I'm gonna put it all up on a throw away Google Drive account so you guys can preview it in browser ;)
Alright here's a preview: https://prnt.sc/votafl
It looks pretty legit. A lot of PDF files and some powerpoint files. I'd still recommend opening it on a throw away OS on a VM.
I'm working on it. I'll report back.
Pretty sure that the final boss is some deep state swamp rat at the CIA that looks like this: https://prnt.sc/vosprm
Here's a tool someone just made me aware of. I believe it's an operating system that's made specifically for OSINT usage.
Also, it's worth understanding ways you can do more customized searches with engines like Google, Bing, and DuckDuckGo. Ultimately, ones that have censorship bias are going to be a waste of time anyway. For example: you cannot find Proud Boys website through Google by their name, but you can with DuckDuckGo.
You can dislike my post all day - it doesn't change the fact of what we are doing. We're here for users that want to anonymously release information about election fraud. We aren't hosted on US based, liberal/big-tech-biased hosting. We are a team of cybersecurity, software development, and IT operations professionals - oh and we're all members of TDW and other various websites. Don't be like the MSM and just dismiss us as "risky" or "fake". There's plenty of people out there that will vouch for what we're doing.
You aren't required to log in. You can view and post anonymously.
This is data submitted anonymously by other users - many from tdw and other websites. We're backing up all evidence of election fraud. This is one of many high profile releases we've had submitted in the last few days - and there's much more - that's going to be released.
No more risky than a .win link? We've built quite a following of users, many from TDW. We are a legitimate website here to allow users to anonymously submit evidence of election fraud. We're backing up data that's being shared on third party hosts (FB, Twitter, GoFile, etc.) that have removed evidence.
Yes but it's in early development stages, so obviously there may be issues:
https://discuss.ipfs.io/t/how-censorship-resistant-is-ipfs-intended-to-be/7892/5
Take a look at this IPFS post. There is no "perfect" solution right now. I'm 100% for diversity in using these technologies. But the fundamental way data is stored and retrieved with ZeroNet makes it very hard to have widescale implementation. I'm not saying users won't use it - but it adds a layer of complexity for new users.
You're talking about a software that is fundamentally different than 99.99% of webstacks out there. You'd have to build entirely around ZNet. It's great in theory but it's not something that's going to be widely adopted.
One last option I'll mention:
DDoS-Guard.com does essentially the same thing as CloudFlare. That's another option. Finally, if nothing else, setup your own http filter / reverse web proxy with nginx (and maybe litespeed) and drop CF altogether. There's hosts that can more than handle the traffic (legitimate or not).
ZeroNet would require every third party user to store and download copies of the website. It's great in theory but it isn't realistic for most users who don't understand how the software works. UnstoppableDomains.com and IPFS is probably a better approach since most browsers have support for .crypto domains.
Also @TDW staff, this leads me to my next point - .Crypto and .Zil domains are one time purchases and can be stored in cold storage. If you're looking for redundancy, this is an option - even if it's just a static page to update people to any new domains. If you can take the time to integrate with IFPS, you'd have a great solution to utilize there.
Also if the TDW staff is interested in meeting with some of our team to discuss about some disaster recovery / business continuity strategies to help prevent (or at least alleviate) some of these issues, we'd love a chance to talk further. It's going to take proactive approaches to prepare for what's coming.
Hey guys, staff member from https://RiggedElection.io
We've been working on this for some days now. We just got our tor hidden service setup - so if traditional DNS routing is blocked by major ISP's, we do have a tor hidden service configured, and we will be adding an i2p service over the coming days. Long term, we are planning to incorporate IPFS for our backend and hopefully work out a solution with an immutable database. We've got a great team of fellow Patriots working on this together - but we're always looking for more to join us and help us to backup evidence of election fraud. We upload 100% of everything to our website. We're hosting on a bulletproof server in an undisclosed location. You can view and post anonymously, and if you register, you control 100% of your data. Please help us archive this important information.
We've been saying the same thing since day 1:
RiggedElection.io
We've been working to backup evidence for days. We just got our tor hidden service live and we'll be adding i2p in the coming days. Longer term our hope is to move entirely into IPFS and (possibly) create a immutable database to prevent the level of censorship we've seen over the last few days.
As a cybersecurity professional, I can't help but agree that this is likely going to happen. The signs are there.
hook it up Heyzeus.
I agree, 100%. Big decisions have big consequences.
gtfo of here commie scum
This might be the biggest news of the day in my opinion. And the fact that this happened hours ago and our media haven't even mentioned it is staggering. The media censorship is happening.
Repost this on RiggedElection.io - it's already being censored. Pastebin and others are deleting your data.
They cheated then too - but they underestimated the amount of support that would turn out for Trump. So this time around they wanted to make extra sure.
Screenshots of root folder PDF's:
https://prnt.sc/votvjh
https://prnt.sc/votvx9
https://prnt.sc/votw34
https://prnt.sc/votw83
Screenshots of folders with additional PDF's and files:
https://prnt.sc/votwoq
Here's some screenshots of some payments being mentioned - probably from CCP:
https://prnt.sc/votwg1