Skip to main content

关于最近台海形势

 发信人: magicknight (I am always love you baby.), 信区: Military
标  题: 关于最近台海形势,我从中南海得到的情况是这样的
发信站: BBS 未名空间站 (Thu Nov  4 12:56:56 2021, 美东)

1,拜登靠印钱救国内经济,需要中国吸收多余的货币来维持。
拜登已经把包括比特币之类的牌都用尽了。比特币及其衍生品能吸收几百亿$,多了也
不行。
台湾明年的国防预算大幅增加,也是要通过军售吸收美元。

2,拜登为了逼迫中国下场救火,试过了新疆,香港,印度牌,不好使。

3,拜登这次要亮最大的牌,就是台湾牌。台湾牌已经在50年前用了一半,那时候的美
国政府不公开承诺过一些事情,但拜登这次火烧眉毛,准备撕毁当时的承诺。中国几次
三番公开呼吁美国信守承诺,也是为了这个。

4,亮牌之前要估价。台湾的价值就是当下发动台海战争,中国需要付出的代价。

5,现在台湾民心可用,包括政府上下也都是美国代理人,美国已经向中国表明美国有
能力在美国选定的时间点起爆台海战争。

6,中国如果答应下场救火,需要付出的代价大概在5万亿$左右,分几年吸收美国多余
货币,直到美国撑过疫情。

7,中国如果不答应,需要付出更多代价摆平台湾。

8,我堂叔和其他同事最近天天在中南海通宵达旦工作,就是在研究怎么破美国的这次
讹诈。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...