I've watched every bit of the Symposium thus far, and have some thoughts on the subject. Interested in others' thoughts as well....
This whole thing depends on the authenticity of the pcap data. What we've really seen so far is that there are lots of mathematical models that are arrived at through different processes and all arrive at a similar conclusion. That is, various mathematical models can all predict the election outcomes in various states/counties. Said another way, the machine algorithm could be written from scratch and come up with the same results.
However, the smoking gun is the hard evidence - the packet capture data. That shows what did happen and what was altered. The rest of the discussions are essentially deriving the code that alter the actual results.
Also, the pcap data source is the one thing Mike Lindell will not disclose. This is the really, really important part. IMO, this data came from the US military from the captured equipment in Germany. The equipment was the router for the aggregation system.
For those that don't know, a router can be used to decrypt encrypted packets from any machine(s) within its LAN (local network). So control of the router is critical. If you work for a business that can block any connection via https to a website and keep you from using a machine to visit that site, it's doing so by decrypting the local network traffic, understanding what site you're trying to visit, and then using rules to determine whether or not you're allowed to visit that site. Open source tools, like a squid reverse proxy, can illustrate this (ie, if you have control of your router and can run open source tools, you can do this yourself...)
So the biggest reveal in this symposium is probably the data source. Why would they give it to Lindell? I don't know. But the authenticity of that data can definitively prove that this election is stolen, while all of the other discussions revolve around how the data was changed. They are converging on a piece of code that could be set up to mimic exactly what happened and how - if you have the data set collected by the router, you can define how the code is changed on the mainframe. I don't see another means of collecting such a large data set from so many machines - it has to be at an aggregation point. Another such point could be across some node(s) monitored by the NSA, I suppose.
Thoughts?
Yep, it's over. The last day had a heavier focus on how state legislators can take action. No big reveal on pcap sources, validity, or whether or not they were tainted with malware by bad actors at the symposium.
Did you catch the news that the PCAP might have come from THE HAMMER ?
I didn't, actually. I've heard that before, but I don't recall anything from the Symposium that would suggest that, per se. It's definitely a possibility, but it's also not clear to me whether or not the data itself has been compromised by an attack at the Symposium, either. I hope there's a backup (or 3, air gapped in different locations...) or that the data hasn't been tampered with. The issue of the PCAP data is very confusing to me at this stage. It's all foggy.
No not from the symposium, but from a gateway pundit article.
https://www.thegatewaypundit.com/2021/08/interesting-timing-one-mike-lindells-cyber-experts-waited-week-bail-china-hack-theory-speak-reporters/
This just touches on it with one sentence. But the washington times article has a whole paragraph and mentions HAMMER specifically.
I think there is a lot of smoke and fog, but if we think carefully we can see whats behind all this ...just eluding me.