1
Wijg3 1 point ago +1 / -0

If you are in possession of one of the endpoints the log would look like this. If your looking in from the outside all you would see is the proxy addresses.

This implies they have the sauce.

edit: you are correct, but when you are the government you have the power to correlate traffic and see through proxies, and Tor for that matter.....think traffic metadata

5
Wijg3 5 points ago +5 / -0

On the surface this appears to be a communications log listing source and destination ip addresses of internet traffic along with the company that has ownership of the ip address and the mac addresses of the equipment. You can look at it like a fingerprinting equivalent of the digital realm. Also appears to have a summary of the commands sent to a device presumably a tabulator or some type of voting equipment.

on the surface it appears to be an excerpt of a communications log from a central vote collection server.

1
Wijg3 1 point ago +1 / -0

Agreed, The whole thing seems likely to exist only to allow dominion and by proxy the DNC and Rinos something to point to and say see it wasn't us it was the damn supply chain bandits. Some foreign actor stole our homework!!

It is obviously not what they are saying it is to anyone with experience in the area.

1
Wijg3 1 point ago +1 / -0

Goes on to give a list of products they believe aren't effected

Here is the list:

Products believed to be NOT AFFECTED by this security vulnerability are: 8Man Access Rights Manager (ARM) AppOptics Backup Document Backup Profiler Backup Profiler Backup Server Backup Workstation CatTools Dameware Mini Remote Control Dameware Patch Manager Dameware Remote Everywhere Dameware Remote Manager Database Performance Analyzer (DPA) Database Performance Monitor (DPM) DNSstuff Engineer’s Toolset Engineer's Web Toolset FailOver Engine Firewall Security Monitor Identity Monitor ipMonitor Kiwi CatTools Kiwi Syslog Server LANSurveyor Librato Log & Event Manager (LEM) Log & Event Manager Workstation Edition Loggly Mobile Admin Network Topology Mapper (NTM) Papertrail Patch Manager
Pingdom Pingdom Server Monitor Security Event Manager (SEM) Security Event Manager Workstation Edition Server Configuration Monitor (SCM) Server Profiler Service Desk Serv-U FTP Server Serv-U Gateway Serv-U MFT Server Storage Manager Storage Profiler Threat Monitor Virtualization Profiler Web Help Desk
SQL Sentry DB Sentry V Sentry Win Sentry BI Sentry SentryOne Document SentryOne Test Task Factory DBA xPress (Free) Plan Explorer (Fee) APS Sentry (EOL) DW Sentry (EOL) SQL Sentry Essentials (EOL) SentryOne Monitor (EOL) BI xPress (EOL)

2
Wijg3 2 points ago +2 / -0

Look for MEP engineering firms. Chances are there a bunch in nearby states.

Here is ranking of the top MEP firms in the us (registration required).

https://www.csemag.com/events-and-awards/mep-giants/