Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: FR_addict

If TLS was used in the packet transmission, then either the sender was capturing all traffic prior to sending it, and hence prior to encryption, and provided him the unencrypted packets, or a receiver captured all received packets after decrypting them and provided the received packets to him.

Or, the operation was being done as a man in the middle attack and somebody involved in the attack is the source of the unencrypted PCAPs.

Or, an older, insecure version of TLS/SSL was used and the encryption was broken using known vulnerabilities in the older protocols.


5 posted on 08/08/2021 8:23:22 PM PDT by nhoward14
[ Post Reply | Private Reply | To 1 | View Replies ]


To: nhoward14

I was just assuming TLS encryption was used, but then again these voting machine companies claim that their machines are not even connected to the Internet. So who knows. Maybe they didn’t even use data encryption. Then Mike would have the metadata and the election voting data.

Just have to figure out how someone was able to capture all the intrusions into the election machines in all the States.


9 posted on 08/08/2021 8:44:09 PM PDT by FR_addict
[ Post Reply | Private Reply | To 5 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson