How many hackers took over the election machines?
Hundreds? Thousands? Or just one?
Doesn't matter how many, it's that there were hackers.
Now ask yourself, where did the hackers go? Why can't they breach the AZ Audit and leak the results? They managed to hack the election, but why can't they get some snip snips from the audit?
A post earlier today suggested the Audit was a honeypot.
While I agree on that point, I do so not in the same way. It could be bait for the hackers. But it could also be proof of something else at the same time...
The AZ Maricopa Audit most definitely has the Military looking out for it.
The IT infrastructure has to be fool-proof and impossible to breach AT ALL COSTS. There is no way they would allow the jackholes in the DeepState to get the cliffs notes ahead of time.
So, the only explanation is that they are using the highest security tech around -- not just something a local group like CiberNinjas can procure. What they have access to is air-tight secure tech.
We have heard NOTHING. NOT ONE LEAK, aside from what they obviously put out there themselves to stir the pot.
I can only conclude that either the DeepState hackers are off taking a piss or the Audit Team has backing in the highest levels of IT security the World has ever known in order to keep every mouth shut and every DeepState infiltrator looking at a 6ft drop and a pile of dirt soon after for even the slightest vapor of info escaping.
Hopium? Sure, call it that.
I call it one damn-well controlled operation.
Not the Dominion machines -- I'm talking about the computers the tech teams are using to analyze the data. Those computers can be connected to the internet. They have to prevent that.
Local networks are set up to share data quickly, because flash drive hand-offs are a liability.
If the computers are compromised for even a second, all could be lost.
The DeepState CANNOT know what they have. They would build a narrative and counter it before it came out.
Good points.
Unless you believe in something like secret encryption backdoors that intelligence agencies have access to, then it's not that difficult to secure something...
And the deep state knows exactly what they did to cheat, and should know exactly what someone looking into it can find, I don't see how knowing in advance what was found makes it counter-able, in that case just assume they found everything, can they still counter that?
But I do agree with you that there is most likely military assistance, but I think it's more to do with preventing any "double gunshot to the back of the head type" suicides
If they are using Apple, Microsoft, Amazon servers, or any other Corporate Cabal service, yeah, I'm not ruling secret encryption backdoors out.
McAfee claimed over a decade ago that the CIA bought computers that had his anti-virus installed as part of their shipped operating systems, which gave him a backdoor.
Also, sure the DeepState knows how they cheated, but if they create a cover story for something the good guys missed they would be playing into the white hats' hands. They are forced to be reactionary, which is something they've never believed possible.
Everything the DeepState does is proactive, based on leaks, blackmail, spies and manipulation. They aren't used to fighting on terrain rife with uncertainty, which this audit very much appears to be.