Posted on 04/20/2023 10:02:55 AM PDT by Renfrew
Lindell, who promised to pay the $5 million award to anyone who could debunk his data that purportedly proved election fraud, was ordered to pay the sum by a private arbitrator, who ruled that Robert Zeidman, a software expert, successfully disproved Lindell’s claims.
“Based on the foregoing analysis, Mr. Zeidman performed under the contract,” the ruling said. “He proved the data Lindell LLC provided, and represented reflected information from the November 2020 election, unequivocally did not reflect November 2020 election data.
(Excerpt) Read more at thehill.com ...
“Lindell got these from Dennis Montgomery who previously scammed the CIA and Joe Arpaio.”
Interesting. I hadn’t heard that name before.
One path to rooting out the Deep State is following some of these scams to the source.
Montgomery seems to have spent decades working at the heart of the national security apparatus. Is he a scammer, or is he an asset to be deployed when needed?
A patriotic DA might go far by trying to unravel that string.
My impression is that he’s a freelance operative who has sold scams to others before this. His name should be an automatic red flag to anyone encountering him. The data packets were nothing more than MS Word files containing a bunch of gibberish.
That’s the bottom line. He hasn’t delivered on his promises after nearly two years.
But he bought a house for Montgomery. So all is well - for Dennis!
As far as I’m aware no one did the simplest possible check:
1) Take a 1000 random mail-in ballots
2) Ask the supposed voters if they cast those ballots
Find even a couple that didn’t vote and you can prove phony votes were added to the ballot stream.
Unfortunately they succeeded in having us focus almost entirely on the machines instead of the paper.
Correct!
“Will they fine Hillary and the Democrats for stating the 2016 elections were rigged?”
“Lindell, who promised to pay the $5 million award to anyone who could debunk his data...”
When you promise to pay someone if they do X, you’d better be prepared to pay it. This isn’t a free speech issue. It is what happens when you promise to pay someone.
You goofball. If you can manipulate the database and change votes, you can rig elections. These databases can and are manipulated, and it can be done remotely.
Your analysis has merit. It’s like being at a poker game where some guy, when he’s the dealer, ends up with four-of-a-kind every time.
That’s so mathematically rare as to be impossible. He’s cheating. But you can’t really hang him unless you actually see him deal from the bottom of the deck.
Well it does take months to do a through computer forensics investigation, now if you are just pulling network traffic yes it can be done in minutes so I have to question your capabilities on much of anything.
“Just like your “GOP wants to cut social security and medicare” garbage you like to spew.”
I don’t know who you are, did not post to you, but I have never “spewed” one syllable about the GOP wanting to cut social security.
You are insane or an idiot or both.
Hand counts are the best time to interject newly discovered voting boxes with freshly minted ballots..Add a willing Judge or two and a Press that looks the other way, turns into a perfect storm..
“Well it does take months to do a through computer forensics investigation...”
But why would you need to do a thorough forensic examination to simply determine whether a file that is purported to contain network traffic actually fits that description???
Because that’s the issue here really. Lindell claimed that he had files with captured network traffic, yet those who examined the files have said (at least two people on the record that I know of) that the files contained nothing that even slightly resembled captured network traffic.
Shouldn’t take months to determine if what they say is true. Probably wouldn’t even take hours.
I think yer onto something!
lol...
Zeidell figured this out in a matter of hours.
“We asked to see the “proof of fraud” that had been promised to us, and were pointed to 5 files on the network. We had been told that these files showed data flowing from China and other places over the Internet to the voting machines on the day of the election. We each downloaded them, one of which was over 22 Gbytes, but found that they contained no recognizable data in any known data format. We were stumped.”
“At some point, I performed a simple transformation of the files and found something surprising. I quietly packed up my things, said goodbye to my fellow experts, went back to my hotel room, and called my wife. “I have some good news,” I whispered to her on the phone. “All I want to say is that you should start thinking about how you want to spend five million dollars.” The transformations I had performed showed that these files were actually simple Microsoft Word documents containing numbers and gibberish. There was no way for this to be network data or any data related to the election. I spent the next hours until late in the evening preparing a detailed report to prove this point. In the morning I reviewed my report and even registered a copyright online to protect what could turn out to be the most valuable document I had ever written.”
A few smoking guns would stop election fraud pretty quickly.
“You goofball. If you can manipulate the database and change votes, you can rig elections. These databases can and are manipulated, and it can be done remotely.”
Except they leave behind a pile of ballots which can then be counted. How does your scheme account for an audit of the actual paper?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.