Whether or not Mike Lindell’s PCAPs are real, the possibility that they are real is certainly making waves.
Schrodinger’s PCAPs.
E
Heres the thing.
Behind the scenes, we know they arent real.
And they have refused to provide the audit team, of which @CodemonkeyZ is part, any of the data. (this despite last Saturday having been the original deadline for the pre-audit team)
Which makes his comments here troubling.
We recognize it as an IC operation that just so happens to fall on the same day as Julian Assange's trial; where the US Government will seek the legal right to extract and imprison anyone on earth who would expose them.
What you are doing here, Ron, is purposefully misleading people using qualifiers, and relying on them to remain distracted and not think critically, because they are loyal to you.
Why wont you tell them the truth?
So, again, here's the thing:
You are, at least here, helping the CIA do exactly what they want; which is to distract people from the real moves being made.
I JUST discussed all this with you privately.
Dont make me leak it.
*You NEED to question Ron over this, not rely on my word.
If the PCAPs are real, I could only believe they came from one place : the United States military's IC. Which begs the question: Why would Mike Lindell have access to such?
No guys, you have to understand that RON is right to question those logs, as i did and still do too.
I am enterprise IT engineer with over 15 years of experiences and deep hands in SecOps, and i have a lo of doubts as well on those captures, and i already expressed it a bunch of times
Few have idea of how capture and collection works, you need hardware probes and sensors on he whole perimeter of he network, subnetworks etc, it's a complex thing to do, you can't just install a software on a pc somewhere and wait the capture
Plus, you should be able o prove input and output traffic, eventual decryption, and much more, all of the fingerprint should have LEGAL values
PLUS, he thing that honestly made me thing it's bluff since the first is, he shows a map with 'connections and vote switched from China and the rest of the word' and a list of IP addresses, that's nice, but legal value is nothing
You can't just say ip x.x.x.x coming from China attacked me so it has been them, IPs can be stolen, spoofed, hijacked, a relay, malware, botnet, or any other kind of layers are used to obfuscate the real origin of the strike
So the question, for Mike himself is, can you keep for yourself those 5mln, and instead of people debunking the logs, you PROOF US from where those things came?
We'd need a honest explanation with detailed network logs (inner perimeter), probing hardware, and everything, otherwise for me, it's just another waste of time (as it has been with him since the first, still have to see something legit that makes sense about his claims)
Before judging, learn how a thing work (and i can ensure IT / SecOps on this level is not something you'll grasp in weeks or months but years) and stop to trust people just because they seems to be good, you'll never break free otherwise, time is running up, be smart and use your energies for useful things
With over a decade of networking experience myself, I'm glad you took the time to highlight what we're talking about isn't as cut-and-dry as "we have these packets".
A state side agency can indeed have all of that in place as they provide / handle the network, but not a private citizen, nor for forensics, can the entity provide that data to a private citizen
CodeMonkey
Whether or not Mike Lindell’s PCAPs are real, the possibility that they are real is certainly making waves.
Schrodinger’s PCAPs.
E
Heres the thing.
Behind the scenes, we know they arent real. And they have refused to provide the audit team, of which @CodemonkeyZ is part, any of the data. (this despite last Saturday having been the original deadline for the pre-audit team) Which makes his comments here troubling.
We recognize it as an IC operation that just so happens to fall on the same day as Julian Assange's trial; where the US Government will seek the legal right to extract and imprison anyone on earth who would expose them.
What you are doing here, Ron, is purposefully misleading people using qualifiers, and relying on them to remain distracted and not think critically, because they are loyal to you.
Why wont you tell them the truth?
So, again, here's the thing: You are, at least here, helping the CIA do exactly what they want; which is to distract people from the real moves being made.
I JUST discussed all this with you privately. Dont make me leak it.
*You NEED to question Ron over this, not rely on my word.
If the PCAPs are real, I could only believe they came from one place : the United States military's IC. Which begs the question: Why would Mike Lindell have access to such?
I don't think he does, personally.
No guys, you have to understand that RON is right to question those logs, as i did and still do too.
I am enterprise IT engineer with over 15 years of experiences and deep hands in SecOps, and i have a lo of doubts as well on those captures, and i already expressed it a bunch of times
Few have idea of how capture and collection works, you need hardware probes and sensors on he whole perimeter of he network, subnetworks etc, it's a complex thing to do, you can't just install a software on a pc somewhere and wait the capture
Plus, you should be able o prove input and output traffic, eventual decryption, and much more, all of the fingerprint should have LEGAL values
PLUS, he thing that honestly made me thing it's bluff since the first is, he shows a map with 'connections and vote switched from China and the rest of the word' and a list of IP addresses, that's nice, but legal value is nothing
You can't just say ip x.x.x.x coming from China attacked me so it has been them, IPs can be stolen, spoofed, hijacked, a relay, malware, botnet, or any other kind of layers are used to obfuscate the real origin of the strike
So the question, for Mike himself is, can you keep for yourself those 5mln, and instead of people debunking the logs, you PROOF US from where those things came?
We'd need a honest explanation with detailed network logs (inner perimeter), probing hardware, and everything, otherwise for me, it's just another waste of time (as it has been with him since the first, still have to see something legit that makes sense about his claims)
Before judging, learn how a thing work (and i can ensure IT / SecOps on this level is not something you'll grasp in weeks or months but years) and stop to trust people just because they seems to be good, you'll never break free otherwise, time is running up, be smart and use your energies for useful things
With over a decade of networking experience myself, I'm glad you took the time to highlight what we're talking about isn't as cut-and-dry as "we have these packets".
A state side agency can indeed have all of that in place as they provide / handle the network, but not a private citizen, nor for forensics, can the entity provide that data to a private citizen