https://twitter.com/NatyLiy/status/1333500580287950849?s=20
"Col. Waldron Confirms US Has a Copy of the Election Night Data ‘Traffic and Packets’ Sent Overseas to Frankfurt."
The Trump cyber team used network analyzers to capture packets (files) that were transmitted from the dominion servers located in these swing states to Germany and they have confiscated the destination servers located in Frankfurt Germany which is where the vote totals were most likely manipulated to give Biden the win. Now all the Trump team needs to do is isolate the original data files and compare them to the received files that were manipulated to prove fraud.
I worked as a network engineer for 40 years and we use to do this type of data capture all the time for troubleshooting purposes. The analyzer captures each packet along with a date time stamp and shows the TCP header information that can be used to isolate specific type of data such as FTP (file transfer protocol).
For democrats who are reading this message, you have lost. You just don't know it yet. Trust me, these data analyzers (like data general sniffers) capture everything including frames, mac addresses, ip addresses, crc and most importantly, the actual data. This information is technical but will hold up in court and will prove beyond any doubt what caused those early morning spike and what information was contained within those "data dumps."
This is the best news I have heard in months. I am very, very excited because this is exactly what I was hoping for. Trump has set up a sting operation and in doing so will now go on the offensive with actual fact based evidence that cannot be disputed by dominion or any democrat political operative and certainly not by some ignorant lawyer who cannot differentiate a bit from a byte or explain what the MSB or LSB is much less describe what a TCP port is.
Kudos to Trump, Michael Flynn, and his cyber team.
Given the legacy nature of the systems that Dominion machines seem to use, I seriously doubt they were architected in such a way to take into account something as modern as a p2p blockchain. The only other thought I had thought about was if e2e encryption was used, but again, it seems doubtful based on the reports we've heard. They clearly didn't send their best. And even if they did use e2e encryption, it's possible the keys are known to decrypt the data.
I have to imagine that the elite cyber engineers have pretty simple workarounds for e2e they probably have dictionaries of every imaginable passphrase the only issue would be the computing power needed to run through all of them quick enough even if they don't if they were essentially honey potting the file transfer which it seems to be the case then that means there was no e2e
It's a good point tho about the legacy nature of the systems however they have been very close to the chest with the proprietary rights for it plus the fact that some machines have been updated makes me wonder if they're all connected to the internet which has been mentioned a few times in testimonies and affidavits it's possible that this update could have been pushed to all the machines and who knows what this update is or does