The spreadsheet from Mary does not stand up to scrutiny. Practically none of the IPs have anything to do with voting locations. MAC addresses show up, a practical impossibility.
I’d be happy to be shown wrong.
ugh, if you are right! THE TEAM has been had again, credibility?
Well he’s shown quite a bit of evidence. Since you have made a point to state it’s not credible....perhaps you can offer info to back up your accusation ?
I will respectfully disagree with you; please consider the following - we are agreed that for an average hacker capturing the Mac Address would be normally impossible.
But you may recall that there was a note about malware being already in the network. It may be that it collects and transmits Mac Addresses in addition to collecting credentials - we just don’t know. It might do this in order to be able to uniquely identify machines for later attacks after DHCP leases have expired. Once you have something executing WITHIN the target network, issuing ARP requests to gather MAC addresses is a piece of cake; as is setting the network card into promiscuous mode and just building a list (to egress periodically).
We also don’t know what tools the national security apparatus has at its disposal. Since we don’t know, we can’t be sure that at some layer inside the TCP/IP stacks that the Mac Address isn’t somewhere in there too...perhaps encrypted or in a compressed section - or even in the “unused” sections. We don’t know whether or not they get feeds from ISPs that enable them to cross reference IP addresses during specific time frames with MAC addresses that are the last hop to the customer from the ISP’s perspective.
We don’t know what we don’t know: so you have raised a very valid doubt, but that’s not enough to invalidate the possibility that our security agencies may have mechanisms to capture this identifier that we are just not yet aware of.
If your friend has performed specific DNS lookups on the specific static IP addresses and are able to determine who owns them (via whois, etc...) and are ALSO able to PROVE they were never leased via DHCP to a voter location, that would be convincing proof to debunk the allegation - but you would need a large representative sample with all the specifics.
The inability of both Coffee county to reproduce the numbers on election night - that’s just unbelievable given that computer systems are supposed to be deterministic - and strong reason to believe in fraud. Then we have the many illegal acts, and video evidence that ballots were dumped after legal deadlines were past (almost certainly fraudulent to begin with based on the statistical distributions), states breaking their own laws, the sky high rate of manual mass adjudication, voting observers that were being systematically prevented from meaningful observation, and so on...