https://twitter.com/NatyLiy/status/1333500580287950849?s=20
"Col. Waldron Confirms US Has a Copy of the Election Night Data ‘Traffic and Packets’ Sent Overseas to Frankfurt."
The Trump cyber team used network analyzers to capture packets (files) that were transmitted from the dominion servers located in these swing states to Germany and they have confiscated the destination servers located in Frankfurt Germany which is where the vote totals were most likely manipulated to give Biden the win. Now all the Trump team needs to do is isolate the original data files and compare them to the received files that were manipulated to prove fraud.
I worked as a network engineer for 40 years and we use to do this type of data capture all the time for troubleshooting purposes. The analyzer captures each packet along with a date time stamp and shows the TCP header information that can be used to isolate specific type of data such as FTP (file transfer protocol).
For democrats who are reading this message, you have lost. You just don't know it yet. Trust me, these data analyzers (like data general sniffers) capture everything including frames, mac addresses, ip addresses, crc and most importantly, the actual data. This information is technical but will hold up in court and will prove beyond any doubt what caused those early morning spike and what information was contained within those "data dumps."
This is the best news I have heard in months. I am very, very excited because this is exactly what I was hoping for. Trump has set up a sting operation and in doing so will now go on the offensive with actual fact based evidence that cannot be disputed by dominion or any democrat political operative and certainly not by some ignorant lawyer who cannot differentiate a bit from a byte or explain what the MSB or LSB is much less describe what a TCP port is.
Kudos to Trump, Michael Flynn, and his cyber team.
If this is true it’s the best news I’ve heard in almost a month. That’ll be the smoking gun and all the evidence we need.
but why hasn't it been released yet
I'm just concerned because they've had about a month now. That would have instantly stopped certifications
Would have missed a ton of RINOs thinking Trump lost and Trump finding out who his real allies are.
Lmfao we showed them mountains of evidence and they still certified. It's what swamp creatures do.
I know that in some states, there are certain legal challenges that you can only make after the vote is certified.
I imagine that in those states, lawsuits and plans were ready to go the moment the cert dropped.
and these people knowingly certified fraud and tried to cover it up, which makes it even worse for them
The public needs to be at peak emotion for meaningful change to occur
Will Barr and all related gatekeepers acknowledge that this evidence exists then form logical conclusions?
"No reasonable prosecutor..."
We have The Expert on cyber.
GG CCP
Barron was part of it???
I would be amazed if they did this in plaintext across networks spanning multiple countries.
That would just open them up to being exposed.
But seeing that we're dealing with the US government, there is a non-zero chance they have backdoor keys to encryption used.
Just remember, encryption or not, these voting machines are meant to be hacked. Do you really think encryption is strong enough to beat the NSA? Not a chance...
Is it easy to crack older encryption methods, if your the NSA it is.
The only thing that I would wonder is if the voting manipulation was on a local level and then uploaded, for instance the guy in the video that worked for Dominion using his personal laptop on a USB. That might be hard to track...
But any encryption they used would be crappy. It is not like we are dealing with geniuses (coomer)
XOR 101010101, they'll never crack it for sure!
These systems used old OSes, like Win7, with weak encryption. The actual implementation for changing votes is important, so if the Dominion software itself did it, it needs to add the encryption to the software, which is non trivial, and needs to be kept up to date with the latest. The original software was form the early 2000's, and the best practices have changed quite a bit since then. Encryption is usually an after thought in such systems. We can't know for sure without the actual versions used this year.
If it was some form of malware that changed the vote, it has the same problem as the other, but it may have been an off the shelf solution, in which case, it is also vulnerable.
Software is complex. Its bad for counting votes. We can literally build a mechanical counter that would in fact be safer.
I write software for a living. SSL libraries can be compiled into anything. Even software unrelated to web connections. I did exactly that for remote server connections with my own client-server app written in C.
The question is what did they actually do, because everything we've seen looks half assed.
If they have the server they have it's private key, no cracking required
They packet sniffed prior to getting the hardware. And once they got the hardware, it doesn't mean the key is available. It might not be on the server. i.e; like AWS KMS
We're just guessing at this, so its kind of useless to debate. I hope they have the raw data from election night.
This news has been out for weeks. Not sure what they are waiting for.