How many hackers took over the election machines?
Hundreds? Thousands? Or just one?
Doesn't matter how many, it's that there were hackers.
Now ask yourself, where did the hackers go? Why can't they breach the AZ Audit and leak the results? They managed to hack the election, but why can't they get some snip snips from the audit?
A post earlier today suggested the Audit was a honeypot.
While I agree on that point, I do so not in the same way. It could be bait for the hackers. But it could also be proof of something else at the same time...
The AZ Maricopa Audit most definitely has the Military looking out for it.
The IT infrastructure has to be fool-proof and impossible to breach AT ALL COSTS. There is no way they would allow the jackholes in the DeepState to get the cliffs notes ahead of time.
So, the only explanation is that they are using the highest security tech around -- not just something a local group like CiberNinjas can procure. What they have access to is air-tight secure tech.
We have heard NOTHING. NOT ONE LEAK, aside from what they obviously put out there themselves to stir the pot.
I can only conclude that either the DeepState hackers are off taking a piss or the Audit Team has backing in the highest levels of IT security the World has ever known in order to keep every mouth shut and every DeepState infiltrator looking at a 6ft drop and a pile of dirt soon after for even the slightest vapor of info escaping.
Hopium? Sure, call it that.
I call it one damn-well controlled operation.
The easy solution is to not connect your computer to the Internet. Problem solved.
OK, but you cannot do that through the internet. You need another connection to the remote computer or, of course, direct access to the computer.
For instance, you might be able to get someone to insert a USB drive into the computer that you want to hack and that USB drive could contain a program that sabotaged that computer. If you want to get data out then you also have to make arrangements for the USB drive to be returned to you with the data on it.
All those processes are much harder and it should be possible to protect against them. You need to use more social engineering and less hacking if the machines are not connected.
People are stupid. Politicians typically more-so.
Even a power point on a State Senator's laptop is fair game.
We know politicians are stupid by looking at the Imran Awan situation. Many Democrat politicians allowed members of the Awan family to directly access their computers and phones and, most probably, send daily downloads from a server in Congress straight back to Pakistan!
You can't fix stupid.