Skip to comments.The Audit of Dominion Voting Machines in Michigan: 14 Key Conclusions
Posted on 12/15/2020 9:45:20 AM PST by WTanner1776
Sometimes it’s hard to know what to believe. As you can read in my article on if John Roberts visited Epstein’s island, there is normally evidence for and against conspiracies. But, in this case, it looks like the audit of Dominion voting machines showed conclusively that the election results, in Michigan, at least, were fraudulent.
Votes were changed. Adjudication was used far more than normal and the logs surrounding it were wiped, as were the server logs. Suspicious software updates took place. The machines flipped votes. Who, and what, can be trusted?
The simple fact is that this audit makes it look like the election was stolen. In areas where similar Dominion machines were used, how do we know that those machines did not also flip votes? How can we trust the election results?
We can’t. A full audit of Dominion voting machines needs to take place. If Trump still loses, so be it. But we cannot rest until we know that the election results are valid. Right now, it appears that they are not. If the audit is to be believed, the election results are nothing if not fraudulent.
(Excerpt) Read more at genzconservative.com ...
I agree but will they do it. They should start immediately.
Did the auditing company attempt to recover the deleted logs from the image of the drive?
Only a complete simpleton would conclude there is “nothing to see here.”
And accept the “outcome.”
“For the good of the country” and all.
Does anyone have a good primer on the Dominion machines?
I had thought they were a touchscreen style machine, so I don’t understand what would need to be adjudicated.
Do they also use optical scanning of paper ballots for input?
Anyone else having trouble accessing the genzconservative.com site.
I am getting the Bill Gates “rim job” swirl.
Could be paranoia, but seeing more indications of denial of service on right leaning sites.
You can’t recover deleted files from the image - only from the drive itself (unless a program such as bleach bit is used to santize the actual magnetic cells).
The image includes only those bits and bytes in the registry, not those still echoed without reference on the actual hardware.
What is next, shop lifting not a crime? Pick pockets are not criminals? Non-violent burglary is OK?
I have a copy of the functional, manual. I think the issue is mail ins as they are paper and scanned in. The machine calibrate at 80% erreo so they error out. Go to adjudication where they can be changed. That is an issue.
“Could be paranoia, but seeing more indications of denial of service on right leaning sites.”
Me too, particularly on Twitter.
Thank you, that makes sense.
So, again, it’s the mail in ballots being used to implement the fraud. Those things are a disaster six ways from Sunday.
I guess I have to give the criminals some credit for creativity. This way they have a legit mail in ballot where the signature matches and everything, but the machine kicks it out of the count and a “referee” gets to decide how to vote it.
The entire population of mail in ballots in the states that used Dominion needs to be hand counted with monitoring.
Seriously, what are we going to do if this is all unwound in June, when Harris is in the Oval Office? The Congress needs to stand up and delay approving the electoral college until audits can be finished.
I’d rather have President Pelosi for a couple of months than have Harris for 4 years.
Sure you can. Dump the image to a working copy, mount it, and you can do anything you want to to it. You'll still have an archival copy of the image to refer back to as well. This is standard procedure when doing computer forensics. It is not rocket science.
I would say it depends on whether the image is a hardware or software image. If software, the registry - the list of segments occupied by actively referenced file pieces - would only reflect the content of the registry, as opposed to the hardware itself, which will have all of the software-recognized files, plus segments of or complete files which have been deleted from the registry.
Hardware imaging software replicates every memory location on the device. Software imaging only replicates those files recognizable from the registry.
The problem lies not in the manipulation of the image, but rather in the manner in which the image is produced.
In other words, these were features, not bugs, in the Dominion Voting System. If this cluster isn’t thoroughly investigated and publicly demonstrated, and the people who knew about this and allowed their deployment aren’t prosecuted, the Dominion system will continue to be used.
Oh, and the method described by the report indicates they took a byte-for-byte copy of the drive. I've done this before myself to clone a drive. They actually described the way I'd take the copy. Boot up a computer with a Linux boot disk, then copy the image of the drive from one device to another. It can be done as simply as this:
dd if=/dev/sdb of=image_of_sda1.img
At that point you have a file that is a copy of every bit on the drive. You can, if you want use that image to clone to another device.
dd if=image_of_sda1.img of=/dev/sdc
Of course, you could also have just gone straight from one drive to another:
dd if=/dev/sdb of=/dev/sdc
Personally, I'd use the former method, as it gives you a copy of the entire drive as a file, that you can then easily mount in read only mode, or copy to another device to actually boot up and look at as closely as you want. This kind of stuff is done every day, and is pretty straightforward. Granted, the image file is going to be as large as the original file, which might make it a little bit clunky to work with, but that's what you want, a byte for byte copy of the data exactly as it existed on the drive.
Well, Romney already chimed in, so you're correct.
Thanks for the additional information. I am following this while still working, and haven’t yet read the whole report. A byte for byte close is what I am calling a “hardware” copy.
I will be honest, however, in that I am unsure if a hardware copy still captures ghost images of files where the magnetic statis is ambiguous. One wouldn’t think that this affects this particular effort (the images on the disk should still be fresh), but I am not in this narrow part of the field, so I do not know.
I do know that previous election logs should NOT be available if the current logs are not, presuming there is not an option to disable logging (which is a signal of the intent to commit fraud, anyway).
So, how does this time in with the count being stopped on election night and the subsequent vote spike for Ol’ Joe?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.