This should be setting of security alarms everywhere
The Crowdstrike remediation method requires a special boot sequence to a powershell environment to selectively delete certain .sys files that temporarily render crowdstike penetration protection OFFLINE
Then a reboot happens, then another update, and then another reboot. During that time, the Windows server is WIDE OPEN to penetration attacks, as the crowdstrike code is not fully active.
In other words, this crowdstrike bug that took down infrastructure all over the world, like Y2K coming to life, had the net effect of making potentially millions of servers DROP THEIR PROTECTION against cyber intrusions, at least temporarily.
During that time, what else is potentially being installed on their systems in preparation for a much larger cyber false flag event? My gut feeling is that this Crowdstrike BUG was no bug at all...
it's a tactic to install a Trojan horse
Paper ballot time. Machines can no longer be trusted.
This makes sense even to me. This Trojan horse may be a changeling that's our black swan.
AND with those servers being down and OPENED I will bet you a $100.00 that the nefarious a$$hats are pinging all those servers ferociously to attack when that is taking place...IT ONLY take MS to get in and get out...HMMMMMM!!!!! Changing Vote Totals Maybe...with NO trace left behind???????
The fix should be sent out too all companies that have Crowdstrike and those servers taken offline (if more than one, take one down, fix it bring it back up) and continue on....
I agree with you on this and it bothers me greatly that this was done DELIBERATELY to open those servers up as you suggest...
F$cking A$$holes!!!!!!!!!! (keeping it nice for the children on the board!!!)
They are saying that the problem was caused by a lack of testing.
In reality, that could have been the test! They now know what to do to bring down all those computers.
Horse Puckey ... (Col. Potter on Mash)!!!!!
Feature not bug
This was what i was thinking but not so smartly if that makes any sense at all. Lmao.
How does anyone know that this was not a WH op giving back door access to the voting machines?
Access was already present and captured in real time.
None of this was ALLOWED IN ANY CASE BROUGHT FORTH...
Pillow Man, etc has the data from overall the world
I think Crowdstrike's history is against them.
They were the company that the DNC called in to show that the DNC email server had been hacked by the Russians.
Also, Trump mentioned them in his famous Zelensky call when he asked Zelensky about the server because he thought it now could be in Ukraine.
Never take anything at face value
Or maybe the good guys used the exploit to add/remove something.
Remember when they intercepted all those palettes of Huawei phones and debugged them? (They might have swapped the chips, I can't remember)