There are others who have been researcher the patterns. Aym not solo in this -- and it has been suggested for some time actually -- but the patterns have become too cogent to dismiss any longer. Ayh have seen the data discrepancies my self and have seen high end cryptographers examine how the algorithms assemble and then fire back data for "validation".
Meanwhile the retorts to this conspiracy theory has been still just "a packet of mysterious data algorithmically resorted and decrypted/encrypted for absolutely no purposeful reason"
There are others who have been researcher the patterns. Aym not solo in this -- and it has been suggested for some time actually -- but the patterns have become too cogent to dismiss any longer. Ayh have seen the data discrepancies my self and have seen high end cryptographers examine how the algorithms assemble and then fire back data for "validation".
Meanwhile the retorts to this conspiracy theory has been still just "a packet of mysterious data algorithmically resorted and decrypted/encrypted for absolutely no purposeful reason"
Salsa?