If the PCAPs are real, I could only believe they came from one place : the United States military's IC. Which begs the question: Why would Mike Lindell have access to such?
No guys, you have to understand that RON is right to question those logs, as i did and still do too.
I am enterprise IT engineer with over 15 years of experiences and deep hands in SecOps, and i have a lo of doubts as well on those captures, and i already expressed it a bunch of times
Few have idea of how capture and collection works, you need hardware probes and sensors on he whole perimeter of he network, subnetworks etc, it's a complex thing to do, you can't just install a software on a pc somewhere and wait the capture
Plus, you should be able o prove input and output traffic, eventual decryption, and much more, all of the fingerprint should have LEGAL values
PLUS, he thing that honestly made me thing it's bluff since the first is, he shows a map with 'connections and vote switched from China and the rest of the word' and a list of IP addresses, that's nice, but legal value is nothing
You can't just say ip x.x.x.x coming from China attacked me so it has been them, IPs can be stolen, spoofed, hijacked, a relay, malware, botnet, or any other kind of layers are used to obfuscate the real origin of the strike
So the question, for Mike himself is, can you keep for yourself those 5mln, and instead of people debunking the logs, you PROOF US from where those things came?
We'd need a honest explanation with detailed network logs (inner perimeter), probing hardware, and everything, otherwise for me, it's just another waste of time (as it has been with him since the first, still have to see something legit that makes sense about his claims)
Before judging, learn how a thing work (and i can ensure IT / SecOps on this level is not something you'll grasp in weeks or months but years) and stop to trust people just because they seems to be good, you'll never break free otherwise, time is running up, be smart and use your energies for useful things
With over a decade of networking experience myself, I'm glad you took the time to highlight what we're talking about isn't as cut-and-dry as "we have these packets".
A state side agency can indeed have all of that in place as they provide / handle the network, but not a private citizen, nor for forensics, can the entity provide that data to a private citizen
If the PCAPs are real, I could only believe they came from one place : the United States military's IC. Which begs the question: Why would Mike Lindell have access to such?
I don't think he does, personally.
No guys, you have to understand that RON is right to question those logs, as i did and still do too.
I am enterprise IT engineer with over 15 years of experiences and deep hands in SecOps, and i have a lo of doubts as well on those captures, and i already expressed it a bunch of times
Few have idea of how capture and collection works, you need hardware probes and sensors on he whole perimeter of he network, subnetworks etc, it's a complex thing to do, you can't just install a software on a pc somewhere and wait the capture
Plus, you should be able o prove input and output traffic, eventual decryption, and much more, all of the fingerprint should have LEGAL values
PLUS, he thing that honestly made me thing it's bluff since the first is, he shows a map with 'connections and vote switched from China and the rest of the word' and a list of IP addresses, that's nice, but legal value is nothing
You can't just say ip x.x.x.x coming from China attacked me so it has been them, IPs can be stolen, spoofed, hijacked, a relay, malware, botnet, or any other kind of layers are used to obfuscate the real origin of the strike
So the question, for Mike himself is, can you keep for yourself those 5mln, and instead of people debunking the logs, you PROOF US from where those things came?
We'd need a honest explanation with detailed network logs (inner perimeter), probing hardware, and everything, otherwise for me, it's just another waste of time (as it has been with him since the first, still have to see something legit that makes sense about his claims)
Before judging, learn how a thing work (and i can ensure IT / SecOps on this level is not something you'll grasp in weeks or months but years) and stop to trust people just because they seems to be good, you'll never break free otherwise, time is running up, be smart and use your energies for useful things
With over a decade of networking experience myself, I'm glad you took the time to highlight what we're talking about isn't as cut-and-dry as "we have these packets".
A state side agency can indeed have all of that in place as they provide / handle the network, but not a private citizen, nor for forensics, can the entity provide that data to a private citizen