How many hackers took over the election machines?
Hundreds? Thousands? Or just one?
Doesn't matter how many, it's that there were hackers.
Now ask yourself, where did the hackers go? Why can't they breach the AZ Audit and leak the results? They managed to hack the election, but why can't they get some snip snips from the audit?
A post earlier today suggested the Audit was a honeypot.
While I agree on that point, I do so not in the same way. It could be bait for the hackers. But it could also be proof of something else at the same time...
The AZ Maricopa Audit most definitely has the Military looking out for it.
The IT infrastructure has to be fool-proof and impossible to breach AT ALL COSTS. There is no way they would allow the jackholes in the DeepState to get the cliffs notes ahead of time.
So, the only explanation is that they are using the highest security tech around -- not just something a local group like CiberNinjas can procure. What they have access to is air-tight secure tech.
We have heard NOTHING. NOT ONE LEAK, aside from what they obviously put out there themselves to stir the pot.
I can only conclude that either the DeepState hackers are off taking a piss or the Audit Team has backing in the highest levels of IT security the World has ever known in order to keep every mouth shut and every DeepState infiltrator looking at a 6ft drop and a pile of dirt soon after for even the slightest vapor of info escaping.
Hopium? Sure, call it that.
I call it one damn-well controlled operation.
Colorado is a question mark because it was Dominion headquarters. Also if they pushed out updates from a centralized server they all had to have connection to the server so finding its location is key.
"Trusted Build".
What is a trusted build and why is it used? EAC blog logo 👈 Sep 16, 2021 👈
https://www.eac.gov/what-trusted-build-and-why-it-used
all you would need is a couple more forensic backups of systems before they wiped them like they did in Colorado. compare the logs and you have your information.