Skip to comments.Attention Trump Campaign: Green Party Candidate Jill Stein Won Groundbreaking Case in October — Gives Campaign Right to Examine Voting Machine Source Code
Posted on 11/27/2020 2:55:53 PM PST by doug from upland
It took Jill Stein four years to win this court case. After witnessing the historic level of fraud in this year’s election it makes us all question the numbers in past elections.
In 2016 Libertarian voters kept Donald Trump from adding New Hampshire, Minnesota and Maine to his electoral haul. Were those actual Libertarian votes in 2016 or were they switched from Trump to Gary Johnson to prevent him from winning those states?
(Excerpt) Read more at thegatewaypundit.com ...
Dr. Jill Stein
Oct 30, 2020
BIG NEWS: the #Recount campaign has won our court fight in Wisconsin, overcoming the final obstacle to a groundbreaking examination of voting machine source code by defeating voting machine vendors’ attempts to gag us from telling the public what we find.
If the machines were not secured immediately after the election, the software code could’ve been changed by now.
If they maintained it on GitHub that could track the changes, but I suspect they wouldn't be using it.
Ya know after a while I’ve come to think of the deep state as a single entity, the CIA and DOJ and FBI too.
But these are Real People who for reason have no problem with destroying the US while making a fortune.
Where did these people come from and did they start out in service being the monsters that they are now?
Or were they brainwashed from very early on.
Just thinking aloud. Which is usually not good :)
You aren’t the only one
We already know it is a client server system. I assume the clients are as dumb as possible. The bad code is on a server halfway around the planet.
People who really know how this stuff works usually don’t have much patience for people who don’t :)
I’m the latter :)
I use a lot of software...but that’s an end user.
I know nothing for programming and what is possible and what’s not.
That’s why it’s great when folks here who do know try to explain it in the simplest terms possiblee.
And they’ve done a damn good job so far.
But I will never grasp it all.
As long as the ones that need to understand it to bring lawsuits do, that’s good enough for me.
Fraud software would have been removed with no audit trail.
When you’re working with software you build source code into an executable.
That executable can be run through a function to create a checksum. This is like a fingerprint for the software.
If you take the same software and you build it again you should get the exact same fingerprint.
This is how you validate software. If it does not give the same checksum then something changed.
But then don’t you need to physically have that software to forensically analyze it?
I don’t even know if that question makes sense :)
In order to handle that kind of data , it has to be server based, which in essence is cloud based , which means the clients only see what the user has access to see or search for what they have access to. The reason it has to be server based, is because it will have to load balance the processing’s between multiple servers, as the requirements go up, the server power is added,, now,, it seems from all of these records being filed,, and i have read a few, the exhibit 15 ont he MI filing says all it needs to say to me about this and I’m in a cloud computing industry, i recently went through a CISA audit .. we provide services to government entities ,, of coarse we host our data in the same cloud that the government does, not only does it provide full transparency , it gives us all the security of the server hosted system more than required by our laws. These machines were connecting to their own clouds, which connected to Iran and China. Like I said, thats enough for me,
“We watched them do it”.....”We have it all”....
Exhibit 109 The last paragraph of 109 is not an understatement.
“Where did these people come from and did they start out in service being the monsters that they are now?”
I suspect first a small sin, that leads deeper and deeper by blackmail. I suspect you can ask John Roberts.
Source code is like a text document. There can be many copies of it, but when you build it it becomes an executable file.
If you want to have a secure system you must match source code to executable file. You do that by building the source code and creating a checksum.
Once you build it to be released and used, you cannot change it. If you do change it, it will not build and create the same checksum anymore.
Every machine that was used should be tested to see if the executable code checksum (fingerprint) matches. If it doesn’t then somebody put different code on that machine.
Of course, by now the source code could have been sanitized.
And drudge maybe.
And so many more.
Once they have a photo or video or audtio...you’re owned.
And I always told and tell my nephews that all you have to do is go a few feet off the narrow path and if you’re lucky, you will find your way back to it years later.
But often, never.
Everything gets easier to justify.
And Roberts is disgusting.
It would be much easier to count how many elections didn’t have any voter fraud/any other possible mistakes happen, throughout all past U.S. elections that involve a large number of voters. Ditto, all other free elections that took place, worldwide, that involve a large number of voters. The only thing much more difficult would be to, accurately, count how many times something unconstitutional happened, from day one that the U.S. Constitution was, officially, put into action, onwards.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.