I don't know why you would ever trust a computer. They can work OK but if you wanted to subvert them that would work as well.
You can write programs that work only on certain days or at certain times, polling day, for instance. So they would pass every test in the preceding days but still rig the vote.
You can write programs that delete themselves after running so a follow-up audit would never find them.
The Chinese added some extra spying components to some SuperMicro server motherboards it made. You could alter the BIOS, the operating system, some subroutines etc.
Then there is interference across a network. The list goes on and if there was money in it then you can bet someone has done it.
If I wrote a program to run in Windows, say, would you also go through the Windows code line by line to see if what you thought was happening was actually happening?
I just looked on my PC and it has around 200 processes running. Ideally, they should all be checked line by line to be safe.
OK, but there is a problem. If I gave you a book in English and a thumb drive full of Chinese characters and told you they were the same, how would you check?
The source code would be text but the compiled and linked executable file would just be binary. Even worse, some of the binary that would run would not be in the source code anyway. It would be part of the operating system or drivers.
Well, I was saying the programs in the US for our voting systems, should be transparent, and subject to audit by reading line by line the source code. [When I was a software systems project manager, EVERY program before it was put online was subject not only to tests, but to a review of the code by several team members going through the code together. Every instruction, every conditional, every potential outcome of the code. There was no hidden code or time bombs in the code my project released. It is doable!]
If the code is as you describe, it needs to be THROWN OUT!!
SHEESH we can't have our voting system software INCOMPREHENSIBLE!
This is interesting and not unconnected. It explains some of the details behind the recent Linux hack.
Basically, code was hidden in an image type file and it acted in concert with the software building/compiling software to insert a number of "back doors" into open source software. Many eyes would have seen the code but no-one could see what was happening.
It was not until someone started to do performance checks on his computer that it was realised that the computer was spending time on some unknown tasks.
When you have your own system you know you can rely on most of it and when you have written a program in house you can be fairly certain that the source code you have is the code that generated the executable. You also know exactly where it will be installed.
In the case of voting machines there will be several polling stations in all of the around 3,000 counties all of which will need to have an executable file of some kind. How can you guarantee that every one will get exactly what they should?
Add in that the circuit boards inside the computer may have been corrupted. How would checking the code help? What if someone had hidden some code on a disk and then flagged the sector as unusable. The OS would never tell you about it. What if the insertion of a USB drive to collect the results triggered a program on the drive that changed the results.
Did you check all the drivers that were installed? What about the dll files (assuming Windows). Other operating systems have equivalents.
Did any of your programs include images? You can hide code in those after the end of the image data. Did you check the compiler to make sure that it did not add anything it shouldn't? Or interpreter or assembler. The possibilities are endless and that is why I would never trust them.
All valid points; I am not a coder but encrypting something to act only on election day wouldn't that be seen in auditing of the code? Of course that's with the assumption someone is looking.
Everything has to have a paper trail right (or evidence of its removal), hence no way around we caught them all.
The way they got around that in 2020 was doing an OTA update last-minute. And then ordered the wiping of the machines some point after the steal was done. Completely breaking protocol.
Their only line of defense was having their pals in the legacy media gaslight people into thinking that never happened.
Where would you get the code from? Suppose I gave you a printout with that part missing? Suppose the printout was several inches thick - you get about ten thousand lines of code to the inch in round terms - might you miss it? What if I didn't call the date "date". Even then, you would need to compile the code yourself to make sure that what you checked was what was actually running.
Also, USB rives are in use at polling stations. I might subvert the code that opens a USB drive to add in some code to the program that was hidden on that specific drive.
To cover every eventuality that a creative programmer might find you would need to have an extremely detailed forensic analysis of every machine and that would take more time than you saved by using the machines in the first place.
I believe he said the encryption keys are for election data, so anyone could decrypt the results data, make changes to vote totals, then encrypt the altered data to change the final results. Also they could change the tabulator settings to control how votes were counted, so there was no need to hack the Windows/BIOS code.
2020 and 2022 used altered software not certified. They lied about certification.
2020 and 2022 no logic and accuracy tests performed for tabulators.
Master Cryptographic Encryption Keys had been left open on database in plain text. Malicious actor can control entire election and cover tracks, intercept info, change, etc.
And the whole inconvenient fact that the machines were in fact connected to the internet while this was all going on, while telling us they were not. And the whole last minute OTA "software update" right before the election thing...and the whole...ordering of the machines being wiped...etc
These machines were INVENTED to control elections and make them "selections". When did this start? When the FIRST machines were introduced into the voting booths.
I don't. I think they've been - and are continuing to be - knee-capped in too many places to get away with a steal. I don't think the foreign invaders are going to get them over the mountain they have to climb to be successful in their election fraud. I think they'll either try having the FNM just make up fake numbers (as fed to them through their SecureDrop system or another) and "proclaim a win by the Potatus" or they could, most likely IMHO, have the Potatus just outright "cancel" the election, proclaiming that he's "protecting the people of this country".
Another possibility is they could eliminate the Potatus at the last minute and proclaim that elections need to be cancelled this year while they figure out "how to best secure the country". President Trump has alluded to this on more than one occasion when he says he doesn't think Joe is going to make it to election day. By November the Potatus ought to be outright drooling and babbling while all the leftist "pundits" will claim he's sharp as a whip.
My guess is they're going to have the Potatus cancel the election because that would allow for a "clean" implementation of martial law and avoid much bloodshed. Having the military in place while the evil cabal, it's foot soldiers and it's minions go through their death throes by lashing out violently would serve to keep the peace as well as give the military the pretense to disseminate information they "discover" while dealing with the rogue politicians. At that point I think that a military takeover of the news media where they start the process of disclosure to the remaining sheeple might be effective. Even the willfully ignorant at this point must know deep down in their psyche that they've been following lies for a very long time.
I agree with your summation. I feel the election will be cancelled by the fake regime in DC right now. They've lost almost all avenues of cheating and their new found illegal pets are not going to do it for them. When the election does happen, it will be paper ballots and run by the military. i have witnessed myself them doing a "dry run" test of an election on paper. From erecting the giant white tents to carrying in large clear totes to hold ballots. I hate to not giving direct evidence of this but I'm NOT going to give away any operational details of what military base this was done on. Did they say it was for a US election? NO. This can only happen after the left throws it's nationwide tantrum and the military put them down. Our side needs to remain calm when this happens. They (DS) want us to pop off. We can not allow that to happen! We've already won and they know it. They're cornered animals right now and will be lashing out more and more.
I was in college studying computer science when I first heard about using computers in elections. I knew then that the only reason would be to cheat. They simply aren't needed. People push for computers so they can cheat.
I don't know why you would ever trust a computer. They can work OK but if you wanted to subvert them that would work as well.
You can write programs that work only on certain days or at certain times, polling day, for instance. So they would pass every test in the preceding days but still rig the vote.
You can write programs that delete themselves after running so a follow-up audit would never find them.
The Chinese added some extra spying components to some SuperMicro server motherboards it made. You could alter the BIOS, the operating system, some subroutines etc.
Then there is interference across a network. The list goes on and if there was money in it then you can bet someone has done it.
Volkswagen raises hand…has advice on diesel emissions voting.
"Spare no expense on the environment."
Changing a single parameter in a piece of code even in a huge system can change it completely. All good programmers know this.
You are correct. In a full test, you read the code itself, comparing it to the specs of that the program was supposed to do.
Yes and no!
If I wrote a program to run in Windows, say, would you also go through the Windows code line by line to see if what you thought was happening was actually happening?
I just looked on my PC and it has around 200 processes running. Ideally, they should all be checked line by line to be safe.
The source code for the program you are auditing, yes.
OK, but there is a problem. If I gave you a book in English and a thumb drive full of Chinese characters and told you they were the same, how would you check?
The source code would be text but the compiled and linked executable file would just be binary. Even worse, some of the binary that would run would not be in the source code anyway. It would be part of the operating system or drivers.
Well, I was saying the programs in the US for our voting systems, should be transparent, and subject to audit by reading line by line the source code. [When I was a software systems project manager, EVERY program before it was put online was subject not only to tests, but to a review of the code by several team members going through the code together. Every instruction, every conditional, every potential outcome of the code. There was no hidden code or time bombs in the code my project released. It is doable!]
If the code is as you describe, it needs to be THROWN OUT!!
SHEESH we can't have our voting system software INCOMPREHENSIBLE!
This is interesting and not unconnected. It explains some of the details behind the recent Linux hack.
Basically, code was hidden in an image type file and it acted in concert with the software building/compiling software to insert a number of "back doors" into open source software. Many eyes would have seen the code but no-one could see what was happening.
It was not until someone started to do performance checks on his computer that it was realised that the computer was spending time on some unknown tasks.
dastardly!
When you have your own system you know you can rely on most of it and when you have written a program in house you can be fairly certain that the source code you have is the code that generated the executable. You also know exactly where it will be installed.
In the case of voting machines there will be several polling stations in all of the around 3,000 counties all of which will need to have an executable file of some kind. How can you guarantee that every one will get exactly what they should?
Add in that the circuit boards inside the computer may have been corrupted. How would checking the code help? What if someone had hidden some code on a disk and then flagged the sector as unusable. The OS would never tell you about it. What if the insertion of a USB drive to collect the results triggered a program on the drive that changed the results.
Did you check all the drivers that were installed? What about the dll files (assuming Windows). Other operating systems have equivalents.
Did any of your programs include images? You can hide code in those after the end of the image data. Did you check the compiler to make sure that it did not add anything it shouldn't? Or interpreter or assembler. The possibilities are endless and that is why I would never trust them.
All valid points; I am not a coder but encrypting something to act only on election day wouldn't that be seen in auditing of the code? Of course that's with the assumption someone is looking.
Everything has to have a paper trail right (or evidence of its removal), hence no way around we caught them all.
there is no paper trail if you dont count manually the votes you trust only rigged machines. They use lame conformist lazy people against us.
The way they got around that in 2020 was doing an OTA update last-minute. And then ordered the wiping of the machines some point after the steal was done. Completely breaking protocol.
Their only line of defense was having their pals in the legacy media gaslight people into thinking that never happened.
That depends.
Where would you get the code from? Suppose I gave you a printout with that part missing? Suppose the printout was several inches thick - you get about ten thousand lines of code to the inch in round terms - might you miss it? What if I didn't call the date "date". Even then, you would need to compile the code yourself to make sure that what you checked was what was actually running.
Also, USB rives are in use at polling stations. I might subvert the code that opens a USB drive to add in some code to the program that was hidden on that specific drive.
To cover every eventuality that a creative programmer might find you would need to have an extremely detailed forensic analysis of every machine and that would take more time than you saved by using the machines in the first place.
I believe he said the encryption keys are for election data, so anyone could decrypt the results data, make changes to vote totals, then encrypt the altered data to change the final results. Also they could change the tabulator settings to control how votes were counted, so there was no need to hack the Windows/BIOS code.
What board were you using??? I'm using X11SRA-F MB!!!
And the whole inconvenient fact that the machines were in fact connected to the internet while this was all going on, while telling us they were not. And the whole last minute OTA "software update" right before the election thing...and the whole...ordering of the machines being wiped...etc
There are thousands of reasons why you would not want computerized election machines and only one reason why you would.
These machines were INVENTED to control elections and make them "selections". When did this start? When the FIRST machines were introduced into the voting booths.
Anyone still interested think there's going to be a election in November?
I don't. I think they've been - and are continuing to be - knee-capped in too many places to get away with a steal. I don't think the foreign invaders are going to get them over the mountain they have to climb to be successful in their election fraud. I think they'll either try having the FNM just make up fake numbers (as fed to them through their SecureDrop system or another) and "proclaim a win by the Potatus" or they could, most likely IMHO, have the Potatus just outright "cancel" the election, proclaiming that he's "protecting the people of this country".
Another possibility is they could eliminate the Potatus at the last minute and proclaim that elections need to be cancelled this year while they figure out "how to best secure the country". President Trump has alluded to this on more than one occasion when he says he doesn't think Joe is going to make it to election day. By November the Potatus ought to be outright drooling and babbling while all the leftist "pundits" will claim he's sharp as a whip.
My guess is they're going to have the Potatus cancel the election because that would allow for a "clean" implementation of martial law and avoid much bloodshed. Having the military in place while the evil cabal, it's foot soldiers and it's minions go through their death throes by lashing out violently would serve to keep the peace as well as give the military the pretense to disseminate information they "discover" while dealing with the rogue politicians. At that point I think that a military takeover of the news media where they start the process of disclosure to the remaining sheeple might be effective. Even the willfully ignorant at this point must know deep down in their psyche that they've been following lies for a very long time.
That's my guess anyway fwiw.
I agree with your summation. I feel the election will be cancelled by the fake regime in DC right now. They've lost almost all avenues of cheating and their new found illegal pets are not going to do it for them. When the election does happen, it will be paper ballots and run by the military. i have witnessed myself them doing a "dry run" test of an election on paper. From erecting the giant white tents to carrying in large clear totes to hold ballots. I hate to not giving direct evidence of this but I'm NOT going to give away any operational details of what military base this was done on. Did they say it was for a US election? NO. This can only happen after the left throws it's nationwide tantrum and the military put them down. Our side needs to remain calm when this happens. They (DS) want us to pop off. We can not allow that to happen! We've already won and they know it. They're cornered animals right now and will be lashing out more and more.
I was in college studying computer science when I first heard about using computers in elections. I knew then that the only reason would be to cheat. They simply aren't needed. People push for computers so they can cheat.
But even paper ballot tabulators (auto scanning) can be rigged as well. Hand counting is the only true way and that has to be triple verified.
👍
There should be no machines involved in counting the votes. Period.
Corrupt garbage in, corrupt garbage out.
so.... this is how they steal and make it invisible just login and run the script then cover the tracks on machines of interest
Does anyone know the status of this SC case?
Cabal works