7899
posted ago by zettapede ago by zettapede +7901 / -2

Hey folks, it's your boy Rai....er... zettapede here with an important announcement:

We're assembling the biggest dump of archives, links, videos, and other data on the election tampering. Put it in the comments below - emphasis on specific, direct evidence of cheating.

Let's turn this into a resource for redpilling the "Where's the evidence?" Normies who've never researched a fact in their lives.

Remember to archive and download all evidence! (And if someone posts an unarchived link or un-downloaded video, make a copy and reply with the link!)

Come at me bro!

LINKS TO GET YOU STARTED

https://thedonald.win/p/11PpBG03og/archive-dump-to-be-filled-as-lin/

https://twitter.com/jamesokeefeiii/status/1324845160358940673?s=21

https://twitter.com/EricTrump/status/1324337951866802178

https://thedonald.win/p/11PpKZuGiT/benfords-law-courtesy-of-4chan-t/c/

https://streamable.com/dti4dd

https://thedonald.win/p/11PpKeTDhw/wow-what-a-turnout-election--105/c/

https://twitter.com/stillgray/status/1324793898724720646?s=21

https://pastebin.com/zjz6nm6Q

https://twitter.com/kimKBaltimore/status/1324563483078307840?s=19

https://controlc.com/59945faa

https://mobile.twitter.com/Pismo_B/status/1324445619474235393?s=19

https://docs.google.com/spreadsheets/d/1xLfjFPvEL4BgLLpe1kFKqa2oujaQ1WaHGk61k__XHX4/htmlview#gid=2075906486

Comments (2002)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
3
_Cabal_ 3 points ago +3 / -0

HOW THE FUCK DOES A "GLITCH" CAUSE SOFTWARE TO SWITCH AN ARBITRARY NUMBER OF VOTES FROM ONE CANDIDATE TO ANOTHER

2
TacticalWitdotcom 2 points ago +2 / -0

It's not a glitch. Bannon covered it. A genius coder made this years back and it was usurped by the dems for evil purposes.

2
leanpocket 2 points ago +2 / -0

You're exactly right. Adding on to that, I think election software should be OPEN SOURCE and visible for people willing to inspect it. That is how the whole Linux Operting System ecosystem works so that the public can find flaws and possibly hidden viruses or secret backdoor software that do not belong in the system.