CodeMonkeyZ think the auditors will be able to easily crack the password
(media.greatawakening.win)
? Notable
Comments (115)
sorted by:
Dominion machines are designed to steal elections. I'll wouldn't be surprised if the machines are also designed to cover it's tracks by not preserving logs and settings.
you would be surprised, most hard drives keep data until it is overwritten no matter what because its a lot more efficient that way and a log of actions would always be present because its OS, unless the data containing parts were shredded or filled with junk they will be able to at minimum rip pieces of data out of it even if they lacked the password and just had parts
I realize that, which is why I'm surprised anything incriminating would be written to the hard drive of any machine that was designed to commit crime.
I’m not sure what you mean. How is this even possible?
It would depend on if the hard drive or flash memory was designed so you could specify the exact sector that data was being written to, to ensure only one copy only existed because often when you save changed to a document, the hard drive will just flag the storage space that the document previously occupied as vacant and then write the updated document to a new location on the hard drive... and those older versions of the document can often be retrieved using special software.
This is why Hillary Clinton used BitBleach on her devices: because it's specialized software designed to remove EVERYTHING, all data fragments that could possibly be used to recreate documents in part or in whole.
Yeah I think it would be possible for simple compute/tallying operations to be held in a sort of RAM-like memory and even processed (extremely quickly given RAM's bandwidth) before being written to anything with storable memory.
It's sort of how our computers work already, but the RAM cache/load-use ratio compared to the HDD storage media-use ratio is inverted in this case.
This is just a theory, but also one based on tech we already have and have had for some time, just set up with a different use-case in mind (handling essentially untraceable data processing/compute).
That said, the algorithms needed to be accessed from somewhere, but if they were clever (ha) then they would have used the backdoor/internet connection for that, possibly making that part untraceable.
We shall see, because I don't think they are this clever, but then again these evil bastards have unlimited money and have captured some of our species' most brilliant minds in their coercion.
Luckily, we already know who wins, we just don't know exactly how we get there; NCSWIC.
I was thinking the same. According to Q, "WE HAVE IT ALL" What happens when the NSA records [for example] don't match the records on the self-destructing logs. Isn't that the good guys word against the bad guys word?
Sounds like that'd be a good way to PROVE fraud, yes? The hen outsmarts the fox, etc.
If the white hats were monitoring network traffic, I’d bet they have traces of the fraud happening and all of this is just to get as many criminals to out themselves as possible in the meantime.
What if my cat could talk, what would it say?
Feed me now.
You're lucky I am only this big.
"You didnt feed me you bag of water w eyeballs. So puked in your shoes. What's for lunch?"
Another example: the BTK Strangler was caught from the embedded metadata on a floppy disk that traced it to his name and church.
I get that. What I’m saying is how is it possible not to leave a trace of evidence of wrongdoing. Server logs can be rewritten, yes. But what executable was used? Now that I’m thinking about it, having a usb drive locally would allow an environment to create fraud without leaving any trace on the host server. Does that sound accurate? A stand alone machine can’t erase everything. Unless it’s straight up mission impossible style like another commenter mentioned.
I doubt the Dominion machines are "standard" because they are designed to commit crime and hiding evidence is only an engineering problem.
This is the gist of my reply to the commenter above; if the machine is being made for this specific purpose and the creators had access to virtually unlimited resources to et it done (Dominion/Gates have had a well-known relationship since 2015 and maybe earlier), then your point is exactly right.
They wouldn't be beholden to using any sort of "OS" as we know it, or even a codebase as we know them to get a machine to do exactly what these are needed to do, IMO.
I just hope they're as stupid as they are evil/misled.
My brain is broken...thanks for the reply. I’m just running through scenarios that would leave 0 footprint.
Just like Tails Linux. https://tails.boum.org/
Talk to Paul Combetta about how he discovered via Reddit that Bleach Bit was the only way to obscure HRC's illicit email account from subpoenaed data.
Spez: his Reddit handle was u/Stonetear and that revelation was how I ultimately ended up on the Trump Train.
I remember that ordeal. Now, do you remember who it was that discovered Stonetear and who caught Stonetear deleting his reddit trail in real time?
Hint: it was a girl and I used to follow her on Twitter before the purge.
You are correct but it depends on the file system. NTFS (windows) and HFS (MacOS) operate that way but ext4 (the native file system for most linux distributions) is not recoverable: once the file is deleted it is gone.
Of course this assumes that logs were enabled and written to disc in the first place to be recovered.
If the machines could cover their own tracks, I'm doubtful that this kind of preventative pressure is being applied.
Their PANIC is drawing SO much attention. It's insane.
Exactly. Remember... These people are stupid!
In the final analysis, everything those machines did IS preserved. Just a matter of finding WHERE it is preserved.
What about remote erasing?
Source?
NSA.gov
Whoooops, our bad.
Try Hunter2.
Passw0rd
Pa$$w0rd. Wasn’t that Podesta’s?
Yup. Podesta the molesta
Pedosta iirc. Those Wikileaks drops were nectar.
Exactly, it's not like the dems have a history of creative passwords kekw
It could just be "admin" or "password" or "12345" because those tend to be the default passwords, and, lets be real, do we think they bothered to change that?
Hey, that's the password to my luggage!
You'll never take me alive!
Password1.
Wait how do you know my password?!
Yup, cracking admin is easy on a windows machine.
So long as the disk isn’t encrypted. Given how sloppy it seems Dominion was I figure it’s a safe bet the disk isn’t encrypted.
You don’t crack what you can just change. I haven’t done this in years. Anymore it is probably a lot easier than back then. You can likely boot the computer with a Live USB of Kali LInux. This will run the operating system completely in memory. You then mount the disk of the computer to the OS you booted. Change a file or two where the password is stored and BAM. Reboot the computer using its disk, login with the password you set. This assumes the disk isn’t encrypted.
The people that do this stuff are wizards. With physical access, they can likely break into damn near anything. Even if the disk is encrypted, they might just drop it onto a network and use some kind of vulnerability to crawl across the network and break in.
With Windows XP you could boot from MsDos from a CD, access the file system, and there was a file that store all the passwords and user accounts you could delete. Once you deleted it all accounts were locked and the administrator password was reset to default.
The best part is it, I bet Space Force has all the login info anyway. These people are just further implicating themselves.
I’ve recovered so many windows machines. Mount the disk, replace the accessibility software with a command prompt and run a few commands. Reboot and log in with the password you set.
Even if the disk is encrypted, there are tools to break the encryption. There are hardware tools designed for especially that, and not software tools, hardware.
The question is did Dominion use bitlocker? I'm betting no. White hats were able to get into these machines during the election in georgia. My guess is they don't need the password at all.
Next question: did Dominion shell out the extra 20 to 30 for TPM chips per system? I'm also betting no.
I don't believe that Dominion saw a situation where white hats would ever get their hands on one of these machines. In all the other countries they were being used, they were in a position that election wasn't questioned. However this is the USA, and Patriots do not sit and do as they are told.
My guess is they are already in the machines. They are just asking as some sort of "4D" chess move.
It's been awhile, but I know there were various LANMAN attacks and such that made cracking windows passwords really easy. It's always a cat and mouse game, hell, I remember being in College hearing how MD5 was uncrackable, could only be brute forced, by the time I graduated MD5 hash collisions trivialized all that.
A lot of times shitty companies hide their multimillion dollar software behind simple security through obscurity bs. I've cracked multiple HASP dongle programs that only had simple test donglestatus, jne nodongle almost everytime. The most complex dongle I defeated took me about 10 hours. I created my own dll injection and overwrote most of the HASP API so that I could provide my own responses (luckily they didn't hide any code on the actual dongle as that was MIA), all the information on how to do that was part of the HASP API, just had to find the proper calls and replace em with my own functions returning bullshit that's similar.
I've had to go in and do some database modification for apps that didn't allow me into the database, it'll be existing in plaintext in some form or another (sometimes can just capture the SQL opening up the database, but usually it's also just hiding in plaintext somewhere).
That being said, our admin's Windows NT password was ~13 characters, couple special chars and took about two weeks with a few of our geeks in school dividing our awesome Pentium 2 power at home running l0pht against it in the late 90s.
u/#michaelconfused
And I'm reading that it sounds like I'm coming off as an asshole a bit. There's been plenty of shit I didn't crack in my day too, either because it was beyond my skill. SecuROM used to be one of my big banes, only was able to crack one game successfully and that was because they didn't encode properly.
I actually enjoyed doing it though, so would take on various reqs on IRC and from friends back in the day, . While these devices are rare in the wild, they can be gotten if you care enough to throw money at it. The older equipment can be found for around $200-$300 per machine.
God I love this community. We have the best, simply the best.
All about that
Enable algorithm-type scrypt secret password value SRS
They got to crack the SA account PW for SQL Server.
I was just about to add that. It's really easy to retrieve the password from a windows machine.
Anons already have the passwords....
you dont think Q level clearance has access to Quantum computing?
Well we know the password's iNOT: "GodBlessAmerica" "1stAmmendment" "2ndAmmendment"
add more in comments
And it's not "Epsteindidntkillhimself"
“BillClintonIsARapist” “PedosAreEvil” “JesusIsLord”
Admin: admin Password: password
Jovan can hack or crack ANYTHING. Jovan! Jovan! Jovan!
Have they tried "P a s s w o r d 1 2 3"
If the machines are Windows machines, they will be able to crack them with physical access almost trivially.
I thought it was funny that of all retarded things, Maricopa County supes used lack of passwords as an excuse.
Like, really? Are they THAT un-tech-savvy?
Ha, ha! They're bureaucrats! Even if they were tech savvy, they're proud to delegate things away. The more you delegate, the bigger your budget, and the more plausible deniability you have. It's a win-win for anyone in politics, even office politics.
I would have to wonder if this audit is just for show. Team Trump had to have known they would do damn near anything to cover their asses. Theory I hear is that there was real time intel during the fraud and even operatives reporting back. I would bet they have it all. Also don't forget Trump blew up their algorithm and they had to rush like crazy to stuff enough votes in the get Gropey Joe "elected". PA didn't even bother scrubbing their numbers until the error got pointed out by the data geeks like Jovan Pulitzer.
So why is he in Mar-a-Lago instead of the White House?
Because everything post 2016 has been one big sting op.
I hope so. Or we're about to find out O'Brien runs the Brotherhood.
[Which he did]
Even I know you should always have an automatic Mission Impossible "this hard drive will self destruct 2 days after the election" end game function.
They truly are stupid.
How many “EE”s in reeeeeeeeee! did they use tho?
It was "Adreno4Life"
Fuck Joe Bidens family and all those Demoncrats
Ron, you should volunteer your expertise if they have a problem. It's probably something stupid like "password".
This would be amazing
if its a windows system, you have physical access to a copy of the drive, you can use a hash/salt check against known passwords. I have actually done this on my own machine, with a 10 character password, took the decrypter 6 minutes to find it. Again these people are stupid. I a have also done this on a windows server 2008 with a unknown 9 character password, It found it in within sixty seconds. Its not hard its just time consuming to setup. You really only need the registry files from the drive.
Password = P@ssword
They are all that stupid... go get em boys....
Does it even matter if the EAC (Elections Assistance Commission) recommended "auditor" Pro V&V guy Jack Cobb recommended COTS (Commercial Off The Shelf) software to the EAC back in 2009?
https://greatawakening.win/p/12i3lBs2YD/maricopa-audit-on-my-mind/
Crooks aren’t very good at logistics, that’s why prison is never part of their supply chain. THEIR TOAST!
Load live Linux distribution.
Install chntpw
Change admin password
Profit
This takes just a few minutes.
I don’t think Code MonkeyZ would have posted this, if he didn’t know they could.
Cisco routers you can boot into rommon mode and reset the password, depends what operating system these machines use
They always forget that the good guys have hackers too.
How would he know that they could easily crack the password?
Oof
BOOM
Given how sloppy the machines and coding are to begin with, I don't doubt it. A lot of machines were still running windows 7, which should be very easy to get into.
Always they tell us. The name Dominium and the thing they try to create.
Yeah they can see everything on a drive with tools like OSForensics or Autopsy and if there are encrypted files they can indeed be cracked. Shouldn’t be much of a problem
Try orangemanbad