Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Looking for Domion IP Traffic Diagram From Col. Waldron
https://rumble.com/embed/v8vw1n/?pub=4 ^ | 11/30/20

Posted on 12/02/2020 12:24:42 PM PST by Glez

Anyone have the image and/or a link to it for Army Col. Waldron's presentation at Rudy Guliani's AZ voter fraud hearing a couple days ago? It shows dominion vote machine traffic going to Frankfurt and other parts of the world.

The title of the image in the streamed video is "Phil Waldron dominionvoting.com internet traffic analysis Nov 3rd 2020"

Its annotated "Spiderfoot reconnaissance tool analyzed primary and sub domains" and was run against the domain dominionvoting.com



TOPICS: Computers/Internet
KEYWORDS: 2020; dominion; fraud
Navigation: use the links below to view more comments.
first 1-2021-25 next last

1 posted on 12/02/2020 12:24:42 PM PST by Glez
[ Post Reply | Private Reply | View Replies]

To: Glez

Is it in the video??

Just screen grab, if so.


2 posted on 12/02/2020 12:30:33 PM PST by Jane Long (Praise God, from whom ALL blessings flow.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Glez

https://www.thegatewaypundit.com/2020/12/breaking-exclusive-got-col-waldron-confirms-us-copy-election-night-data-traffic-packets-sent-overseas-frankfurt-video/


3 posted on 12/02/2020 12:43:48 PM PST by eyeamok
[ Post Reply | Private Reply | To 1 | View Replies]

To: Glez

in the embedded court docs


4 posted on 12/02/2020 12:44:18 PM PST by eyeamok
[ Post Reply | Private Reply | To 1 | View Replies]

To: Glez

I work in cyber security (financial markets) and want to point out the use of a specific word -”vulnerabilities”. The good Colonel uses it quite often in his presentation.

Within the Cyber community, the use of that word indicates a very specific condition. It is not some vague condition that might be exploited. That is known as a “threat”. A “vulnerability” is a known, specific condition that:

- can be exploited
- or is known to be currently exploited

These exploitable conditions are used to gain unauthorized access to the underlying system. To me, this is a damn scary presentation.


5 posted on 12/02/2020 12:47:29 PM PST by taxcontrol (Stupid should hurt - Dad's wisdom)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Glez

This? https://pbs.twimg.com/media/EoFrguhVkAAj_QQ?format=jpg&name=large


6 posted on 12/02/2020 12:48:20 PM PST by armyofprinciples (something's amiss)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Glez
Found here: https://threadreaderapp.com/thread/1333462308568240128.html

Specifically: https://pbs.twimg.com/media/EoFrguhVkAAj_QQ.jpg


7 posted on 12/02/2020 12:54:46 PM PST by Yo-Yo (is the /sarc tag really necessary?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

What the Hell?

That is one of the most incomprehensible graphs I have ever seen. I admit, I have never seen one like it, but with the color coding, it is nearly impossible to read.

But what it looks readily like to me, when one looks at the “Internet” group, there is a boatload of stuff going outbound.

If this were restricted to a local network with only a local server on site, a router, and all the machines connected ONLY to that isolated server) that did not allow outbound access, I expect one would not see the gold colored “Internet” disk.

Is that the way you would interpret this?


8 posted on 12/02/2020 1:04:51 PM PST by rlmorel ("I’d rather enjoy a risky freedom than a safe servitude." Robby Dinero, USMC Veteran, Gym Owner)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Glez
Dominion Connections

FReegards!

1st-Annual-Freeper-Convention-1million-vet-march

9 posted on 12/02/2020 1:06:31 PM PST by Agamemnon (Darwinism is the glue that holds liberalism together)
[ Post Reply | Private Reply | To 1 | View Replies]

To: taxcontrol
You and I share similar backgrounds.

I work in financial services (large multinational bank) and when we say "vulnerability" to our I.T. leadership they interpret it as a specific condition that exists in our environment that will be exploited unless deliberate and decisive action is taken to eliminate it.

Sometimes that means remediation, sometimes that means extra controls to monitor the condition to see if there are attempted exploits and other times if it's serious enough, it means the system/server/platform that has the vulnerability needs to be removed from service as quickly as possible.

There is at least one vendor who's VPN hardware & software solution contains a very nasty vulnerability that many firms even outside of Financial Services are running away from as fast as possible.

You likely already know who I'm talking about.

10 posted on 12/02/2020 1:06:34 PM PST by usconservative (When The Ballot Box No Longer Counts, The Ammunition Box Does. (What's In Your Ammo Box?))
[ Post Reply | Private Reply | To 5 | View Replies]

To: armyofprinciples
https://pbs.twimg.com/media/EoFrguhVkAAj_QQ?format=jpg&name=large

Looks like what was in the video for sure. Good job finding it. 8>)

11 posted on 12/02/2020 1:07:50 PM PST by Robert DeLong
[ Post Reply | Private Reply | To 6 | View Replies]

To: Andrewksu

This is the link to Col Waldron’s diagram


12 posted on 12/02/2020 1:08:21 PM PST by centurion316
[ Post Reply | Private Reply | To 1 | View Replies]

To: Glez
This is I think, a related exhibit attached to a Michigan court filing as Exhibit 105. Lots of detail here. Lots. Lots of Lots. Hang on it will take you on a ride.

It's a little clunky to follow but the trick is to read the numbered paragraphs that describe the information immediately below that paragraph.

https://www.courtlistener.com/recap/gov.uscourts.mied.350905/gov.uscourts.mied.350905.1.15.pdf

13 posted on 12/02/2020 1:10:22 PM PST by Hootowl99
[ Post Reply | Private Reply | To 1 | View Replies]

To: armyofprinciples

That’s it. Thanks.


14 posted on 12/02/2020 1:19:24 PM PST by Glez
[ Post Reply | Private Reply | To 6 | View Replies]

To: Jane Long

It is in the video but not readable. I included an image in the post but it doesn’t seem to be displayed here. Not sure why.

https://imgur.com/a/6fNhuko


15 posted on 12/02/2020 1:19:24 PM PST by Glez
[ Post Reply | Private Reply | To 2 | View Replies]

To: eyeamok

That’s where I saw it initially and was looking for a good image.


16 posted on 12/02/2020 1:19:24 PM PST by Glez
[ Post Reply | Private Reply | To 3 | View Replies]

To: Hootowl99

That most definitely is what I’m looking for. When he presented it it seemed it was interactive as he moused over the data points.


17 posted on 12/02/2020 1:19:24 PM PST by Glez
[ Post Reply | Private Reply | To 13 | View Replies]

To: Glez

There must be more to the diagram, because I don’t really get this one.


18 posted on 12/02/2020 2:02:10 PM PST by dinodino ( )
[ Post Reply | Private Reply | To 17 | View Replies]

To: Yo-Yo

Yup, those are colored curved lines. No doubt about it.


19 posted on 12/02/2020 2:03:36 PM PST by TChad
[ Post Reply | Private Reply | To 7 | View Replies]

To: Glez

I hope it is apparent to you, and everyone looking at the graph now, it in no way shows dominion vote machine traffic going to Frankfurt and other parts of the world. It is a load of nonsense, presented in a confusing way to hide the fact that it is a huge load of nothing. It is an embarrassment of a graph.


20 posted on 12/02/2020 2:04:21 PM PST by Wayne07
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-25 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson