ELECTION FRAUD FRIDAY: Post symposium discussion thread! What did we learn? What should we be working on, now? What happens next? Where's my coffee?
(media.greatawakening.win)
🗣️ DISCUSSION 💬
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (240)
sorted by:
I watched all weekend and didn't see any of the PCAP data, even Codemonkey said he didn't see it.
I think everything else we learned is very powerful and is huge booms, but I didn't see PCAPs.
Why wasn't it brought up again at the symposium?
Yeah, that's really weird. I rewatched that part of 9-0 and they're kind of vague about where that actually came from.
useful. Didn't see black screens woth 6 columns of states streaming pcap data? Rewatch it then. We didn't go over the data for 2 reasons. The team going over it found a poison pill injected into the data, and we got better things to go over since the forensic image bombshells were dropped.
Why did Codemonkey say he never saw PCAPs then? And honestly, I don't know what all that streaming stuff was. It could be anything. No one stopped and said, Here is the PCAP data, here is the access point, none of it. I work in IT so I have a basic understanding of all of this.
I also get the poison pill, but Lindell's experts didn't back everything up? Why did they just start going through the data at the start of the symposium? Didn't they have time to prepare?
The forensic image stuff is interesting, but why wasn't it looked at before hand? I need to look more at what even happened there but I can't find all the info online.
I am a machine learning engineer, so I don't work in IT but I do have some knowledge in hacking. Codemonkey along woth the other external members didn't get the data because it was injected will malicious code, that was found at the Symposium, but could have been injected before hand. They aren't going to give out data that is corrupt in some way. They entire Symposium was suppose to be organic and casual. They did not know they were getting these forensic images beforehand. It was a massive MASSIVE bombshell of a update for everyone. These images are so much better than pcaps. So with the pcaps needing to be fixes and with the bombshell images, the Symposium went another direction. This was all new info for everyone. You were seeing the messy, boring, slow side of forensics. Its is very slow because you don't know what you have, you don't know how the system is setup, where the important files are, etc. We watched 1 day of the images being looked at which will the weeks to complete.
Someone here earlier posted two tweets from a guy who was there and he said they never saw anything presented. The one guy who came on stage just said they needed more time to analyze it.
So many questions.... sauce please
Here is Steve Bannon talking about it:https://rumble.com/vl2dzs-government-agencies-have-infiltrated-mike-lindells-circle.html
You can see it on the stream if you go to day 3 at 1030 ET
Will you please explain "poison pill?" ty
There was malware embedded deep into the data which could later be used to throw out a court case due to "spoliation of evidence". Forensic audits of computers are insanely intense, you mess up a single bit of data and you basically lose your evidence. Literally every key stroke must be logged.
ty, fren
"Poison pill" in this case could mean malware that will corrupt or all the data within the packet capture files. There's also a chance it's just planted data that invalidates the rest of the data because no one can tell what is authentic or what is planted.
Sure, They talk about it here: https://rumble.com/vl2dzs-government-agencies-have-infiltrated-mike-lindells-circle.html Just after 10:30 ET on day 3. They seem to be saying that someone infected the PCap data will malicious code. Something that if given out could be bad. We didn't get specifics on it other than the data is being handled by authorities as it relates to a few EOs.
ty fren