1
antimatter 1 point ago +1 / -0

Well overturning really means pushing the decision back to the state legislature to pick the electors. And given how Blue the legislature is, they would just pick the same electors.

6
antimatter 6 points ago +9 / -3

So your cool if you dox the wrong person and potentially cause them harm.. Thats cool. Cause we already have two people doxxed on this Vote usb manipulations and no one knows who it really is or what they were doing.

https://thedonald.win/p/11Ql1dVuY3/codemonkeyz-outs-dominion-employ/c/

All I see here are a bunch of leftist bringing their shit to this forum and causing rifts in the community with this "Doomer/Cuck" narrative being thrown around. You want to support Trump? Stop pushing fake nonsense and then shitting all over everyone who calls it out.

-26
antimatter -26 points ago +9 / -35

No.. Do you have the rule that states that? Do you have the SOPs for what was supposed to be and what not? Cause all I see is hearsay right now. We have no idea if those laptops are part of the operation or not, we have no idea if it was connected to the internet or not. He didn't take the laptop with him anywhere in the video, so for all I know it was supposed to be there.

There are a lot of people I want to see drawn and quartered, this dude is not one of them until I get more evidence.

I firmly believe this is going to end in violence one way or another. I'm just scared to death at some of weak ass evidence I'm seeing that might be used to persecute people who really don't deserve it.

-56
antimatter -56 points ago +8 / -64

This is the most irresponsible post I've seen. Everyone is ready to put him in front of a firing squad and no one actually know ANYTHING about what's going on there..

-4
antimatter -4 points ago +1 / -5

We couldn't see shit in that video, lets not roast an innocent person here.

1
antimatter 1 point ago +1 / -0

I watched the whole thing. "I'm an AZ voter" the craziest part was how each person's stats basically reinforced the following person's testimony. His explanation of the weighted algorithm fits perfectly with the prior person talking about decimal points used..

1
antimatter 1 point ago +1 / -0

Well this will be easily verifiable in ... at most 4 days. If true, I hope they have more plans than just "Firing" Wray and Haspel.

1
antimatter 1 point ago +1 / -0

You would have to decrypt the packets though. Unless Dominion is so colossally stupid that they transmit on unencrypted data over the internet.. Which means anyone in the world could have read the information in the data packets.

I'm still skeptical of this guy though. Isolating packets of just the voting machines in the vast (I'm talking TRILLLIONS) of packets that get sent over those wires.. I have a hard time believing.

1
antimatter 1 point ago +1 / -0

This might be a good opportunity to completely dismantle this abysmal 2 party (cough cough uni party) system. Get to a better system that doesn't keep forcing out 3rd party candidates from joining debates.

-1
antimatter -1 points ago +1 / -2

He's talking about a printer. Open ports mean jack squat without a service listening on it. Port 22 is normally ssh. I don't see SSH as a function of a CS-2560 printer. Do you? http://www.kyocera.cct.hu/letoltesek/dokumentum/km2560_km3060_og_s_en_r10.pdf

Unless he's already inside the building physically accessing the printer.. I'm sorry you can't just gain access to a network via a random port on a printer. Just another larp.

-8
antimatter -8 points ago +3 / -11

Eh.. this is common. Wifi on the printer broadcasting its own access point. Doubtfull he can do anything but print friendly messages on it. Used to do this college. People would connect their printer to the dorm network and anyone with a little it knowledge could send a print to someones printer in another dorm.

1
antimatter 1 point ago +1 / -0

I hope so. Either way the discovery process, the obtaining of the equipment, the lining up of experts to inspect the machines and software will take much longer than we have. So I think they are throwing all this stuff out there to show, "We don't have the specific details of how the fraud happened. But its obvious there was fraud". In order to convince the state legislatures to take back their power of selecting electors and win that way.. Then sort out the mess after.

2
antimatter 2 points ago +2 / -0

Thats actually a very good video. He does a good job isolating the fraud to different areas and explaining it. Thats a big problem right now, the fraud was so rampant at different levels, its hard to sort it all out and argue specifics. On top of the obvious fraud, these IT systems seem to have been purposely done in a confusing and less than secure way.

Same reason Hildawg setup an email server separate from the government. It wasn't just to hide stuff from FOIA, its to also give plausible deniability.. "I didn't give classified information out! I was hacked!" Well when you setup a server and foregoes every modern security measure. You might as well have given it away.

2
antimatter 2 points ago +2 / -0

Agreed, outsourcing anything doing with voting to an international company is insanity. I also don't understand why we don't have some sort of commission that goes line by line through voting software code and audits it. The Nevada gaming commission has incredibly strict rules and audits of the software going into gambling machines to make sure they don't try and screw people over with their algorithms. At minimum we should have the same thing with voting machines.

1
antimatter 1 point ago +2 / -1

What are you talking about? There is no "re-tooling". I never said they were communicating to "government servers" here are the plain facts.

  1. He cannot know what devices were causing the traffic between the IP addresses.
  2. The IP addresses he was looking at are Dominion owned. Meaning they are assigned to Dominion buildings.
  3. The voting machines in question were NOT in Dominion owned locations. They were in government civics buildings counting the ballots. If they connected to the internet from there.. It would be originating from IP addresses assigned to the internet servicing the government building. OR.. They used cellphone internet, which would be a random IPv6 address. Which again means he cannot know what IP to watch to "claim" these devices were on the internet.
1
antimatter 1 point ago +3 / -2

What I'm trying to get at, is all you can see from the outside without a warrant etc.. Is to watch traffic VOLUME flowing from one IP address to another IP address. These IP addresses he is looking at would be assigned to entire office buildings or data centers. Which contain hundreds/thousands of devices which will be using those IPs. You cannot tell individual devices or what type of traffic it was. (Cell phone, desktop, etc.)

Now keep in mind, these voting machines were at city/state/county locations. So the IP addresses the machines (if connected to the internet) would have been communicating from, would be government IPs. All he was able to show was traffic volume between Dominion and Scytl office BUILDINGs and maybe data centers which house the servers.

4
antimatter 4 points ago +4 / -0

Yeah and most cell carriers translate you to IPv6 now. There is so much more information I need. We are getting complex IT information filtered through multiple layers of people who can't tell the difference from USB or HDMI connectors.

We know USB sticks, memory cards, OLD pcmcia flash storage etc all have votes on them. So either they move the votes from the counting machines to the central tabulating machines manually via the physical USB storage etc.. Or they could have a stand alone switch in the room, connecting all the machines on an isolated network. OR.. They could just simply be connected to the internet and transmitting results. I just have too much conflicting information to know for sure.

It could simply be "all of the above". Not all machines were connected or something.

1
antimatter 1 point ago +2 / -1

Yup, the core of the Net Neutrality argument is actually very complex and needs a good understanding of networking. The Media abused this by simplifying it down to "OMG DO YOU WANT GOOD INTERNETZ OR WUT??" Even a lot of non "networking" IT folks fell for it. Stopping net neutrality probably saved the internet. They need to focus more on local monopolies of Telco's and corrupt deals between local governments and the Telcos to keep competition out.

1
antimatter 1 point ago +1 / -0

I'm pretty sure he was talking mostly about Pima county (Tucson, AZ) machines. He mentioned they are not Dominion. They are actually Diebold machines. Very old. I have family that voted there and confirmed they are Diebold. They are Dominion by way of acquisition as Dominion purchased Diebold in 2010.

3
antimatter 3 points ago +4 / -1

Ajit Pai actually did some good things at the FCC. Stopped the net neutrality madness, expanded open airways frequencies. For instance, added bandwidth to the public frequencies like WIFI. I'm not sure why people think this is good?

-4
antimatter -4 points ago +2 / -6

Not quite. Remember, the machines in question were at state/county/city locations. If they were on the internet, they would have been on government internet IPs. Knowing which IPs the machines would have been communicating from is nearly impossible. You would have hundreds (thousands?) of locations where the machines were on election night, each with their own IP. He would have to know all of those locations, which internet they "may" have been plugged into and been monitoring traffic "VOLUME" from each of them.

5
antimatter 5 points ago +5 / -0

The smoking gun would be source code of the machines and the server, and the database storing the result information.

The rest, things like firewall logs, server logs etc is still pretty weak. I am hoping the Frankfurt raid was real. If they really do have the servers and the software that was on it. They still have a rough time because there are so many layers of security and encryption to get through on the devices themselves to get to the source code etc.

4
antimatter 4 points ago +4 / -0

Yup, problem is he can't tell what generated the traffic. For instance, my company network has 400+ network connected devices on it, most communicate on the internet. From the outside, all 400+ devices will have traffic coming from a SINGLE ip address. WIFI cellphones, My boss watching netflix.. All that traffic gets mashed together and all you can do is see "volume" from the outside, unless you miraculously crack many different encryption protocols, you could not see what the traffic was or what device caused it.

view more: Next ›