HACKER VOICE REVEAL! Is Project Zorgo a YouTuber in Real Life? (Found Spy Device in Safe House) - Summary

Summary

The conversation revolves around a group of individuals (referred to as "ninjas") who have recently made

Facts

1. The discussion revolves around a group of individuals who are trying to identify the identity of a hacker or hackers. They suspect that the hacker may have left a GoPro camera in a safe house.
2. The group has previously had a confrontation with a hacker who was disguised and had a deep voice, which may have been faked with a mask.
3. The hacker is suspected of having a British accent, and the group is considering the possibility that one of their members, Marlon, may have been the hacker.
4. The group has been tracking the hacker's activities and is looking for clues to identify them. They have also been watching videos of the hacker for any clues.
5. The group is seeking help from their followers to identify the hacker's voice from the videos they have.
6. They suspect that the hacker may have been in their safe house when they were away, having moved to Florida for a while.
7. The group has a video footage of a meeting they had with a hacker, and they are considering playing this video to their followers to help identify the hacker.
8. The group has been trying to figure out who a "voice" belongs to and are considering playing a video of this voice to their followers.
9. The group has been trying to identify who they thought were the hackers, and they are considering calling some of these people.
10. The group has been observing the behavior of individuals they suspect to be the hackers and have noticed secretive behavior.
11. The group has been trying to figure out whether a person named Liz was involved with the hackers, based on their suspicions and observations.
12. The group has moved out of their original location and have moved to a new location in Los Angeles.
13. The group is asking their followers a specific question about their favorite snack, and they are considering whether to do a 'word association' activity to identify the hacker.
14. The group has been trying to figure out who a "voice" belongs to and are considering playing a video of this voice to their followers.
15. The group has been trying to figure out whether a person named Liz was involved with the hackers, based on their suspicions and observations.
16. The group has been trying to figure out whether a person named Rebecca was involved with the hackers, based on their suspicions and observations.
17. The group has been trying to figure out whether a person named Marlon was involved with the hackers, based on their suspicions and observations.
18. The group has found a GoPro camera in a cupboard in their safe house, which they suspect may have been left by the hacker.
19. The group is considering the possibility that the hacker may have been in their safe house when they were away, having moved to Florida for a while.
20. The group is seeking help from their followers to identify the hacker's voice from the videos they have.
21. The group has been trying to figure out who a "voice" belongs to and are considering playing a video of this voice to their followers.
22. The group has been trying to figure out whether a person named Liz was involved with the hackers, based on their suspicions and observations.
23. The group has been trying to figure out whether a person named Rebecca was involved with the hackers, based on their suspicions and observations.
24. The group has been trying to figure out whether a person named Marlon was involved with the hackers, based on their suspicions and observations.
25. The group has found a GoPro camera in a cupboard in their safe house, which they suspect may have been left by the hacker.
26. The group is considering the possibility that the hacker may have been in their safe house when they were away, having moved to Florida for a while.
27. The group is seeking help from their followers to identify the hacker's voice from the videos they have.
28. The group has been trying to figure out who a "voice" belongs to and are considering playing a video of this voice to their followers.
29. The group has been trying to figure out whether a person named Liz was involved with the hackers, based on their suspicions and observations.
30. The group has been trying to figure out whether a person named Rebecca was involved with the hackers, based on their suspicions and observations.
31. The group has been trying to figure out whether a person named Marlon was involved with the hackers, based