2371
posted ago by SutopSutolf ago by SutopSutolf +2371 / -0

https://twitter.com/NatyLiy/status/1333500580287950849?s=20

"Col. Waldron Confirms US Has a Copy of the Election Night Data ‘Traffic and Packets’ Sent Overseas to Frankfurt."

The Trump cyber team used network analyzers to capture packets (files) that were transmitted from the dominion servers located in these swing states to Germany and they have confiscated the destination servers located in Frankfurt Germany which is where the vote totals were most likely manipulated to give Biden the win. Now all the Trump team needs to do is isolate the original data files and compare them to the received files that were manipulated to prove fraud.

I worked as a network engineer for 40 years and we use to do this type of data capture all the time for troubleshooting purposes. The analyzer captures each packet along with a date time stamp and shows the TCP header information that can be used to isolate specific type of data such as FTP (file transfer protocol).

For democrats who are reading this message, you have lost. You just don't know it yet. Trust me, these data analyzers (like data general sniffers) capture everything including frames, mac addresses, ip addresses, crc and most importantly, the actual data. This information is technical but will hold up in court and will prove beyond any doubt what caused those early morning spike and what information was contained within those "data dumps."

This is the best news I have heard in months. I am very, very excited because this is exactly what I was hoping for. Trump has set up a sting operation and in doing so will now go on the offensive with actual fact based evidence that cannot be disputed by dominion or any democrat political operative and certainly not by some ignorant lawyer who cannot differentiate a bit from a byte or explain what the MSB or LSB is much less describe what a TCP port is.

Kudos to Trump, Michael Flynn, and his cyber team.

Comments (188)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
25
aconcernedtroll 25 points ago +25 / -0

End to end encryption means they'd have a chest but no key to open it. Seizing the servers themselves would have been the way to obtain that key to decrypt the packets.

17
N3verCl3ver 17 points ago +17 / -0

This is correct, that's why I hope we have the server.

12
koyima 12 points ago +12 / -0

You mean like raiding the server center in Frankfurt

10
Tecumseh_S64 10 points ago +10 / -0

Fortunately I think the other research into the Dominion machines stated their security is identical across all devices. In other words, if you have the security fob or password for one machine, you have it for all of them.

7
N3verCl3ver 7 points ago +7 / -0

Looking at the system diagrams leads me to believe a lot of people are not understanding the complexity of the systems. The voting machines are one thing, and certainly they may all use the same sort of "key". The thing is there is a lot more to it than just the end user (voter) machines. There is also the tabulators and central server infrastructure that would almost certainly be using different authentication keys. But in the context of the encryption we really aren't talking about that type of key anyhow. If the Frankfurt server was operated by a different company (scytl?) specifically for tabulation and reporting to Edison research then it would not be a dominion asset.

3
borscht-nazi 3 points ago +3 / -0

Even having the endpoints doesn't necessarily guarantee a key to be present on them. If I -- an extremely paranoid engineer -- were to set something up along with what they supposedly did, I'd not allow keys and certs to reside on the same physical nodes, maybe USB or network mounts or some such.

1
aconcernedtroll 1 point ago +1 / -0

For network traffic, every remote connection that a given machine connects to is going to have it's own unique key. So, a tabulator might communicate with several servers. Each server will have a unique key and each tabulator will have a unique public key, or vice versa. So you'd need the traffic as well as the private key. Hence the seizure of the servers in Frankfurt.

5
ThePastDays 5 points ago +5 / -0

Thats also why governments everywhere want to ban encryption. So that only those corrupt in power can cover and conceal their messages with their "necessary need for encryption" as government agents/officials. And they would know exactly what we are doing/finding/planning because our messages would be open for them to read. They would also immediately know who to silence in order to maintain their control of the population.

It would be impossible to expose them and we would be powerless. This goes along with disarming the citizens and imposing never ending lock-downs with no justification other than "because they said so".

3
deleted 3 points ago +3 / -0