A Summary of Konnech Products and the Threats Posed Against the United States - The Authority ...An in-depth look into the vulnerable technologies, applications and partners Konnech utilizes in it's enterprise that are all connected to the global internet—and by inference, exploitable by the CCP.
(theauthorityq.substack.com)
🚔 Crime & Corruption 💸
Comments (6)
sorted by:
on Aug 15 - the substack author posted that first article will drop Oct 5 - "Things are about to get SPICY"
"In conclusion, the DoD-funded company “Konnech” has an untold number of vulnerabilities in its Election Management System, which has been used in thousands of counties across the United States. Products within this system are often connected to the internet, tracking data of all sorts down to a specific geolocation. These apps are invasive. Konnech collected Personal Identifiable Information (PII) on poll workers (names, addresses, patterns of life, etc.) and products like XORA, ClickSoftware, and Field Force Manager strongly connected to China. I showed through Binary Edge that China had transferred data from the Chinese UNICOM Backbone to associated Konnech domains in the United States. Personally Identifiable Information may have been leaked by Konnech as President Eugene Yu was arrested yesterday in connection with the Theft of Personal Data. This data was sent back to the United States through Konnech-related domains on different IP addresses coming from the same port in China. Once again, any data that touches the Chinese Internet is owned by The Chinese Government."
Great post, thank you
"Konnech’s Field Force Manager can create a geofence when tracking Election Workers in the field. The Web Portal allows a user to configure custom geographic regions that could range over an entire state."
Konnech, as in connect to the internet. Dominion, over who? The names will point the way…
*its
Also, “by inference?” Dude. Just say “thus.”