8509
Comments (290)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
218
LiberalismIsTheVirus 218 points ago +219 / -1

If you pressure them it's more likely to occur. LEAN ON THEM!

17
catvideos3 17 points ago +17 / -0

Rabble Rabble!!!!

25
TheTrump 25 points ago +25 / -0

If they want to run a forensics investigation on the Dominion machines, fine but with all due respect, they can't be surprised when it turns up nothing because they committed the fraud on the machines using malware that was preloaded onto USB drives. The drives were plugged in by "poll workers" who then had the ability to switch out, delete, and add votes and do so without leaving a digital fingerprint since it's done using outside software.

Secondly, the machines have long been wiped so it's highly unlikely that they will find any evidence even if their had been digital fingerprints left behind. The media and the left will then write article after article declaring "yet another loss for Trump and his legal team as Dominion voting machines showed no indications of fraud".

The solution is to do an independent audit of the ballots, including an ACTUAL signature verification audit and to carry out a criminal investigation that will result in those involved in the fraud to begin flipping on one another just as Guliani did with the mafia in the 80's.

26
Drift_Striker 26 points ago +26 / -0

friendly neighborhood cybersecurity expert here...incorrect...there is always a digital footprint of a compromise.

Portable malware may itself not be present but there is a trail of data manipulation, timestamps, logs (even cleared ones) that all tell a story of the attack vector and indicators of compromise.

True forensic analysis of the disk will uncover the pattern in these data captures which can be matched to other voting machines and even to known threat actors like country state hacker groups.

Even a formatted or reloaded system may maintain ghost data within disk sectors. To get rid of data, entirety, they would need to wipe a disk with multiple low level passes, writing all zeros or all ones, to ensure a purge. If encrypted, shredding the private key would suffice.

We are dealing with a clown show at the state IT level. We know the drives aren't encrypted and I doubt they will take the time to purge data for hundreds of systems. They likely just boot to an image and does a quick format (overwrite the beginning of a drive) before it reloads. Data can still be recovered, albeit more difficult, but forensically available to some degree.