Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: linMcHlp
Have *YOU* ever wrote an application that sends packet data through a network?

I have. You won't know what my data means *UNLESS* you can see my code.

How many voting machine companies allow people to see their code?

That you can't take the byte data and make sense of it means absolutely nothing. You couldn't figure out what any of my packet data did by trying that either.

Zeidman has proven nothing about that big file that he calls "gibberish."

80 posted on 03/13/2024 11:17:28 AM PDT by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 67 | View Replies ]


To: DiogenesLamp; srmanuel
May interest:

https://github.com/robertdavidgraham/blxtract

blxtract Read Me

Mike Lindell is a rich American businessman who claims he has "absolute proof" the Nov 2020 election was hacked -- proof in the form of "pcaps" on the days around the election from all over the U.S. On August 10 2021 he held a "cyber-symposium" where he invited "cyber-experts" to review the pcaps.

He didn't provide pcaps. Instead, he provided almost 300 gigabytes of .bin files in a format known as "BLX" created by a guy named Dennis Montgomery.

The data included the source for a program called CExtractor that would extract data from that file format. But, this code is written in a deliberately obfuscatory manner that is very hard to read.

This project rewrites that code in a simpler manner that programmers can read. I'm in the process of removing or changing things so that it continues to produce the identical output, but in a more readable way.

The original 300 gigabytes of data is available at this BitTorrent magnet link:

magnet:?xt=urn:btih:39a9590de21e77687fdf7eacee4dd743f2683d72&dn=cyber-symposium&tr=udp://9.rarbg.me:2780/announce

The code is in Microsoft's C++/CLR language.

Specification

The extract program works like the following.

The data has been encoded with ROT3, meaning they've been rotated 3 positions to the left, meaning the number 3 has been subtracted from each character.

The data we are able to extract accounts for less than 1% of size of the files we have, like rnx-000001.bin. The remainder of the files consist of either random junk data or encrypted records that we cannot extract without the key.

The code does 4 passes over the file looking for records embedded in the file. Each pass starts at the beginning of the file proceeding to the end.

A pass looks for a start-of-record pattern, a different pass for each pattern. The list of start-of-record delimiters are:

  • "xT1y22"
  • "tx16!!"
  • "eTreppid1!"
  • "shaitan123"

Note that these are the plain-text patterns. When scanning the file for the pattern, you must either rotate-left each incoming byte, or rotate-right the bytes of the patterns. In other words, the actual start-of-record patterns in the raw file look like:

  • "{W4|55"
  • "w{49$$"
  • "hWuhsslg4$"
  • "vkdlwdq456"

When a delimiter is found, it then reads the next 1024 bytes of the file that follow the start-of-record.

ROT3 (subtract 3 from each byte) is then applied to all 1024 bytes, meaning, the value 3 is subtracted from all the bytes.

It then looks for an end-of-record delimiter of ".dev@7964" and truncates the record at that point (removing the end delimiter and everything after). This is the plain-text delimiter that matches after ROT3 conversion of the data.

The remaining record is then written to the output. Each record is written with an additional CRLF ("\r\n") at the end of the line.

It would be 4 times faster to do a single pass searching for all 4 delimiters at once, instead of 4 separate passes. However, this would produce data in a different order.

YCombinator comment by Robert Graham:

The ~20 cyberexperts in attendance were invited due to their support of Republican causes. The two independnets were myself, invited through Lead Stories (a fact-checking firm) and Harri Hursti, invited through CNN. Lindell was so certain of himself that he invited his fact-checking adversaries CNN and LeadStories to come see for themselves.

Lindell didn't give us pcaps. I think he honestly believed he had them. It's just that he's non-technical, and has no ability to judge whether somebody is technical enough to judge whether he has pcaps.


83 posted on 03/13/2024 1:16:08 PM PDT by linMcHlp
[ Post Reply | Private Reply | To 80 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson