1469
Comments (52)
sorted by:
48
Jakefoy92 48 points ago +51 / -3

Well...that’s kind of a big deal, so this raid thing is actually real? Wow...that’s mighty spicy

18
Deplora 18 points ago +20 / -2

How does this have anything to do with a "raid"? If you do a "raid" with guns and stuff, you don't need hackers.

23
Aethermage 23 points ago +24 / -1

You need to know where to raid.

27
TheFountainhead 27 points ago +28 / -1

Fucking exactly. How do you know where to send the men with guns? you track the traffic. You also then have the ability to know if they tried to wipe any info since you were snooping.

This is the kraken

8
Burmeister 8 points ago +8 / -0

yeps

4
deleted 4 points ago +4 / -0
4
0095D 4 points ago +4 / -0

...but what if the server was behind seven proxies?

3
Thwok 3 points ago +3 / -0

Then their white-hats are obviously 8th level :)

3
Choomguy 3 points ago +3 / -0

The guys with the guns arent the ones to gather evidence off of whatever they took in the raid. You think you just bring the server to court and say “here it is”?

11
Deplora 11 points ago +12 / -1

Hackers generally skip the military raid step, and just let themselves into a server remotely.

13
aconcernedtroll 13 points ago +13 / -0

Hackers yes, if your intent is simply to hack. If you intend to prove something in a court of law, getting the physical devices and running forensic analysis is more important.

Also, I'm assuming these packets were encrypted. Hence the need to get the actual servers and the subsequent keys to decrypt those packets.

3
kanabiis 3 points ago +3 / -0

He never said they had the data from the servers, he said they had the packet data.

There is a good chance that they were not able to access the servers, even shitty cyber security techs can get lucky and lock down a server really good.

Sniffing packets from the public internet however is a very easy thing to do. Poor encryption policy can render those packets easily viewed.

He said they had packets, he did not say they had the data.

1
Thwok 1 point ago +1 / -0

You can track encrypted packets without having to break encryption.

2
cuckslasher 2 points ago +2 / -0

most hackers dont do movie hacker shit

21
Aussiepede69 21 points ago +21 / -0

Ooooooo I love it when the long shots turn out to be real. 👌😎

15
deleted 15 points ago +15 / -0
19
Tokens_Worth 19 points ago +20 / -1

All information is sent in packets.

Packets have a size. A source. And a destination.

All packets are monitored and can be traced.

11
Sansa_Belt 11 points ago +11 / -0

Normal volume on those German servers at 7TB... on the 3rd and the 4th... 10TB a huge bump in traffic (Volume of packets transmitted).

3
ChicoDusty 3 points ago +3 / -0

sauce

6
themaga 6 points ago +6 / -0

Separately, an "empty packet" is also called a biden ballsack.

4
deleted 4 points ago +4 / -0
12
PoppinKREAM 12 points ago +12 / -0

Packets are like the envelope you stick mail in. They come in all shapes and sizes, and you can tell a bit about a package if you have the packaging.

You can see where it was sent from, where it was sent to, what it contained, and generally what the purpose of it was.

A white hat hacker can intercept a packet and make a copy of it as it continues onto its destination.

Using the package example, if someone were to say "no packages left this facility, and no packages were sent to Germany," then a box that shows their own address as the return address, that shows it was scanned by USPS at X time on Y date, that was addressed to Germany, and was marked by Germany as having been recieved, you have the ability to call bullshit.

Its essentially that exact scenario, except it's all digital.

3
aconcernedtroll 3 points ago +3 / -0

They wouldn't know exactly what's in those packets if they are encrypted. Which they very likely are. If they weren't encrypted however, they probably wouldn't hold up as evidence, as unencrypted packets can be spoofed.

Now- if you seize the servers, as the rumors are pointing to, and you have the keys to decrypt the packet contents from the servers you pretty much have damning proof that packets are authentic and you can get the content of the packets.

1
deleted 1 point ago +1 / -0
6
residue69 6 points ago +6 / -0

It's like putting chunks of data in a digital "envelope" so the network (digital post office) knows where it came from and where it needs to go.

Network Layer Services- Packetizing, Routing and Forwarding

Packetizing – The process of encapsulating the data received from upper layers of the network(also called as payload) in a network layer packet at the source and decapsulating the payload from the network layer packet at the destination is known as packetizing. The source host adds a header that contains the source and destination address and some other relevant information required by the network layer protocol to the payload received from the upper layer protocol, and delivers the packet to the data link layer.

The destination host receives the network layer packet from its data link layer, decapsulates the packet, and delivers the payload to the corresponding upper layer protocol. The routers in the path are not allowed to change either the source or the destination address. The routers in the path are not allowed to decapsulate the packets they receive unless they need to be fragmented.

Even if the data in the packet is encrypted, the header has the source and destination address unencrypted, which would show the computer that created and sent the packet, and the server that it was destined for.

4
TheFountainhead 4 points ago +4 / -0

To add to what some have already said. Think of a packet as a bitesize chunk of data. you know how big they are supposed to be. if the packet comes in too big or too small or seems corrupted because it doesn't jive with the rest, then you know that packet is bad and needs to be resent. etc. this are like envelopes with timestamps and addresses that contain information.

Saying "we have the packets" is saying, we have snooped on the traffic itself, and not hacked into the server per se. they were listening in on the conversation is good metaphor. that means they actually have proof of where the data came from, where it was send and when. (that is a bigger deal than just having the server itself in some ways)

1
Thwok 1 point ago +1 / -0

The opposite of what Big Mike's packin'

9
MAGALogic 9 points ago +9 / -0

That would be huge if that is true.

-5
edxzxz -5 points ago +1 / -6

Yeah, so would the story that CIA director Gina 'Hasple' was injured during the raid in Frankfurt where several US servicemen were killed, and she is now under arrest at GITMO. https://twitter.com/bbputinwork/status/1333464081123172354/photo/1

9
USMCMAGA 9 points ago +9 / -0

Fuck this Q tard bullshit! Nobody is going to gitmo, getting secretly executed or wearing fucking ankle bracelets for fucks sake!

2
deleted 2 points ago +2 / -0
0
deleted 0 points ago +1 / -1
1
deleted 1 point ago +1 / -0
5
Sansa_Belt 5 points ago +5 / -0

I guess that they were actively measuring volume traffic, and he said that it was a jump from approximately 7TB to 10TB of traffic on a particular server on the 3rd and the 4th. And that (on the German Network) is unusual at this time of the year.

5
deleted 5 points ago +5 / -0
3
artifex_mundi_x 3 points ago +3 / -0

Our only chance too. Analysis might reveal the real outcome of the election.

4
brutustyberius 4 points ago +4 / -0

The most interesting take away from Rudy’s Arizona meeting was the multiple military teams working on the same dominion vote fraud issue. One team has been working on it for two years. That would be 2018. There was an executive order concerning foreign interference in elections about that timeframe. Interesting how that lines up.

3
Sanctii 3 points ago +3 / -0

Not active military. Waldron is ex military. The other team he mentioned was Russ Ramsfields team which is being paid by the Overstock CEO. We have heard no leaks about anything our gov't is up to. I am still optimistic they are up to something though.

4
deleted 4 points ago +4 / -0
4
deleted 4 points ago +4 / -0
3
Maconstate 3 points ago +3 / -0

Lol

2
rplgn 2 points ago +2 / -0

Tomorrow's headline: the KKK works for Trump.

3
SnakeEyes 3 points ago +3 / -0

Wizards and warlocks?

2
Rageof4wa 2 points ago +2 / -0

If you have the packets and the software, you could "replay" the entire election to get the actual results before the data was manipulated in Germany.

2
USMCMAGA 2 points ago +2 / -0

This is the kind of shit that keeps my hopes alive! Get the EO from 2018 out and keep it handy 😁

2
MeSewCorny 2 points ago +2 / -0

Mmmmm packets 🤤

2
Thwok 2 points ago +2 / -0

Pedes, this is a 'uge hidden tid-bit when you think about it, and further indication that GEOTUS has been preparing a trap for the Commie traitors for years.

To capture/record packet traffic, they would need to compromise the lower-level internet infrastructure (i.e. switches/routers) somewhere along the route, and echo the traffic stream into a record as it's passed to the Dominion server. This can be done passively (without detection) by compelling the right ISP on the route at the right choke point to install monitoring software that filters for a specific target, or using spooks like the NSA (hell knows what "magic" they have). Or inserting a packet-sniffing agent close enough to the target server to inspect/record the traffic as it streams in (like Creepy Hair-Sniffing Joe watching a 1st-grade class walk by in the hallway). The latter is more likely, as it's setup pretty much just requires one CIA agent with a conscience/cold-feet to report in to the DNI or Unit 305. The former requires many individuals to know about it, and the best-kept secrets are those shared by the fewest

Just like a great post here I read awhile back: the smartest criminals are never arrested for the crimes they committed in the past; they are arrested committing the crimes that are designed to catch them (i.e. traps).

This will go down as GEOTUS's greatest service to this country.

1
fapoo 1 point ago +1 / -0

we have the best computer geniuses don't we folks

1
rplgn 1 point ago +1 / -0

The thing is if they have it down to the packet level then they can possibly verify the data connections using TLS certificates and their public keys. Just saying, this is a fucking bombshell.