LadyDraza
8.11K subscribers
630 photos
141 videos
335 files
874 links
Download Telegram
Words matter. Secure may mean pre-determined outcome. Used in a sentence: Due to all the planned foreign interference, Biden's win was totally secure.
https://t.me/KanekoaTheGreat/825
When the method used to shape the outcome is completely laid out, it relies on a single thing: There was too much apathy in the American voting public. Manipulation of the voter roll entries of people that didn't come out to vote gave the control algorithm Dr Frank's credit line. If everyone cared more about who was going to be elected and showed up on election day, this type of manipulation would not be possible. Other types would be, but not the type seen in the 2020 election.
Forwarded from iWill214
From my standpoint I am saying if there was that much data involved means it does not make sense and I am very scared for Mike and the overall cause. He said someone brought this data to him jan 9, I think and it could just be another part of the setup. He said he has people hired that worked for the government, that does not give me comfort. He said you cannot alter PCAP data and I know that it can be altered. I could write a simulator program that could create a PCAP file that represented anything I wanted to with timestamps from anytime in the past or future. This is typical for testing hardware and software systems. I have found comments from others that have common concerns. Is there anyone I can contact that understands the actual data and can explain all of my issues? Waiting until the symposium will be too late, I feel, damage may be done.
LadyDraza
From my standpoint I am saying if there was that much data involved means it does not make sense and I am very scared for Mike and the overall cause. He said someone brought this data to him jan 9, I think and it could just be another part of the setup. He…
I woke up thinking I had answered your concerns poorly by trying to explain what I am suspecting. The better answer is that all of us have your concerns. I am full of hope that the people that collected the information documented everything well and that all is good. But, that is the point of the symposim. Many cyber security experts will come from the public and verify and see for themselves. Now, Mike has already had some amazing cyber-forensic guys look at this for months - as shown in Absolute 9-0. I don't think he would ask for this public challenge if he wasn't pretty darned sure that he knows the answer to our concerns, even if we don't yet. That is my thought and my hope.
Forwarded from PaddyMac
So in other words LadyDraza; it didn’t matter how many came out to vote. What mattered was how much was left over in the voter registration totals for use. The credit line (which I’ll call the reserve). Is that Correct?
Forwarded from PaddyMac
Which is why the vote totals are so high nationally.
Forwarded from PaddyMac
And the vote totals were driven by Trumps turnout.
I love this! I think the smartest people on Telegram came here to talk about this! You guys get it! Thank you!! Thank you for caring!!!
YouTube link to the AZ news!: https://www.youtube.com/watch?v=7OZmNbBDQ6k
Ben Cotton just used the term script-kiddie. This is the term used for someone who is interested in hacking computers, but doesn't have deep cybersecurity education. They typically just copy scripts that are available on the internet that someone with higher skills wrote and use them. They just said a script-kiddie could access these machines in 10 min.
NIC: Network interface card. That is the piece of the computer that had the port where you plug the ethernet cord in.
MAC Address: Media Access Control address. This is important information. Any device that connects to the internet (NIC, cell modem...) has a MAC address. The MAC address is made up of 2 parts. The first part is a code that tells the manufacturer and device model and the second half is a serial number. So each internet connection from a given machine will have unique MAC addresses
SPLUNK is a fantastic program that would have been installed on one of the machines in this network. It montors and records your network and would show all of the network communication and other information. www.splunk.com
Important thing about the calibration is it tells the scanner where everything is on the sheet so the machine can identify the location that voting bubble would be at. If the calibration mark is intentionally printed in the wrong location...the machine will look for the filled in bubble in the white area next to the filled in bubble. Will say, "I can't read this vote" and zoooommmm...off this ballot goes for adjudication.
Based on what he just said...the data shows a log of voting adjustments up AND down in the voting totals...into December and some into Jan 2021. This is part of what Dr. Frank called the "clean up phase"
This is Dr. Frank's slide 👆🏻
So...important point here. You can totally have a network of computers that are connected to each other but none of them are connected to the internet. This has been a lot of the claims to the public that the machines were networked, but isolated. They still get IP addresses to be on the local network. But - if one of those computers are connected to the internet, even by another connection, like a cell modem connection, then suddenly they are ALL on the internet.
Forwarded from Cindy0419