Seems like what they have been telling the audience that they need to go home and insist on forensic audits of their states. That hasn't been working thus far. I thought they were going to receive Pcaps of hard evidence to take home and show. Please tell me I am wrong
Comments (10)
sorted by:
Q said 'the military is the only way', so I think the symposium is more for show & education, to wake up the people who are still asleep.
plus, it isn't over yet. and at the Wisconsin rally, Mike Lindell kept the 'surprise' for the very last hour of the event, and it was over 90 degrees. he definitely likes to put on a show, keep the audience guessing.
Thanks - I want this all to work!
I think symposium and audits are only meant to red pill normies. The military IS the only option
This is looking like a big nothing burger maybe a ploy to make the DS use more ammo but other then the alleged hacks on Mike Lindell's sites and Coumo resigning... it seems like nothing is going to happen.
After reading the comments on the board, it sounds like CMZ was a big flop.
My personal opinion, is that CMZ and pillow guy are actors, filling time.
If and when the military decides to do something, they'll have their shit together, but for now, these guys are just filling the airwaves.
I think everyone forgot when CMZ told us and I quote “we gave it our all. Now we need to keep our chins up and go back to our lives as best we are able. We have a new President sworn in and it is our responsibility as citizens to respect the Constitution regardless of whether or not we agree with the specifics or details regarding officials who are sworn in”
Plus the HBO special.
Not drawing conclusions, but it’s interesting. Especially with today’s events.
I might be wrong but from my understanding PCaps are like CCTV recordings. A forensic audit is like checking the crime scene for evidence.
Packet Captures are just that - captures of raw data packets traveling in cyberspace.
Imagine Willy Wonka and the Chocolate Factory, when the TV boy gets zapped into a million pieces.
The data transfers in compressed packets that read like a pile of lego parts and a script telling you how to reassemble them. The final product file is bulky and hard to ship, so you deconstruct it, squish the parts together and give instructions.
Doing this also allows you to move large files in intermittent spurts so network systems aren't bogged down serving a single request at a time.
Anyone can put up a "net" and collect the packets, if you know what "frequency" they are being sent among the millions of other packets other people are also sending.
That's what they have.
Next comes figuring out the instructions. If you know what you're doing, you got that file in the datastream too, otherwise you're mix-and-matching the pieces until you get lucky and find a pattern, which could LITERALLY take a millennia.
Reassemble it and you can reconstruct the file as it was in TRANSIT. If it is encrypted, you have a few more steps to decrypt it -- that is, unless, the packets were already decrypted with the intent to modify them anyway.
Now comes the crux of your intrigue.
If you capture when the packets LEAVE and ARRIVE from their destinations, you can see if they have been tampered with during the datastream. How that works is, a middle-man server is sent the real packets and has a pre-programmed code that modifies the packets at the COMPRESSION level. That's not small beans, that's top-tier espionage.
Keep in mind, the fact the packets were collected unencrypted is proof Dominion let it leak on purpose.
This is what the VAST majority of experts are waiting for here. If they get the Packet Captures, they can tell if Lindell actually has packets either going TO China or FROM China. If he has both, then they can prove 100% that China tweaked the packets.
If he has anything other than ACTUAL packets that were intercepted from China (which would require him putting together a team ahead of time to set up the "net") this whole thing is a wash.
With the vast quantity of information required to not be dismissed as authentic packets outright, there are only three options:
A. He has the receipts and they are legit.
B. Someone who DOES HAVE ACCESS to the real information feed fed him a line of packets data that was modified to intentionally sabotage Lindell's efforts.
C. He doesn't even have ANY data packets at all and this is all coming out of literally thin air (very unlikely).
One question Dr. Frank didn't ask that he should have. He was asking audits. I want to know how long it would take to set up and complete an all paper ballot election. Throw out everything and do this over above board and transparently.
Apparently Jovan and someone else wrote programs that would make the forensic audit much less expensive, by ruling out all the ballots that pose no questions. They even offered to cover the costs in Michigan.
So with this aid, it would seem it wouldn't take as long as AZ.