Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: stars & stripes forever

CodeMonkeyZ

Mike Lindell’s PCAPs are very important and might be absolute proof of a cyber operation that targeted the election.
I say “might” because PCAPs are a very specific thing and would need to be proven with analysis before we know for sure.
91.1K views
19:51

CodeMonkeyZ
PCAP is an abbreviation for “Packet Capture”.
Data travels over the internet in packets that can be easily intercepted with specifically designed software or hardware.
87.4K views
20:04

CodeMonkeyZ
Packets are relayed over many nodes and jumps between the origin and the recipient.
Any of these relays or networks in between are able to capture packets which pass through.
86.9K views
20:06

CodeMonkeyZ
Just having 100 Gorillabytes of packet captures means nothing on its own since packets are being sent constantly back and forth over the internet.
The fact that you are able to read this message means you are receiving packets in real time.
82.6K views
20:09

CodeMonkeyZ
Since packets are sent back and forth constantly with any amount of jumps or networks in between, anybody along the route could theoretically capture the packets holding your online banking password and steal your money.
81.0K views
20:11

CodeMonkeyZ
Now why isn’t everyone’s online bank account getting hacked every day by people who get the smart idea to run packet capturing software?
80.0K views
20:14

CodeMonkeyZ
TLS, or Transfer Layer Security, encrypts your data before sending it over the network.
If anybody captures your packets while youre using TLS, then they just see a garbled mess.
80.9K views
20:18

CodeMonkeyZ
Only the recipient and sender of the packet will know what the packet contains if TLS is used.
80.8K views
20:19

CodeMonkeyZ
Now let’s think for a second about Mike Lindell’s PCAPs.
78.6K views
20:19

CodeMonkeyZ
If Mike Lindell has PCAPs that prove there was a cyber operation that targeted the election networks, then first we need to think about how he got the PCAPs.
81.0K views
20:22

CodeMonkeyZ
If we assume TLS was enabled, then Mike Lindell would only be able to get intelligible PCAPs if the person logging the packets was either the sender, receiver, or cracked the encryption of the packets.

If Mike’s team was able to crack TLS then we will have a major problem for anybody who uses the internet.

There are man-in-the-middle techniques which could grab packets thought to be end-to-end encrypted but very few groups are in position to do so. (see: nsa, cloudflare, etc).
85.9K views
20:29

CodeMonkeyZ
Now let’s assume that the sender/receiver of the packets didn’t use TLS.

If Mike’s team was able to run the packet capturing mechanism somewhere along the network routes that the election data took, and TLS was not enabled, then we can essentially conclude that

He. Has. It. All.
96.0K viewsedited
20:32

CodeMonkeyZ
The barrier to entry to use TLS is very low. It takes but a minute to enable on a server or software, and takes seconds as an end-user (https is TLS, http isnt).
81.3K views
20:35

CodeMonkeyZ
If election management software sent packets over the internet without at least enabling TLS, then that indicates that they are careless at implementing security at the least, and might even be potentially malicious.
83.1K views
20:37

CodeMonkeyZ
I have not seen Mike Lindells PCAPs and don’t know the circumstances and data he has, but this could potentially be HUGE if he is able to verify and properly analyze what happened on the networks on election night.
87.9K views
20:39

CodeMonkeyZ
Forwarded from
Kathy Dannenberg

Packets consist of two portions: the header and the payload. The header contains information about the packet, such as its origin and destination IP addresses (an IP address is like a computer’s mailing address). The payload is the actual data

https://t.me/CodeMonkeyZ/854 (scroll up)


253 posted on 07/22/2021 10:20:52 PM PDT by bitt (<img src=' 'width=500>)
[ Post Reply | Private Reply | To 171 | View Replies ]


To: bitt

Code monkey is pretty spot on, however he is trying to solve a puzzle using the knowledge he has gained though out the years. He is missing the obvious, there are encryption breaks. It is always unencrypted at the end. Keyloggers are a good way to get unencrypted data and even way back in the day listening to the sound of typewriters could tell you what was being typed.

If you knew the targets before hand you would have placed the capture devices at the end of the end to end Encryption to avoid the cracking.

Night all.


257 posted on 07/22/2021 10:33:35 PM PDT by CJ Wolf ( what is scarier than offensive words? Not being able to say them...God wins. Trump always wins. . )
[ Post Reply | Private Reply | To 253 | View Replies ]

To: bitt

Code monkey is pretty spot on, however he is trying to solve a puzzle using the knowledge he has gained though out the years. He is missing the obvious, there are encryption breaks. It is always unencrypted at the end. Keyloggers are a good way to get unencrypted data and even way back in the day listening to the sound of typewriters could tell you what was being typed.

If you knew the targets before hand you would have placed the capture devices at the end of the end to end Encryption to avoid the cracking.

Night all.


258 posted on 07/22/2021 10:33:40 PM PDT by CJ Wolf ( what is scarier than offensive words? Not being able to say them...God wins. Trump always wins. . )
[ Post Reply | Private Reply | To 253 | View Replies ]

To: bitt

:: If we assume TLS was enabled, then Mike Lindell would only be able to get intelligible PCAPs if the person logging the packets was either the sender, receiver, or cracked the encryption of the packets. ::

Possible scenario, given past information:

What if the “recipient” in this case is the Dominion Server setup in Spain/Germany?


280 posted on 07/23/2021 3:14:55 AM PDT by Cletus.D.Yokel (Patriots, stop looking at the politicians as enemies. Look at the complicit Legacy Media.)
[ Post Reply | Private Reply | To 253 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson