1320
Comments (20)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
10
ChilledCovfefe 10 points ago +10 / -0

To me this "data" is the weakest part of the presentation.

This is not the raw data, this is a representation of data that “cyber security experts” gathered before and during the election. Here are my questions because I want to see the full proof! I am in the computer business for decades BTW.

Who are the cyber security experts and how did they have the access to monitor these voting machines in 2900 counties? When the actors connected to the machines what did they do to steal the votes? Did they use a RDP type session to remote control the machine? Did they break in some other way and change data or upload files ?? Where is the network trace and other data which would be needed to answer #2? Without answers to 2 and 3, this data is simply like a log of phone calls, we can see who called who and at what time but we don’t have evidence of the CONVERSATION that took place. Also, anyone could create a list like this on excel by hand to use to trick people that don’t know a lot about computers like Mike or even the lady that was presenting the information.

5
idkfa 5 points ago +5 / -0

Ditto, and that's emphatically not concern trolling.
I want to see the details.

That being said, there are two options here: either it's true or it's false. These accusations aren't just big, they're incredibly detailed.
Thus, investigation should be a no-brainer...
Right? Right?..