2221
Comments (69)
sorted by:
110
sideOfBeef2016 110 points ago +111 / -1

That is just insane, how the fuck are systems this insecure deployed

67
ascarymonster 67 points ago +67 / -0

NASED, The National Association of State Election Directors, is a non profit organization funded by billionaires. From there website- "Our members are Election Directors from across the country, many of whom have worked in election administration at the state and local level for decades. In each of their states, they are responsible for implementing election laws and policies, maintaining the voter registration databases, working with local election officials to ensure a successful voting experience for all voters, and more. "

60
deleted 60 points ago +60 / -0
14
Cuttrogue 14 points ago +14 / -0

Who gave them such immense power with no audit and why? How is this possible in the most powerful country on Earth? WTF were republicans doing while all this was happening?

This is absolutely ridiculous and mind-boggling.

8
ascarymonster 8 points ago +8 / -0

There are many swamp creatures inside the GOP. Defrauding Americans of their civil liberties has a very long history of bipartisan support

3
deleted 3 points ago +3 / -0
10
MrBlack 10 points ago +10 / -0

Send like the election process needs to be federalized in terms of process, and executed at the state level.

19
BidenCrimeFamily 19 points ago +20 / -1

It's a feature, not a flaw.

7
spanglevision 7 points ago +8 / -1

winner winner chicken dinner

6
TommyLasordasBallBag 6 points ago +6 / -0

Purposely.

60
Plaquenil 60 points ago +60 / -0

! Notice from Twitter and the DNC: there's no way to "hack" an election except with $100,000 in Facebook ads if Trump wins. Our elections are secure. Click this link to read some propaganda.

19
SuperChicken 19 points ago +20 / -1

Nah more like $36,000!

16
coderdude6598 16 points ago +16 / -0

It is in the source code. Subroutine does not run if null variables provided or not triggered. Software “update” removes subroutine after election. No evidence.

This is 8th grade level programming with CIA level chicanery.

5
Plaquenil 5 points ago +5 / -0

You mean "oops! I forgot to initialize a variable!"?

4
coderdude6598 4 points ago +4 / -0

Looks like multiple parts of subroutine as noted in analyses; vote-switching, vote deletion with multiple variables including MAX_TARGET variable to keep votes below than 50.1% for example. If you don’t need to manage the max total, then that variable could be set to 100%; this is all speculative based on typical coding approach. Trump admin completed forensics on the software on Thursday after being tipped off by Google engineers that did the analysis on Wed morning after election from my source who is now in hiding.

40
deleted 40 points ago +40 / -0
33
astralentity 33 points ago +33 / -0

What OS is that? That looks to be a custom CDE based desktop, or it could be OS2/eComStation.

20
deleted 20 points ago +20 / -0
13
Plaquenil 13 points ago +13 / -0

It might be Windows CE.

18
nufosmatic 18 points ago +18 / -0

DO NOT EVER BET YOUR LIFE, OR THE LIVES OF THE ONES YOU LOVE, ON PRE-SUB-ALPHA SOFTWARE LIKE WINDOWS

7
deleted 7 points ago +7 / -0
2
deleted 2 points ago +2 / -0
2
nufosmatic 2 points ago +2 / -0

I know that General Electric digital X-ray machines of a certain vintage do not use Windows. Everything else is suspect.

Did you hear about the US warship that had to be towed back to port because the Windows-powered energy management system they installed on the ship failed at sea during sea trials. Do you know what kind of shitstorm a ships captain gets when his ship has to be towed back to port?

He tried very hard to have ALL MICROSOFT PRODUCTS PULLED FROM DEFENSE SYSTEMS. He almost succeeded...

Does any of this sound familiar given events of the day?

https://en.wikipedia.org/wiki/USS_Yorktown_(CG-48)

Smart ship testbed From 1996 Yorktown was used as the testbed for the Navy's Smart Ship program. The ship was equipped with a network of 27 dual 200 MHz Pentium Pro-based machines running Windows NT 4.0 communicating over fiber-optic cable with a Pentium Pro-based server. This network was responsible for running the integrated control center on the bridge, monitoring condition assessment, damage control, machinery control and fuel control, monitoring the engines and navigating the ship. This system was predicted to save $2.8 million per year by reducing the ship's complement by 10%.

On 21 September 1997, while on maneuvers off the coast of Cape Charles, Virginia, a crew member entered a zero into a database field causing an attempted division by zero in the ship's Remote Data Base Manager, resulting in a buffer overflow which brought down all the machines on the network, causing the ship's propulsion system to fail.[9]

Anthony DiGiorgio, a civilian contractor with a 26-year history of working on Navy control systems, reported in 1998 that Yorktown had to be towed back to Norfolk Naval Station. Ron Redman, a deputy technical director with the Aegis Program Executive Office, backed up this claim, suggesting that such system failures had required Yorktown to be towed back to port several times.[10]

In the 3 August 1998 issue of Government Computer News, a retraction by DiGiorgio was published. He claims the reporter altered his statements, and insists that he did not claim the Yorktown was towed into Norfolk. GCN stands by its story.[11]

Atlantic Fleet officials also denied the towing, reporting that Yorktown was "dead in the water" for just 2 hours and 45 minutes.[10] Captain Richard Rushton, commanding officer of Yorktown at the time of the incident, also denied that the ship had to be towed back to port, stating that the ship returned under its own power.[12]

Atlantic Fleet officials acknowledged that the Yorktown experienced what they termed "an engineering local area network casualty".[10] "We are putting equipment in the engine room that we cannot maintain and, when it fails, results in a critical failure," DiGiorgio said.[10]

Criticism of operating system choice ensued. Ron Redman, deputy technical director of the Fleet Introduction Division of the Aegis Program Executive Office, said that there have been numerous software failures associated with NT aboard the Yorktown.[10]

Because of politics, some things are being forced on us that without political pressure we might not do, like Windows NT. If it were up to me I probably would not have used Windows NT in this particular application ... Refining that is an ongoing process ... Unix is a better system for control of equipment and machinery, whereas NT is a better system for the transfer of information and data. NT has never been fully refined and there are times when we have had shutdowns that resulted from NT.

— Ron Redman[10]

7
Hunterscrackbaby 7 points ago +7 / -0

Looks EXACTLY like windows CE to me. But hard to tell. Fuck windows CE. Spent 2 years of my life as a support tech for a product that used it

7
Trump2024 7 points ago +7 / -0

I read the base code is Python so maybe it's a Python GUI? I don't know enough about Python to hazard a guess.

7
nufosmatic 7 points ago +7 / -0

There are lotso Python GUIs to chose from, most with lotso back doors to the window elements. Brrrrr - I just got a chil...

2
Trump2024 2 points ago +2 / -0

Thanks for the info. I assumed there were GUIs but didn't want to make that statement to look like I'm knowledgable when I'm not.

4
nufosmatic 4 points ago +4 / -0

I'm not kidding about "pre-sub-alpha" - what she showed us would get a person locked up in the business I'm in...

5
Whitemarlin 5 points ago +5 / -0

What is pre-sub-alpha?

1
nufosmatic 1 point ago +1 / -0

You've heard of "beta"?

Before "beta" there is "alpha".

Before "alpha" there is "pre-alpha".

And before "pre-alpha", there is "pre-sub-alpha".

Aka - not ready for prime-time... not cooked all of the way through...

21
deleted 21 points ago +21 / -0 (edited)
19
Getfuckedcommietrash 19 points ago +21 / -2

Who is she?

1
Thefirstgay 1 point ago +2 / -1

dibs

19
shitPostingChamp 19 points ago +20 / -1

We have the best cute hacker Pedes, don’t we folks?

16
8
Serioush 8 points ago +8 / -0

Because the people that purchase those from the creator actually want them secure.

14
Afripede 14 points ago +14 / -0

Never accept any form of electronic voting. Hand count.

9
kekNation 9 points ago +9 / -0

Would admin access all you to change/delete all the votes stored in that machine?

8
Filo76 8 points ago +8 / -0

Someone correct me if I’m wrong but...

They don’t store the votes IN the machine. The votes you cast on the screen go into the card that is inserted into the machine. Then you take the card to the election worker and they are later tabulated.

The problem is that we don’t know what the machine is writing to the card. Say the screen says Donald Trump and you voted red down ballot. You hit the big VOTE button and the machine writes the data to the card. Was that data changed between what the screen displayed and what was written on the card?

I’ve no idea.

7
kekNation 7 points ago +7 / -0

The thing that seems obvious is that fuckery of this sort would only be put in there for a nefarious purpose.

Nobody would intentionally make a machine this vulnerable without a reason; competitors would use that as a selling point again your machine. . .unless the insecurity IS THE SELLING POINT.

6
deleted 6 points ago +6 / -0
1
Jimmy33 1 point ago +1 / -0

In 2016 there were vids going around showing that the cards themselves could be easily hacked and the vote tallies auto changed.

4
BadManOrange 4 points ago +4 / -0

That's a key question. What can you actually do as admin?

3
Fozibare 3 points ago +3 / -0

Anything. You can install software, viruses, change versions of software, restore to earlier versions... physical access and administrative control provides zero security.

Analysis in the aftermath would be very difficult. Tantamount to asking the TSA at the end point of a flight trying to determine who brought weapons onto a plane.

7
deleted 7 points ago +7 / -0
6
deleted 6 points ago +7 / -1
3
deleted 3 points ago +4 / -1
-1
lobster -1 points ago +1 / -2

Its not a girl actually. I know "her".

Sex change because of salary/employment is a thing in SV.

1
deleted 1 point ago +3 / -2
3
deleted 3 points ago +3 / -0
3
nufosmatic 3 points ago +3 / -0

DO NOT EVER BET YOUR LIFE, OR THE LIVES OF THE ONES YOU LOVE, ON PRE-SUB-ALPHA SOFTWARE

3
deleted 3 points ago +3 / -0
3
cmonman 3 points ago +3 / -0

Canadian collusion. This is the best timeline.

3
Tryhardneckbeard 3 points ago +3 / -0

OUR ELECTIONS ARE TOTES FUCKING SECURE U BIGOTS..... CAN ANYONE IN ANTIFA DOXX THIS WOMAN WHO IS DISENFRANCHISING OUR VOTERS?!?!

2
The_Real_Jameson 2 points ago +2 / -0

Explains the busted locks on voting machines.

1
Ironlabel 1 point ago +1 / -0

Lol this was designed so that someone important can walk right up to it and do their thing with our ever needing any tools or a key and just in depth enough where a random person would not do any of those things.

1
Shakakka99 1 point ago +1 / -0

I must live in a simulation. This is a clown world.

1
BLM_are_terrorists 1 point ago +1 / -0

That's the machine I voted on... Our county thankfully went red but still

I'm wondering if more people would benefit from recognizing this as the machine used, but I'm assuming Dominion is used on more than this machine, right?

1
deleted 1 point ago +1 / -0
1
BastardSonBiden 1 point ago +1 / -0

Wow. I mean you have to try REALLY hard to make a piece of hardware that easy to bypass security measures. Unbelievable

1
Redwine82 1 point ago +1 / -0

Leilts go back to lever action votes

1
MuffDuster 1 point ago +1 / -0

Archive

1
Dtom13 1 point ago +1 / -0

Hack the vote totals with this one weird trick!

1
droden 1 point ago +1 / -0

unsecure on the outside and unsecure on the inside. feature not a bug.

1
ronaldcamillo123 1 point ago +1 / -0

That woman is pretty hot.

1
Junosu 1 point ago +1 / -0

Holly Jeepers, Batman. That is "problematic".

1
rusty_spittoon 1 point ago +1 / -0

Sticky?

1
Polks_Corps 1 point ago +1 / -0

I would totally hit that

1
deleted 1 point ago +1 / -0