This is what I do - and the info presented in legitimate! Keep scrolling to the bottom to see what threat hunting can provide - if they actually have the full traffic and if that traffic was plain text then they have the full steal of the election... even if it was encrypted - it can be decrypted by NSA or other similar types and proven where and when it was sent. the digital footprint in this case is huge.
Isn’t this whistleblower the very same guy who years ago claimed he had 47 hard drives of super secret CIA information? Montgomery?
This is huge, and I can’t thank you enough. This week has been dicey.
If you know your business, and this is real, then this should do it.
Then why hasn’t any of this been introduced in any of the lawsuits? You can’t introduce new evidence at the Supreme Court level. They rely on the record established in the trial court. How do they intend to use this evidence. If they are counting on state legislatures to do the right thing we are screwed.
Does anyone have a military biography of Pete Waldron? Something that shows education, dates of service, assignments, etc?
That seems pretty important to know.
The other problem is he’s looking at traffic from dominionvoting.com which is their corporate network. There’s no reason state voting data would be on that network at all.
I’m tellin ya right now... It’s gonna be a damn miracle if Trump wins this election. The fact that this evidence is crystal clear, and the DOJ still hasnt done sqwat, blows my mind. To think just how bad this country has become with corruption, truly disturbes me...
Dec. 1 news
Domain Name: dominionvotingsystems.com
Registrar URL: http://www.godaddy.com
Updated Date: 2020-05-26T15:48:58Z
Creation Date: 2020-05-26T15:48:57Z
Registrant State/Province: Hunan
Registrant Country: CN
A domain registered in China. Not sure why that is significant.
Do we give it to the Supreme Court?
Data would have never gone over the wire clear.. so if they have it, they also have to have the private key to decrypt the packet as well which implies they also have (or had) at some point access to the server as well and got the key from there.
If they were sending data clear text over the wire then nothing can be trusted in terms of data.. because man in the middle could have intercepted and modified it before it reached its destination
Bttt.
5.56mm
ping