Your right if Joe Blow can half way figure it out, don't you think NSA and cyber command can. They know what happened, problem is what is anybody going to do about it? Apparently nothing!
I had! Further scrutiney is this: Either the perps were so stupid as to not hide their IP (doubtful) or so arrogant they thought it wouldn't matter (again doubtful, considering Hillary lost the last election). Or as you said, spoofing was involved. But that too seems fishy... because they used masks still pointed to China and Iran. Or last, the entire set up was a fraud (again unlikely).
My guess is the infrastructure in place must have been smart enough to decipher the inbound masking to determine the actual origin. Is that possible? I don't know. Any techs out there?
I am at a point where all of this seems necessary. The elections must be shown to be severely compromised on a national level. It must unroll at a reasonable pace. We have to see what it has done. These people aren't elected. They never were elected. This has been going on for years.
Mike is not technical. Not even close. Simply the use of the word "super computer" is all you need for that verification. This algorithm could be done from a laptop if one wanted. A basic server is all one needs to perform such operations. If this information is presented in any court they won't have much choice but to admit it is proven to be a scam. What do they do to fix it? i have no idea,
Your right if Joe Blow can half way figure it out, don't you think NSA and cyber command can. They know what happened, problem is what is anybody going to do about it? Apparently nothing!
I had! Further scrutiney is this: Either the perps were so stupid as to not hide their IP (doubtful) or so arrogant they thought it wouldn't matter (again doubtful, considering Hillary lost the last election). Or as you said, spoofing was involved. But that too seems fishy... because they used masks still pointed to China and Iran. Or last, the entire set up was a fraud (again unlikely).
My guess is the infrastructure in place must have been smart enough to decipher the inbound masking to determine the actual origin. Is that possible? I don't know. Any techs out there?
From what I've seen, they have public source and destination IPs. They also looked up the IP block owners and listed them.
They leaked enough of this information early on that I'm confident they "have it all".
I'll have to go back and find the screenshot I took. It shows source/dest/block owner/vote count and who the votes were given too.
I looked up several of these IP addresses and they were correct.
Could this still all be a Psyop? Sure. I'm still holding out thought.
Image of screen capture on iPhone of connections to election equipment
I am at a point where all of this seems necessary. The elections must be shown to be severely compromised on a national level. It must unroll at a reasonable pace. We have to see what it has done. These people aren't elected. They never were elected. This has been going on for years.
Mike is not technical. Not even close. Simply the use of the word "super computer" is all you need for that verification. This algorithm could be done from a laptop if one wanted. A basic server is all one needs to perform such operations. If this information is presented in any court they won't have much choice but to admit it is proven to be a scam. What do they do to fix it? i have no idea,
Idk seems like a horse and pony show at this point