Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: ldish

The spreadsheet from Mary does not stand up to scrutiny. Practically none of the IPs have anything to do with voting locations. MAC addresses show up, a practical impossibility.

I’d be happy to be shown wrong.


49 posted on 02/05/2021 7:39:24 PM PST by Chaguito
[ Post Reply | Private Reply | To 12 | View Replies ]


To: Chaguito

ugh, if you are right! THE TEAM has been had again, credibility?


65 posted on 02/05/2021 9:00:35 PM PST by ldish (WAS DEC 6th-Last OPP? NO-but we CONSERVATIVES now know we should've been there!)
[ Post Reply | Private Reply | To 49 | View Replies ]

To: Chaguito

Well he’s shown quite a bit of evidence. Since you have made a point to state it’s not credible....perhaps you can offer info to back up your accusation ?


69 posted on 02/05/2021 9:19:11 PM PST by HollyB
[ Post Reply | Private Reply | To 49 | View Replies ]

To: Chaguito

I will respectfully disagree with you; please consider the following - we are agreed that for an average hacker capturing the Mac Address would be normally impossible.

But you may recall that there was a note about malware being already in the network. It may be that it collects and transmits Mac Addresses in addition to collecting credentials - we just don’t know. It might do this in order to be able to uniquely identify machines for later attacks after DHCP leases have expired. Once you have something executing WITHIN the target network, issuing ARP requests to gather MAC addresses is a piece of cake; as is setting the network card into promiscuous mode and just building a list (to egress periodically).

We also don’t know what tools the national security apparatus has at its disposal. Since we don’t know, we can’t be sure that at some layer inside the TCP/IP stacks that the Mac Address isn’t somewhere in there too...perhaps encrypted or in a compressed section - or even in the “unused” sections. We don’t know whether or not they get feeds from ISPs that enable them to cross reference IP addresses during specific time frames with MAC addresses that are the last hop to the customer from the ISP’s perspective.

We don’t know what we don’t know: so you have raised a very valid doubt, but that’s not enough to invalidate the possibility that our security agencies may have mechanisms to capture this identifier that we are just not yet aware of.

If your friend has performed specific DNS lookups on the specific static IP addresses and are able to determine who owns them (via whois, etc...) and are ALSO able to PROVE they were never leased via DHCP to a voter location, that would be convincing proof to debunk the allegation - but you would need a large representative sample with all the specifics.

The inability of both Coffee county to reproduce the numbers on election night - that’s just unbelievable given that computer systems are supposed to be deterministic - and strong reason to believe in fraud. Then we have the many illegal acts, and video evidence that ballots were dumped after legal deadlines were past (almost certainly fraudulent to begin with based on the statistical distributions), states breaking their own laws, the sky high rate of manual mass adjudication, voting observers that were being systematically prevented from meaningful observation, and so on...


106 posted on 02/06/2021 2:50:13 PM PST by mbj
[ Post Reply | Private Reply | To 49 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson