There is nothing to translate. However what it does do, it demonstrates that they were running standard forensic tools on the internal network, and by the looks of it they have been in the Dominion network for a while, collecting evidence.
It puts Whitmer and company in a very tight spot legally.
Literally just explained to a friend, verifiable evidence of connections between Dominion and China and others. These records are publicly available and can't be faked.
This does state they found unencrypted password, meaning they were plain text readable. This means if you accessed where that password is stored you would be able to read it in as if you typed it.
They also state they found passwords on a TOR (dark web)site for employees. These are obtained many ways but typically these days people get a phishing email to confirm their password and they do, then people post these to databases on Tor sites.
So at the very least employees have been successfully phished in the past and there are plain text passwords in the systems they scanned.
As an IT professional this calls the whole system’s security into question. The voting system should be treated like a secure DoD network which these types of vulnerabilities are much harder to find. It’s bad news for them.
There is nothing to translate. However what it does do, it demonstrates that they were running standard forensic tools on the internal network, and by the looks of it they have been in the Dominion network for a while, collecting evidence.
It puts Whitmer and company in a very tight spot legally.
Well, talk to me like I'm 5. Lol I got it, thanks!
Not IT, but this reeks of John Brennan.
Hard evidence that several website servers are intimately connected and that China + Iran had access to Dominion servers
Thank you!
Literally just explained to a friend, verifiable evidence of connections between Dominion and China and others. These records are publicly available and can't be faked.
Thank you!
IT person here.
This does state they found unencrypted password, meaning they were plain text readable. This means if you accessed where that password is stored you would be able to read it in as if you typed it.
They also state they found passwords on a TOR (dark web)site for employees. These are obtained many ways but typically these days people get a phishing email to confirm their password and they do, then people post these to databases on Tor sites.
So at the very least employees have been successfully phished in the past and there are plain text passwords in the systems they scanned.
As an IT professional this calls the whole system’s security into question. The voting system should be treated like a secure DoD network which these types of vulnerabilities are much harder to find. It’s bad news for them.
Thank you!!!