2946
Comments (253)
sorted by:
119
WakingKnowledge 119 points ago +122 / -3

These cheaters have their bases covered. But it does not matter now. THE CAT IS OUT OF THE BAG ASSHOLES!

44
deleted 44 points ago +50 / -6
44
WakingKnowledge 44 points ago +45 / -1

our first Revolution was only a small percentage of the people. That is all we need.

44
fazzman23 44 points ago +45 / -1

this. rasmussen is reporting 55% of people support forensic audits. thats basically them saying 55% of the country believes fraud occured.

the revolution was SUBSTANTIALLY smaller than 55%

18
jbDonuts 18 points ago +18 / -0

This poll also shows that the system still has a slim chance of working without having to go full-retard. Keep your powder dry, troop.

7
b00nis 7 points ago +7 / -0

I wonder how many of that 55% took the jab. Might cull that number a bit.

8
jerrycan111 8 points ago +11 / -3

I agree 100%. Just seems like everyone wants someone else to solve shit for them.

24
MICHIGANisRED 24 points ago +24 / -0

I'm willing to die if necessary. Really. I have no children. If that's what it takes, that's what it takes.

6
SideOBeef2016 6 points ago +6 / -0

I feel the same way, and I have a beautiful 10 month old daughter.

5
Mamapedia 5 points ago +5 / -0

She needs you

13
ColonelHughes 13 points ago +13 / -0

Our children will be slaves if we are not willing to die for them now

5
Brakesbreaktrains2 5 points ago +5 / -0

We need organized leadership. Otherwise it's lunatic terrorists

3
WakingKnowledge 3 points ago +3 / -0

Nope, you have to gather an army of like minded freedom lovers.

6
chickeninoven 6 points ago +6 / -0

Let us know how many FIB join up.

2
WakingKnowledge 2 points ago +3 / -1

There is always a way to figure out who those faggots are.

4
Trumps_legacy 4 points ago +4 / -0

yeah but u have all become fat n lazy tho

5
WakingKnowledge 5 points ago +6 / -1

I would rather die fighting to the death as a fat, lard ass then live another second under evil.

4
bratt 4 points ago +4 / -0

Lard Ass for Trump, For Truth, For Freedom. I have lost 15 pounds since January. Even better my fitness and endurance is much improved.

2
SashiGarami 2 points ago +2 / -0

Now go train Gracie or Brazilian Jiu Jitsu! \m/

1
bratt 1 point ago +1 / -0

How about I just shoot anyone who threatens me or mine. I am too old to go hand on. That is how you get hurt. Insert Indiana Jones vs sword fighter pic here.

10
DickTick 10 points ago +10 / -0

Not really... And codemonkey should know this better than anyone, but every single thing you do like that leaves a trace, so while what he's talking about is 100% possible, it's impossible to do it without leaving digital breadcrumbs everywhere

3
mojorisen 3 points ago +3 / -0

The cat is out of the bag on many things. Hunter ped pics. FBI lying to FiSA courts. The list is HUGE!

but nothing is happening. Unless there is a fair and balanced law enforcement and judicial system, none of the proof matters.

The communist will ignore it. The MSM will ignore it. Law enforcement will ignore it and life goes on.

0
WakingKnowledge 0 points ago +1 / -1

Well if you want to live under Communism, you are free to choose that life for yourself and future generations. No matter what they say, there is always a choice. I would rather live free and die striving for that goal than die untrue to myself and a coward.

3
Grond999 3 points ago +4 / -1

No one is going to prison (see last 5 years).

1
WakingKnowledge 1 point ago +1 / -0

That is because this is a prison planet.

-2
Schiffblower -2 points ago +6 / -8

Good thing CodeMonkeyZ is saying this all AFTER the audit

And you’re all falling for it

3
WakingKnowledge 3 points ago +5 / -2

Falling for what? We already knew they cheated on a massive scale. IT IS A FACT.

79
digi 79 points ago +91 / -12

There is nothing here other than screenshots from bios screens that EVERY FUCKING DELL IN THE GOD DAMNED WORLD HAS. People need to drop this Codemonkey guy like a bad habit. He has time and time again taken normal everyday IT tasks and released it as if its some sort of conspiracy and the non-tech community eats it up.

I mean for FUCKS SAKE his own posted documentation says they uncheck network boot! So which is it?? https://t.me/CodeMonkeyZ/964 I bet not a single person in here even understands how PXE booting works!

People need to wake the fuck up, this type of dis-info is what is destroying us.

38
deleted 38 points ago +39 / -1
20
OrangeElvis 20 points ago +20 / -0

The point is with the BIOS password, you can activate PXE network boot. This is not a smoking gun in and of itself - but one would THINK an election machine would be built so that option isn't just "greyed out" but gone completely with no way of activating network boot as a bios option - period.

17
digi 17 points ago +17 / -0

Well then you couldn't use a regular computer if you want to lock out that feature. As far as I know Dell doesn't make a bios where you can remove stuff like PXE boot. But you can secure the bios with a password. But it doesn't matter, PXE boot is used by nearly every IT department as a way of deploying standard windows images. It only works within local LANs and not across the internet for technical Networking reasons.

I mean by default there is no bios password. SOMEONE has to set it. So someone will always have a BIOS password. I would be more concerned if no one had a bios PW meaning they didn't set it.

Almost every network card in a computer these days has some form of network booting available. I would venture to say most computers people are using to post here can do it. Everyone has this bios option on there computer. Finding a computer without those capabilities is hard and you most certainly won't find a business class computer from dell without it.

14
OrangeElvis 14 points ago +17 / -3

My point stands. Election machines should be custom built, closed systems that are incapable of being configured for any kind of network boot or access.

7
DonJr2024 7 points ago +10 / -3

We are so, so, so far from that being among the most pressing election concerns.

Plus you are being arbitrary. PXE booting a computer is not necessarily bad/wrong. A failsafe setup can still allow for it and can benefit from it.

3
OrangeElvis 3 points ago +9 / -6

If you don't think the possibility of an election machine being booted to an alternative, outside operating system and configuration then you are a part of the problem. These machines need to be dumped for all future elections and go to a simple paper ballot with fingerprint ID.

Any voting machine that can be configured via settings to be accessed externally should be automatically voided from consideration of use.

26
DonJr2024 26 points ago +26 / -0

I own a tech company and have worked in tech for over 20 years. What is shown vs what is claimed in the title and comments are wildly different.

Motherboards and BIOS chips literally exist to be the central hub of all computer components. You can't just take a totally common, core functionality and declare that it is evidence of malicious actions. PXE booting is totally routine as a local option. And if a system is secure, the workstations have very limited functionality and this whole discussion is pointless.

If you show me a local server serving up images that no one knows about, fine. Or if you show how it is PXE booting over the internet, ok. But to just show that they have BIOS's with network boot, means nothing.

13
antimatter 13 points ago +13 / -0

Bingo, most reasonable comment here.

4
toqer 4 points ago +4 / -0

Digi >As far as I know Dell doesn't make a bios where you can remove stuff like PXE boot

There's numerous AMI and Phoenix bios editors out there. Basically all they do is show/hide Bios features, so in the very least that could be done. For something the scale of elections though, there's no reason they can't just remove the features for special customers, but the downside is if you have to deploy a lot of these, it would make it really inconvenient, or even impossible.

Also with Dell you have powershell cmdlets that allow you to change things in a Bios. If these machines are talking to each other through NTLM then the hash is being passed around the network. Considering the AZ audit found they had shared passwords, if these machines were operating standalone using the standard NTLM hash (IIRC it was like [email protected]#$%^) then a tool like Cain and Able can figure that out fairly quick. From there you can edit a bios remotely with a few POSH commands, like invoke-webrequest to grab the payload, then start-process -machinename or if you really wanted to be self flaggulating, do it all manually via enter-pssession.

PXE boot/imaging theoretically could be done securely though through TPM and secureboot. The latest Dell/HP laptops have the same type of "Internet restore" that Apples have had for a few years so with a combination of PKI/SSL with public keys loaded into the TPM and a Certificate Revocation List check requirement, we could send out Gold images, and the hardware would essentially be locked to only accept those gold images.

OrangeElvis> Election machines should be custom built, closed systems that are incapable of being configured for any kind of network boot or access.

This is the WRONG approach here. This is almost exactly what we have now.

What's better protected?

A. Something only 1 person, or company is watching.

B. Something that the entire world is watching.

A real world example would be Windows Vs Linux. Windows is closed source, nobody knows how the security is done, although that isn't completely accurate. People figure out how it's done all the time. This is called "Security through Obscurity"

OTOH Linux everyone that has the capability to understand what the code is doing knows it's safe, or they figure out there's a problem with it. They submit code changes to a repository, then if they make sense they're merged into the main branch. This is one of the reasons open source software/methods are so secure since issues aren't hidden. Everyone can see them.

AtheistTrumper > I disagree, they should be completely open source.

Exactly, they should be. Also all voter ID's should be smartcard based with a public/private keypair on them that's checked against a intermediate CA with the actual CA CSR and cert locked in a safe somewhere.

antimatter>Disabling the NICs in bios. DOES disable network capabilities.

Not exactly. What it does do is shuts down the PCI bus data lines going to that NIC card via the southbridge (or whatever the chipset is called these days) , but if you look at a PC with the NIC disabled, you'll still see blinking lights as it's still getting power. Theoretically if it's still plugged into a network but on layer 2? (been a while since I learned the OSI model so forgive me if I have the wrong layer)

Unless it's completely powered off it's still an attack vector as far as I'm concerned. Motherboards without built in NIC's would be ideal. Techs could use a USB NIC to image them, them remove them post-imaging.

The way you deal with this is by encrypting the drives and using a TPM to unlock the key when you're booting trusted code

Right, and secureboot. Like I said above the TPM contains a PKI keypair that checks against a CRL to disable any machines that need disabling.

----my own personal opinion on this---

I've been doing IT/Cyber for close to 30 years now.... The only way to have a perfectly secure system is all stakeholders have to be involved in its creation, and all stakeholders have to understand the gains/benefits or the loss/dangers of features. It's not something the average American joe will understand in a short amount of time.

I think the best way of getting there is all major parties agree to send their own "Tech delegates" to provide input on the design of a national voting system. It shouldn't be something left up to a private company. I find there really is a broad spectrum of political opinion in tech. Don't let the Googles and Facebooks fool you. There are some very bright conservative techies, but in silicon valley they have to stay hidden, as the "R" in Republican is somewhat the scarlet letter right now.

Everything should be out in the open. The functional system design, the code, the hardware.

I think we could create our own system within 4 years, without issue. The issue we run into though is too many cheats right now don't want to lose their advantages. We'd also have issues with plants holding up the process. It really boils down to a matter of will. Do we really want to do this?

2
JarJarJedi 2 points ago +2 / -0

As somebody who worked in the industry for 30 years and personally built PXE boot setups, can confirm - PXE boots are common and if set up properly, not insecure - in fact, can be more secure than local boot since there's no way for anybody to mess with the system since all the code comes in from a secure server and not a local drive that somebody could mess with, and one server may be easier to control than a hundred workstations. The whole question there is in the setup - where the PXE boot images come from. With those things, the devil is in the details - if the setup allows unauthorized images, that's terrible. But without details of the setup, it means nothing except that they used common components, which by now probably everybody does.

2
MaverickRobot 2 points ago +2 / -0

Thank you for your sanity, pede. And your honesty. I am in IT and can vouch for your assessment.

1
CantStumpTheTrump 1 point ago +1 / -0

Motherboards and BIOS chips literally exist to be the central hub of all computer components. You can't just take a totally common, core functionality and declare that it is evidence of malicious actions.

The BIOS is a pretty standardized design; and buying two different brands of motherboard will show you that its very trivial for a manufacture to customize the firmware options to enable; disable, and burn various options.

PXE booting is totally routine as a local option.

Which could easily get locked down with a custom firmware that these devices are required to use and can then be be audited against. They can also make them complete read-only because they are very specific devices and will not require any adjustments.

Or if you show how it is PXE booting over the internet, ok.

I mean, you get that it can PXE boot locally but the image being applied is getting pulled from a location not locally right? MDT works under this premise.

2
AtheistTrumper 2 points ago +2 / -0

I disagree, they should be completely open source.

3
OrangeElvis 3 points ago +3 / -0

First choice = NO MACHINES. Baring that, certainly open source should be demanded and legally required.

3
deleted 3 points ago +5 / -2
7
digi 7 points ago +7 / -0

Thats not the argument here. I'm just pointing out that the information presented is meaningless screenshots that could be had from a google image search. You want to change the regulations regarding voting machines.. Fine I'm with you 100% on that.

3
antimatter 3 points ago +3 / -0

Shoulda woulda.. Yes the regulations need to be better with voting equipment. Doesn't change the fact that NOTHING presenting by codemonkey or claimed in the OP is evidence of wrong doing. We are barking up the wrong tree here.

2
ViduusMAGA 2 points ago +2 / -0

You think we’d have learned the last 30 times we’ve fallen for his larps Yet I keep getting downvoted and called a shill for not playing qtard with CM.

2
President_Elect_Pepe 2 points ago +2 / -0

To be fair the fact that these systems have network chips is concerning in of itself.

2
digi 2 points ago +2 / -0

I agree 100% I don't think general purpose computers should be used in the elections. Should be simple scantron type counting machines. But as long as they use off-the-shelf computers. It will come with network chips.

0
President_Elect_Pepe 0 points ago +1 / -1

Originally these weren’t off the shelf.

You’re falling into their trap.

They cost a ridiculous amount of money precisely because they were originally custom hardware.

Nobody ever mandated these systems contain off the shelf components. In fact it’s likely mandated in several places that they not be.

2
digi 2 points ago +2 / -0

I don't think I'm falling into the trap. I agree these machines shouldn't be used. I've been arguing the information as presented by CodeMonkeyZ is completely wrong. If the usage of a general purpose Dell machine is the conspiracy here.. Then they should SAY that. But instead we get generic bios screenshots that show nothing and claim that is the proof of remote access. Its not.

1
President_Elect_Pepe 1 point ago +1 / -0

I think you kind of missed the point.

You’re accepting a premise you shouldn’t in regard to them using off the shelf components. That’s all I meant.

It’s all good.

1
maleitch 1 point ago +1 / -0

If they are running windows they are not running so called custom hardware. You think dominion is going to develop their own CPU architecture for voting machines? You people are terrifying in your technical ignorance

1
President_Elect_Pepe 1 point ago +1 / -0

You’re reading too much into my use of a specific term and the context.

All we mean by custom hardware is something that is not off the shelf bought from a third party.

Most third party board would have some kind of networking chip.

You could easily run windows on similar boards with the network chip removed. The question then becomes how do you upgrade. Do you remove USB ports also?

All I was objecting to is the idea that they must use a board with a networking chip.

You can stop being condescending now.

1
unashamed 1 point ago +1 / -0

Back in high school, we would open the computer cases and pull the BIOS jumper on the board. We could then access the BIOS & circumvent network boot. We’d then get direct admin access to the local OS & install all our own programs and custom GUI. The PC would still boot from LAN by default, so it was transparent to normies.

I also brought the Halo trial in on a flash drive and we copied it to all the PCs. Eventually, a bunch of kids got the same idea. We’d have school-wide LANs at lunch. It was bad enough the sysadmin had a script to prevent “Halo.exe” from running. So we just changed the name and it still worked. Good time.

6
DonJr2024 6 points ago +7 / -1

We've long known they use generic Windows machines. They probably give everyone the same user name and password and put it on yellow stichy's. This is not proof of fraud. Just incompetence.

0
OrangeElvis 0 points ago +2 / -2

Again, I never said it was proof of anything but the potential for very bad things. Things that Dominion is on record as stating was IMPOSSIBLE. THAT is the point of all this. It is proof Dominion lied. And it is likely indirect proof AZ election officials lied, as the video indicates the STATE has the password.

3
DonJr2024 3 points ago +3 / -0

Dominion said that their machines have customized BIOS chipsets? Where?

1
OrangeElvis 1 point ago +1 / -0

Dominion specifically said their machines are not capable of accessing a network/internet. This video potentially disputes that.

1
maleitch 1 point ago +1 / -0

The fuck it does. There are so many more components required to enable a functioning network. You guys are totally discrediting the legitimate election audit with this super secret agent idiocy.

1
OrangeElvis 1 point ago +1 / -0

Lol, not at all. It is just additional info that undermined Dominion - and potentially the states that say they don't have the password.

Go be a Karen somewhere else.

2
ShadowInv 2 points ago +2 / -0

Pxe network boot relies on local network broadcasts to issue dhcp with boot filename and server. This would require a lot of infrastructure on the local network. It is not something that can just reach out to the internet easily without other support systems.

2
OrangeElvis 2 points ago +2 / -0

We don't really have any idea because their system is almost a black box.

2
catsfive [S] 2 points ago +3 / -1

My interpretation (and here I'm seeking clarification from an expert) is that the machines can be remotely commanded to reboot into wireless mode somehow. But that doesn't sound right

5
DonJr2024 5 points ago +5 / -0

Err not really. Unless there is more I'm missing. Wired/wireless is irrelevant. We're talking about that computers can get boot info from the network and thus potentially boot into a different setup than if you boot from the first available local boot device.

That is standard.

This is like saying that the computers have keyboards and keyboards can be used to enter cheating instructions to the computer. Having no keyboards is not the answer.

1
KillerKap 1 point ago +1 / -0

Yes this is possible using VPN remotely or someone sitting offsite but close enough to wifi into the same network. But that doesnt even matter.

The real problem is that the LAN adapter on the voting machine (Dell Optiplex 7060) was enabled... meaning a corrupt election official can plug in a mobile battery powered hotspot about the size of a buisness card with a tiny cable and that voting machine is on WAN (or internet accessible). Even for just a short while, like when they stopped counting in the middle of the night.

Anything could happen at that point. Remote desktop, backdoor into Dominion's custom software or any number of simple progs to change data on the client machine.

1
digi 1 point ago +1 / -0

Where does it show it was enabled? The video CodeMonkeyZ posted showed the NICs disabled. But it really is a mute point as USB is enabled because they use USB sticks to move the data . So a USB network adapter can be plugged in at any time unless special settings are in the windows operating system, but no evidence of that is shown.

1
KillerKap 1 point ago +1 / -0

its in the first few seconds. just pause and you can see checkbox lan with pxe enabled

1
Tr0mp 1 point ago +1 / -0

wouldn't you still need a local secondary OS installed on the hard drive for a PXE net boot? i don't get it

2
OrangeElvis 2 points ago +2 / -0

No. That is the point of network boot.

1
digi 1 point ago +1 / -0

PXE boot means the bios ON the network hardware reaches out to the network asking for an IP address. In that same ask for an IP, it also says it wants to boot. Both DHCP and PXE Servers will respond. Sometimes the DHCP server is the PXE Server. The PXE Server then sends it booting information or sends it to another location with the booting files. Those files are streamed across the network and the computer boots as normal, albet a little slower. Normally the image is a readonly operating system as its a lot more difficult to manage desktop images remotely.

This is most commonly used by IT departments to remotely install Windows images on computers in the company. If you have a big building with hundreds of machines and a few IT staff and need to upgrade the windows image, this is how they would do it.

9
LibertarianXian 9 points ago +11 / -2

Ditto

t. sr. sysadmin who's seen literally thousands of Poweredges and their damn iDRACs and talk to them on CLI through racadm in Linux

8
WindyCityBluez 8 points ago +10 / -2

I understand how PXE boot works.. plus, I need some hopium. Dark times man. Dark times.

3
xBigCoffinHunter 3 points ago +5 / -2

I think the greater point is Dominion says they are not networked. That it’s not possible. Well, that is clearly bullshit. I mean we’ve known that. This is nothing knew but if they were actually being truthful these machines wouldn’t have a nic at all. Disabling the nics and password protecting the bios does not equate to a machine without the capability to connect to a network. A server with no nic at all gets closer but any asshat with a usb nic can get around that even.

3
antimatter 3 points ago +3 / -0

Disabling the NICs in bios. DOES disable network capabilities. And how on earth would you have a SERVER without networking? There is no such thing. You ain't "SERVING" shit if thats the case.

1
xBigCoffinHunter 1 point ago +1 / -0

Because they’re voting machines. They’re not servers. They’re supposed to be standalone clients are they not? I get it’s installed on a regular old Dell but disabling the nic is not the same as selling a machine that cannot be joined to a network. If the capability is there then it’s there.

2
antimatter 2 points ago +2 / -0

I'm not arguing that point. You are right, generic old computers should not be used for elections. But the information as presented is not the proof of remote access as claimed by CodeMonkeyZ. It just shows that they are Dell computers with a standard bios and standard setup by a standard IT department.

1
xBigCoffinHunter 1 point ago +1 / -0

I think it does show that dominion is lying. They said they can’t connect to a network.

1
ViduusMAGA 1 point ago +1 / -0

I feel like their training manuals that got leaked with networking instructions proved that a lot more then this thread..

1
digi 1 point ago +1 / -0

Sure its possible. Just because you have a piece of equipment installed on a computer does not means its plugged in or used. Besides does dominion even administer the hardware? I'm not sure it does. The video claimed that the state has the bios passwords. Meaning the state might be managing the hardware and probably even provided the computers in questions. Dominion may only be providing the software.

1
KillerKap 1 point ago +1 / -0

no usb and no nic and no wifi. basically no interface for connectivity would be the only solution. it is pure nefarious fuckery that our states are purchasing whitelabeled $1k Dell miniPCs that are completely vulnerable and consider that "safe".

1
digi 1 point ago +1 / -0

Shouldn't be a generic computer at all. But I haven't seen WHAT these computers are for. Are these the tabulators? Are these the machines running the GUI that people use to vote? Either way my understanding is they use USB sticks to copy the vote information and take it to the tabulators. Thats what all the USB fuckery was in the videos.

So if USB is enabled so they can move the vote information off it to the central computer/tabulator. Then they can also plug in a USB network adapter. So the whole bios thing is that much more of a useless thing to focus on.

35
Alpha_Lemming 35 points ago +37 / -2

And this is why they won't give up the routers in Maricopa, those routers have Netflow logs with he traffic on and out of the facility.

What traffic, when, and to /from whom

16
Easter_Bunny 16 points ago +16 / -0

They wouldn't have netflow logs but they would show helper addresses, and other configuration possibly, that would facilitate the PXE boot process.

14
Alpha_Lemming 14 points ago +14 / -0

That's right, netflow is cache.

10
LibertarianXian 10 points ago +10 / -0

This assumes netflow/sflow is configured and reporting to a syslog/splunk server somewhere. Generally network devices don't have that setup by default because it can be really resource intensive.

4
catsfive [S] 4 points ago +4 / -0

Not to mention router traffic rules (unless that's also what you mean, in that case I defer to better experts).

8
militarysnoopy 8 points ago +8 / -0

Which is why, as we heard from the audit update a couple weeks ago, they performed massive numbers of innocuous queries on their databases - to fill logs with useless data.

They will have already done the same to the routers at this point.

3
Balzenburg 3 points ago +3 / -0

True but seeing that on a separate system with the same kind of nefarious script would point to fraud.

3
peterstrzoked 3 points ago +3 / -0

It already points to fraud. IMO 37,000 login queries with a blank password has no legitimate explanation.

“Oh but we were doing maintenance and had a bug in the script!”

Really show me the script. Oh and why were you doing “maintenance” on devices that had been subpoenaed by the senate at that point?

More evidence is always great - but that one piece of evidence is the smoking gun of nefarious intent, IMO

1
Powdered_Sugar 1 point ago +1 / -0

What's doubly funny about that is that with any modern SIEM like Splunk it's super easy to filter out those noise queries and only look at activity that involved the transmission of data.

3
Pres_Trump 3 points ago +3 / -0

ISP would be a good place to look too unless this is all on the internal network. But, if there were calls from outside the network that traffic would also be logged by the ISP.

3
peterstrzoked 3 points ago +3 / -0

And we know the ISPs all want to help us fix election fraud...

2
unashamed 2 points ago +2 / -0

ComcastNBCUniversal does not approve of your disparaging comments.

Also this: https://www.hollywoodreporter.com/business/business-news/supreme-comcast-1234974650/

1
rageous 1 point ago +1 / -0

You're kidding yourself if you think those logs haven't long been "accidentally" or "mysteriously" deleted.

28
ChrisTheSoberITGuy 28 points ago +31 / -3

In other words they're virtual machine terminals.

Nothing is logged locally.

Holy fucking shit.

8
catsfive [S] 8 points ago +8 / -0

But once the switchover happens they decrypt. Encryption causes frames to be filled. They assumed they were in the clear. HOLY FUCK, LINDELL HAS IT ALL.

4
DonJr2024 4 points ago +7 / -3

Guys you're really grasping here. Virtual machines, PXE booting, having a BIOS screen, etc are all standard parts of plenty of normal, secure setups. How the fuck does a computer start without a BIOS? What local logging do you think is needed and why? Sorry but this is lame.

4
ChrisTheSoberITGuy 4 points ago +4 / -0

PXE and networked virtual machines are not normal for voting systems that are supposed to be offline

2
clownworld30330 2 points ago +2 / -0

These things are supposed to be running trusted, certified code. Looking at one as a user you can't tell if it is. Local admins have passwords that let them boot these machines to run any code they want.

It's not a huge gotcha, but it's not nothing either.

2
Tr0mp 2 points ago +2 / -0

do we have confirmation that this wasn't a feature their "voting machine OS/BIOS" was supposed to have?

1
peterstrzoked 1 point ago +3 / -2

Election computers should have no bios. They should also have no operating system, keyboards, mice, or screens.

We’ve proven to be too irresponsible for any of the above to be involved in our elections.

With that being said, I’m with you on the nothingburger-ness of this whole thing.

Paper ballots that can be recounted by hand make computer fuckery a moot point.

Uncreased “pristine, printer marked” ballots in GA, or vanloads of suitcases brought in under cover of darkness in Michigan - with ballots being randomly assigned to voters who hadn’t voted... this is the fraud we should be focusing on.

I’m not saying dominion fuckery didn’t play a role - or that dominion didn’t have bad practices, just that until we can focus on the easily verifiable and blatantly obvious PHYSICAL fraud, the rest of this is a red herring to discredit us.

6
antimatter 6 points ago +6 / -0

Basically you are saying they shouldn't have a computer. Because you can't have a computer without a bios right now. That isn't the argument being had here. Myself and a few other techies are trying to say.. Is that the information presented by Codemonkey is all a nothing burger. We can argue if computers should be involved.. Won't be much of an argument because I agree they shouldn't. Simple counting machines is all that is needed.

0
peterstrzoked 0 points ago +1 / -1

I wasn’t attempting to hop in on the argument of whether a computer having a standard bios is nefarious or not - as I would agree that is silly. But I was making a point that our overuse of them in elections is a problem.

I suspect that all of this computer noise is designed to distract from the very real and tangible fraud that cannot be disputed.

If I say the election was hacked, then you say “well I’m a computer expert from CISA, and that’s absurd, there was no fraud” the average person shrugs and just assume the CISA “expert” is right.

(Much like what is happening on a smaller scale here with the opposite conclusion on this particular post, Ie CZ says this is fraud and I don’t understand it, so it must be fraud).

But if you take 100 ballots that were counted and can show that they all have an identical mark, with an identical artifact, or mail in ballots that should have been folded that were never folded - that’s a lot easier for a lay person to grasp - and I wish the conservative community at large was more focused on that.

4
Amaroq64 4 points ago +5 / -1

Basically, it seems like the techpedes are saying that codemonkey is a grifter and he's trying to act like having a standard bios is indisputable proof of election fraud, and it's going to make us look like idiots when we jump on it and start sharing it uncritically.

3
peterstrzoked 3 points ago +3 / -0

We get a lot of misinformation here. Some of it is accidental, but I’m sure some of it is intentional, in an attempt to discredit us.

I’m more concerned with the fact that someone cleared the log with 37,000 login attempts than I am with these machines having a standard bios.

4
DonJr2024 4 points ago +5 / -1

I would love to work on a perfect election machine. Dominion is so laughably far from it that the conversation is not even worth having. We might as well discuss if my coffee mug would make a good spaceship.

But absent the actual SERVER that supposedly took advantage of PXE capability and some evidence of how a compromised workstation matters and affects things... yeah nothingburger.

19
antimatter 19 points ago +21 / -2

Standard setup information.. Check Standard Dell BIOS screenshots.. Check. Standard Windows Deployment process.. Check.

Post on patriots.win for quick points and gaslight everyone in the process.. Check.

7
DonJr2024 7 points ago +8 / -1

Bunch of non tech people being taken for a ride here.

3
OrangeElvis 3 points ago +4 / -1

If you are building an election machine, you don't even have a "greyed out" network boot option. You make that mf not even capable of accessing the outside. Period.

This is not proof of anything, but it does show the machines were potentially easily compromised with BIOS password.

6
antimatter 6 points ago +6 / -0

Network boot doesn't work across the internet. Its used primarily for deploying an operating system within your company network.

3
KillerKap 3 points ago +3 / -0

Thats not entirely true. You can site to site VPN and PXE boot from WAN.

2
antimatter 2 points ago +3 / -1

Well yes.. I will concede that. And if you took it further, can probably be done by forwarding broadcast packets or having control of the DHCP server so the "next server" property points to a computer elsewhere. But this all requires additional hardware and access to the network at the time. I'm arguing the lack real information presented by CodeMonkneyZ.

As I've mentioned with others, I don't like computers being involved in the election either. The bios is the least of the problems, do they have the USB ports disabled? I didn't see that in the bios or if they have GPOs setup to disable it in windows. Meaning they could just as easily plug in a USB nic. But they probably don't since my understanding is they use USB sticks to move the vote tallies to the server. So they couldn't disable it. They would have to black list USB NIC drivers or something else. I'm not an expert windows systems admins.

1
KillerKap 1 point ago +1 / -0

During an audit it would be trivial to see if the system added hardware like a USB NIC. however booting into a controlled PE to change a part of the data tabulating votes would be undetectable.

3
OrangeElvis 3 points ago +4 / -1

That doesn't matter. All you need is to run machines on Election Day with this network boot feature on and a hidden server on site - and then reboot machines to default settings after election is closed.

4
antimatter 4 points ago +5 / -1

Ok... So now all you have to do is prove that pxe booting was enabled during that time. That a server was somewhere onsite and providing a network boot image to the same LAN that the election machine is on.. And that the boot option had PXE booting at the top and not the local HD. And that network booting these things isn't normal operation. And then after all that.. You have to prove that the network image did something nefarious. But you also have to remember, The AZ auditors had the machines and pulled logs from the local OS that show activity from the time when they were being used.. So how would you have a machine booted from a network image but also running the local OS and generating data? Hint, you couldn't.

1
OrangeElvis 1 point ago +1 / -0

As I said, it is not proof of anything other than potential. I also notice you assume these are AZ machines on the video - they are not.

However, your defensiveness is pretty curious. Do you think the election was stolen - and that Trump won by a LOT?

3
antimatter 3 points ago +4 / -1

HUgely. I just think people are focusing on unprovable stuff rather than the obvious right in front of us. Like Pulling ballots from under the table. Or the switching of pens and sharpies in az, or the magical stopping of counting at 10p only to resume in the dead of night.

All much more visible, easily provable.

1
OrangeElvis 1 point ago +1 / -0

Don't misunderstand - I am about ALL of it. All this does is undermine the already shit rep of Dominion by proving the potential of these machines being accessible. This is a war of perception of the people. The courts and executive branch of the federal gov't are compromised. It is left to the states to take care of this shit before the 2nd Amendment has to be invoked or we lose our country for our children.

-1
JoseyMontana -1 points ago +1 / -2

Great comment. So let's ignore and not document this obvious path to future fraud because, well, your assessment of likely public relations and legal success is too dour.

Best forget about it after calling Ron terrible names and accusing him of being a Chinese spy.

2
catsfive [S] 2 points ago +2 / -0

Expert level question for you. It's clear we captured unencrypted data. Can you please speculate as to why? Packet size? Or just arrogance?

2
OrangeElvis 2 points ago +2 / -0

It is not clear to me. It is clear we have people claiming to have captured data. I want to believe them and I think we are going to have answers to all questions soon. Mike Lindell has already scheduled a hacker forum with media present. He put up seven figures to anyone who can prove it isn't real. I no fing idea if it is or not, but for that kind of money and sunlight, we are going to find out soon.

1
peterstrzoked 1 point ago +1 / -0

They wouldn’t even need PXE boot at the top of the list in the bios settings if it was booted using a one time boot menu on Election Day. Of course if I was an auditor and I found machines all set to PXE boot with hard drives that didn’t appear to be used on Election Day, that would raise my suspicion and make me want to look for that server.

But I haven’t heard any allegations of those two issues, and it becomes a moot point if you can pull a local HD image that shows it was being used on Election Day....

12
tom_of_rj_fame 12 points ago +12 / -0

Ok so when do we get the AZ audit results?

12
Thewickersnipper 12 points ago +12 / -0

while(true){ Console.writeLine(“Two weeks”); }

4
LibertarianXian 4 points ago +4 / -0

BREAK

BREEEEAAAAAKK

CUT THE POWER

"It's still running, sir"

NUKE IT FROM ORBIT

2
bonejack 2 points ago +2 / -0

Damn infinite loops.

3
PKShadilay 3 points ago +3 / -0

Probably not until after we hang the bastards obstructing the audits. We're going to need a shit ton of rope.

12
keeponwinning 12 points ago +12 / -0

Something new, or just way to get a list of people following him.

9
digi 9 points ago +10 / -1

Just a way to get masses of non technical people following him.

7
browndrill 7 points ago +7 / -0

dominion has sold 10's of thousand wireless modems for their voting machines. something the establishment denied could even happen. Michigan alone bought around 3,400

6
deleted 6 points ago +6 / -0
5
Ronpaulblican2 5 points ago +5 / -0

That’s why the routers are being hidden.

5
jbDonuts 5 points ago +5 / -0

PXE boot?

4
4
3
catsfive [S] 3 points ago +3 / -0

Stickied you over on GA, thanks for the solid post

2
CoolAsACucumber 2 points ago +2 / -0

Thank you! Please tell them to unban me over there as well

3
catsfive [S] 3 points ago +3 / -0

Options, options. Just letting y'all now that the Q-tards are timestamping this info way ahead of PW

2
CoolAsACucumber 2 points ago +3 / -1

True, that site is filled with the CodeMonkeyZ posts and now they're trying to relate in back to q tard posts.

6
catsfive [S] 6 points ago +6 / -0

Say what you want but the moment CodeMonkeyZ's video dropped there was a mass shooting at the Pentagon

4
WindyCityBluez 4 points ago +4 / -0

Interesting. I was wondering why all those docs were referring to BIOS settings. But the only way to boot from network would be to boot from flash that redirects to a NAS vdisk or PXE boot.. am I missing something here?

4
tocheeba 4 points ago +7 / -3

While I don't have a doubt shit was rigged, CodeMonkey is an idiot.

0
catsfive [S] 0 points ago +2 / -2

I'll juice the fuck out of any orange that comes my way and more on to the next one, NO PROBLEM

4
ckover9000 4 points ago +4 / -0

Cool story. Call me when there are commie corpses to bur.

4
crimsonfancy 4 points ago +4 / -0

Is this why they need the routers?

4
JackLemon 4 points ago +6 / -2

QTards are still trying to promote this piece-of-shit, kiddie porn, smut peddling, QAnon grifter as if the creep has any credibility whatsoever. Why can't you low info, low IQ morons keep this idiocy on your own board? You twits have done enough damage to Trump and MAGA you should be banned on sight.

2
catsfive [S] 2 points ago +5 / -3

How about NO, loser

I mod the Q WIN. Sort me by top, and cash me outside

1
JackLemon 1 point ago +1 / -0

Yeah we know you mod the QTard board because you mention it often and are too stupid to realize that bragging about it is like bragging about riding in the front seat of the short bus.

You pathetic morons and the grifters that scam you have done far more damage to Trump, his actual supporters and the MAGA movement than the DemonRats or RINOs could ever dream of accomplishing.

The only good thing about you venturing into the sane side of this site is that many of us can mock and ridicule you to your stupid faces. Dumb fucks.

ETA: The only reason you have any karma score on this board is because of the dumber-than-shit QTards that follow you here. No sane person is going to up vote a post about a kiddie porn, smut peddling QAnon grifter like Codemonkey Ron.

2
catsfive [S] 2 points ago +3 / -1

Yup, gotta agree—there was a teeny slice of your meaningless life that typed that

0
JackLemon 0 points ago +1 / -1

What a lame, low IQ response from a follower of a kiddie porn, smut peddler. No one is surprised you couldn't counter any of the facts because you're a pathetic moron.

3
LostSailor 3 points ago +3 / -0

He’s talking about idrac and he just posted pictures yesterday where the instructions say to disable the idrac onboard nic so while what he said above is true with a enterprise licensed idrac. None of this is possible if the nic is disabled. So was the idrac nic active? Was there a data connection established? If so the yes, someone could log into the idrac with the correct user/pass and make the server do lots of things.

I mean the dell servers have a internal usb that you can install anything in technically. If it can boot from it, it can be installed.

3
FreddyThePatriot 3 points ago +3 / -0

But then the official operating system would have no logs during the time periods the election too place at all.

3
Bogey 3 points ago +3 / -0

They deleted the logs and dumped the login files. We have no proof anything on the machines was put there in real time the day of the election.

3
Donkeyballs 3 points ago +3 / -0

Damn PXE Boot, gets the lm every time.

3
Morphheus 3 points ago +3 / -0

Explains why domi ion is stonewalling on everything

2
GravityBounce1976 2 points ago +2 / -0

This is all the ammo AZ needs to get the routers.

2
cptkloss 2 points ago +3 / -1

it's very far fetched, so far fetched as to be looking as misinformation designed make us look stupid.

2
RumDrummer 2 points ago +2 / -0

Ah, the old Volkswagon switcharoo!

2
weneedaweedeater 2 points ago +2 / -0

How didn't I think of this? Of course - if it's got a network connection - it can PXE boot. That's awful, but quite clever.

2
STONKATRUCK 2 points ago +2 / -0

Why are they connected to the internet anyway

2
TGNX 2 points ago +2 / -0

Well, that's...damning.

2
proforma 2 points ago +2 / -0

Okay, this explanation lost me. I'm not sure what means--but if it is saying they cheated, well then I get it.

1
Santa_Liqueur 1 point ago +1 / -0

This person discovered the term “network boot” and thinks that’s automatically evidence of some nefarious plot.

Really, any computer (including your own) can be configured to look on the network for its operating system. This means there’s a server sitting out there looking for computers to connect to it, and it’ll go “ok, here’s your operating system.”

The chances of this being true here is mindbendingly small, because it assumes a few things:

  1. A network robust enough to actually do that, which is not easy or cheap.

  2. Computers that are set up to do it in a quick, silent way, and fail back to a local hard drive if it doesn’t work.

  3. A server installed that can handle it, which won’t be some basic looking desktop on a table somewhere.

I’m not saying it’s impossible. But, it’s a lot less credible when some rando starts talking about it.

Also, it’s not even necessary to any claims made to date. Network boot or not, that’s not the issue here, it’s a human one. All the machines need to do is send a lot of ballots to manual review, then humans simply assign the votes they want and keep rescanning ballots. Simple. No network magic required.

2
BarneyFranksNipples 2 points ago +2 / -0

Seems like a really unnecessary feature, unless you’re selling the back-door access.

2
tellittothedead1 2 points ago +2 / -0

BIG IF TRUE

1
PepePinochet 1 point ago +1 / -0

if true

1
tellittothedead1 1 point ago +1 / -0

I have a feeling it is legit. Other papers and evidence have been released to corroborate

2
NoSteppy2020 2 points ago +2 / -0

This is like DieselGate but with a Spicy TWIST!

2
tombombadil86 2 points ago +2 / -0

When I read the manual it seemed like the instructions were exactly the opposite. The instructions say to disable booting from the network card.

I'm starting to think Ron is a disinformation asset or whatever they're called. Has he been right about anything yet?

2
KungPaoMcChicken 2 points ago +2 / -0

I doubt that. Network booting surely requires a boot image on the network. Though perhaps the router could be configured to pass an external image in. It would take forever to load and this type of thing would make the environment insecure. It would require the dhcp server or router performing dhcp function to somehow serve an external image. I doubt this very much.

2
catsfive [S] 2 points ago +2 / -0

Heyooooo

1
KungPaoMcChicken 1 point ago +1 / -0

I run a bunch of software that does automated testing on equipment via network boot image. I have the size of my image down to 11mb. Small enough to fit on a portable battery operated single board computer.

2
Groundpounder 2 points ago +2 / -0

Dominion: “Votes for sale! get your votes here while they’re hot!” 🏷

2
Matttdamonnn 2 points ago +3 / -1

Honestly who the fuck is CodeMonkeyZ and why has everything “breaking” thing he’s posted never amounted to anything?

Getting your news from tweets is no more real than the news they get from CNN. C’mon man.

2
catsfive [S] 2 points ago +3 / -1

The fuck you think this is

Get back to the sidelines where you spend most of your time

2
TheWhitestOfFangs 2 points ago +3 / -1

I'm going to say it this way: This is not useful - even if true.

The "usual" fraud approach of stuffing ballots and "miscounting", mismatching signatures and such is more than enough to prove what happened was false and the results were opposite. The push should be first to fix the bent changes that were made and REMOVE THE MACHINES altogether. Then stricting the regulations for requiring observers and chain of custody and such with the law requiring courts to act IMMEDIATELY with harsh punishments. This will make it really difficult for those fuckers to do this kind of shit again and then when the elections are done (congress and presidency later) - the investigations and legal actions should be firm and painful.

Even if CodeMonkey is correct, which I don't trust, it's not useful at this point, especially in the courts and with public opinion where much of this "goes to waste" due to lack of technical knowledge. Showing simple ballot fraud, which everyone can understand gives a much better stance.

0
JoseyMontana 0 points ago +1 / -1

Hey that's Napoleon-level strategic genius you got there, Bonapart.

1
theglynn 1 point ago +1 / -0

SPLUNK Why do they need splunk? https://www.edureka.co/blog/what-is-splunk/

Short post, but IT needs to get away from our votes.

1
Perhelion 1 point ago +1 / -0

PAPER PAPER PAPER BALLOTS

1
Meddlesom 1 point ago +1 / -0

Now why would they ever want to do that? What possible use could it have? It just doesn't make sense, because why would Chewbacca, an eight foot tall Wookiee, want to live on Endor with a bunch of Ewoks? It just doesn't make sense, so you must acquit.

1
you_HO 1 point ago +1 / -0

Dominion = Dirty Sneaky Bastards.

1
Junosu 1 point ago +1 / -0

Yikes!

1
DemonkkkRatSlavers 1 point ago +1 / -0

Rig the riggers up to be swung from side to side.

1
deleted 1 point ago +1 / -0
1
redinmn 1 point ago +1 / -0

So they were running virtual machines or just grabbing a config from the cloud?

1
Amen 1 point ago +1 / -0

This was so obviously Jim. Such obvious fakes.

1
DEEPSTATE 1 point ago +1 / -0

Interesting, this is really easy to do, I use to create my own multi linux usb bootloaders for fun

1
Iranhasnukes 1 point ago +1 / -0

trump won, mutha fuckers

1
RealTXPatriot 1 point ago +1 / -0

Is there a dominion office in the CONUS?

1
MAGANatsFan 1 point ago +1 / -0

PXEboot if the machines can do that, then thats a red flag!!

1
Siteless_Vagrant 1 point ago +1 / -0

Wouldn't there be a log of those boots, with server names? I seem to remember seeing that on mine sometime. I think when I killed Win 10 Rapeware on my laptop and installed Ubuntu.