+ Reply to Thread
Page 1 of 2 1 2 LastLast
Results 1 to 20 of 23

Thread: Intel computers hide another CPU that can take over your machine

  1. Link to Post #1
    Avalon Member Builder's Avatar
    Join Date
    3rd June 2015
    Location
    Earth
    Posts
    285
    Thanks
    144
    Thanked 1,467 times in 267 posts

    Unhappy Intel computers hide another CPU that can take over your machine

    "Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine."

    http://boingboing.net/2016/06/15/int...ship-with.html

  2. The Following 29 Users Say Thank You to Builder For This Post:

    betoobig (16th June 2016), Bill Ryan (16th June 2016), Chip (16th June 2016), Constance (16th June 2016), cursichella1 (16th June 2016), Daozen (16th June 2016), Elisheva (23rd June 2016), fourty-two (16th June 2016), Hervé (16th June 2016), Inversion (16th June 2016), jjjones (17th June 2016), justntime2learn (17th June 2016), kanishk (17th June 2016), mab777 (17th June 2016), marique3652 (22nd June 2016), Michelle Marie (16th June 2016), muxfolder (16th June 2016), PRAGMAE (22nd June 2016), quiltinggrandma (17th June 2016), Richard S. (16th June 2016), seko (16th June 2016), Sierra (18th June 2016), Sunny (19th June 2016), Sunny-side-up (16th June 2016), toppy (17th June 2016), TraineeHuman (17th June 2016), WhiteLove (16th June 2016), Yetti (16th June 2016), ZooLife (16th June 2016)

  3. Link to Post #2
    Scotland Avalon Member
    Join Date
    16th February 2012
    Posts
    2,035
    Thanks
    2,282
    Thanked 9,410 times in 1,804 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Worth a thread on it's own. I've been doing my own reading about Google today, another military industrial corporation masquerading as a cute company.....

    "Intel", hiding in plain view. And what is Google's parent company now called? Alphabet.

  4. The Following 19 Users Say Thank You to Daozen For This Post:

    betoobig (16th June 2016), Bill Ryan (16th June 2016), Chip (16th June 2016), cursichella1 (16th June 2016), Elisheva (23rd June 2016), fourty-two (16th June 2016), Inversion (16th June 2016), jjjones (17th June 2016), justntime2learn (17th June 2016), kirolak (16th June 2016), marique3652 (22nd June 2016), Michelle Marie (16th June 2016), quiltinggrandma (17th June 2016), seko (16th June 2016), Sunny (19th June 2016), Sunny-side-up (16th June 2016), toppy (17th June 2016), TraineeHuman (17th June 2016), ZooLife (16th June 2016)

  5. Link to Post #3
    Avalon Member Carmody's Avatar
    Join Date
    19th August 2010
    Location
    Winning The Galactic Lottery
    Posts
    11,389
    Thanks
    17,597
    Thanked 82,316 times in 10,234 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    I mentioned, on this forum, at various times and places.... that this was being done with telecommunications hardware, to my direct communicated knowledge, since approx 1993.

    Ie, that I've known of this secondary control set and feature that comes in on normal (inescapable) signal pathways, for 23 years.

    Consider the takeover story of Cisco, as they are now -the- internet backbone company.

    The origins go all the way back to the Atlas rocket program and how the scientists involved (the first hackers) created the basis for the arpanet. (another story I received first hand)

    Thus, as the logic dominoes fall, the idea of Chinese chipsets (or whatever) that might do unwanted things, just got very very real.



    Esoterically, it's a case of as above, so below: You...are a hybrid... a foreign program inserted as an overlay on a biological. In a holographic seeming temporally inclined dimensional 'space'.

    The biological has override programs. Fear, love, hate, pain, reflex, complex processing systems like the gut, etc...

    We call some leveraged activations of some of those override features that are always active and running in the biological...we call them... 'false flags'.
    Last edited by Carmody; 16th June 2016 at 14:25.
    Interdimensional Civil Servant

  6. The Following 22 Users Say Thank You to Carmody For This Post:

    betoobig (16th June 2016), Bill Ryan (16th June 2016), Chip (16th June 2016), conk (16th June 2016), cursichella1 (16th June 2016), Daozen (16th June 2016), Elisheva (23rd June 2016), Fellow Aspirant (23rd June 2016), fourty-two (16th June 2016), Hervé (16th June 2016), Jean-Marie (16th June 2016), jjjones (17th June 2016), justntime2learn (17th June 2016), kirolak (16th June 2016), quiltinggrandma (17th June 2016), seko (16th June 2016), Sierra (18th June 2016), Sunny (19th June 2016), toppy (17th June 2016), TraineeHuman (17th June 2016), Yetti (16th June 2016), ZooLife (16th June 2016)

  7. Link to Post #4
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,589
    Thanks
    30,509
    Thanked 138,461 times in 21,498 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Quote Posted by Carmody (here)
    I mentioned, on this forum, at various times and places.... that this was being done with telecommunications hardware, to my direct communicated knowledge, since approx 1993.
    Similarly I've known of the parallel management channels in Intel processors, visible in such features as Wake-On LAN for Intel®, for at least a couple of decades, and with more advanced system management facilities in Intel's server line of CPU's (Xeon and Itanium).

    That's an interesting analogy you make between the hybrid layering of humanity, and these parallel control channels in networking and processing hardware. Thanks.
    My quite dormant website: pauljackson.us

  8. The Following 15 Users Say Thank You to ThePythonicCow For This Post:

    Bill Ryan (16th June 2016), Carmody (16th June 2016), Chip (16th June 2016), cursichella1 (16th June 2016), Elisheva (23rd June 2016), fourty-two (16th June 2016), jjjones (17th June 2016), justntime2learn (17th June 2016), kirolak (16th June 2016), PathWalker (17th June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016), Sunny (19th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  9. Link to Post #5
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,589
    Thanks
    30,509
    Thanked 138,461 times in 21,498 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Quote Posted by Paul (here)
    Similarly I've known of the parallel management channels in Intel processors, visible in such features as Wake-On LAN for Intel®, for at least a couple of decades, and with more advanced system management facilities in Intel's server line of CPU's (Xeon and Itanium).
    And, of course, there's another example of a covert layered control channel hiding in plain sight - there is increasing use of virtual machines, presently in the server world, and tentatively in the desktop personal computer world (such as with Qubes and Wine).

    In a virtual machine, the "computer" you think you are using is running on top of another layer of software, that has complete control over everything coming in and out of the virtualized computer. My Linode.com "box" that I use to support several websites, such as projectavalonstatus.net, is such a virtual box, allowing me to stop, and start, and reconfigure the "server" (virtualized computer running inside an actual server somewhere inside Linode.com) at will, from my North Texas trailer, with no physical contact or involvement by real human Linode employees.

    In short, most any sufficiently advanced technology is capable of such magic layering ... indeed ... that layering of structure is ubiquitous in our universe. In the grand scheme of things, the layers are either self-organizing and forming, or created by some higher power. Then we humans, and apparently other intelligent beings such as might have crafted us humans, construct more such layers, of more mundane natures.

    Such layering creates opportunities for out-of-channel information sharing and control, invisible to those confined to some other layer.
    Last edited by ThePythonicCow; 16th June 2016 at 16:10.
    My quite dormant website: pauljackson.us

  10. The Following 13 Users Say Thank You to ThePythonicCow For This Post:

    Carmody (16th June 2016), Elisheva (23rd June 2016), fourty-two (16th June 2016), justntime2learn (18th June 2016), kirolak (16th June 2016), Magnus (22nd June 2016), PathWalker (17th June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016), Sunny (19th June 2016), toppy (17th June 2016), TraineeHuman (17th June 2016), ZooLife (16th June 2016)

  11. Link to Post #6
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,589
    Thanks
    30,509
    Thanked 138,461 times in 21,498 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Quote Posted by Paul (here)
    Such layering creates opportunities for out-of-channel information sharing and control, invisible to those confined to some other layer.
    Yet another example: the presently infamous "spooky action at a distance" discussed in quantum mechanics is likely, in my view, just another example of something that likely could be described easily using the layer of physical ordering once known as the "aether", but which seems magical when we insist on explaining it using only some other layer, such as that of matter and mathematically abstracted fields such as electro-magnetism, gravity, strong and weak forces.
    My quite dormant website: pauljackson.us

  12. The Following 12 Users Say Thank You to ThePythonicCow For This Post:

    Bill Ryan (16th June 2016), Carmody (16th June 2016), conk (16th June 2016), Elisheva (23rd June 2016), fourty-two (16th June 2016), justntime2learn (18th June 2016), Magnus (22nd June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016), Sunny (19th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  13. Link to Post #7
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,589
    Thanks
    30,509
    Thanked 138,461 times in 21,498 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    I have long thought that the key to the organization of computer software and hardware was the organization of the human individuals, teams, businesses, etc that created that software and hardware.

    Carmody's point, before I wander too far off topic, seems to me to be that this same rule of thumb applies to the organization of the "wetware" known as humans. Our organization, both as individual beings and as civilizations, likely reflects the ordering and organization of higher entities that have played critical defining roles in our creation and evolution.
    My quite dormant website: pauljackson.us

  14. The Following 10 Users Say Thank You to ThePythonicCow For This Post:

    Bill Ryan (16th June 2016), Carmody (16th June 2016), Elisheva (23rd June 2016), fourty-two (16th June 2016), justntime2learn (18th June 2016), kirolak (16th June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  15. Link to Post #8
    Avalon Member
    Join Date
    4th December 2014
    Posts
    1,442
    Thanks
    2,127
    Thanked 8,789 times in 1,357 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    This article is jaw dropping. This whole design appears to be built around remotely executing any process on any target Intel X86 based system for any duty anywhere at any time with maximum access to the target, limiting the access to these processes and encrypting the activities so hard that it is impossible do decode the process and the communication.

    This really appears to be some kind of globally controlled military control mechanism. This is very disturbing in many ways...

  16. The Following 10 Users Say Thank You to WhiteLove For This Post:

    Bill Ryan (16th June 2016), Elisheva (23rd June 2016), justntime2learn (18th June 2016), kirolak (16th June 2016), Open your eyes (17th June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016), Sunny (19th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  17. Link to Post #9
    Avalon Member Carmody's Avatar
    Join Date
    19th August 2010
    Location
    Winning The Galactic Lottery
    Posts
    11,389
    Thanks
    17,597
    Thanked 82,316 times in 10,234 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Quote Posted by WhiteLove (here)
    This article is jaw dropping. This whole design appears to be built around remotely executing any process on any target Intel X86 based system for any duty anywhere at any time with maximum access to the target, limiting the access to these processes and encrypting the activities so hard that it is impossible do decode the process and the communication.

    This really appears to be some kind of globally controlled military control mechanism. This is very disturbing in many ways...
    The majority of all mainframe and individual telecommunications hardware from the big suppliers, in all of the western world... was built this way since approximately 1995. they did not have the data handling capacity at the time, so the usage was selective. Then. Not now. Now we have all of it recorded and kept. All.

    Computers are late to the game as they are the newest kids on the block. But they have moved up fast, to surpass the telecommunications systems of the recent past.



    The attack is against encrypted software, or encrypted data, as the encryption, if well done, can have the data being passed through any system ---without being in any sort of danger of being decoded or understood.
    Last edited by Carmody; 16th June 2016 at 17:12.
    Interdimensional Civil Servant

  18. The Following 10 Users Say Thank You to Carmody For This Post:

    Elisheva (23rd June 2016), fourty-two (16th June 2016), Hervé (16th June 2016), kirolak (16th June 2016), quiltinggrandma (17th June 2016), seko (16th June 2016), Sierra (18th June 2016), Sunny (19th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  19. Link to Post #10
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,589
    Thanks
    30,509
    Thanked 138,461 times in 21,498 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Quote Posted by WhiteLove (here)
    This article is jaw dropping. This whole design appears to be built around remotely executing any process on any target Intel X86 based system for any duty anywhere at any time with maximum access to the target, limiting the access to these processes and encrypting the activities so hard that it is impossible do decode the process and the communication.
    It (this layered structure) made perfectly good sense to me at the time, when I was involved in designing and developing systems for use by large corporate and government customers. It was, and remains, important to those customers to be able to manage their computation, storage, communication, sensory and robotic resources, in a separate control layer, as resources per se, distinct from and with zero impact on the specific programs running within them.

    Another example might be suggestive. A large trucking, rail and shipping firm will want to manage its trucks, railcars, containers, and ships, keeping track of and controlling what's where, doing what, independently of, but controlling and monitoriing, what individual truck drivers, rail engineers and ship crew might be doing.

    The existence of such layered control and monitoring systems is not ipso facto evil ... but such existence can be evidence of an underlying control structure over human civilization that may well be, in human terms, quite evil.
    My quite dormant website: pauljackson.us

  20. The Following 8 Users Say Thank You to ThePythonicCow For This Post:

    Carmody (16th June 2016), Daozen (16th June 2016), kirolak (16th June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016), Sunny (19th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  21. Link to Post #11
    Avalon Member Carmody's Avatar
    Join Date
    19th August 2010
    Location
    Winning The Galactic Lottery
    Posts
    11,389
    Thanks
    17,597
    Thanked 82,316 times in 10,234 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Quote Posted by Paul (here)
    Quote Posted by WhiteLove (here)
    This article is jaw dropping. This whole design appears to be built around remotely executing any process on any target Intel X86 based system for any duty anywhere at any time with maximum access to the target, limiting the access to these processes and encrypting the activities so hard that it is impossible do decode the process and the communication.
    It (this layered structure) made perfectly good sense to me at the time, when I was involved in designing and developing systems for use by large corporate and government customers. It was, and remains, important to those customers to be able to manage their computation, storage, communication, sensory and robotic resources, in a separate control layer, as resources per se, distinct from and with zero unintended impact on the specific programs running within them.

    Another example might be suggestive. A large trucking, rail and shipping firm will want to manage its trucks, railcars, containers, and ships, keeping track of and controlling what's where, doing what, independently of, but controlling and monitoriing, what individual truck drivers, rail engineers and ship crew might be doing.

    The existence of such layered control and monitoring systems is not ipso facto evil ... but such existence can be evidence of an underlying control structure over human civilization that may well be, in human terms, quite evil.
    You might even say that the systems are useless or without a good half or more of their potential function available, if they did not have it.

    In the case of the average person's concern, a backdoor is potential for abuse and cannot be tolerated, like a place on the body where a virus can enter and wreak havoc.

    Trust has to be earned, and the powers at large are so far down the untrustable and devious/malicious end of the pier... that it seems they'll never get to neutral in the next thousand years, If at all.
    Last edited by ThePythonicCow; 16th June 2016 at 18:09.
    Interdimensional Civil Servant

  22. The Following 11 Users Say Thank You to Carmody For This Post:

    Daozen (16th June 2016), fourty-two (16th June 2016), Foxie Loxie (16th June 2016), Hervé (16th June 2016), kirolak (16th June 2016), quiltinggrandma (17th June 2016), seko (16th June 2016), Sierra (18th June 2016), ThePythonicCow (16th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  23. Link to Post #12
    Avalon Member Builder's Avatar
    Join Date
    3rd June 2015
    Location
    Earth
    Posts
    285
    Thanks
    144
    Thanked 1,467 times in 267 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    There is also a secondary system in every phone:
    http://www.osnews.com/story/27416/Th...y_mobile_phone

  24. The Following 14 Users Say Thank You to Builder For This Post:

    Carmody (16th June 2016), Elisheva (23rd June 2016), fourty-two (16th June 2016), Foxie Loxie (16th June 2016), Hervé (16th June 2016), kirolak (16th June 2016), mab777 (17th June 2016), PRAGMAE (22nd June 2016), quiltinggrandma (17th June 2016), seko (16th June 2016), Sierra (18th June 2016), Sunny (19th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  25. Link to Post #13
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,589
    Thanks
    30,509
    Thanked 138,461 times in 21,498 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Quote Posted by Carmody (here)
    In the case of the average person's concern, a backdoor is potential for abuse and cannot be tolerated, like a place on the body where a virus can enter and wreak havoc.

    Trust has to be earned, and the powers at large are so far down the untrustable and devious/malicious end of the pier... that it seems they'll never get to neutral in the next thousand years, If at all.
    Trust, and understanding/awareness.

    What we do not understand is often threatening ... strange things go bump in the darkness of our confusion. Sometimes the resulting fear is entirely appropriate, sometimes not.

    When we do understand, we can distinguish the sound of our family cat jumping up on the dresser to take a nap on a soft pile of clothes, from the sound of a burglar or "man-in-black" abductor. Our response can be more refined and appropriate, and our fears less vague, ubiquitous and often misplaced.
    My quite dormant website: pauljackson.us

  26. The Following 7 Users Say Thank You to ThePythonicCow For This Post:

    Carmody (16th June 2016), Foxie Loxie (16th June 2016), jitu (17th June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  27. Link to Post #14
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,589
    Thanks
    30,509
    Thanked 138,461 times in 21,498 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Quote Posted by Builder (here)
    There is also a secondary system in every phone:
    http://www.osnews.com/story/27416/Th...y_mobile_phone
    Nice one. Another instance of such a secondary system is being created as we write, in programmable home routers: MIPS VM tech lets routers stay open despite new FCC rules.
    My quite dormant website: pauljackson.us

  28. The Following 10 Users Say Thank You to ThePythonicCow For This Post:

    Carmody (16th June 2016), Foxie Loxie (16th June 2016), Hervé (16th June 2016), kirolak (16th June 2016), quiltinggrandma (17th June 2016), seko (16th June 2016), Sierra (18th June 2016), Sunny (19th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  29. Link to Post #15
    Finland Avalon Member muxfolder's Avatar
    Join Date
    27th April 2010
    Location
    jossain
    Age
    47
    Posts
    751
    Thanks
    5,051
    Thanked 3,851 times in 668 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    I'm sure this same technology is in AMD-processors as well although it's not mentioned here. But it's for our benefit of course, or at least that's what they're trying to tell us.

  30. The Following 6 Users Say Thank You to muxfolder For This Post:

    Carmody (16th June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016), ThePythonicCow (16th June 2016), toppy (17th June 2016), ZooLife (16th June 2016)

  31. Link to Post #16
    United States Avalon Member conk's Avatar
    Join Date
    17th March 2010
    Location
    Alabama
    Language
    Southern English
    Posts
    3,937
    Thanks
    11,067
    Thanked 11,145 times in 2,998 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Carmody says "Now we have all of it recorded and kept. All." What a monumental chore, cataloging and retrieving such an Everest of data!
    The quantum field responds not to what we want; but to who we are being. Dr. Joe Dispenza

  32. The Following 4 Users Say Thank You to conk For This Post:

    Daozen (16th June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016), toppy (17th June 2016)

  33. Link to Post #17
    France On Sabbatical
    Join Date
    7th March 2011
    Location
    Brittany
    Posts
    16,763
    Thanks
    60,315
    Thanked 95,891 times in 15,481 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    ^^^ Google and its fame search engine is their friend...
    "La réalité est un rêve que l'on fait atterrir" San Antonio AKA F. Dard

    Troll-hood motto: Never, ever, however, whatsoever, to anyone, a point concede.

  34. The Following 3 Users Say Thank You to Hervé For This Post:

    quiltinggrandma (17th June 2016), Sierra (18th June 2016), ThePythonicCow (16th June 2016)

  35. Link to Post #18
    Avalon Member Carmody's Avatar
    Join Date
    19th August 2010
    Location
    Winning The Galactic Lottery
    Posts
    11,389
    Thanks
    17,597
    Thanked 82,316 times in 10,234 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Quote Posted by muxfolder (here)
    I'm sure this same technology is in AMD-processors as well although it's not mentioned here. But it's for our benefit of course, or at least that's what they're trying to tell us.
    I was just thinking about going AMD for that very reason. to get away from Intel. but....I'd have to research that first.
    Interdimensional Civil Servant

  36. The Following 6 Users Say Thank You to Carmody For This Post:

    Hervé (17th June 2016), hohoemi (17th June 2016), muxfolder (17th June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016), ThePythonicCow (17th June 2016)

  37. Link to Post #19
    United States Avalon Member
    Join Date
    28th December 2013
    Age
    65
    Posts
    406
    Thanks
    770
    Thanked 1,076 times in 332 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    That's why I like person to person communication, internet is not safe anymore !

  38. The Following User Says Thank You to Yetti For This Post:

    quiltinggrandma (17th June 2016)

  39. Link to Post #20
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,589
    Thanks
    30,509
    Thanked 138,461 times in 21,498 posts

    Default Re: Intel computers hide another CPU that can take over your machine

    Quote Posted by Carmody (here)
    I was just thinking about going AMD for that very reason. to get away from Intel. but....I'd have to research that first.
    Let us know if you figure anything out.
    My quite dormant website: pauljackson.us

  40. The Following 5 Users Say Thank You to ThePythonicCow For This Post:

    Elisheva (23rd June 2016), Hervé (17th June 2016), hohoemi (17th June 2016), quiltinggrandma (17th June 2016), Sierra (18th June 2016)

+ Reply to Thread
Page 1 of 2 1 2 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts