good luck with that
Alex Halderman has three degrees in computer science from Princeton University; does security analysis of voting precinct programs in the US (and in other countries). He’s teamed for forensics analysis w/ the California Secy of State, in Antrim County, Michigan, and in Louisiana.
Alex Halderman’s Georgia report showed the vulnerability of ballot marking devices on voting machines on which Dominion installs its software and showed different ways one can access vote totals through vulnerabilities within the ballot marking device with nothing more than a Bic pen:
<><>the ballot marking device and the Georgia printer were at the front of the courtroom
<><>he exposed the first vulnerability by pressing the power button down 5 maybe 7 sec w/ a Bic pen
<><> that puts the voting machine in “safe mode” to effect a reboot
<><>the judge witnesses the screen display
<><>an image of the button being pressed w/ a pen to ostensibly launch the reboot.
<><>but before the reboot occurs, the computer asks if he wants to go into safe mode; he selects “Yes.”
<><>that way the computer doesn’t shut down or reboot;
<><>the voting machine now in “safe mode” allows the voter fraud
<><>it allows opening up voter files to change the content of files and change vote totals.
<><>Halderman also demonstrated how to fix the results and rig the count during an actual election.
<><>this is done remotely, by installing already pre-programmed applications for the desired result,
<><>pre-programmed applications are infinite
<><>applications can be programmed to do whatever you tell them to do.
<><>hypothetically you’d vote for George Washington,which is then recorded, even actually displayed,
<><>but is recorded as you having voted for Benedict Arnold.