I love this. I can’t wait to see some legal repercussions for Hunter but I’m not going to hold my breath.
Looks like 4chan is leaking again. Let’s stay focused.
Didn’t Oprah get sued by the beef industry? And not the Hillary Clinton side of beef kind but the Texas cattle industry. Companies routinely sue people that disparage their brand.
It probably starts with a stern cease and desist letter and grows in temperature. But this is nothing new.
200k dead is 200k more Democrat voters. It’s not surprising he would honor them.
Most politicians become filthy rich while in office and continue to become more rich afterwards. Makes you think
Fastest sticky in the West!
The list is in Chinese. I don't know what I expected.
Oh god that would be terrible. lol
I love the hunter2 irc story. By the way, did you see that Hunter Biden actually used “Hunter02” to lock his laptop. Not shitting you on this.
Moldylocks was pretty cute before leftism stuck. http://www.occidentaldissent.com/2017/04/19/moldylocks-trashy-villain-tragic-victim/
Just curious, why the down vote for information?
We need to understand why these tests are so terribly bad. The unreliable tests are a tool being used to lock everything down. Where we they made? Who funded them?
I’m sure there are a lot of false positives like with Elon Musk. However, in Dane County (home) there are still a ton of inpatients and ICU patients. See https://cityofmadison.maps.arcgis.com/apps/opsdashboard/index.html#/e1b2b7b6ea444637b102fdce3aab6693
I wish we had an accurate case count and we knew what percentage and how many tested positive but were actually asymptomatic.
This should be voted up.
I look forward to their review. They might not see anything bad in the the official code...
I hope they have the file checksums for the running config and application files from election night and compare those to the vendor approved version the voting machines were supposed to be running on election night.
https://i.pinimg.com/originals/ac/72/4e/ac724e2d3b609d4f184b7f77564f4b74.jpg movie reference
It must be some sort of Golf Cart Time Machine.
Remember the shills posting malicious links? Well, ISPs often scan the outbound URLs on sites to determine the overall reputation of the parent site. If a bad actor spammed a bunch of malicious links on our site and then reported our site to one of these reputation sites with the “new” link (https://thedonald.win/new), I bet they could tarnish the reputation of our site. The amount of overall reputation influence would depend on each algorithm / site.
Currently, we have a clean bill of health but it’s important to run this frequently because results change.
- https://www.urlvoid.com/scan/thedonald.win/
- https://brightcloud.com/tools/url-ip-lookup.php
- https://sitecheck.sucuri.net/results/Thedonald.win
- https://mxtoolbox.com/emailhealth/Thedonald.win/ (Says email but gives overall domain health)
The Top Level Domain (TLD) of “dot win” used to have a lot of suspicious sites - it was #8 in 2018 (See https://integracon.com/suspicious-top-level-domains-what-you-should-know/). Currently it is a much better score but still a high percentage with 19.9% bad: https://www.spamhaus.org/statistics/tlds/
Another high correlation with malware are sites that are hosted on recently registered domain names. Our site should be old enough to not get dinged by that metric but it’s up to the algorithm on the date they use and the weight - e.g. Palo Alto Networks uses 32 days (https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/content-inspection-features/url-filtering-security-categories.html).
TLDR: There could be legit technical reasons behind blocking links. Everything I look at currently gives us a good bill of health.
Here is one Lawyer’s take on the interview: https://twitter.com/mcadoogordon/status/1326655155207540739?s=21
As soon as the code is published I will take a look at it.
I know the snippet of code isn’t what looks for missing votes and switched votes or the part that outputs the results.
Hopefully they reviewed security camera footage (if there were any, the reporter didn’t see any) and verified software and operating system checksums on all unsecured machines.
If a bunch of high value targets are left exposed like this they should really immediately pivot to Digital Forensics and Incident Response. If they didn’t, I would imagine it could put any votes tabulated by those unsecured machines as suspect and maybe even thrown out in court. Disclaimer, IANAL, I’m a humble IT Security pede.
Oh yeah, don’t use a free VPN service. Avoid those.
Remember how I said a VPN was like a tunnel and your traffic comes out the other side? Well that other side’s IP Address is what appears on the servers for anywhere you visit. The VPN provider will have a block of IP Addresses and yours will be the 1st available one from the stack.
What happens if a lot of the other people on that VPN are abusing websites you are trying to visit in a completely legit fashion? Well some websites like Google might realize that they are getting a lot of SPAM’d search queries from the block of IP Addresses and might enforce a CAPTCHA for any searches to slow that block down a bit.
As Hairy_Mouse said, some websites might even go as far as restrict all traffic from known VPN IP blocks.
PC or Mobile?
Most VPN companies have both a PC client and a Mobile client so you can protect yourself no matter what device connects to the questionable WiFi network. If you don’t connect to the free WiFi (at the coffee shop, the hotel, the healthcare provider, etc.) then your needs are much lower.
Recommendation
Which is best? Well, that’s up to how much you want to pay and what features matter to you. I’d recommend a “no logging” VPN that doesn’t have records so they have nothing to turn over to the feds when subpoenaed (your traffic remains private). Don’t use a free VPN service, those are suspicious.
There are a few articles that rank the best VPN but I won’t tell you which to select.
I wonder if the machine has an API. I wonder if the system makes audit records for any of these admin behaviors.
A VPN is a tunnel. Your phone or computer’s internet traffic goes into the tunnel immediately after leaving your device. The other end of the tunnel is at the VPN provider’s servers.
This means that your internet traffic is hidden from whomever is providing your connection to you — be it the WiFi router or your cellular carrier. As soon as it hits the tunnel the data is scrambled so even if they snoop they can’t figure out what was said.
Missed the “I’m not going to end fracking, come on man” (paraphrased) and then ends fracking.
I’m sure there are more than what’s on this list.