800
Comments (8)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
1
seektruth2021 1 point ago +1 / -0

This, to me, is a smoking gun. A database application residing on the machine that can access the database directly without going through the voting system's software logging and security fills in a missing piece of the fraud puzzle.

It allows a person to make changes to the database (where the votes are stored) without official audit log trails. Now, I'd be interested to see if the database has its own system logs separate from the voting systems software.

For any precinct, county, or state to use machines this riddled with security flaws, and a system that allows those flaws to go unnoticed or ignored, should be looked at as if they are guilty of conspiracy to commit voter fraud, because they are complicit in either their ignorance or their willful ignorance.