Posted on 12/02/2020 12:24:42 PM PST by Glez
Anyone have the image and/or a link to it for Army Col. Waldron's presentation at Rudy Guliani's AZ voter fraud hearing a couple days ago? It shows dominion vote machine traffic going to Frankfurt and other parts of the world.
The title of the image in the streamed video is "Phil Waldron dominionvoting.com internet traffic analysis Nov 3rd 2020"
Its annotated "Spiderfoot reconnaissance tool analyzed primary and sub domains" and was run against the domain dominionvoting.com
Is it in the video??
Just screen grab, if so.
in the embedded court docs
I work in cyber security (financial markets) and want to point out the use of a specific word -”vulnerabilities”. The good Colonel uses it quite often in his presentation.
Within the Cyber community, the use of that word indicates a very specific condition. It is not some vague condition that might be exploited. That is known as a “threat”. A “vulnerability” is a known, specific condition that:
- can be exploited
- or is known to be currently exploited
These exploitable conditions are used to gain unauthorized access to the underlying system. To me, this is a damn scary presentation.
Specifically: https://pbs.twimg.com/media/EoFrguhVkAAj_QQ.jpg
What the Hell?
That is one of the most incomprehensible graphs I have ever seen. I admit, I have never seen one like it, but with the color coding, it is nearly impossible to read.
But what it looks readily like to me, when one looks at the “Internet” group, there is a boatload of stuff going outbound.
If this were restricted to a local network with only a local server on site, a router, and all the machines connected ONLY to that isolated server) that did not allow outbound access, I expect one would not see the gold colored “Internet” disk.
Is that the way you would interpret this?
I work in financial services (large multinational bank) and when we say "vulnerability" to our I.T. leadership they interpret it as a specific condition that exists in our environment that will be exploited unless deliberate and decisive action is taken to eliminate it.
Sometimes that means remediation, sometimes that means extra controls to monitor the condition to see if there are attempted exploits and other times if it's serious enough, it means the system/server/platform that has the vulnerability needs to be removed from service as quickly as possible.
There is at least one vendor who's VPN hardware & software solution contains a very nasty vulnerability that many firms even outside of Financial Services are running away from as fast as possible.
You likely already know who I'm talking about.
Looks like what was in the video for sure. Good job finding it. 8>)
This is the link to Col Waldron’s diagram
It's a little clunky to follow but the trick is to read the numbered paragraphs that describe the information immediately below that paragraph.
https://www.courtlistener.com/recap/gov.uscourts.mied.350905/gov.uscourts.mied.350905.1.15.pdf
That’s it. Thanks.
It is in the video but not readable. I included an image in the post but it doesn’t seem to be displayed here. Not sure why.
That’s where I saw it initially and was looking for a good image.
That most definitely is what I’m looking for. When he presented it it seemed it was interactive as he moused over the data points.
There must be more to the diagram, because I don’t really get this one.
Yup, those are colored curved lines. No doubt about it.
I hope it is apparent to you, and everyone looking at the graph now, it in no way shows dominion vote machine traffic going to Frankfurt and other parts of the world. It is a load of nonsense, presented in a confusing way to hide the fact that it is a huge load of nothing. It is an embarrassment of a graph.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.