Can someone please explain to me why we should toss section 230? Just want to hear it from this sides point of view instead of reading about it elsewhere. Thanks.
PS: No point to this post, just thought I'd share my experience these last months...
Up until 3-4 months ago, I started noticing all the corrupt shit going on, what a snake this Biden and associates were and started noticing the censorship was getting worse. Before, I never gave a damn about politics but always thought Trump was an asshole and maybe Biden should win...
This thinking stopped when I started talking to a friend and he showed me a bunch of things that opened my eyes. It started with the Podesta emails. From there I started looking into everything even more and became hooked in looking for the truth. I was fully convinced that Biden can't win and with him winning, America as we know it is going to turn into a big shit hole. I only wish more people could see the truth like I did.
I've been on Reddit for 10+ years and heard about TheDonald and everything you guys have went through but never paid attention to it. Now days, I'm more passionate about Trump, hoping he wins and the fraud gets exposed.
(Snippet from the full PDF report)
Source: https://verifiedvoting.org/wp-content/uploads/2020/08/red-team-support.pdf
Executive Summary On February 10, 2014, three members contracted by the Freeman, Craft, and McGregor Group, Inc. (FCMG) executed a computer and network penetration test, commonly referred to as a "Red Team" evaluation, on the Dominion Democracy Suite version 4.14-A Voting System. Over the course of five days, the team evaluated the physical, computer, and communications security of each system within the Democracy Suite.
The October testing found that while some vulnerabilities were addressed, multiple critical vulnerabilities were not addressed in the various systems and subsystems within the Democracy Suite. This included remote code execution and denial of service vulnerabilities as well as off-line ballot tampering. The following report is a comprehensive list of all findings discovered by the Red Team during the evaluations conducted in Sacramento, California.
**Findings (Computer and Communications Security) ** The following constitutes all findings regarding computer and communication security that could have a significant impact on information assurance.
Binaries Can Be Converted Into Original Source Code (All Windows Systems) Upon examination of the DemSuite software installed on each of the Windows based systems, it was discovered that each binary (executable) was developed in Microsoft C# under the .NET4 framework. This discovery allowed the Red Team to easily decompile all target binaries into its original source code, to include most developer comments, and recover vital information like software configurations and hard coded encryption keys. These decrypted credentials were later used from an evaluator’s workstation to gain access to the EMS Server’s SQL database. At that point the evaluator was able to view the database schema, which included current election definitions and tallied results, and modify fields within the database, to include fields (e.g. candidate information and vote tallies) within the test election.
UPDATE From October 2014 Testing: Obfuscation Technique Used on DemSuite Binaries As described above, during the February 2014 evaluation, the Red Team was able to decompile the executable files and DLL’s back into its original source code. In the 4.14.2301.0 version of the EMS Application Server Manager an obfuscation technique was used to rename variables and function calls to names with random hexadecimal characters. While some of the source code structure, like function call names, were recovered; the actual functionality (local variable instantiation, function calls, other algorithms) of the function call could not be recovered. It should be noted that the original encryption keys found in the first evaluation continue to remain un-obfuscated.
Zero Trust Relationship Between EMS Server and Workstations On examining the communications between the EMS Server and the Workstation, it was determined that no “trust relationship” exists between the systems. Trust relationships are predetermined parameters a system must meet prior to accessing resources on a network. In a Microsoft enterprise environment, this is usually established using domains. This lack of a trust relationship allowed an evaluator to access the SQL database, located on the EMS Server, from an untrusted system resulting in the modification of the test election.
Encryption Keys Recovered From Memory (EMS Server and Workstation) The evaluation team parsed through all human readable “strings” within the system memory of the EMS Server and Workstation. In the process of searching for possible encryption keys, the team noticed a 128-bit value that was consistent across both machines. After examining the memory spaces near this 128-bit value, keywords were discovered in plain-text. It was later determined that these keywords are used in the encryption process of both the Server and Workstation. These keywords were also found after decompiling the EMS Server’s “Application Server Manager” binary and analyzing the cryptography library.