This information is coming from CodeMonkeyZ Ron Watkins former site administrator of the imageboard website 8chan.
CodeMonkeyZ: Whistleblower is not from Arizona.
Whistleblower is from one of the many other states that used the Dominion software.
Whistleblower went to excruciating effort to detail and archive everything possible.
Whistleblower was trusted enough to be given instructions on how to modify the BIOS.
Today we will know what is behind the Supervisor password.
Arizona Election Machines BIOS password leaked?
(NOT THE LEAK)
500 page dominion manual:
Look at manuals Appendix A and compare with leaked picture
It appears this is going to be a slow burn.
CodeMonkeyZ: The scope of the whistleblower is beyond my initial expectations. This is going to take a bit longer to get out. Trying to get teasers out tonight and a video tomorrow
CodeMonkeyZ: Welcome to the Election Management System bios administrative panel. Just type in the password to unlock the Setup screen.
CodeMonkeyZ: You typed in the password? Good now Welcome to the Election Management System Server.
CodeMonkeyZ: Our whistleblower risked their life and livelihood by wearing a wire and hidden camera to capture this for the American People. Its blurry, but legible.
Camer? (I assume he means camera)
CodeMonkeyZ: Sorry for the technical issues and delays earlier, but this footage is larger in scope that I initially thought it was going to be
Individual frames need to be redacted very carefully. A minor slip-up could potentially dox the whistleblower (Picture showing 2 disk drives at 465.8 GB each. A Portable SSD T3 and Toshiba MQ01ACF0
CodeMonkeyZ: Like a boxers jab, these images I am posting are just establishing credibility for the whistleblower.
If you're curious what is inside the BIOS administration panel that the vendor refuses to release the password for... Well, here's a taste.
CodeMonkeyZ: The BIOS is a sub-operating system. It runs behind the scenes. Before your computer turns on and boots Windows, it follows the settings and instructions present in the BIOS.
What is CLOUD DESKTOP?
CodeMonkeyZ: What is PXE boot?
Hint it requires a network card: https://heimdalsecurity.com/blog/what-is-pxe-boot/
(Not part of the leak)
PXE BACKDOOR ATTACKS
1 ADD A LOCAL ADMINISTRATOR DURING SETUP.
2 MOUNT IMAGE DISK - ADD BATCH OR EXECUTABLE FILES TO ALL USERS
4 MOUNT IMAGE DISK - USE CHNTPW TOOL TO OVERWRITE ADMINISTRATION PASSWORD.
CodeMonkeyZ: Further intel on BIOS and related settings:
The screenshots display internal settings at a level beneath what you see when you typically access a device.
The BIOS is the ‘deep machine’ that lives just below the surface. From here, one can change low level settings like machine date & time, boot drive order, set system-level access passwords, or modify properties of the CPU.
Someone with access to the BIOS can configure a machine to ‘boot’ or startup from the network instead of the local hard drive (where one might have Windows installed) by enabling PXE, pronounced PIXIE, from the BIOS.
The BIOS isn’t a backdoor. It’s a side entrance that the owner/operator keeps the keys to.
DOMINION WHISTLEBLOWER ADMIN PASSWORD REMOTE ACCESS
"Then you will know the truth, and the truth will set you free." John 8:32
A whistleblower reached out with footage filmed of the Dominion Election Management System inside an election center in one of the states that used Dominion software and hardware (not Arizona). As you will see in the video, the whistleblower initially discusses with a Dominion employee about who holds the BIOS password and it is discovered that the STATE is keeping the password - not Dominion, and not the county. Later, the whistleblower asks the Dominion employee about connectivity and whether or not the machines can be connected to the internet...
With just 1 minute and 17 seconds, we expose their most egregious lie.
FRAUD VITIATES EVERYTHING.
-- disclaimer: This footage was NOT filmed in Arizona.
Katie Hobbs… Who has the escrow in AZ?
The whistleblower video established that the whistleblower's STATE has the password.
Not the county. Not the vendor.
How about AZ?
CodeMonkeyZ: Just realized that CyberNinjas' transparency report outlines all of the money they have received as of July 28, and there is no mention of the AZGOP on that list.
Did the AZGOP solicit donations for the Maricopa forensic audit? If the AZGOP solicited donations for the Maricopa forensic audit, why didnt they send money?
CodeMonkeyZ: Dominion servers in-fact had a network card in them, according to the BIOS screen.
"Integrated NIC" can be seen at the top as clear as day.
CodeMonkeyZ: The Election Management System, responsible for tallying votes and creating reports to turn into the county, had front and back USB enabled. Curiously, it also had “USB Boot Support” enabled.
Is it possible to use “USB Boot Support” to compromise a machine?
CodeMonkeyZ: The boot manager boot options are: 1. Embedded SATA Port Optical Drive - EFI DVD/CDROM 1 2. PXE Device t: Embedded NIC 1 Port 1 Partition 1
What does “Boot from PXE Device: Embedded Network Interface Controller” mean?
CodeMonkeyZ: Why does the Image Cast Central (ICC) need both "Wireless" and "Cloud Desktop" options?
Is "using Cloud Desktop over a wireless connection" just a fancy way of saying "REMOTE ACCESS"?
Forwarded by CodeMonkeyZ:
(I'm a software engineer) Cloud desktop is slightly different to remote access , cloud desktop allows you to use the terminal as a dumb terminal to drive a remote computer (this does require internet acsess) where as remote access is the process of gaining access to the terminal your currently residing on remotely.
All of the above needs internet access to function however.
CodeMonkeyZ: There are a few small errors in this article, but the general idea is on point.
CodeMonkeyZ Speaks with Gateway Pundit: “What I Put Out on the Dominion Evidence is Roughly 1% of What We Are Holding”
CodeMonkeyZ: Has the AZ Senate given the green light for the Maricopa audit to do canvassing? If not, why not?
CodeMonkeyZ: Some people are saying that Wendy Rogers has said that canvassing has already started. Is there any source for that claim? I dont think it is true; someone please post a source for that claim in the comments.
CodeMonkeyZ: Make sure you have a torrent client setup. It will be useful soon...
The story of the century? Perhaps..
CodeMonkeyZ: What is a torrent? What files are shared over torrent? Why will this be important soon?
CodeMonkeyZ: Story of the Century? —
CodeMonkeyZ: Phase 0: Get everyone educated on torrents.
Phase 1: ???
Phase 2: ???
Phase 3: ???
How do you stay safe with torrents? What is a vpn? Can vpn be used with torrents? Why would you want to use a vpn with torrents? What is a seedbox?
Please help each other learn.
User comments not from CodeMonkeyZ
Use a trust worthy VPN.. like PIA https://www.privateinternetaccess.com/buy-vpn-online one of the best on line...
Private Internet access is a good vpn. Vpn masks your ip. The nature of torrents are that they are shared through seeding. This means that owners of the whole file have the option to seed files to other prospects downloading the file. The more seeders the harder it is for a picture of what you are downloading as on paper it's multiple packets from multiple ips. Vpn masks your ips thus creating distorted information further. Also the more seeders the faster people the file. The original file will be seeded by a server or the host. Once a number of people have the file they should seed it to speed the spread.
What Are Torrents & How Do They Work? https://www.lifewire.com/torrent-file-2622839
I would also be careful if the file you torrent has a virus.
CodeMonkeyZ: When will Karen Fann announce the official start of canvassing in Maricopa county for the forensic audit?
CodeMonkeyZ: I will be releasing a torrent file that should be spread to as many people as possible. Please only use torrent if you absolutely know what you are doing. It is possible to dox yourself with torrents if you don’t correctly setup your security.
edit: Don’t stay up late waiting for this torrent, it is still being prepared and needs hours to complete.
CodeMonkeyZ: If one person holds an important file, that person is an easy target. If a million people hold an important file, the file becomes an impenetrable shield for all.
CodeMonkeyZ: Scope of phase 1 has been expanded. Currently reaching out to reporters so they can be briefed and prepared to independently verify the data as soon as phase 1 begins.
CONTINUED IN COMMENTS