Once they have the data in addition to the packet data from the DOD hack election night
********************************************************
Why isn’t the packet traffic alone sufficient evidence? It seems to me the mathematical and statistical evidence should be proof and then once packet traffic is shown (along with testimony of Gina Haspel), then it is game over. Besides, we already have systems in GA and in Mich. that have proved the case. I think running forensics on the additional machines is merely a diversion personally. Or maybe intended to draw this out before the public??
Likely they know destination/data of the packets and want to
match that with a specific machine’s data.
Video at 2:10m
Voting Machine Vulnerabilities
https://twitter.com/CaseboltRandy/status/1340832271713132544