I don't know why you would ever trust a computer. They can work OK but if you wanted to subvert them that would work as well.
You can write programs that work only on certain days or at certain times, polling day, for instance. So they would pass every test in the preceding days but still rig the vote.
You can write programs that delete themselves after running so a follow-up audit would never find them.
The Chinese added some extra spying components to some SuperMicro server motherboards it made. You could alter the BIOS, the operating system, some subroutines etc.
Then there is interference across a network. The list goes on and if there was money in it then you can bet someone has done it.
All valid points; I am not a coder but encrypting something to act only on election day wouldn't that be seen in auditing of the code? Of course that's with the assumption someone is looking.
Everything has to have a paper trail right (or evidence of its removal), hence no way around we caught them all.
The way they got around that in 2020 was doing an OTA update last-minute. And then ordered the wiping of the machines some point after the steal was done. Completely breaking protocol.
Their only line of defense was having their pals in the legacy media gaslight people into thinking that never happened.
Where would you get the code from? Suppose I gave you a printout with that part missing? Suppose the printout was several inches thick - you get about ten thousand lines of code to the inch in round terms - might you miss it? What if I didn't call the date "date". Even then, you would need to compile the code yourself to make sure that what you checked was what was actually running.
Also, USB rives are in use at polling stations. I might subvert the code that opens a USB drive to add in some code to the program that was hidden on that specific drive.
To cover every eventuality that a creative programmer might find you would need to have an extremely detailed forensic analysis of every machine and that would take more time than you saved by using the machines in the first place.
I believe he said the encryption keys are for election data, so anyone could decrypt the results data, make changes to vote totals, then encrypt the altered data to change the final results. Also they could change the tabulator settings to control how votes were counted, so there was no need to hack the Windows/BIOS code.
I don't know why you would ever trust a computer. They can work OK but if you wanted to subvert them that would work as well.
You can write programs that work only on certain days or at certain times, polling day, for instance. So they would pass every test in the preceding days but still rig the vote.
You can write programs that delete themselves after running so a follow-up audit would never find them.
The Chinese added some extra spying components to some SuperMicro server motherboards it made. You could alter the BIOS, the operating system, some subroutines etc.
Then there is interference across a network. The list goes on and if there was money in it then you can bet someone has done it.
All valid points; I am not a coder but encrypting something to act only on election day wouldn't that be seen in auditing of the code? Of course that's with the assumption someone is looking.
Everything has to have a paper trail right (or evidence of its removal), hence no way around we caught them all.
there is no paper trail if you dont count manually the votes you trust only rigged machines. They use lame conformist lazy people against us.
The way they got around that in 2020 was doing an OTA update last-minute. And then ordered the wiping of the machines some point after the steal was done. Completely breaking protocol.
Their only line of defense was having their pals in the legacy media gaslight people into thinking that never happened.
That depends.
Where would you get the code from? Suppose I gave you a printout with that part missing? Suppose the printout was several inches thick - you get about ten thousand lines of code to the inch in round terms - might you miss it? What if I didn't call the date "date". Even then, you would need to compile the code yourself to make sure that what you checked was what was actually running.
Also, USB rives are in use at polling stations. I might subvert the code that opens a USB drive to add in some code to the program that was hidden on that specific drive.
To cover every eventuality that a creative programmer might find you would need to have an extremely detailed forensic analysis of every machine and that would take more time than you saved by using the machines in the first place.
I believe he said the encryption keys are for election data, so anyone could decrypt the results data, make changes to vote totals, then encrypt the altered data to change the final results. Also they could change the tabulator settings to control how votes were counted, so there was no need to hack the Windows/BIOS code.