Win uses cookies necessary for site functionality, as well as for personalization. By using this site, you agree to our use of cookies as described in our Privacy Policy.
Honestly reading it isn't too bad once you get used to it like we did back in my day. You kids need to man the fuck up and intimately learn how technology works before my generation passes and it's all left with (((them))).
I agree that learning a small bit of assembly makes it easier to learn stuff down the road. Kind of like how learning Esperanto makes it easier to learn other languages.
Everyone of you newbie programmers should be hazed with a mandatory 3 credit hours of Assembly your freshman year just to teach you to appreciate the higher order languages you have now! ... and also to vet out the sissies!
And when the original code is compiled, it is optimized and changed from an inefficient form which humans can easily read, into an efficient form which computers can quickly read. That means your nicely-written function named FunctionThatPerformsTask which you filled with nice comments explaining what it does and how it works... doesn't matter. The compiler changes it into instruction 0x39 which is called by address 0x001A of instruction 0xA3 and contains no comments, lol.
Fortunately there are some utilities which partially reverse the process, but a human still has to interpret the result and figure out its meaning and function and re-add those descriptive labels so the code can be "worked with" again.
Nono, what I'm saying is that when you compile the code, it totally strips all the comments out. None of them are left behind inadvertently, it doesn't work that way.
I've been out of the whole cracking loop for years. But when you used to run executables through Ida Pro, many comments were left in and showed up giving valuable insights to what sections of code were doing.
This Dominion outfit is likely going to be a smallish crew by current development standards ? And its highly likely that the supervisors who would have been responsible for checking for incriminating or suspicious artefacts wont have been clever enough to take their duties seriously. Just a guess mind you :)
I know there are utilities that will take care of some of the grunt work of adding readable labels to function names and things like that... Look into it if necessary. I can only imagine that's a TON of code and I wouldn't be surprised if it was obfuscated with Huffman tables kept in a chip on the machine's board or some shit...
Based on CodeMonkey's work, it appears that the election-rigging functions of DOMINION machines are not hidden or accessed via special OEM versions: they are, in fact, described in the operator's manual... Features of the software. The ability to set the machine up to throw out entire batches of votes, automatically alternate splitting votes out to candidates so the totals remain close together, and more.
The cheating is part of the software, its not just some 'cheat update' that they uploaded while counting. Its a feature of the whole program, says so in the manual
Why haven't any truly MAGA voting machine been made that are airgapped (no internet at all) with software that doesn't have emulation/debugging shit baked in? Surely after the shit that happened teo years ago we would be on it?
He's also sharing python code. I can't believe anyone would handle cheating like this in such a high level language. I'd expect them to do it as close to the metal as possible. Someone needs to qsnatch one of those boxes.
They may be on it, but they sound a little lost with that assembly there. I have many years of working on hardcore assembly (and bytecode) which could probably help them out, which is why I was asking.
It may be hard to penetrate the noise and get in touch with them. Make an original post explaining who you are and offering your services and we'll blast it out to them on social media in hopes someone helps them catch sight of it.
Guy in OP is a joke, he posts SSs of "the code" later down with full comments and variable+function names like he just opened the project in VS.
Not to mention the votes will 100% count fine on a default config, likely with fraud there was a config thrown in there and then swapped out with a script to clean the evidence (if *nix via cron, no one would even need to touch the machines then and it's super easy to implement)
this isnt valid assembly and the python code is a 6-year-old open source file format parser/converter
pls stop wasting ur time on schizo bullshit this guy doesnt know what hes doing
Right? Further down he posts some code that has function+variable names and comments. You don't pull that from asm alone. This guy is doing it to make us look like a fucking joke.
I do this for a living. It’s possible with IDA Pro or Ghidra to get some good insights as to how this works. Where is the binary they are using? I wanna take a stab at this
Found an anon sharing a good set of election data streams from the NYT feed in .csv files for every 12 hours and will link that below. Here is the repo, in case you need to feed election data in for analysis on your finding. Happy to tinker if you get copy of the binary, as well... we can sync in DMs if you have any luck.
Downloaded the entire "elections" directory from Colorado Secretary of State where the Dominion (DVS) User Manual screenshots manual came from. Many more manuals and documents. Have a look if you want to dig
The real issue is when you look at his twitter thread he apparently suddenly has the variable names and comments.
I asked him in DM for the binary he used as I'm a professional software engineer who works with asm and reverse engineering regularly and he blocked me.
Even if it was, that wouldn't matter if someone had physical access to the device and put their own software on it (and then "refreshed" the original software after the election)
Easy counter would be to do some kind of file hash. Hash required to be checked every hour. If it fails the check, the last hour of ballots must be recounted until it passes the hash. I would also say like government computers, no usb ports, no internet. Intranet is one way only to a tabulation server.
Every state must have an open REST API that allows anyone to register for a key and access. Federal election commission will hold links to every state's API on their site.
Any citizen can enter a unique ID spit out by the machine (a receipt) on the website to validate a counted vote.
Didn't that election fraud guy at the DOJ quit? Think they are hiring?
Presumably he has whatever software (could be an .exe, could be multiple, could be a bunch of DLLs... probably a collection of binaries), and then ran that through a disassembler, and this is the output.
My guess: he doesn't, but it's been said that it's a standard feature of the software. If that's the case, then it most likely had that logic in there, just as a "feature" rather than something that looks blatantly malicious.
One method purported to create a static binary actually bundles the Python interpreter and the bytecode into a single executable file.
With Cython, you can generate a static binary that can be substantially faster than the comparable interpreted Python. But, Cython source is recognizably different, and the Cython compiler actually generates C or C++ source that is subsequently compiled.
Lots of good talk here. Good ideas. I'm not the dude with the info and I don't code. Offer your services to Werise through twitter PM. Crowdsource the fuck out of getting this work done.
Maybe there's a way for it to be misused but that flow chart looks like that function is designed for ranked-choice voting, which is used in various jurisdictions in the US. It's not like there's no reason for that feature to be there.
Why on earth is closed source software even allowed to run on a tabulator?
It makes no f-ing sense where we are supposed to have "free and open" elections.
The idea is that Trump's party was coded as Repub_I_ican, so that people voting straight ticket Repub_L_ican don't match and he wouldn't get those votes
Wtf is there to look for, they flat out admit in their manual how the ability to control election results is a feature! Grab the hardware, disconnect from the internet and audit that shit
Maybe. x86 refers to the processor instruction set, not the OS. There are plenty of x86 Linux distros. Hell, there's even Windows RT which would be ARM assembly.
That's absolutely correct. Nevertheless I'm just surprised that the microprocessor would be an x86 processor and not ARM or some other embedded processor.
I just assumed if it were x86, that it's likely some kind of windows OS.
It's basically impossible if the program is complex enough.
That said some programs exist that generate high level source code (like in C) from assembly.
That source code will still lack important information that you've lost from the initial compile (variable names no longer exist, comments no longer exist) and some control statements might have changed (like if loop unrolling happened).
That kind of code though is human readable enough and you can kind of work with it.
NSAs open source, unclassified Ghidra has a built in decompiler that makes the job of analysis a little bit easier. It won’t produce the most readable C code, but if you can find some interesting strings and whatnot, you can start fixing some of the C code to produce usable code.
Fucking assembler
Assembly isn't so bad... if you're trying to add a few numbers together.
Honestly reading it isn't too bad once you get used to it like we did back in my day. You kids need to man the fuck up and intimately learn how technology works before my generation passes and it's all left with (((them))).
I agree that learning a small bit of assembly makes it easier to learn stuff down the road. Kind of like how learning Esperanto makes it easier to learn other languages.
assembly nearly broke me as a person in college. never again.
Puts hair on your c:\>hest.
Everyone of you newbie programmers should be hazed with a mandatory 3 credit hours of Assembly your freshman year just to teach you to appreciate the higher order languages you have now! ... and also to vet out the sissies!
Assembler when in the hands of an excellent coder is some wizard shit, it's as close to bare metal hardware 1:1 power efficiency ratio as you can get.
The problem being.... It has almost NOTHING pre done for you.
Fun fact: Chris Sawyer wrote Rollercoaster Tycoon entirely in assembly.
Is that why you can hear the tiny people screaming from beyond the void?
He was a masochist ...
I miss drowning peeps or launching them off into nowhere on a coaster.
Absolute witchcraft. Here is 3D graphics in 256 bytes. https://www.pouet.net/prod.php?which=3397
Aw man, I frigging love the demo scene. The 256B stuff is good but I think the really impressive bang for bytes are the 4kB demos.
I still Twitch when I think about assembler....
That's what you get when you decompile. You don't have the source code, just the machine language that resulted.
And when the original code is compiled, it is optimized and changed from an inefficient form which humans can easily read, into an efficient form which computers can quickly read. That means your nicely-written function named FunctionThatPerformsTask which you filled with nice comments explaining what it does and how it works... doesn't matter. The compiler changes it into instruction 0x39 which is called by address 0x001A of instruction 0xA3 and contains no comments, lol.
Fortunately there are some utilities which partially reverse the process, but a human still has to interpret the result and figure out its meaning and function and re-add those descriptive labels so the code can be "worked with" again.
I'd assume the people who commissioned the software are greedy and cheap. So the comments inadvertently left in the software may prove interesting.
Nono, what I'm saying is that when you compile the code, it totally strips all the comments out. None of them are left behind inadvertently, it doesn't work that way.
I've been out of the whole cracking loop for years. But when you used to run executables through Ida Pro, many comments were left in and showed up giving valuable insights to what sections of code were doing.
This Dominion outfit is likely going to be a smallish crew by current development standards ? And its highly likely that the supervisors who would have been responsible for checking for incriminating or suspicious artefacts wont have been clever enough to take their duties seriously. Just a guess mind you :)
Yep, maybe proves the old adage about pride coming before a fall.
I think you mean disassemble
No worries, I'll be able to convert to something more readable and I'll upload to this site as I get pieces finished.
I know there are utilities that will take care of some of the grunt work of adding readable labels to function names and things like that... Look into it if necessary. I can only imagine that's a TON of code and I wouldn't be surprised if it was obfuscated with Huffman tables kept in a chip on the machine's board or some shit...
Agreed. God damn assembly. Everything about it SUCKED.
Certainly not speed of the code, you don't get faster than lean assembly.
I know kung flu...
D..did you just take both pills at once?
WTF is wrong with you, Neo?
Shoot the pills and crush and sniff the jar
ftfy
Based on CodeMonkey's work, it appears that the election-rigging functions of DOMINION machines are not hidden or accessed via special OEM versions: they are, in fact, described in the operator's manual... Features of the software. The ability to set the machine up to throw out entire batches of votes, automatically alternate splitting votes out to candidates so the totals remain close together, and more.
https://twitter.com/codemonkeyz
Why would a voting machine have the ability to defraud election results? Maybe we shouldn't be using these machines at all huh?
The cheating is part of the software, its not just some 'cheat update' that they uploaded while counting. Its a feature of the whole program, says so in the manual
Why haven't any truly MAGA voting machine been made that are airgapped (no internet at all) with software that doesn't have emulation/debugging shit baked in? Surely after the shit that happened teo years ago we would be on it?
Because the ones who decide to do anything about it are the ones who wants these features?
He's also sharing python code. I can't believe anyone would handle cheating like this in such a high level language. I'd expect them to do it as close to the metal as possible. Someone needs to qsnatch one of those boxes.
Who said we don’t ;)
They do everything in plain sight because they know they own law enforcement.
And the media. And half the Republican senators. Look how baldly fucking CAUGHT they are and still the entire news is saying "President-Elect Biden"
Where is he sharing this code? I'm trying to find it so I can decompile and review myself but I don't know where to go.
He's in contact with CodeMonkeyZ (fmr 8kun admin). They're on it.
They may be on it, but they sound a little lost with that assembly there. I have many years of working on hardcore assembly (and bytecode) which could probably help them out, which is why I was asking.
Rock on brother. Drop him a line and get in on it.
Yeah I do some light RE, too, and I'd love to take a gander. No way to really prove my bona fides, though.
I've been doing this for over 30 years, my work is my bona fide lol.
Haha oh shit that's a long time. I've been into RE for 15 years, but mostly for game hacking. I'm not a professional or anything.
It may be hard to penetrate the noise and get in touch with them. Make an original post explaining who you are and offering your services and we'll blast it out to them on social media in hopes someone helps them catch sight of it.
Just screenshots, from what I saw. Here https://twitter.com/We_Have_Risen/status/1326693990675206144?s=19
They actually did get hit with qsnatch earlier this year apparently.
Everyday it becomes more and more clear: we have the best autists, I’m telling you.
And they want to give us MORE vaccines!?
This vaccine probably has the cure to autism
This way they can never be stopped
VMAT2, responsoble for "religious experiences". they want to kill God
This is great if it is the code from the “glitchy” servers.
Even legit code can help - you can learn how the results could be manipulated
https://twitter.com/tom2badcat/status/1326692121999503360?s=19
Connection to Vault 7.....
I’m very much hoping that servers in Germany really did get confiscated by federal agents a few days ago and they’re ahead of us on this.
Guy in OP is a joke, he posts SSs of "the code" later down with full comments and variable+function names like he just opened the project in VS.
Not to mention the votes will 100% count fine on a default config, likely with fraud there was a config thrown in there and then swapped out with a script to clean the evidence (if *nix via cron, no one would even need to touch the machines then and it's super easy to implement)
Curious, why not Ghidra?
Ha, I was like "Why not Ghidra?" Totally forgot it's a spook tool.
Still, it's open source. It probably isn't bad after having so many eyes on it now. Plus, it beats buying Hex-Rays...
Heartbleed, RSA
Never forget
Valid points. NSA has always done shady shit.
this isnt valid assembly and the python code is a 6-year-old open source file format parser/converter pls stop wasting ur time on schizo bullshit this guy doesnt know what hes doing
That’s not the code.
Right? Further down he posts some code that has function+variable names and comments. You don't pull that from asm alone. This guy is doing it to make us look like a fucking joke.
I do this for a living. It’s possible with IDA Pro or Ghidra to get some good insights as to how this works. Where is the binary they are using? I wanna take a stab at this
Get in contact with the guy in the tweet.
Found an anon sharing a good set of election data streams from the NYT feed in .csv files for every 12 hours and will link that below. Here is the repo, in case you need to feed election data in for analysis on your finding. Happy to tinker if you get copy of the binary, as well... we can sync in DMs if you have any luck.
https://github.com/favstats/USElection2020-NYT-Results
Happy hacking, pede!
https://thedonald.win/p/11Q8XLkOjk/downloaded-the-entire-elections-/c/
Downloaded the entire "elections" directory from Colorado Secretary of State where the Dominion (DVS) User Manual screenshots manual came from. Many more manuals and documents. Have a look if you want to dig
how did he get the code?
Don't ask, don't tell.
More importantly, where do I get the code?
He didn't, dude is larping like a motherfucker for our attention or to throw us off.
The real issue is when you look at his twitter thread he apparently suddenly has the variable names and comments.
I asked him in DM for the binary he used as I'm a professional software engineer who works with asm and reverse engineering regularly and he blocked me.
Should really be written in an open source language, and available online. Full open source, full review.
Know why open source programs are so secure? Cause 15million nerds use and review the code and find bugs/security flaws
Even if it was, that wouldn't matter if someone had physical access to the device and put their own software on it (and then "refreshed" the original software after the election)
Very true.
Easy counter would be to do some kind of file hash. Hash required to be checked every hour. If it fails the check, the last hour of ballots must be recounted until it passes the hash. I would also say like government computers, no usb ports, no internet. Intranet is one way only to a tabulation server.
Every state must have an open REST API that allows anyone to register for a key and access. Federal election commission will hold links to every state's API on their site.
Any citizen can enter a unique ID spit out by the machine (a receipt) on the website to validate a counted vote.
Didn't that election fraud guy at the DOJ quit? Think they are hiring?
Also CRC checksums run by all interested parties prior to feeding ballots.
Presumably he has whatever software (could be an .exe, could be multiple, could be a bunch of DLLs... probably a collection of binaries), and then ran that through a disassembler, and this is the output.
My guess: he doesn't, but it's been said that it's a standard feature of the software. If that's the case, then it most likely had that logic in there, just as a "feature" rather than something that looks blatantly malicious.
It wasn’t. If legit, this is the object code, translated back to assembly code.
But, it would originally be written in a compiled language like C or C++.
If it were Java or Python, it would be bytecode to run by a JIT interpreter.
Generally but there are several ways to compile static binaries from Python.
It depends on how it is done.
The usual *.pyc files are bytecode.
One method purported to create a static binary actually bundles the Python interpreter and the bytecode into a single executable file.
With Cython, you can generate a static binary that can be substantially faster than the comparable interpreted Python. But, Cython source is recognizably different, and the Cython compiler actually generates C or C++ source that is subsequently compiled.
Lots of good talk here. Good ideas. I'm not the dude with the info and I don't code. Offer your services to Werise through twitter PM. Crowdsource the fuck out of getting this work done.
I did. I'm a professional who does this shit on the daily.
Blocked in under a minute.
You could say that about literally every post related to stealing this election.
At the end of this thread, he points out the feature (FEATURE!!!!!) that does exactly what Dr. Shiva showed yesterday. https://twitter.com/We_Have_Risen/status/1326728415924396032
Maybe there's a way for it to be misused but that flow chart looks like that function is designed for ranked-choice voting, which is used in various jurisdictions in the US. It's not like there's no reason for that feature to be there.
https://ballotpedia.org/Ranked-choice_voting_(RCV)
I don't speak machine. Wizard pedes get on this. Kek commands it!
Anybody have any confirmation if this is actually real?
How do we know this is legitimate?
Why on earth is closed source software even allowed to run on a tabulator? It makes no f-ing sense where we are supposed to have "free and open" elections.
VET HIM FIRST to make sure he did have access. Don't want a lefty to waste your time debugging a random program
How could he possibly have gotten the source code? Dominion is a private company with proprietary software, correct?
When the government won’t act, we will.
And by we I mean not me the smart people
What is the code scam where capital i is used for an L in the word Republican? Was that in Dominion or yet another fraud?
The idea is that Trump's party was coded as Repub_I_ican, so that people voting straight ticket Repub_L_ican don't match and he wouldn't get those votes
Jeezus. How many votes did THAT scam effect? Trump must have had a fucking tidal wave!
How'd he get it?
Wtf is there to look for, they flat out admit in their manual how the ability to control election results is a feature! Grab the hardware, disconnect from the internet and audit that shit
The question is... did they obfuscate the code.
I get called an idiot savant weekly and am humbly retarded here. Y'all the real mvp's.
Decompilation is a bitch. Google has a tool to help, lol.
Pimp Magic.
The voting machines are running windows? That looks like x86 code.
Maybe. x86 refers to the processor instruction set, not the OS. There are plenty of x86 Linux distros. Hell, there's even Windows RT which would be ARM assembly.
That's absolutely correct. Nevertheless I'm just surprised that the microprocessor would be an x86 processor and not ARM or some other embedded processor.
I just assumed if it were x86, that it's likely some kind of windows OS.
How long does it take to read assembly language? I have a couple of hours to spare time.
It's basically impossible if the program is complex enough.
That said some programs exist that generate high level source code (like in C) from assembly.
That source code will still lack important information that you've lost from the initial compile (variable names no longer exist, comments no longer exist) and some control statements might have changed (like if loop unrolling happened).
That kind of code though is human readable enough and you can kind of work with it.
NSAs open source, unclassified Ghidra has a built in decompiler that makes the job of analysis a little bit easier. It won’t produce the most readable C code, but if you can find some interesting strings and whatnot, you can start fixing some of the C code to produce usable code.
Also Ghidra does ship with training documents.
Pretty quick to read. Long time to understand.
holy no fucking thanks. I hope he fucking gets through it without blowing his brains out.
Techfag here... holla!!
How do we get a hold of this guy?
Many skills here to assist and the timer is ticking to get the answers.
He might want to to look at Ghidra