Skip to main content

徐州铁链女案情的客观深入分析

 发信人: zmimy02 (mimi), 信区: Military
标  题: 徐州铁链女案情的客观深入分析。非洗地
发信站: BBS 未名空间站 (Tue Feb 15 10:29:53 2022, 美东)

结婚证照片出来后,一切有了合情合理的解释。

根据最新的反馈,该结婚证照片已经证实是小花梅。

所以以下事实全部成立:

1。该小花梅的确是云南人。小花梅1979前后生人。
2。的确存在拐卖事实。也的确存在走失
3。小花梅在此前已经有精神问题
4。全部八个小孩都是该小花梅所生。证实铁链女就是小花梅

就事论事。此时已经没有太多讨论空间。

其余什么口音问题,容貌问题,年龄问题,李莹问题都属于枝节,不需要太多关注,无
法撼动基本事实

承认徐州还有很多被拐卖的女人,也承认铁链女事件中有很多违法和不规范的做法。但
这都属于其它问题,可以分开讨论。

Comments

  1. 
本来她可能很绝望
但是看了太多要解救她的人
见了太多来调查她的人
她会意识到原来我才是幸福的。

而为了大多数人的幸福,一定要让她被坑蒙拐骗,一定要拆散她的家,一定要烧了她的破房子,孩子们必须是不同的三个以上的爹。。

这样,很多人才满足才幸福。


    ReplyDelete

Post a Comment

https://gengwg.blogspot.com/

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...