Too many people in this comment section are going insane. I work with Microsoft SQL Server and Microsoft SQL Server Management Studio, or SSMS (which was the program shown in the video) almost daily.
The white hat hacker's laptop is running SSMS. He is connecting to the SQL Server instance running on the Dominion machine. The point is that votes can be changed by an outside user in real time while the machine is counting ballots. That's such an obvious security hole that could be plugged by simply blocking the incoming port while the machine is in tabulation mode. It takes literally 10 minutes to write code to do that.
I don't know the rest of the details, which is how the white hat guy obtained the credentials to the SQL instance. If there's no password, or the password is on the dark web (Pillow Guy claimed many election department passwords were on the dark web), that's even worse.
Let's not get started on all the other security holes these Dominion scanners have... such as being able to count the same ballot multiple times, as demonstrated on video at the State Farm Arena in Atlanta.
Too many people in this comment section are going insane. I work with Microsoft SQL Server and Microsoft SQL Server Management Studio, or SSMS (which was the program shown in the video) almost daily.
The white hat hacker's laptop is running SSMS. He is connecting to the SQL Server instance running on the Dominion machine. The point is that votes can be changed by an outside user in real time while the machine is counting ballots. That's such an obvious security hole that could be plugged by simply blocking the incoming port while the machine is in tabulation mode. It takes literally 10 minutes to write code to do that.
I don't know the rest of the details, which is how the white hat guy obtained the credentials to the SQL instance. If there's no password, or the password is on the dark web (Pillow Guy claimed many election department passwords were on the dark web), that's even worse.
Too many people in this comment section are going insane. I work with Microsoft SQL Server and Microsoft SQL Server Management Studio, or SSMS (which was the program shown in the video) almost daily.
The white hat hacker's laptop is running SSMS. He is connecting to the SQL Server instance running on the Dominion machine. The point is that votes can be changed by an outside user in real time while the machine is counting ballots. That's such an obvious security hole.