550
Comments (14)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
7
PlateOwner [S] 7 points ago +7 / -0

"A secure audit log prevents the modification of log data by an unauthorized entity, providing integrity checks over the log content. An audit log is constituted of a sequence of log entries, each of which is related to a noteworthy event that has occurred within the monitored system."

"The Dominion Election Management System's central accumulator does not include a protected real-time audit log that maintains the date and time stamps of all significant election events. Key components of the system utilize unprotected logs... The system makes the creation and maintenance of various logs voluntary, so that the user has a choice to "not retain" or "conceal" their actions. Further, when logs are left unprotected and can be altered, they no longer serve the functional purpose of a transparent audit log to the public or election officials."--Russ Ramsland

https://gusskarlis.com/wp-content/uploads/2020/11/Ramsland_Affidavit.pdf