How many hackers took over the election machines?
Hundreds? Thousands? Or just one?
Doesn't matter how many, it's that there were hackers.
Now ask yourself, where did the hackers go? Why can't they breach the AZ Audit and leak the results? They managed to hack the election, but why can't they get some snip snips from the audit?
A post earlier today suggested the Audit was a honeypot.
While I agree on that point, I do so not in the same way. It could be bait for the hackers. But it could also be proof of something else at the same time...
The AZ Maricopa Audit most definitely has the Military looking out for it.
The IT infrastructure has to be fool-proof and impossible to breach AT ALL COSTS. There is no way they would allow the jackholes in the DeepState to get the cliffs notes ahead of time.
So, the only explanation is that they are using the highest security tech around -- not just something a local group like CiberNinjas can procure. What they have access to is air-tight secure tech.
We have heard NOTHING. NOT ONE LEAK, aside from what they obviously put out there themselves to stir the pot.
I can only conclude that either the DeepState hackers are off taking a piss or the Audit Team has backing in the highest levels of IT security the World has ever known in order to keep every mouth shut and every DeepState infiltrator looking at a 6ft drop and a pile of dirt soon after for even the slightest vapor of info escaping.
Hopium? Sure, call it that.
I call it one damn-well controlled operation.
Very much true. Lindell stuck his neck out for the Patriots and I'm positive the good guys got what they planned to get out of the event.
Moves and counter-moves.
The very definition of "Fuck around and find out"
Well during the audit. Wouldn't the machines be offline now? So unless they are physcially there. I don't think they would be able to get in via online methods.
Not the Dominion machines -- I'm talking about the computers the tech teams are using to analyze the data. Those computers can be connected to the internet. They have to prevent that.
Local networks are set up to share data quickly, because flash drive hand-offs are a liability.
If the computers are compromised for even a second, all could be lost.
The DeepState CANNOT know what they have. They would build a narrative and counter it before it came out.
Good points.
Unless you believe in something like secret encryption backdoors that intelligence agencies have access to, then it's not that difficult to secure something...
And the deep state knows exactly what they did to cheat, and should know exactly what someone looking into it can find, I don't see how knowing in advance what was found makes it counter-able, in that case just assume they found everything, can they still counter that?
But I do agree with you that there is most likely military assistance, but I think it's more to do with preventing any "double gunshot to the back of the head type" suicides
If they are using Apple, Microsoft, Amazon servers, or any other Corporate Cabal service, yeah, I'm not ruling secret encryption backdoors out.
McAfee claimed over a decade ago that the CIA bought computers that had his anti-virus installed as part of their shipped operating systems, which gave him a backdoor.
Also, sure the DeepState knows how they cheated, but if they create a cover story for something the good guys missed they would be playing into the white hats' hands. They are forced to be reactionary, which is something they've never believed possible.
Everything the DeepState does is proactive, based on leaks, blackmail, spies and manipulation. They aren't used to fighting on terrain rife with uncertainty, which this audit very much appears to be.
The easy solution is to not connect your computer to the Internet. Problem solved.
OK, but you cannot do that through the internet. You need another connection to the remote computer or, of course, direct access to the computer.
For instance, you might be able to get someone to insert a USB drive into the computer that you want to hack and that USB drive could contain a program that sabotaged that computer. If you want to get data out then you also have to make arrangements for the USB drive to be returned to you with the data on it.
All those processes are much harder and it should be possible to protect against them. You need to use more social engineering and less hacking if the machines are not connected.
People are stupid. Politicians typically more-so.
Even a power point on a State Senator's laptop is fair game.
We know politicians are stupid by looking at the Imran Awan situation. Many Democrat politicians allowed members of the Awan family to directly access their computers and phones and, most probably, send daily downloads from a server in Congress straight back to Pakistan!
You can't fix stupid.
The whole Truth and nothing but the Truth?
Let me tell ya, if half of what I learned in the last two weeks looking at old grimoires and alchemical manuals is true...
We ain't seen shit yet.
Carry a Bible daily. I guarantee it'll be more effective as a defensive tool than a gun would very soon.
Colorado is a question mark because it was Dominion headquarters. Also if they pushed out updates from a centralized server they all had to have connection to the server so finding its location is key.
"Trusted Build".
What is a trusted build and why is it used? EAC blog logo 👈 Sep 16, 2021 👈
https://www.eac.gov/what-trusted-build-and-why-it-used
all you would need is a couple more forensic backups of systems before they wiped them like they did in Colorado. compare the logs and you have your information.
I wonder if the past year has been various tests to figure out who is loyal and who is not. Who is dedicated to our country and who is dedicated to their pockets.
I don't think it was a hack. It was algorithms. If there was a hack involved, it's more likely it was committed in order to hide evidence, not blatantly move votes from one candidate to another. We already know that for every vote Trump got in certain areas, [they] moved .25-.33 of each vote to Buyden. Those machines were already wired to the net, being operated out if Germany and Spain when it happened. This is why Trump raided both locations after the vote switches took place early morning of 11/5. Delta took one place, SeALs took the other, can't remember which team took which site, buy I think Delta raided Germany site, SeALs raided the other. And Chemical Gina and her Clowns were caught in Germany in the process. Scytl and their team were caught in Spain.