gov/storage/report.pdf

These are direct Government links to the documents. Go ahead and tell me what's wrong, buddy boy. Remember to prove it with valid citation.

Sure. Phishing is not a targeted attack.

Avatar image for drunk_pi
Drunk_PI

3358

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#55 Drunk_PI
Member since 2014 • 3358 Posts

@ad1x2 said:

Sometimes I wonder if people so adamantly defend China despite their issues and their obvious misinformation with the virus because they're afraid that making them mad will result in less cheap products from there in the future, especially if Trump gets reelected and wants to increase sanctions.

That's just me thinking out loud, nobody has to answer that although I'm sure someone will respond.

Who's defending China?

Avatar image for zaryia
Zaryia

21607

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#56 Zaryia
Member since 2016 • 21607 Posts

@n64dd said:

Sure. Phishing is not a targeted attack.

Please offer citation disproving the ICA report, SIC report, and DOJ report (each which I have kindly linked for you) which directly state Russia Interfered. N64DD's opinion is not valid citation.

Until further notice you have lost this debate.

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#57 N64DD
Member since 2015 • 13167 Posts

@zaryia said:
@n64dd said:

Sure. Phishing is not a targeted attack.

Please offer citation disproving the ICA report, SIC report, and DOJ report (each which I have kindly linked for you) which directly state Russia Interfered. N64DD's opinion is not valid citation.

Until further notice you have lost this debate.

I did. My background is in cyber security (i'm cyber security architect). Do you know what you're even reading?

Avatar image for zaryia
Zaryia

21607

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#58  Edited By Zaryia
Member since 2016 • 21607 Posts

@n64dd said:

I did. My background is in cyber security

You MUST be fully aware that you claiming you are an expert in cyber-security doesn't actually refute the extremely lengthy conclusions of our ICA and DOJ, from both Republicans and Democrats.

I will link them again for you:

https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume4.pdf

https://www.justice.gov/storage/report.pdf

Russia Interfered.

Either you directly quote what is incorrect in those large reports (with proof), or you concede. Until further notice you still remain the loser of this "debate". I can't believe this is even debated anymore outside of Q-Anon lol.

Avatar image for br0kenrabbit
br0kenrabbit

18123

Forum Posts

0

Wiki Points

0

Followers

Reviews: 10

User Lists: 0

#59 br0kenrabbit
Member since 2004 • 18123 Posts

@n64dd said:

I did. My background is in cyber security (i'm cyber security architect). Do you know what you're even reading?

So you know Unix or STFU.

Can I ask you some Unix questions that aren't easily Googled?

Avatar image for horgen
horgen

127733

Forum Posts

0

Wiki Points

0

Followers

Reviews: 1

User Lists: 0

#60 horgen  Moderator
Member since 2006 • 127733 Posts

10 second google searching tells me phishing can be a targeted attack.

Avatar image for LJS9502_basic
LJS9502_basic

180189

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#61 LJS9502_basic
Member since 2003 • 180189 Posts

@n64dd said:
@zaryia said:
@n64dd said:

Sure. Phishing is not a targeted attack.

Please offer citation disproving the ICA report, SIC report, and DOJ report (each which I have kindly linked for you) which directly state Russia Interfered. N64DD's opinion is not valid citation.

Until further notice you have lost this debate.

I did. My background is in cyber security (i'm cyber security architect). Do you know what you're even reading?

Phishing can be a targeted attack. Guess you aren't the best at your job huh...…..

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#62  Edited By N64DD
Member since 2015 • 13167 Posts

@LJS9502_basic: @horgen:

Incorrect. Phishing is a general

Net thrown to catch random victims.

Targeting would fall under social engineering.

For br0ken rabbit, very little unix is used in my job so i know enough to get by.

Avatar image for LJS9502_basic
LJS9502_basic

180189

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#63  Edited By LJS9502_basic
Member since 2003 • 180189 Posts

@n64dd said:

@LJS9502_basic: @horgen:

Incorrect. Phishing is a general

Net thrown to catch random victims.

Targeting would fall under social engineering.

For br0ken rabbit, very little unix is used in my job so i know enough to get by.

Wrong. There are different types of phishing. Included targeting phishing.

Less than 10 seconds to google will teach you. Either you are not well versed in your job or that isn't your job.

https://www.csoonline.com/article/3234716/types-of-phishing-attacks-and-how-to-identify-them.html

Avatar image for foxhound_fox
foxhound_fox

98532

Forum Posts

0

Wiki Points

0

Followers

Reviews: 13

User Lists: 0

#64 foxhound_fox
Member since 2005 • 98532 Posts

@pillarrocks said:

China needs to pay for what it did to the rest of the world.

The US still hasn't paid for what the Spanish Flu did to the world.

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#65 N64DD
Member since 2015 • 13167 Posts

@LJS9502_basic: nah fam. Those other kind of “phishing” dont classify as traditional phishing and are under other categories now.

Hillary got hit by traditional phishing, which what I was talking about. She got hit because she had an illegal personal server violating all kinds of legal documentation and agreements she had.

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#66 N64DD
Member since 2015 • 13167 Posts

@foxhound_fox: Canada still hasn’t paid for Beiber.

Avatar image for br0kenrabbit
br0kenrabbit

18123

Forum Posts

0

Wiki Points

0

Followers

Reviews: 10

User Lists: 0

#67 br0kenrabbit
Member since 2004 • 18123 Posts

@n64dd said:

@LJS9502_basic: @horgen:


For br0ken rabbit, very little unix is used in my job so i know enough to get by.

Wait...you're not just an IT security guy, you're a Security Architect™, and you know very little of Unix?

Avatar image for zaryia
Zaryia

21607

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#68  Edited By Zaryia
Member since 2016 • 21607 Posts

@n64dd said:

@LJS9502_basic: nah fam. Those other kind of “phishing” dont classify as traditional phishing and are under other categories now.

Hillary got hit by traditional phishing, which what I was talking about. She got hit because she had an illegal personal server violating all kinds of legal documentation and agreements she had.

So you admit the SIC and DOJ are correct, and Russia Interfered? As you have not given proof their reports are false.

Avatar image for foxhound_fox
foxhound_fox

98532

Forum Posts

0

Wiki Points

0

Followers

Reviews: 13

User Lists: 0

#69 foxhound_fox
Member since 2005 • 98532 Posts

@n64dd said:

@foxhound_fox: Canada still hasn’t paid for Beiber.

He's your problem now.

Avatar image for Willy105
Willy105

26209

Forum Posts

0

Wiki Points

0

Followers

Reviews: 19

User Lists: 0

#70 Willy105
Member since 2005 • 26209 Posts

@ad1x2 said:

Sometimes I wonder if people so adamantly defend China despite their issues and their obvious misinformation with the virus because they're afraid that making them mad will result in less cheap products from there in the future, especially if Trump gets reelected and wants to increase sanctions.

That's just me thinking out loud, nobody has to answer that although I'm sure someone will respond.

I don't think anyone on the left or right likes the Chinese government that exists in mainland China. Red guys hate them for being a competitor, blue games hate them for them being horrible to their citizens.

Problem is, the red guys usually have a harder time separating the Chinese government with the Chinese people or Chinese Americans than the blue guys.

Avatar image for SUD123456
SUD123456

7059

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#71 SUD123456
Member since 2007 • 7059 Posts

@n64dd said:

@LJS9502_basic: @horgen:

Incorrect. Phishing is a general

Net thrown to catch random victims.

Targeting would fall under social engineering.

For br0ken rabbit, very little unix is used in my job so i know enough to get by.

Spear phishing is a thing. And our company practices defense and against broad and targeted attacks.

Avatar image for drunk_pi
Drunk_PI

3358

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#72 Drunk_PI
Member since 2014 • 3358 Posts

@Willy105 said:
@ad1x2 said:

Sometimes I wonder if people so adamantly defend China despite their issues and their obvious misinformation with the virus because they're afraid that making them mad will result in less cheap products from there in the future, especially if Trump gets reelected and wants to increase sanctions.

That's just me thinking out loud, nobody has to answer that although I'm sure someone will respond.

I don't think anyone on the left or right likes the Chinese government that exists in mainland China. Red guys hate them for being a competitor, blue games hate them for them being horrible to their citizens.

Problem is, the red guys usually have a harder time separating the Chinese government with the Chinese people or Chinese Americans than the blue guys.

Everyone has their reasons. The problem is that whenever stance the GOP takes on China, it's incoherent and unreasonable (e.g. sanctions, "they started it in the lab," and so on), and whenever Democrats oppose those stances for logical reasons, it's dismissed and suddenly they're pro-China.

The Chinese government screwed up and hid COVID-19 but right now, we're number one in COVID-19 stats and we continue to bicker without providing much of a solution other than a blame game.

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#73 N64DD
Member since 2015 • 13167 Posts

@br0kenrabbit: enough to get by. More knowledge in networking, firewalls. Juniper, ccnp, blue coat (scs certified), cisco sase certified, palo alto, etc.

Avatar image for br0kenrabbit
br0kenrabbit

18123

Forum Posts

0

Wiki Points

0

Followers

Reviews: 10

User Lists: 0

#74 br0kenrabbit
Member since 2004 • 18123 Posts

@n64dd said:

@br0kenrabbit: enough to get by. More knowledge in networking, firewalls. Juniper, ccnp, blue coat (scs certified), cisco sase certified, palo alto, etc.

So say someone is pushing an attack via NTP exploit and forcing the use of an expired transport layer. What you do?

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#75 N64DD
Member since 2015 • 13167 Posts

@br0kenrabbit said:
@n64dd said:

@br0kenrabbit: enough to get by. More knowledge in networking, firewalls. Juniper, ccnp, blue coat (scs certified), cisco sase certified, palo alto, etc.

So say someone is pushing an attack via NTP exploit and forcing the use of an expired transport layer. What you do?

Patch NTP.

Avatar image for kadin_kai
Kadin_Kai

2247

Forum Posts

0

Wiki Points

0

Followers

Reviews: 5

User Lists: 0

#76 Kadin_Kai
Member since 2015 • 2247 Posts

@LJS9502_basic said:
@n64dd said:

@LJS9502_basic: @horgen:

Incorrect. Phishing is a general

Net thrown to catch random victims.

Targeting would fall under social engineering.

For br0ken rabbit, very little unix is used in my job so i know enough to get by.

Wrong. There are different types of phishing. Included targeting phishing.

Less than 10 seconds to google will teach you. Either you are not well versed in your job or that isn't your job.

https://www.csoonline.com/article/3234716/types-of-phishing-attacks-and-how-to-identify-them.html

From memory a certain user with the username similar Nintendo console that first released Turok once suggested that everyone should turn on their air conditioning units to combat global warming.

That's what you're dealing with.

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#77 N64DD
Member since 2015 • 13167 Posts

@kadin_kai said:
@LJS9502_basic said:
@n64dd said:

@LJS9502_basic: @horgen:

Incorrect. Phishing is a general

Net thrown to catch random victims.

Targeting would fall under social engineering.

For br0ken rabbit, very little unix is used in my job so i know enough to get by.

Wrong. There are different types of phishing. Included targeting phishing.

Less than 10 seconds to google will teach you. Either you are not well versed in your job or that isn't your job.

https://www.csoonline.com/article/3234716/types-of-phishing-attacks-and-how-to-identify-them.html

From memory a certain user with the username similar Nintendo console that first released Turok once suggested that everyone should turn on their air conditioning units to combat global warming.

That's what you're dealing with.

Only in the summer. In the winter all it would do is make everybody's electric bill bonkers.

Avatar image for horgen
horgen

127733

Forum Posts

0

Wiki Points

0

Followers

Reviews: 1

User Lists: 0

#78 horgen  Moderator
Member since 2006 • 127733 Posts

@n64dd said:
@kadin_kai said:
@LJS9502_basic said:
@n64dd said:

@LJS9502_basic: @horgen:

Incorrect. Phishing is a general

Net thrown to catch random victims.

Targeting would fall under social engineering.

For br0ken rabbit, very little unix is used in my job so i know enough to get by.

Wrong. There are different types of phishing. Included targeting phishing.

Less than 10 seconds to google will teach you. Either you are not well versed in your job or that isn't your job.

https://www.csoonline.com/article/3234716/types-of-phishing-attacks-and-how-to-identify-them.html

From memory a certain user with the username similar Nintendo console that first released Turok once suggested that everyone should turn on their air conditioning units to combat global warming.

That's what you're dealing with.

Only in the summer. In the winter all it would do is make everybody's electric bill bonkers.

Point proven.

Avatar image for kadin_kai
Kadin_Kai

2247

Forum Posts

0

Wiki Points

0

Followers

Reviews: 5

User Lists: 0

#79 Kadin_Kai
Member since 2015 • 2247 Posts

@n64dd said:
@kadin_kai said:
@LJS9502_basic said:
@n64dd said:

@LJS9502_basic: @horgen:

Incorrect. Phishing is a general

Net thrown to catch random victims.

Targeting would fall under social engineering.

For br0ken rabbit, very little unix is used in my job so i know enough to get by.

Wrong. There are different types of phishing. Included targeting phishing.

Less than 10 seconds to google will teach you. Either you are not well versed in your job or that isn't your job.

https://www.csoonline.com/article/3234716/types-of-phishing-attacks-and-how-to-identify-them.html

From memory a certain user with the username similar Nintendo console that first released Turok once suggested that everyone should turn on their air conditioning units to combat global warming.

That's what you're dealing with.

Only in the summer. In the winter all it would do is make everybody's electric bill bonkers.

Yes, FABULOUS idea. This is PURE GOLD. I'm speechless, you're just .... I am sorry I just don't have words to describe your amazing idea. I reckon a Nobel prize should be on its way! Pure genius!

"Remember people of the earth, switch on your air conditioning units (only during summer) to combat global warming" - N64dd.

Avatar image for br0kenrabbit
br0kenrabbit

18123

Forum Posts

0

Wiki Points

0

Followers

Reviews: 10

User Lists: 0

#80 br0kenrabbit
Member since 2004 • 18123 Posts

@n64dd said:

Patch NTP.

Okay, but are you already compromised? If I've already attacked you and you're just now patching, I'm still in.

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#81  Edited By N64DD
Member since 2015 • 13167 Posts

@br0kenrabbit: install norton and say a prayer.

Also change the ntp port to something non-default, limit ips/urls it can connect to. White listing ips and urls is needed. That would be a good start.

Avatar image for br0kenrabbit
br0kenrabbit

18123

Forum Posts

0

Wiki Points

0

Followers

Reviews: 10

User Lists: 0

#82  Edited By br0kenrabbit
Member since 2004 • 18123 Posts

@n64dd said:

@br0kenrabbit: install norton and say a prayer.

Also change the ntp port to something non-default, limit ips/urls it can connect to. White listing ips and urls is needed. That would be a good start.

My payload is listen and report. It's the same size and name as a rarely-used system file (lets say for fax), and when launched will record keystrokes, parse for non-English words (hopefully catching passwords here), and attach the result to an outgoing E-mail after 1 week.

Norton I wouldn't worry about. It would catch me if I attempted any encryption or actually altering a system file, but there's no need for that.

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#83  Edited By N64DD
Member since 2015 • 13167 Posts

@br0kenrabbit: norton was a joke brah

Also the attack you’re talking about is used for ddos. I think you’re confusing what the transport layer does of OSI.

Avatar image for br0kenrabbit
br0kenrabbit

18123

Forum Posts

0

Wiki Points

0

Followers

Reviews: 10

User Lists: 0

#84  Edited By br0kenrabbit
Member since 2004 • 18123 Posts

@n64dd said:

@br0kenrabbit: norton was a joke brah

Also the attack you’re talking about is used for ddos. I think you’re confusing what the transport layer does of OSI.

Oh, no. I switched scenarios completely with the "my payload" bit. I'm having too much fun.

We used a 'poison well' system for a particular client years (read: decades) back. There was a forward facing fake network set up that hackers could snoop around in, but it was independent of the actual real network. Any of the files a hacker may find interest in, XLS files for instance, would call back to us if downloaded and opened.

That was more for lack of a better option: back in the 90's Network security was like trying to plug a hole in a ship with tissue paper.

The worst payload I've seen is an AWARD BIOS flasher. That fucker...

Edit: And you could use NTP to access encrypted outgoing data, you could force the acceptance of an outdated (hacked) version of SSL

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#85  Edited By N64DD
Member since 2015 • 13167 Posts

@br0kenrabbit: uh huh

Glad to know your attack really didn’t make much sense.

Anyways. I hope the world goes after China.

Avatar image for br0kenrabbit
br0kenrabbit

18123

Forum Posts

0

Wiki Points

0

Followers

Reviews: 10

User Lists: 0

#86 br0kenrabbit
Member since 2004 • 18123 Posts

@n64dd said:

@br0kenrabbit: uh huh

Glad to know your attack really didn’t make much sense.

Anyways. I hope the world goes after China.

No, you just didn't think it through. I gave you the information in the first post:

forcing the use of an expired transport layer

That being an expired version of SSL. So now I got all your passwords.

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#87 N64DD
Member since 2015 • 13167 Posts

@br0kenrabbit: you’re changing what you’re doing everytime and that’s not how any of this works.

Lol I’m done and we’ve derailed this thread too much.

Avatar image for br0kenrabbit
br0kenrabbit

18123

Forum Posts

0

Wiki Points

0

Followers

Reviews: 10

User Lists: 0

#88 br0kenrabbit
Member since 2004 • 18123 Posts

@n64dd said:

@br0kenrabbit: you’re changing what you’re doing everytime and that’s not how any of this works.

Lol I’m done and we’ve derailed this thread too much.

No. Let's go through this.

Post #1

forcing the use of an expired transport layer

I now have your passwords. I'm in.

Post #2

Okay, but are you already compromised? If I've already attacked you and you're just now patching, I'm still in.

Now I get to upload whatevar I want.

Post #3

My payload is listen and report.

This is what I upload. Forget the NTP stuff, irrelevant at this point. You patched it, good job, too late.

Avatar image for br0kenrabbit
br0kenrabbit

18123

Forum Posts

0

Wiki Points

0

Followers

Reviews: 10

User Lists: 0

#89 br0kenrabbit
Member since 2004 • 18123 Posts

@n64dd

The response I'm looking for isn't even technical. It's far more basic than that.

Avatar image for Xabiss
Xabiss

4749

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#90  Edited By Xabiss
Member since 2012 • 4749 Posts

@LJS9502_basic said:
@n64dd said:

@LJS9502_basic: @horgen:

Incorrect. Phishing is a general

Net thrown to catch random victims.

Targeting would fall under social engineering.

For br0ken rabbit, very little unix is used in my job so i know enough to get by.

Wrong. There are different types of phishing. Included targeting phishing.

Less than 10 seconds to google will teach you. Either you are not well versed in your job or that isn't your job.

https://www.csoonline.com/article/3234716/types-of-phishing-attacks-and-how-to-identify-them.html

Actually from my understanding Spear Phishing is considered a targeted phishing attack from my experience.

Spear phishing is the act of sending emails to specific and well-researched targets while purporting to be a trusted sender. The aim is to either infect devices with malware or convince victims to hand over information or money.

Avatar image for kadin_kai
Kadin_Kai

2247

Forum Posts

0

Wiki Points

0

Followers

Reviews: 5

User Lists: 0

#91 Kadin_Kai
Member since 2015 • 2247 Posts

@n64dd: Go after China! Perhaps a little military action needed?

Avatar image for LJS9502_basic
LJS9502_basic

180189

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#92 LJS9502_basic
Member since 2003 • 180189 Posts

@Xabiss said:

Actually from my understanding Spear Phishing is considered a targeted phishing attack from my experience.

Spear phishing is the act of sending emails to specific and well-researched targets while purporting to be a trusted sender. The aim is to either infect devices with malware or convince victims to hand over information or money.

Guess you should have read the entire link.

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#93 N64DD
Member since 2015 • 13167 Posts

@LJS9502_basic said:
@Xabiss said:

Actually from my understanding Spear Phishing is considered a targeted phishing attack from my experience.

Spear phishing is the act of sending emails to specific and well-researched targets while purporting to be a trusted sender. The aim is to either infect devices with malware or convince victims to hand over information or money.

Guess you should have read the entire link.

Do you think they should investigate china after this or anything of that effect?

Avatar image for deactivated-5ecb2e9232c57
deactivated-5ecb2e9232c57

653

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 10

#94 deactivated-5ecb2e9232c57
Member since 2019 • 653 Posts

@n64dd said:

Do you think they should investigate china after this or anything of that effect?

Who is "they"?

Avatar image for LJS9502_basic
LJS9502_basic

180189

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#95 LJS9502_basic
Member since 2003 • 180189 Posts

@leicam6 said:
@n64dd said:

Do you think they should investigate china after this or anything of that effect?

Who is "they"?

Yes who?

Avatar image for n64dd
N64DD

13167

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#96 N64DD
Member since 2015 • 13167 Posts

@LJS9502_basic: other governments, the UN, etc.

Avatar image for zaryia
Zaryia

21607

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#97 Zaryia
Member since 2016 • 21607 Posts

@n64dd said:

@LJS9502_basic: other governments, the UN, etc.

Yes. I think they should investigate China, just as we should investigate the Trump administration after this is all over. We have to see exactly what went wrong.

Avatar image for deactivated-5ecb2e9232c57
deactivated-5ecb2e9232c57

653

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 10

#98 deactivated-5ecb2e9232c57
Member since 2019 • 653 Posts

@n64dd said:

@LJS9502_basic: other governments, the UN, etc.

How do you propose they do that? China is on the UN Security Council and has veto power. They're also a global economic superpower at this point and hold sway in every region of the globe. The US has also ceded a lot of influence and allies to China since Trump got into office.

I'm all for bringing nefarious actors to justice but they've got the rest of the world through the wringer. Short of going into open warfare and the consequences of that are destruction of global supply chains and the global economy, I'm not sure what exactly can be done.

Avatar image for Gaming-Planet
Gaming-Planet

21106

Forum Posts

0

Wiki Points

0

Followers

Reviews: 14

User Lists: 0

#99 Gaming-Planet
Member since 2008 • 21106 Posts

We were hearing the downplaying since January.

A lot of us knew what was happening just by seeing what was leaked and the wechat conversations. It was already known that it started sometime in November. Surprised it took the west this long when neckbeards on the internet figured this shit out before anybody else.

Avatar image for hitemhigh
hitemhigh

36

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

#100  Edited By hitemhigh
Member since 2006 • 36 Posts

@ratchetclank92: why do you hate them? They made everything you own. The virus sucks but the science is saying it wasn't made in a lab by Chinese.