This is not the raw data, this is a representation of data that “cyber security experts” gathered before and during the election. Here are my questions because I want to see the full proof! I am in the computer business for decades BTW.
Who are the cyber security experts and how did they have the access to monitor these voting machines in 2900 counties?
When the actors connected to the machines what did they do to steal the votes? Did they use a RDP type session to remote control the machine? Did they break in some other way and change data or upload files ??
Where is the network trace and other data which would be needed to answer #2?
Without answers to 2 and 3, this data is simply like a log of phone calls, we can see who called who and at what time but we don’t have evidence of the CONVERSATION that took place. Also, anyone could create a list like this on excel by hand to use to trick people that don’t know a lot about computers like Mike or even the lady that was presenting the information.
If you watch the Lindell video, near the end Mary Fanning comes on. She seems to be the source of this evidence.
She shows a tabular analysis of the raw data that seems to be what produced this flow graph. In the last few columns of that table it claims to deduce how they attempted access, whether they did actually gain access and what if any vote changes were made and who they benefited.
That would indeed be a smoking gun if other people can replicate their conclusions from the same raw data.
But, she clearly doesn’t have the raw data and has been given this material by a “source”, she won’t say more about it and nobody that talks to her challenges her on it.
She either has access to an explosive bombshell that was leaked indicative that we are on the edge of WWIII or it’s a really sophisticated hoax.
Two other thoughts. The tabular report seems to indicate a column for MAC address for both ends of the connection. How did they get that?
Also, the graph shows a lot of many-to-many connections. About the only entity I can think of that would be able to monitor all traffic entering and leaving the country would be: NSA.
That would be highly suspect since MAC addresses don't egress from the physical network they're attached to. Unless it was the MAC address of the target machine plus the nearest-hop route.
Whoa. You seem to know networking. Was there really foreign interference, or could it have been Americans redirecting through foreign networks to cover their tracks? I believe if it was done in foreign countries, it was done by Americans over there or at the orders of Americans. I don’t believe any foreign nations acted independently to interfere. Anyone with the ability would have already known the steal was planned.
So they accessed their complete Internet traffic dump overnight, broke TLS before breakfast and rewound the entire US election over lunch, and printed this pretty graph by dinnertime?
Watch the video again numbnuts. She specifically names the parties that provided this information. She also states who developed this program and why it was developed. Computer expertise my ass. It doesn't take a rocket scientist to see what you idiots are trying to pull.
Hhmmm, are you talking about Hammer and Scorecard and Dennis Montgomery?
Let‘s assume for a second that’s the case. That still in no way lessens the need to see the raw data, establish a chain of custody for it and replicate his interpretations.
Anything less will be called by the other side “feverish conspiracy theories”.
We will only gain traction in this fight with cold, hard facts that stand up in a court of law. If you don’t understand that, you are a fool.
Thank you. Jesus Christ it was annoying af to not get these details or a better explanation of this data. When they said it was successful in that column, how do they know? Then they talked about specific vote amounts being somehow tied to this. It sounds like utter BS but I sure would like to hear otherwise.
It does matter, we need to identify and round up every fucker who helped undermine our democracy and charge them for treason or foreign interference accordingly
This is not the raw data, this is a representation of data that “cyber security experts” gathered before and during the election. Here are my questions because I want to see the full proof! I am in the computer business for decades BTW.
Without answers to 2 and 3, this data is simply like a log of phone calls, we can see who called who and at what time but we don’t have evidence of the CONVERSATION that took place. Also, anyone could create a list like this on excel by hand to use to trick people that don’t know a lot about computers like Mike or even the lady that was presenting the information.
💯 I’m in the biz too and this is spot on.
If you watch the Lindell video, near the end Mary Fanning comes on. She seems to be the source of this evidence.
She shows a tabular analysis of the raw data that seems to be what produced this flow graph. In the last few columns of that table it claims to deduce how they attempted access, whether they did actually gain access and what if any vote changes were made and who they benefited.
That would indeed be a smoking gun if other people can replicate their conclusions from the same raw data.
But, she clearly doesn’t have the raw data and has been given this material by a “source”, she won’t say more about it and nobody that talks to her challenges her on it.
She either has access to an explosive bombshell that was leaked indicative that we are on the edge of WWIII or it’s a really sophisticated hoax.
🤷
Two other thoughts. The tabular report seems to indicate a column for MAC address for both ends of the connection. How did they get that? Also, the graph shows a lot of many-to-many connections. About the only entity I can think of that would be able to monitor all traffic entering and leaving the country would be: NSA.
That would be highly suspect since MAC addresses don't egress from the physical network they're attached to. Unless it was the MAC address of the target machine plus the nearest-hop route.
Whoa. You seem to know networking. Was there really foreign interference, or could it have been Americans redirecting through foreign networks to cover their tracks? I believe if it was done in foreign countries, it was done by Americans over there or at the orders of Americans. I don’t believe any foreign nations acted independently to interfere. Anyone with the ability would have already known the steal was planned.
So they accessed their complete Internet traffic dump overnight, broke TLS before breakfast and rewound the entire US election over lunch, and printed this pretty graph by dinnertime?
Indeed. Ain't sounding likely.
Watch the video again numbnuts. She specifically names the parties that provided this information. She also states who developed this program and why it was developed. Computer expertise my ass. It doesn't take a rocket scientist to see what you idiots are trying to pull.
Hhmmm, are you talking about Hammer and Scorecard and Dennis Montgomery?
Let‘s assume for a second that’s the case. That still in no way lessens the need to see the raw data, establish a chain of custody for it and replicate his interpretations.
Anything less will be called by the other side “feverish conspiracy theories”.
We will only gain traction in this fight with cold, hard facts that stand up in a court of law. If you don’t understand that, you are a fool.
Ok, what’s the minute and second in the video where she says these things. Happy to update my comments based on facts - if you have them.
All I heard was “cyber security experts” as the source.
I think these are fair questions which I don't have answers for which someone should give explanation to.
Thank you. Jesus Christ it was annoying af to not get these details or a better explanation of this data. When they said it was successful in that column, how do they know? Then they talked about specific vote amounts being somehow tied to this. It sounds like utter BS but I sure would like to hear otherwise.
does it really matter at this point where it was routed to and back again. A steal is a steal
It does matter, we need to identify and round up every fucker who helped undermine our democracy and charge them for treason or foreign interference accordingly
Did some more poking around. Seems like this is supposedly a sample of what is going on here:
https://electionrecords.com/
Not much beef there either.