How many hackers took over the election machines?
Hundreds? Thousands? Or just one?
Doesn't matter how many, it's that there were hackers.
Now ask yourself, where did the hackers go? Why can't they breach the AZ Audit and leak the results? They managed to hack the election, but why can't they get some snip snips from the audit?
A post earlier today suggested the Audit was a honeypot.
While I agree on that point, I do so not in the same way. It could be bait for the hackers. But it could also be proof of something else at the same time...
The AZ Maricopa Audit most definitely has the Military looking out for it.
The IT infrastructure has to be fool-proof and impossible to breach AT ALL COSTS. There is no way they would allow the jackholes in the DeepState to get the cliffs notes ahead of time.
So, the only explanation is that they are using the highest security tech around -- not just something a local group like CiberNinjas can procure. What they have access to is air-tight secure tech.
We have heard NOTHING. NOT ONE LEAK, aside from what they obviously put out there themselves to stir the pot.
I can only conclude that either the DeepState hackers are off taking a piss or the Audit Team has backing in the highest levels of IT security the World has ever known in order to keep every mouth shut and every DeepState infiltrator looking at a 6ft drop and a pile of dirt soon after for even the slightest vapor of info escaping.
Hopium? Sure, call it that.
I call it one damn-well controlled operation.
If they are using Apple, Microsoft, Amazon servers, or any other Corporate Cabal service, yeah, I'm not ruling secret encryption backdoors out.
McAfee claimed over a decade ago that the CIA bought computers that had his anti-virus installed as part of their shipped operating systems, which gave him a backdoor.
Also, sure the DeepState knows how they cheated, but if they create a cover story for something the good guys missed they would be playing into the white hats' hands. They are forced to be reactionary, which is something they've never believed possible.
Everything the DeepState does is proactive, based on leaks, blackmail, spies and manipulation. They aren't used to fighting on terrain rife with uncertainty, which this audit very much appears to be.