CodeMonkeyZ think the auditors will be able to easily crack the password
(media.greatawakening.win)
? Notable
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (115)
sorted by:
I realize that, which is why I'm surprised anything incriminating would be written to the hard drive of any machine that was designed to commit crime.
I’m not sure what you mean. How is this even possible?
It would depend on if the hard drive or flash memory was designed so you could specify the exact sector that data was being written to, to ensure only one copy only existed because often when you save changed to a document, the hard drive will just flag the storage space that the document previously occupied as vacant and then write the updated document to a new location on the hard drive... and those older versions of the document can often be retrieved using special software.
This is why Hillary Clinton used BitBleach on her devices: because it's specialized software designed to remove EVERYTHING, all data fragments that could possibly be used to recreate documents in part or in whole.
Yeah I think it would be possible for simple compute/tallying operations to be held in a sort of RAM-like memory and even processed (extremely quickly given RAM's bandwidth) before being written to anything with storable memory.
It's sort of how our computers work already, but the RAM cache/load-use ratio compared to the HDD storage media-use ratio is inverted in this case.
This is just a theory, but also one based on tech we already have and have had for some time, just set up with a different use-case in mind (handling essentially untraceable data processing/compute).
That said, the algorithms needed to be accessed from somewhere, but if they were clever (ha) then they would have used the backdoor/internet connection for that, possibly making that part untraceable.
We shall see, because I don't think they are this clever, but then again these evil bastards have unlimited money and have captured some of our species' most brilliant minds in their coercion.
Luckily, we already know who wins, we just don't know exactly how we get there; NCSWIC.
I was thinking the same. According to Q, "WE HAVE IT ALL" What happens when the NSA records [for example] don't match the records on the self-destructing logs. Isn't that the good guys word against the bad guys word?
If the white hats were monitoring network traffic, I’d bet they have traces of the fraud happening and all of this is just to get as many criminals to out themselves as possible in the meantime.
What if my cat could talk, what would it say?
Another example: the BTK Strangler was caught from the embedded metadata on a floppy disk that traced it to his name and church.
I get that. What I’m saying is how is it possible not to leave a trace of evidence of wrongdoing. Server logs can be rewritten, yes. But what executable was used? Now that I’m thinking about it, having a usb drive locally would allow an environment to create fraud without leaving any trace on the host server. Does that sound accurate? A stand alone machine can’t erase everything. Unless it’s straight up mission impossible style like another commenter mentioned.
I doubt the Dominion machines are "standard" because they are designed to commit crime and hiding evidence is only an engineering problem.
Just like Tails Linux. https://tails.boum.org/