Posted on 08/07/2021 12:24:06 PM PDT by packagingguy
On August 10, 2021, Mike Lindell will be hosting a Cyber Symposium where he will lay out all his data about the 2020 elections. His claims are numerous but the main one is that we were under cyberattack by the CCP.
He claims that his "white hat hackers" have collected all the evidence needed to prove Donald Trump won re-election.
He states that all the dead people voting, people voting from out of state, etc. was done using 2010 election rolls. The people who voted out of state indeed did not, but their names were needed to electronically alter the vote tallies.
😳😄
I hate the situation we’re in and I hate all the lies we’ve been told by our own side. That being said, we should give Mike a chance.
I read somewhere that Dominion uses Microsoft Access. If this is true, it would help explain how it was done.
If you are not familiar with Microsoft Access, it is a desktop PC database with no transaction log and no real security to speak of. Any modification to the tables of a Microsoft Access database by, say, a surreptitiously inserted USB stick running a small Visual Basic script, would be essentially untraceable.
Mike, we love your pillows. We really do. Two kings, matching pillowcases. Great night’s sleep. But you really gotta find a different subject, if not hobby. Stick to shilling your bedding. It’s actually decent quality.
All that would be needed is to access one of the MANY devices between the end points. The closer to the core of the Internet the more traffic would have to be reviewed. As such, it becomes a problem of scale (assuming you have access first). Conversely, the closer you are to one of the endpoints, the easier it is to find the data. Issues of access still apply.
Allow me to paint an example
PC connects to local switch, switch to local router, router to ISP’s router and so on to the Internet core.
If you hack (compromise) the PC, then it is trivial to look a the inbound vs Outbound traffic. However, if the switch is the point of compromise, you have to find the PC’s traffic inside of the stream that has everyone else on the switch. Same for router, same for ISP router ... etc. At each level, the background traffic grows in volume but the target data remains the same. Somewhere in that mix it becomes a needle in a haystack. Possible but unlikely.
Understand my background. I am a white hat hacker and I get paid to compromise banks and financial institutions. I have never been stopped in 25 years. I would like to think that it is because I am some kind of Uber hacker but the truth is ... well there is just so much that needs to be protected. Further, there are so many ways in, that most enterprises can’t afford to have someone dedicated to protecting their assets all the time.
HOWEVER
What is stated as being in possession - pcap or packet captures. Normally, this capture has to be set up ahead of time to record the flows while they occur. And they can generate a LOT of data. Even if you use Netflow data (available from switches and routers) that does not include the actual packet data and only captures the flow information, it is still a fairly large set of files. This is why most enterprises and ISPs only use Netflow for troubleshooting and dont have it turned on as normal operations. Collectively, this makes me think that what is stated as being evidence may not be “right”. But I just simply dont know the details and I am therefore reluctant to say anything other than I remain skeptical.
Hope so.
Really?
I have gone numerous times into the metadata to retrieve Emails for the Army and State Department which classified above the access level of the system.
I will have to check into this.
He may have sufficient evidence, but it’s not going to overturn a damned thing.
PING!
All the nay sayer’s on this threat need to understand something about America today.
If you cannot a case before a judge... judges oftentimes refuse cases, then you will have no legal standing in presenting information.
Let’s say your daughter is raped and you have video evidence, DNA, sperm, blood samples and witnesses, BUT you cannot get past the police logging the case. With no trail or getting a case before a judge, the perp walks. It is really that corrupt in these here United States.
And your evidence for this is ?
The global company I recently retired from had NetFlow turned on worldwide. I could pull up logs from months in the past to search for errors, address pairs, endpoints, paths, etc. LOTS of info captured.
That said, I question where he got all of the states' logs from. Their traffic does not all go through a common device, as far as I know, so would have to be from different sources or from "Echelon" or somesuch.
I do hope he is successful, the symposium starts this Tuesday, Aug. 10 and ends Thursday, Aug. 12.
one plus God wins the war. Have faith.
I would have a lot more faith if we controlled the army...
:-)
Let’s give Lindell the benefit of the doubt. Let’s see what he has or doesn’t have. Then the pros here on FR can step in and judge it for what it is, or isn’t.
now I can reply to you...weird. Anyway, this is incredibly interesting and worth the read
Devolution - Part 1: https://patelpatriot.substack.com/p/devolution
Devolution - Part 2: https://patelpatriot.substack.com/p/devolution-part-2
Devolution - Part 3: https://patelpatriot.substack.com/p/devolution-part-3
Devolution - Part 4: https://patelpatriot.substack.com/p/devolution-part-4
Devolution - Part 5: https://patelpatriot.substack.com/p/devolution-part-5
Patel Patriot’s Telegram Channel: https://t.me/patelpatriotchat
What if all of Mike’s computer info is or will be hacked?
Thank you everyone for your input. Now we can get a clearer picture of whether Mike is right or not. I have been looking for months to find how he got his information without success.
Indeed. I think Mike believes everything he hers and really doesn’t understand a whole lot.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.