Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: Chaguito

I will respectfully disagree with you; please consider the following - we are agreed that for an average hacker capturing the Mac Address would be normally impossible.

But you may recall that there was a note about malware being already in the network. It may be that it collects and transmits Mac Addresses in addition to collecting credentials - we just don’t know. It might do this in order to be able to uniquely identify machines for later attacks after DHCP leases have expired. Once you have something executing WITHIN the target network, issuing ARP requests to gather MAC addresses is a piece of cake; as is setting the network card into promiscuous mode and just building a list (to egress periodically).

We also don’t know what tools the national security apparatus has at its disposal. Since we don’t know, we can’t be sure that at some layer inside the TCP/IP stacks that the Mac Address isn’t somewhere in there too...perhaps encrypted or in a compressed section - or even in the “unused” sections. We don’t know whether or not they get feeds from ISPs that enable them to cross reference IP addresses during specific time frames with MAC addresses that are the last hop to the customer from the ISP’s perspective.

We don’t know what we don’t know: so you have raised a very valid doubt, but that’s not enough to invalidate the possibility that our security agencies may have mechanisms to capture this identifier that we are just not yet aware of.

If your friend has performed specific DNS lookups on the specific static IP addresses and are able to determine who owns them (via whois, etc...) and are ALSO able to PROVE they were never leased via DHCP to a voter location, that would be convincing proof to debunk the allegation - but you would need a large representative sample with all the specifics.

The inability of both Coffee county to reproduce the numbers on election night - that’s just unbelievable given that computer systems are supposed to be deterministic - and strong reason to believe in fraud. Then we have the many illegal acts, and video evidence that ballots were dumped after legal deadlines were past (almost certainly fraudulent to begin with based on the statistical distributions), states breaking their own laws, the sky high rate of manual mass adjudication, voting observers that were being systematically prevented from meaningful observation, and so on...


106 posted on 02/06/2021 2:50:13 PM PST by mbj
[ Post Reply | Private Reply | To 49 | View Replies ]


To: mbj

Thanks. The question is whether the information in the spreadsheet comes from a govt agency, and if so, how and to whom.

And how one of the MAC addresses does not exist in a Mac lookup. But in an internet search appears in one place: Patrick Byrne’s website deepcapture.com.

I hope Mary Fanning is genuine.


111 posted on 02/06/2021 8:07:47 PM PST by Chaguito
[ Post Reply | Private Reply | To 106 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson