Any updates on this Reiner Fuellmich saga? I feel like it's all background noise and we'll never see anyone actually brought to justice in court. Then again, it's a HUGE case like with Durham and probably takes time to build a list of all the names and amass the proper pile of evidence -- which is likely a difficult undertaking itself with all the fake news and cooked numbers.
Bottom line here, if these machines were configured to PXE Boot before the disk. Then on election day they could be running a completely different OS then the one on the Disk. During the Elections the Machines would run dirty, but during the audits later the machines would run clean.
If they did this, then more likely then not the Splunk Logs, and the router logs would contain this information. This would be why they'd fight to the death to prevent anyone from seeing these logs. The logs could prove that these machines were configured and ran a dirty OS they designed, instead of the one presented during certification.
Reiner Fuellmich was the attorney.
same guy working on coming Nuremberg 2? Interesting.
Any updates on this Reiner Fuellmich saga? I feel like it's all background noise and we'll never see anyone actually brought to justice in court. Then again, it's a HUGE case like with Durham and probably takes time to build a list of all the names and amass the proper pile of evidence -- which is likely a difficult undertaking itself with all the fake news and cooked numbers.
Bottom line here, if these machines were configured to PXE Boot before the disk. Then on election day they could be running a completely different OS then the one on the Disk. During the Elections the Machines would run dirty, but during the audits later the machines would run clean.
If they did this, then more likely then not the Splunk Logs, and the router logs would contain this information. This would be why they'd fight to the death to prevent anyone from seeing these logs. The logs could prove that these machines were configured and ran a dirty OS they designed, instead of the one presented during certification.
The router logs are key. The next shoe to drop.