CodeMonkeyZ think the auditors will be able to easily crack the password
(media.greatawakening.win)
? Notable
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (115)
sorted by:
It would depend on if the hard drive or flash memory was designed so you could specify the exact sector that data was being written to, to ensure only one copy only existed because often when you save changed to a document, the hard drive will just flag the storage space that the document previously occupied as vacant and then write the updated document to a new location on the hard drive... and those older versions of the document can often be retrieved using special software.
This is why Hillary Clinton used BitBleach on her devices: because it's specialized software designed to remove EVERYTHING, all data fragments that could possibly be used to recreate documents in part or in whole.
Yeah I think it would be possible for simple compute/tallying operations to be held in a sort of RAM-like memory and even processed (extremely quickly given RAM's bandwidth) before being written to anything with storable memory.
It's sort of how our computers work already, but the RAM cache/load-use ratio compared to the HDD storage media-use ratio is inverted in this case.
This is just a theory, but also one based on tech we already have and have had for some time, just set up with a different use-case in mind (handling essentially untraceable data processing/compute).
That said, the algorithms needed to be accessed from somewhere, but if they were clever (ha) then they would have used the backdoor/internet connection for that, possibly making that part untraceable.
We shall see, because I don't think they are this clever, but then again these evil bastards have unlimited money and have captured some of our species' most brilliant minds in their coercion.
Luckily, we already know who wins, we just don't know exactly how we get there; NCSWIC.
I was thinking the same. According to Q, "WE HAVE IT ALL" What happens when the NSA records [for example] don't match the records on the self-destructing logs. Isn't that the good guys word against the bad guys word?
Sounds like that'd be a good way to PROVE fraud, yes? The hen outsmarts the fox, etc.
If the white hats were monitoring network traffic, I’d bet they have traces of the fraud happening and all of this is just to get as many criminals to out themselves as possible in the meantime.
What if my cat could talk, what would it say?
Ribbit!
Feed me now.
And not that dry crap.
You're lucky I am only this big.
"You didnt feed me you bag of water w eyeballs. So puked in your shoes. What's for lunch?"
Another example: the BTK Strangler was caught from the embedded metadata on a floppy disk that traced it to his name and church.
I get that. What I’m saying is how is it possible not to leave a trace of evidence of wrongdoing. Server logs can be rewritten, yes. But what executable was used? Now that I’m thinking about it, having a usb drive locally would allow an environment to create fraud without leaving any trace on the host server. Does that sound accurate? A stand alone machine can’t erase everything. Unless it’s straight up mission impossible style like another commenter mentioned.
I doubt the Dominion machines are "standard" because they are designed to commit crime and hiding evidence is only an engineering problem.
This is the gist of my reply to the commenter above; if the machine is being made for this specific purpose and the creators had access to virtually unlimited resources to et it done (Dominion/Gates have had a well-known relationship since 2015 and maybe earlier), then your point is exactly right.
They wouldn't be beholden to using any sort of "OS" as we know it, or even a codebase as we know them to get a machine to do exactly what these are needed to do, IMO.
I just hope they're as stupid as they are evil/misled.
“Planners” aren’t as smart as the commentators based on their actions
I speculate they are afraid of what will be found because otherwise if there was no trace they would allow the audit to silence discussion
My brain is broken...thanks for the reply. I’m just running through scenarios that would leave 0 footprint.
Yours and mine both. I’m seeing satellites.
Just like Tails Linux. https://tails.boum.org/