Thoughts?........................
See #12. This should be the smoking gun, but it doesn’t prove cheating was used. It shows the tools the attackers can use, how the attach can be executed, reveals horrendous vulnerabilities in the election equipment, and shows how audit logs can be modified to delete evidence.
To our experts. Is it possible to modify logs without that modification access itself being logged?
Seems to me that any device used to reprogram/corrupt/mess up/ etc. a voting machine could be said to be used for only that purpose; unlike other devices for multiple uses & thus be ruled illegal to use. Am I wrong? What else might a machine like this be used for?