1
TheChillingEffect 1 point ago +1 / -0

I'm just assuming it was encrypted data. Like I stated above, it could just be - as you've stated - laziness... And yes, I'm assuming behind a VPN. Maybe none of that is true, however.

1
TheChillingEffect 1 point ago +1 / -0

I agree. Either we'll have to see that the MIL/NSA/etc can break certificates, or they're home brew certificates and they got the CAs and keys. If the packets were unencrypted, that would be ridiculously silly - but then again, we are dealing with stupid, reckless people....

1
TheChillingEffect 1 point ago +1 / -0

I'm just assuming that's the case. If I were running an operation, I'd want packets encrypted. But of course, they have to be decrypted on the destination side. I'm just making an assumption, but of course, I have no idea. If it's 37TB of data, all streaming from different sources cast across the country, it would be very hard to capture data and get it all. So I'm assuming they got the aggregated data at a collection point.

Thus, I'm assuming they created certificates for the transport with a master CA they implemented. That would allow the decryption of all data if you got the master CA, any secondary CAs, etc. Just my take...

2
TheChillingEffect 2 points ago +2 / -0

This is curious.... If they didn't get the edge equipment, then they couldn't really have any data - as best as I can tell. That would imply all of the data is made up. However, I can't really see this scenario. Not sure why the statement is out there.

3
TheChillingEffect 3 points ago +3 / -0

That's true. It's really a sophisticated MITM attack. I have to try to oversimplify the statement a bit for brevity.

All packet headers have to have information on source and destination, but the data would remain encrypted. However, on the destination side, the data has to be decrypted. Thus, if you can intercept the packets via MITM to locate the destination and can get access to equipment on the destination side, you can get the data. I'm assuming this is what occurred.

8
TheChillingEffect 8 points ago +8 / -0

Very true. But Lindell has put everything on the line to take it all the way. Not discounting everyone else, but it takes serious conviction to put everything you have on the line. Unfortunately, it takes someone with wealth these days to make a public impact. It shouldn't be that way, but it is...

0
TheChillingEffect 0 points ago +1 / -1

Hope for the best. Prepare for the worst. Let's take action.

11
TheChillingEffect 11 points ago +11 / -0

Mike Lindell is a hero. Regardless of whether everything went smoothly or not, if you're paying attention, he's put on extremely valuable information.

Don't judge the man in the arena until you're the man.

1
TheChillingEffect 1 point ago +1 / -0

I don't know how much of this is applicable to Canada, but I would assume it's very similar. Take it as a starting point.

https://www.thehealthyamerican.org/

4
TheChillingEffect 4 points ago +4 / -0

Interesting. I didn't. Was waiting to see it happen. I am NOT near a 5G tower. Are you?

2
TheChillingEffect 2 points ago +2 / -0

By "better than pcaps," what they mean is that this is forensic data from a machine - proof that can show what happened on A machine (but presumably others - that the "widescale" problem - you'd have to show how wide the tampering is, but of course that data is being destroyed in real time right now, nationally).

The pcaps are just the capture of real-time data packets from the machines to the outside world that contain data about election tabulation, and thus, changes. The trick is going to be proving the data source of the pcap is legitimate. That's going to be the big thing that proves the manipulation was nationwide, coordinated, and largely in real-time... Hope they can prove the source of the capture is impeccable.

4
TheChillingEffect 4 points ago +4 / -0

For the record, I don't know why anyone wanting any transparency would ever use an OS whose code isn't auditable, anyway. Just sayin...

3
TheChillingEffect 3 points ago +3 / -0

Not only that, but by changing the partitioning table, they definitely destroyed any data that would have been preserved with a new, smaller image that didn't overwrite the entire drive.

6
TheChillingEffect 6 points ago +6 / -0

It's proof of tampering. The stalling is an indicator that it's likely widespread. The lack of agreement to allow full forensic audits, coupled with the ongoing "maintenance" of machines, is reasonable expectation of covering one's tracks.

Likely, the only proof of widespread computer manipulation that can ever be proven will be because of the source of packet capture. IMO, that's presently the missing link - can the packet capture be validated as true. If so, that's that. Still waiting to see what's said on this topic.

Thus far, there's more than enough to suggest this should be investigated on a national level, and in select cases, taken to court. However, all of the stops seem to be in to try and prevent this. We shall see what happens.

5
TheChillingEffect 5 points ago +5 / -0

Logs removed after the Dominion employee did an "update." But, but muh prooof. Where's muh proof? </s?

11
TheChillingEffect 11 points ago +11 / -0

I don't believe they have their primary team on this - basically just some higher level managers of those teams out for the discussions (for the reasons you suggest, I imagine). I used to manage compiler engineers and later on, RTOS engineers. You don't really take those guys out in public...

2
TheChillingEffect 2 points ago +2 / -0

I'm more of a Linux/BSD guy, so thanks for that clarification...

6
TheChillingEffect 6 points ago +6 / -0

There not only shouldn't be a web server ca 1997 on this thing, there shouldn't be VB scripts... That alone is a massive problem.

5
TheChillingEffect 5 points ago +5 / -0

Looks like they're using private Jitsi (XMPP/Jabber) video conferencing - probably running on Linux. Good idea to avoid a commercial service, except the servers are probably being DDOS'd to death...

view more: ‹ Prev Next ›