Posted on 12/15/2020 3:30:16 PM PST by SeekAndFind
I saw on the Donald.win site that it was still in the source code.
US intel will prove him to be a liar.
The Supreme Court’s Texas Ruling is Nothing Short of Disgrace
How many of those litigant states backing Texas used the rigged Dominion voting machines?
The answer to that demonstrates that the USSC aided and abetted state officials’ election tampering equipment/software of Dominion Voting Systems.
By rejecting the Texas lawsuit, the USSC effectively said, “we the Supreme Court permit you to manipulate and disenfranchise America voters outside the jurisdictional of your own state legislatures b/c numerous details in the Texas lawsuit exposed the tax-paid public servants as derelict......possibly criminal......in carrying out their duties.
Alarmingly, the USSC protected the tax-financed administrative state-——particularly those election officials who were beneficiaries of Zuckerbrg’s $400 million outlay.
AG’s in states who were party to Texas’ lawsuit, might now start investigating Dominion Voting Systems for their crimes, utilizing their own tax-financed L/E capabilities.
Hmmm lying there is illegal. What kind of jail time for that.
Was he under oath when he said it? That would be perjury, no?
Again and Again, no Dominion election software system ever used Orion, see my prev posts.
Please Stop Spreading Stupid
This is Serv-U which is an FTP client sold by the same company. It has nothing to do with the Orion platform.
what you are doing is just like saying “the control software in my Hyundai car got hacked, this means that every cargo container with Hyundai stenciled on it is compromised”
Please stop
I was being sarcastic. But I restate the question - and so what if they lie. GOPeers love liars.
They easily lie to the a-hole Congress fools who in return easily believe the lies.
Yes, what difference does it make? The accusation is that the software/system is capable of changing votes and shifting votes on purpose not that it was hacked. That’s actually someone trying to provide cover for Dominion, it’s just more BS.
Sure, except it has as many 2020 vulnerabilities as Orion. The company is like Adobe, created and run to spread vulnerabilities. Nobody should use any of their software especially voting machine companies.
No, the attack vector was the update system, and only one malicious .dll file specifically for one product was identified.
Please do not spread misinfo, there is enough already.
Wow, so the Serv-U gif is hosted on the Solarwinds webserver
Omg. haha
It was an inside job.
Dominion Engineer Told Antifa He’d ‘Made Sure’ Trump Wouldn’t Win, Report Says
Vice President of U.S. Engineering Eric Coomer shared anti-Trump posts online
https://neonnettle.com/news/13250-dominion-engineer-told-antifa-he-d-made-sure-trump-wouldn-t-win-report-says
No you are wrong. solarwinds -- serv-u_ftp_server SolarWinds Serv-U FTP server before 15.2.1 allows remote command execution. 2020-07-05 7.5 CVE-2020-15541
That's just one of many for the product.
Please do not spread misinfo
It's a garbage product mainly useful for companies that want to add vulnerabilities to their products.
No I am right.
That was a totally different issue. That bug did affect
Serv-u versions 15.0.. to 15.2.. but that issue was identified and patched in july.
But it was a vulnerability/bug, not a deliberate attack that including signed .dll files inserted into the update matrix for a specific product in a deliberate penetration attempt
You do see the difference?
“It’s a garbage product mainly useful for companies that want to add vulnerabilities to their products”
More like an expensive product that is one of many created in order it easier to manage lots of slave machines, and see who is uppity.
The screenshot came from an expert witness in Sidney Powell’s GA lawsuit. A cyber security expert. Captured and secured the code for the website, and it was copyright SolarWinds.
Then Solarwinds pulled the site credits/log.
Signed code attacks are easy and a dime-a-dozen. Code signing certs are everywhere and easy to obtain. China and Taiwan have hundreds of code signing certs they can use to create or compromise products, and they do it all the time. The media is pretending this is novel and they obviously fooled you.
Other software supply chain attacks are through unsigned open source, also quite common. The US military has a ton of open source in it, supposedly all vetted but its not.
Vulnerabilities are a hidden way to allow adversaries to gain access to a product. For example a voting machine company can use SW that they know is vulnerable, advertise that fact on their website, and expect that enemies can use that information to meddle in elections.
A good example of the latter is Adobe. Inserting Adobe components is not much more than a way to make sure that a product is hackable.
Why would any company do that, you might ask. The answer is simple: $$$.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.