We passed the member login of Comet again: www.cometpingpong.com/protected
Inside, two of the encrypted zip folders in the list contained the date-- 09-09-2015: https://i.redditmedia.com/87fWSaTJAGNE9-n4Gh0oYEGkmDfBcTbzrV4xnl6rg0A.jpg?w=1024&s=7b50d00dec61d5994dfcc654a52d899c
I cross referenced the date with the Clinton and Podesta wikileaks emails and sure enough:
https://wikileaks.org/podesta-emails/emailid/53200
PODESTA HAD DINNER WITH ALAFANTIS AT COMET THE NIGHT OF THAT DATE.
Are they recording this?
Without the encryption key (or a better understanding) I don't know how we can access these.
I will be sharing my final findings of my Comet Servers/ Biff Skipman Investigation too.
I heard the concerns but I'm back.
Reconfigured my tor relays so I'm ready to finish this.
We are so close.
The noose draws ever tighter.
Happy Hunting.
view the rest of the comments →
Prepper_Jack ago
This is my concern. It could be a part of the default Jimdo management interface, or it could be part of a common app that's installed. It could be for financial transactions, we don't know.
I will say that the AMP.txt leads me to believe that it's part of the website interface, as that can easily stand for accelerated mobile pages. If that's the case, it could be the automated archives of the website, when they were making changes and uploading new content.
Melitica ago
I would agree that is a part of the basic build. Possibly a way to get into website w.o going to host. Similar to signing in to Wordpress but less familiar.
siriansun ago
Exactly, my thoughts as well. Will be interesting to see if anything comes out of this, but even the URL in the screenshot is throwing me off.