Gothamgirl

Thanks for sharing.

Gothamgirl

Thank you, and I agree about the after the world war 2 books comment.

Gothamgirl

I noticed Dorothy in a video with morse code recently it made me think of this.

Gothamgirl

That reminds me of something I saw recently.

Gothamgirl

Honestly it was a guess based off the shirt "All 11 lakes" so I may not be correct. I have been combing all day, but nothing stands out yet.

Gothamgirl

When you look up WorldCorp Enterprises Channel on youtube they list a few. This video is a dead giveaway of who it is. https://youtu.be/QCdprP2IyV8

carmencita

Well, that is odd. I did not do anything different.

carmencita

Wow. That is strange. I wonder if there is a glitch right now. I am going to try sending this link https://voat.co/v/pizzagate/1902387 Let me know if it came through

carmencita

No, I am not. I was on my phone earlier. Am not now. Try it.

carmencita

Ok I watched. Fishy. Very odd

carmencita

I think even going in and asking if they are looking for help, you know, for a friend. Ask them for a brochure if they have one and a business card? I think the fact that the sketchy looking pizza place is next door, is somewhat suspicious. Keep in touch please and let the Mother Hen know you are safe.

Blacksmith21

Ashburn arguably has more data centers than Silicon Valley. Everyone who hosts is there. Ashburn grew to what it is (data center-wise) because of its proximity to the MAE East NAP and the major fiber routes in NoVA.

Pro Tip: Intel agencies like to build data centers on these rights-of-way.

DeathTooMasons

Virginia, shocker. So far from DC.

carmencita

Please take someone with you and film if you can. But whatever you do Stay Safe

Yuke

Can't hurt to scope it out!

carmencita

Yikes! Are they still open for biz? Do they actually serve food from there? It looks like a run down dive or are they doing a gut with a redo? It looks like a scary place.

carmencita

The chance of becoming a victim of either violent or property crime in Brea is 1 in 35. Based on FBI crime data, Brea is not one of the safest communities in America. Relative to California, Brea has a crime rate that is higher than 73% of the state's cities and towns of all sizes. Don't know if this helps any, but with this kind of data, could that be a reason they are located in brea?

collegetoker

That's just where the hosting company is registered. I was providing that in combination with the GPS coordinates in conjunction with the forum post to show that it is in Aushburn Virginia and there is evidence for it being their. I got the location using a reconnaissance toolkit, so I'm not just guessing.

carmencita

OK, Thanks for research:-)

collegetoker

So who the fuck am I supposed to turn to, PMCs? This whole situation is crazy.

Notgood2

Just for once, can we talk about Skippy in the videos instead of the servers?

Gothamgirl

I may be wrong but they're most likely a cloud service provider and most likely nothing to do with the actual site.

collegetoker

I'm telling you, I tested this multiple times with multiple domains that resolve to that website; all but one are in the same datacenter.

Gothamgirl

I see, thanks for sharing that with me and thanks for digging.

islandofdelight

FBI has many offices in Virginia: http://www.countyoffice.org/washington-va-fbi-office/

Worldcorpo is FBI white hats evidence leak.

collegetoker

And why would you say that?

Doboy787

Worldcorp is a 4 chan troll job. It's connected to an ARG by Silvagunner/Siivagunner. ONly thing here is that its possible elite are using ARG to groom kids into pedophilia.

Gothamgirl

No Silvergunner is a simulation of a dark CIA Mk project if you look into the whole storyline. The video that we assume is Podesta is real. Thats what makes it an ARG.

collegetoker

Proof, do you have it?

EDIT: not asking for a lot here, just a basic amount of evidence.

dickface888

Wasn't the concensus here recently that the worldcorp video was a troll job edited together?

collegetoker

Do you have evidence to that effect?

dickface888

Well Titus Frost just did a video on how the video was a hoax that you could find on youtube, and I recall everyone here talking about it a couple of weeks ago. I don't know what to think.

Gothamgirl

The problem with his video is he only knows some of the story. Otherwise Titus is great.

collegetoker

There is a type of scream that is the mark of fear that is very difficult to duplicate even in adults, nevermind in children. There is a gravelly irregularity to the pitch which is indicative of actual fear. Not to mention that even the fans of the Titus Frost don't buy what he's selling.

I'm a simple man: If I see a child getting abused, I try to help bring their abuser to justice. Frankly, I don't really even care if this guy isn't Podesta.

DeathTooMasons

My take as well. Child is being abuse. Why is it ignored that the guy sings "I'M John Podesta"...i still here it clear.

carmencita

Did we not establish at one point, from someone that did a voice test, that it possibly could be him.? I believe that to be possible, about the mark of fear. You can maybe fake the decibel but the range of fear, I do not think it is possible. If caught, I think something should be done to him so that he reaches that level of fear. Revenge is Sweet.

ArthurEdens

The video of the kid rinsing burn marks on his his body also seemed pretty real

dickface888

I'm with you, tbh deep down I still do think that was Podesta in that vid and at CPP no less.

dickface888

Wasn't the concensus recently that the worldcorp video was a troll job edited together?

Notgood2

That is bullcrap! Do you think a kid can fake screaming like that?

collegetoker

There is potential for recovery depending on how it was deleted, if each site is running on its own VM, if this is the original server, and how often files are added and removed from the server.

The site was definitely different initially: the background was a gore picture, but I'm not sure if it was actual gore or just movie magic.

collegetoker

Okay, so flarum.cn is also hosted on databucket.info's servers. How is that even possible?

Notgood2

Finally, good posting on this stupid sub. If we figure out who is behind that website, we will catch Skippy!

collegetoker

What I don't understand is how that can also be on the same server as flarum.cn. Wouldn't it also show up on the server with worldcorpo.net?

EDIT: ssh seems to be an option, it's just a matter of getting in.

SoldierofLight

Gotcha. Thanks. I'd entered the 135 S. STATE COLLEGE BLVD, STE 500, Brea, CA, 92821 address which explains why I didn't see it.

collegetoker

Also, those are their corporate offices, not their data centers.

collegetoker

Databucket.info

92.242.140.255 - 51.4964,-0.1224 - United Kingdom

Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-31 03:44 EDT
Nmap scan report for databucket.info (208.113.128.159)
Host is up (0.079s latency).
rDNS record for 208.113.128.159: ip-208-113-128-159.nodes.dream.io

Host script results:
| dns-brute: 
|   DNS Brute-force hostnames: 
|     devel.databucket.info - 92.242.140.21
|     stats.databucket.info - 92.242.140.21
|     http.databucket.info - 92.242.140.21
|     mx0.databucket.info - 92.242.140.21
|     development.databucket.info - 92.242.140.21
|     svn.databucket.info - 92.242.140.21
|     syslog.databucket.info - 92.242.140.21
|     id.databucket.info - 92.242.140.21
|     devsql.databucket.info - 92.242.140.21
|     test.databucket.info - 92.242.140.21
|     mysql.databucket.info - 92.242.140.21
|     devtest.databucket.info - 92.242.140.21
|     info.databucket.info - 92.242.140.21
|     alerts.databucket.info - 92.242.140.21
|     dhcp.databucket.info - 92.242.140.21
|     test1.databucket.info - 92.242.140.21
|     alpha.databucket.info - 92.242.140.21
|     noc.databucket.info - 92.242.140.21
|     test2.databucket.info - 92.242.140.21
|     internet.databucket.info - 92.242.140.21
|     ap.databucket.info - 92.242.140.21
|     dmz.databucket.info - 92.242.140.21
|     testing.databucket.info - 92.242.140.21
|     apache.databucket.info - 92.242.140.21
|     ns0.databucket.info - 92.242.140.21
|     upload.databucket.info - 92.242.140.21
|     app.databucket.info - 92.242.140.21
|     vm.databucket.info - 92.242.140.21
|     ipv6.databucket.info - 92.242.140.21
|     apps.databucket.info - 92.242.140.21
|     vnc.databucket.info - 92.242.140.21
|     lab.databucket.info - 92.242.140.21
|     aptest.databucket.info - 92.242.140.21
|     linux.databucket.info - 92.242.140.21
|     en.databucket.info - 92.242.140.21
|     auth.databucket.info - 92.242.140.21
|     ops.databucket.info - 92.242.140.21
|     web.databucket.info - 92.242.140.21
|     erp.databucket.info - 92.242.140.21
|     oracle.databucket.info - 92.242.140.21
|     web2test.databucket.info - 92.242.140.21
|     log.databucket.info - 92.242.140.21
|     eshop.databucket.info - 92.242.140.21
|     beta.databucket.info - 92.242.140.21
|     owa.databucket.info - 92.242.140.21
|     whois.databucket.info - 92.242.140.21
|     blog.databucket.info - 92.242.140.21
|     pbx.databucket.info - 92.242.140.21
|     wiki.databucket.info - 92.242.140.21
|     f5.databucket.info - 92.242.140.21
|     cdn.databucket.info - 92.242.140.21
|     s3.databucket.info - 92.242.140.21
|     www.databucket.info - 208.113.128.159
|     secure.databucket.info - 92.242.140.21
|     www2.databucket.info - 92.242.140.21
|     firewall.databucket.info - 92.242.140.21
|     citrix.databucket.info - 92.242.140.21
|     xml.databucket.info - 92.242.140.21
|     forum.databucket.info - 92.242.140.21
|     cms.databucket.info - 92.242.140.21
|     shop.databucket.info - 92.242.140.21
|     manage.databucket.info - 92.242.140.21
|     ftp.databucket.info - 208.113.128.159
|     mgmt.databucket.info - 92.242.140.21
|     crs.databucket.info - 92.242.140.21
|     mirror.databucket.info - 92.242.140.21
|     git.databucket.info - 92.242.140.21
|     cvs.databucket.info - 92.242.140.21
|     sql.databucket.info - 92.242.140.21
|     mobile.databucket.info - 92.242.140.21
|     gw.databucket.info - 92.242.140.21
|     database.databucket.info - 92.242.140.21
|     squid.databucket.info - 92.242.140.21
|     monitor.databucket.info - 92.242.140.21
|     help.databucket.info - 92.242.140.21
|     db.databucket.info - 92.242.140.21
|     ssh.databucket.info - 92.242.140.21
|     mssql.databucket.info - 92.242.140.21
|     helpdesk.databucket.info - 92.242.140.21
|     demo.databucket.info - 92.242.140.21
|     ssl.databucket.info - 92.242.140.21
|     mta.databucket.info - 92.242.140.21
|     home.databucket.info - 92.242.140.21
|     dev.databucket.info - 92.242.140.21
|_    stage.databucket.info - 92.242.140.21

Nmap done: 1 IP address (1 host up) scanned in 2.95 seconds

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '92.242.140.0 - 92.242.140.255'

% Abuse contact for '92.242.140.0 - 92.242.140.255' is '[email protected]'

inetnum:        92.242.140.0 - 92.242.140.255
netname:        BAREFRUIT-ERRORHANDLING
descr:          BAREFRUIT-US-ANYCAST-A
country:        GB
org:            ORG-BL53-RIPE
admin-c:        PR42-RIPE
tech-c:         PR42-RIPE
status:         ASSIGNED PA
mnt-by:         CATALYST2-MNT
created:        2008-03-11T16:59:41Z
last-modified:  2008-07-24T17:13:47Z
source:         RIPE

organisation:   ORG-BL53-RIPE
org-name:       Barefruit Ltd.
org-type:       LIR
address:        5 Windmill Street
address:        London
address:        W1T 2JA
address:        UNITED KINGDOM
phone:          +44 207 637 0304
admin-c:        PR42-RIPE
mnt-ref:        CATALYST2-MNT
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         CATALYST2-MNT
abuse-c:        BA5057-RIPE
created:        2007-12-14T12:37:34Z
last-modified:  2016-09-28T10:03:34Z
source:         RIPE # Filtered

person:         Paul Redpath
remarks:        Catalyst2 Services Ltd
org:            ORG-csl3-RIPE
address:        Forsyth House
address:        Cromac Square
address:        Belfast
address:        BT2 8LA
phone:          +44 800 107 7979
fax-no:         +44 845 280 4993
abuse-mailbox:  [email protected]
mnt-by:         CATALYST2-MNT
created:        2004-01-12T14:35:03Z
last-modified:  2014-01-14T15:15:38Z
source:         RIPE # Filtered
nic-hdl:        PR42-RIPE

% Information related to '92.242.140.0/24AS45028'

route:          92.242.140.0/24
descr:          BF-MC-1
origin:         AS45028
mnt-by:         CATALYST2-MNT
created:        2008-04-23T11:52:47Z
last-modified:  2008-04-23T11:52:47Z
source:         RIPE

collegetoker

http://edu.run

39.018,-77.539 - Ashburn, Virginia, United States



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/public/whoisinaccuracy/index.xhtml
#


#
# The following results may also be obtained via:
# https://whois.arin.net/rest/nets;q=208.113.128.159?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
#

NetRange:       208.113.128.0 - 208.113.255.255
CIDR:           208.113.128.0/17
NetName:        DREAMHOST-BLK6
NetHandle:      NET-208-113-128-0-1
Parent:         NET208 (NET-208-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   New Dream Network, LLC (NDN)
RegDate:        2006-04-12
Updated:        2012-03-02
Ref:            https://whois.arin.net/rest/net/NET-208-113-128-0-1


OrgName:        New Dream Network, LLC
OrgId:          NDN
Address:        417 Associated Rd.
Address:        PMB #257
City:           Brea
StateProv:      CA
PostalCode:     92821
Country:        US
RegDate:        2001-04-16
Updated:        2017-01-28
Comment:        Address location was created regardless of geographic location.
Ref:            https://whois.arin.net/rest/org/NDN


OrgNOCHandle: NETOP274-ARIN
OrgNOCName:   NetOPs
OrgNOCPhone:  +1-714-706-4182 
OrgNOCEmail:  [email protected]
OrgNOCRef:    https://whois.arin.net/rest/poc/NETOP274-ARIN

OrgAbuseHandle: DAT5-ARIN
OrgAbuseName:   DreamHost Abuse Team
OrgAbusePhone:  +1-714-706-4182 
OrgAbuseEmail:  [email protected]
OrgAbuseRef:    https://whois.arin.net/rest/poc/DAT5-ARIN

OrgTechHandle: NETOP274-ARIN
OrgTechName:   NetOPs
OrgTechPhone:  +1-714-706-4182 
OrgTechEmail:  [email protected]
OrgTechRef:    https://whois.arin.net/rest/poc/NETOP274-ARIN


Host script results:
| dns-brute: 
|   DNS Brute-force hostnames: 
|     mx.edu.run - 208.113.128.159
|     admin.edu.run - 208.113.128.159
|     host.edu.run - 208.113.128.159
|     devel.edu.run - 208.113.128.159
|     stats.edu.run - 208.113.128.159
|     http.edu.run - 208.113.128.159
|     mx0.edu.run - 208.113.128.159
|     development.edu.run - 208.113.128.159
|     administration.edu.run - 208.113.128.159
|     svn.edu.run - 208.113.128.159
|     mx1.edu.run - 208.113.128.159
|     devsql.edu.run - 208.113.128.159
|     id.edu.run - 208.113.128.159
|     ads.edu.run - 208.113.128.159
|     mysql.edu.run - 208.113.128.159
|     syslog.edu.run - 208.113.128.159
|     images.edu.run - 208.113.128.159
|     devtest.edu.run - 208.113.128.159
|     adserver.edu.run - 208.113.128.159
|     test.edu.run - 208.113.128.159
|     news.edu.run - 208.113.128.159
|     info.edu.run - 208.113.128.159
|     dhcp.edu.run - 208.113.128.159
|     alerts.edu.run - 208.113.128.159
|     test1.edu.run - 208.113.128.159
|     noc.edu.run - 208.113.128.159
|     internal.edu.run - 208.113.128.159
|     alpha.edu.run - 208.113.128.159
|     ns.edu.run - 208.113.128.159
|     direct.edu.run - 208.113.128.159
|     ap.edu.run - 208.113.128.159
|     test2.edu.run - 208.113.128.159
|     internet.edu.run - 208.113.128.159
|     ns0.edu.run - 208.113.128.159
|     dmz.edu.run - 208.113.128.159
|     apache.edu.run - 208.113.128.159
|     testing.edu.run - 208.113.128.159
|     intra.edu.run - 208.113.128.159
|     ns1.edu.run - 208.113.128.159
|     dns.edu.run - 208.113.128.159
|     app.edu.run - 208.113.128.159
|     upload.edu.run - 208.113.128.159
|     intranet.edu.run - 208.113.128.159
|     ns2.edu.run - 208.113.128.159
|     vm.edu.run - 208.113.128.159
|     dns0.edu.run - 208.113.128.159
|     ipv6.edu.run - 208.113.128.159
|     ns3.edu.run - 208.113.128.159
|     apps.edu.run - 208.113.128.159
|     vnc.edu.run - 208.113.128.159
|     dns1.edu.run - 208.113.128.159
|     ntp.edu.run - 208.113.128.159
|     lab.edu.run - 208.113.128.159
|     appserver.edu.run - 208.113.128.159
|     voip.edu.run - 208.113.128.159
|     dns2.edu.run - 208.113.128.159
|     ops.edu.run - 208.113.128.159
|     ldap.edu.run - 208.113.128.159
|     aptest.edu.run - 208.113.128.159
|     vpn.edu.run - 208.113.128.159
|     download.edu.run - 208.113.128.159
|     oracle.edu.run - 208.113.128.159
|     linux.edu.run - 208.113.128.159
|     auth.edu.run - 208.113.128.159
|     web.edu.run - 208.113.128.159
|     en.edu.run - 208.113.128.159
|     local.edu.run - 208.113.128.159
|     owa.edu.run - 208.113.128.159
|     web2test.edu.run - 208.113.128.159
|     erp.edu.run - 208.113.128.159
|     backup.edu.run - 208.113.128.159
|     log.edu.run - 208.113.128.159
|     pbx.edu.run - 208.113.128.159
|     eshop.edu.run - 208.113.128.159
|     whois.edu.run - 208.113.128.159
|     beta.edu.run - 208.113.128.159
|     s3.edu.run - 208.113.128.159
|     mail.edu.run - 208.113.128.159
|     exchange.edu.run - 208.113.128.159
|     wiki.edu.run - 208.113.128.159
|     blog.edu.run - 208.113.128.159
|     secure.edu.run - 208.113.128.159
|     mail2.edu.run - 208.113.128.159
|     f5.edu.run - 208.113.128.159
|     www.edu.run - 208.113.128.159
|     cdn.edu.run - 208.113.128.159
|     mail3.edu.run - 208.113.128.159
|     server.edu.run - 208.113.128.159
|     fileserver.edu.run - 208.113.128.159
|     chat.edu.run - 208.113.128.159
|     www2.edu.run - 208.113.128.159
|     mailgate.edu.run - 208.113.128.159
|     shop.edu.run - 208.113.128.159
|     firewall.edu.run - 208.113.128.159
|     citrix.edu.run - 208.113.128.159
|     xml.edu.run - 208.113.128.159
|     main.edu.run - 208.113.128.159
|     sip.edu.run - 208.113.128.159
|     forum.edu.run - 208.113.128.159
|     cms.edu.run - 208.113.128.159
|     manage.edu.run - 208.113.128.159
|     smtp.edu.run - 208.113.128.159
|     ftp.edu.run - 208.113.128.159
|     corp.edu.run - 208.113.128.159
|     mgmt.edu.run - 208.113.128.159
|     ftp0.edu.run - 208.113.128.159
|     crs.edu.run - 208.113.128.159
|     sql.edu.run - 208.113.128.159
|     mirror.edu.run - 208.113.128.159
|     git.edu.run - 208.113.128.159
|     cvs.edu.run - 208.113.128.159
|     squid.edu.run - 208.113.128.159
|     mobile.edu.run - 208.113.128.159
|     gw.edu.run - 208.113.128.159
|     database.edu.run - 208.113.128.159
|     ssh.edu.run - 208.113.128.159
|     monitor.edu.run - 208.113.128.159
|     help.edu.run - 208.113.128.159
|     db.edu.run - 208.113.128.159
|     ssl.edu.run - 208.113.128.159
|     mssql.edu.run - 208.113.128.159
|     helpdesk.edu.run - 208.113.128.159
|     demo.edu.run - 208.113.128.159
|     stage.edu.run - 208.113.128.159
|     mta.edu.run - 208.113.128.159
|     home.edu.run - 208.113.128.159
|_    dev.edu.run - 208.113.128.159

SoldierofLight

I did a quick check on Google maps but didn't find anything next door except a Merrill Lynch building. Can you verify?

collegetoker

Don't do anything too crazy now. I don't want a bodycount on my hands.

Yuke

Opencoporates for New Dream Network, LLC gives two addresses:

135 S. STATE COLLEGE BLVD, STE 500, Brea, CA, 92821

707 WILSHIRE BLVD STE 5050, LOS ANGELES CA 90017

https://opencorporates.com/companies/us_ga/12014142

collegetoker

They added a data center in Aushburn VIrginia

https://discussion.dreamhost.com/thread-137051.html

That is where it is, I can guarantee it.

sound_of_silence

ashburn's not too far from DC..

sound_of_silence

go get the original file from the host..

collegetoker

I'm nowhere near there and I don't have the equipment. We're either going to need law enforcement, an inside man, or to hack in.

sound_of_silence

maybe just ask /pol/ for assistance..

sound_of_silence

archived - https://archive.fo/5Se1y

could start troll demand campaign on dh discussion board.. https://discussion.dreamhost.com/

paulieweb

Dreamhost is a pretty big, standard hosting service. Not sure what you think you have here??

EvaEverywhere

Yeah, this provides nothing, just points to a very common used hosting provider that is quite shitty and unhelpful to their clients.

collegetoker

A state, a city, and GPS coordinates. That's what I think I have. Did you even read all the way down?

turn-down-for-what

Dreamhost has hundreds of thousands of clients. Worldcorpo is just one of them. If we run under the assumption that Dreamhost puts customer's websites on the data center closest to the customers billing address (not a crazy assumption) then we know the operator lives in the VA/DC area. That's it.

Sure, go storm Dreamhosts's castle for the 50mb of Worldcorpo data stored on a hard drive on a server on a rack in a cage. I'm not sure what you'll accomplish though.

I think the most effective attack vector would be to call Dreamhost pretending to have forgotten your password or whatever and do a little social engineering to try and get an email address or name associated with the account.

collegetoker

> Sure, go storm Dreamhosts's castle for the 50mb of Worldcorpo data stored on a hard drive on a server on a rack in a cage. I'm not sure what you'll accomplish though.

We have physical evidence of a crime taking place and we know where that evidence is. Was getting the police involved ever part of the plan?

> If we run under the assumption that Dreamhost puts customer's websites on the data center closest to the customers billing address (not a crazy assumption) then we know the operator lives in the VA/DC area. That's it.

I'd need to know how many datacenters there are to make an assumption like that.

> I think the most effective attack vector would be to call Dreamhost pretending to have forgotten your password or whatever and do a little social engineering to try and get an email address or name associated with the account.

> Asking a literal autist to do social engineering.

I can see what I can do, but you're leaving my skillset. It would be better to do a dry run first on one's own account so that they know what questions to expect.

LargePepperoni

Careful doing social engineering. You can get prison time.

madhatter67

unless you are socially engineering society to accept pedophilia....in which case you are likely to get promoted

collegetoker

Hopefully this is useful to somebody.

ArthurEdens

I think someone found that out a while back and it only added to the mystery

fartyshorts

I looked in to all of this before. The same host that hosts worldcorpo hosts several domains that are all mirrors of worldcorpo. They all have hidden names, except one. That one is owned by a (female) nerd who works at NASA. I still have all of this in my notes somewhere.

collegetoker

Where did they think it's from? Because I 100 percent know where it is and I know that it's hosted on a server with another website (or a mirrror of worldcorpo) on it. It's flarum.cn, but it's the same site.

ArthurEdens

I think they found a few locations like LA, NJ, and Austrailia. Can't for sure remember. (voat search isn't working for me). And they found a link to another site too. You should definitely post what you got anyway.

collegetoker

Put my proverbial balls on the table. What I know, how I know it, and how I know it isn't bullshit.

ArthurEdens

If it's risky, then back off i guess. If it's a big lead, leave a breadcrumb on 4chan or here that won't put you in a spot. What people really want to know is worldcorp's intentions. Are they messing with people or trying help. And they want to see who is the abuser is.