General statistics
List of Youtube channels
Youtube commenter search
Distinguished comments
About
H33t3
Mental Outlaw
comments
Comments by "H33t3" (@H33t3Speaks) on "Mental Outlaw" channel.
Buy. The. Content. How YouTube isn’t taken down by DMCA is absolutely fucking beyond me. I say this as a former Free-Software guy. Fuck this place.
57
👮🏻♂️: “Hello my fellow antifa, do you require material assistance in commiting a serious felony?”
21
If 50 years can tale down General Electric, these sites will be lucky too last another 5 years in there current incarnation. Just wait until they diversify into the financial sector. They’re monied-morons, most of it will fly away.
10
Oh… oh child. The things you’ll find with a decompiler.
9
What’s infuriating is that it all comes from only several 2M (2,000,000) client wide subnets. Western cyberspace could be fixed with IP bans. But nooooo, we can’t have nice things.
5
Return to the Command Line Embrace Tradition and Virtue
5
Not running Gentoo on the hardware: Absolutely plebeian.
2
@notsteve5927 Please research “Grey Zone Warfare” and sit down.
2
One time I put an Ubuntu disc in the A: drive, upside down and got a working install. I never considered all my time in Linux as a waste, it’s helped me PROFOUNDLY. Gentoo ftw
2
Imagine using KDE lmaoooo
2
💯👆🏻
2
Yes, the cab is outside!
2
They trained it on the DOJ archives of seized CSAM. Quite brilliant, in theory. We’ll see how it goes.
2
Thinking Chromium isn’t pozzed is beyond amusing. Sorry bud 💯
1
YouTube and all the Dinosaur Web 2.0's are currently undergoing serious backend retooling to combat intensely sophisticated hacking campaigns from China, as the stage of using cybertronic penetration moves from espionage into psychological warfare. The entire Web 2.0 sphere of social media is overthrown with FORINTS PsyOps that have been dripping all forms of extremism into the West, too great effect. Radical advancements in AI (I'm looking directly at GPT-3 here) have made it possible for a single military psychological operator to have quite a bit of fun on a cybernet that assumes implicit trust relationships via it's implied client-sever models. I'd share more thoughts on this but, I have an enemy.
1
I won't even be able to think as slow as normies in the fucking grave lmao
1
It’s literally just comparing MD5 hashes of confiscated material and flagging accounts. This totally can’t go wrong guys! *PUNCHES TEETH*
1
log2pwn Java was a mistake.
1
Have you heard of PLA Unit 61716?
1
Based and Fedpilled
1
See’s title: Yes.
1
Pfffffft bahahahahhahahahahahahahaha EVERYBODY PIONT AND LAUGH. GET STRAPPED UP BOIS
1
A proper MITM hijacks anything. Rawr. Endless zombies.
1
Response: UCC 1-308 ALL RIGHTS RESERVED
1