×
Login Register an account
Top Submissions Explore Upgoat Search Random Subverse Random Post Colorize! Site Rules
34

Dominion whistle blower video

submitted by speed_bernicia to electionfraud 2.8 yearsAug 3, 2021 11:50:27 ago (+35/-1)     (files.catbox.moe)

https://files.catbox.moe/4bzos2.mp4



12 comments block


[ - ] goatmeetupsanon 5 points 2.8 yearsAug 3, 2021 13:49:55 ago (+6/-1)

Fuck you faggot. I posted this first.

[ - ] 9000timesempty 4 points 2.8 yearsAug 3, 2021 13:56:41 ago (+4/-0)

Nothing pictured over in that video is related to the voting machines. Holy shit you fucks are dumb. That bios screen is of a Dell Optiplex 9030 All in One. Not a custom board or anything close. Even the backups screen isn't even fucking related.

You stupid fucks.

Yes the voting machine are compromise but we shouldn't allow these asinine clips. This amateur shit is worse than the media.

[ - ] dingbat 3 points 2.8 yearsAug 3, 2021 15:05:52 ago (+4/-1)

You’re a dorky IT guy who thinks everyone knows everything about computers and has to insult everyone’s intelligence. You probably have zero social graces and zero street smarts. Go fuck yourself.

[ - ] SparklingWiggle 1 point 2.8 yearsAug 3, 2021 22:54:31 ago (+1/-0)

You're stupid. Admit it. Keep your mouth shut. Fuck off with your expectation of courtesy.

[ - ] deleted 0 points 2.8 yearsAug 4, 2021 03:43:28 ago (+0/-0)

deleted

[ - ] deleted 0 points 2.8 yearsAug 4, 2021 03:30:17 ago (+0/-0)*

deleted

[ - ] Bbylon 1 point 2.8 yearsAug 3, 2021 19:32:29 ago (+1/-0)

It was published by Ron Watkins which gives it more credibility.
I agree that it looks like dell's bios menu but couldn't it be a coincident given the minimalist design?

This is the bios menu of Dell Optiplex 9030 if anyone is interested: https://files.catbox.moe/c4t0ys.PNG

[ - ] try 2 points 2.8 yearsAug 3, 2021 13:52:46 ago (+3/-1)

THANKS for that video!

Other more rare info:

https://searchvoat.co/v/QRV/4117743/

and

https://searchvoat.co/v/news/4125573/26586156

Elements of https://searchvoat.co/v/news/4125573/26586156 :

highlights from actual source code analysis :


MY REVELATIONS (not so secret)

Source code defects in "Dominion Democracy Suite Voting System" I pronounce include :

- The system allows the user to select the size of RSA keys, including 1024 bit, laughable in 2020.

- SHA-1 in RSA signature generation !!!! :

- https://threatpost.com/exploit-fully-breaks-sha-1/151697/

SHA-1 is a Shambles:

(PDF) https://eprint.iacr.org/2020/014.pdf

- Use of MD5 : MD5 is only good for corruption detection, NOT security! NSA banned it in 2001. FIPS 140-2 from 2001 says to use approved secure hashes. People have published "collisions" of any MD5, if bytestream can be stretched.

- Weak crackable AES 128 bits used!!! Should be AES 256, but the code silently drops it to AES 128 in undocumented fashion.

- Debugging harness code hidden in production firmware builds allows anyone with debugger harness access to RAM space. (proven). Debugger harness can be attached to innocent looking Android Cell Phone and a Arduino dongle, by a voter!.

- Hard coded encryption keys hidden in source code (yes really)

- Sensitive keys are stored on disk unencrypted and a external device can trivially read these critical crypto keys.

- Hard coded encryption keys hidden in source code of the master vote tabulator for the precincts (yes really)

- Random number and entropy routine to make live challenge-response keys lacks enough entropy and thus makes VERY CRACKABLE transmission keys.

Note that the diversity hire chin-tapping retard code reviewers hired by State of California to find those exploits found NONE and put NONE in their August 2019 security overview report shown here : (PDF) https://votingsystems.cdn.sos.ca.gov/vendors/dominion/dvs510software-report.pdf

That corrupt Democrat-loving code review company is called "Gaming Laboratories International, LLC" A casino machine review company hired to look for gambling exploits in random number generators and nothing else, it seems.

https://gaminglabs.com/ found NOTHING I mentioned in the ICP2 firmware/hardware 473,991 lines of source code. They found NO PROBLEMS of democrat inserted cryto weakneses I listed! Bwah hah hah hah hah! Neither did CodeMonkey or his pals yet.

Are we living in CLOWN WORLD, when women and diversity skin retards are hired for penetration source code analysis?

Rudy Giuliani press conference Nov 19th states strongly WHY NO DEFECTS FOUND by engineers other than in Texas. Dominion promises re-election to those who allow its purchase in States!

All the exploitable weaknesses above could be used to rig an election on a machine, within a machine, though on vote night EXTERNAL COUNT manipulation via Q-Snatch NAS and compromised MS Windows via Europe was more visible,

Leftist Democrat Soros shills and Tel Aviv Jews on voat will downvote this.
JEW SHILLs DOWNVOTE my priceless truths!

Not one of those security exploit holes snuck into the source are in this dominion problem PDF:

https://www.courtlistener.com/recap/gov.uscourts.gand.283580/gov.uscourts.gand.283580.7.1_2.pdf

. Also not listed above are actual special "missing lines of code" in logic.

MISSING LINES?

Yes. The Dominon source code actually has lots of vital lines of code missing. Many "switch" case statements do not have default cases, for "none of the above" or "default" else. This is a classic way to hide a large chunk of code from functioning, requested by NSA, not merely a single missing logic line. I think Apple's SSL was once hacked that way by a bad actor engineer. Professional programmers write error handlers for unexpected cases in a switch statement. Criminals and diversity hires, do not.

Likewise, choosing ANY of the crypto weakness I mentioned is highly suspect. I listed 10 true absolute critical defects in security.

Nothing I listed is on any web site it seems, not even the newbie CodeMonkeyZ related people, but voat has it. Voat has these exploitable holes listed.

And now , you have Dominion exploitable weakness list too. Though you need the 473,991 lines of source code of ICP2 firmware, to see which case statements in the C/C++ code for the vote machines can be used to leverage a full firmware mod attack, and I am not putting one word of source code onto voat.

Speaking of source code, none of this post is secret or confidential and can be gleaned by very strong due dilligence.

refer also to

https://searchvoat.co/v/QRV/4117743/

It has sections like :

=============

REMOVE BATTERIES SOON, FBI?:

Rebooting after re-powering Dominion terminals up, after 40 votes or so, and after time moves forward a day after shutdown from its internal clock, might re-flashes themselves to hide blatant Nov 3 fraud logic evidence. (assumed). The FLASH chips onboard on all cpu components (firmware) needs to be de-soldered , with no power given to the circuit boards, in case the logic to reflash is duplicated hidden in the firmware flash modules themselves! Battery power might even be enough to reflash and hide a small hack.

Rough thoughts... excuse typos...

Rebooting hides the core evidence of one attack vector

Paper oriented dominions are simpler : merely opening the election seal and hand counting machines that entomb paper ballots, will show massive miscounts of Trump. Sadly, official seals were removed by mysterious unknown parties in some areas of USA , like Gwinnett County, Georgia (proven) : https://tennesseestar.com/2020/11/10/georgia-whistleblower-officials-used-ballot-machines-missing-security-seals-in-gwinnett-county/

This prevents ability to catch a Dominion in the act of swapping Trump votes for Biden by looking at papers inside.

Downballot Letter I" "media profile?

Letter I" trick caught using math by Dr. Shiva, cost Trump about 100,000 votes per state who used "downballot" checkbox : https://files.catbox.moe/dp54kf.jpeg

"Letter I" in republican spelled as Uppercase "I" trick, for 17% of downballot checkbox people (most do not use downballot box, not even dems)!!!

The media profile might even rewrite itself, hiding the Letter I trick, making it magically start working properly.

But internal or external hacking, unrelated to Letter I, was seen in Michigans reddest county, when it became one of the bluest counties due to hacking setting fuckup (it did not keep tally within 4%) :

https://thefederalist.com/2020/11/06/software-glitch-in-michigan-county-tallied-6000-republican-votes-as-democrat/

Georgia's machines that failed , close to election, got a mysterious new firmware 2 days before election.

Android operating system

The source code shows that Android operating system is used internally in recent years. Android and that type of CPU pair is too powerhungry in hibernation nap mode to reflash anything, so the reflash cannot be done off dormant battery from main android cpu, but a hidden microcontroller near the flash could drive a modifier and even miraculously use a "collision" hash to make both firmware versions depict the same "signature". A hidden microcontroller would still need to use a huge amount of amp hours to drive flash mod of entire two copies of 1 megabyte flash. But a clever hack will modify a tail end of about 100 kilobytes, plus the MD5 hash sweetener to form a crypto collision match.

3rd area of a flash image :

The third area of flash, the checksum watch-dog that chooses backup copy at boot, if main firmware has a bad checksum, need not be reflashed, but it too, that secret little part, could have the main exploit in it and need analysis by Trump, and hiding by bad actors. It might even hold the logic to HIDE THE EVIDENCE after 24 hours reboot. 95% of all computers use more than one backup copy of firmware in flash. Mainly because Flash RAM can only be rewritten 50,000 times before being dead. (30,000 on average)

The tiny stub of firmware in the flash needs to be forensically preserved very soon, without letting it cover itself up. The source code to tiny 3rd flash partition will NOT be reflected in the 473,991 lines of source code of ICP2 firmware.

Studying the code for firmware reloading via USB dongles, will only reveal another means, but no evidence.

Geogia got mysterious new unvetted firmware in two Counties from Dominion at last minute!!!:

Politico disinfo : Election Day glitch in Georgia counties still unexplained:

https://www.politico.com/news/2020/11/04/georgia-election-machine-glitch-434065

The reason I used leftist Politico link, is because it clearly states that the firmware updates were HIDDEN from the device logs and used a covert way of being updated that avoids writing to system log of Dominion. Specifically, this unaltered exact verbatim quote from that link:

But log files for the devices — electronic poll books that poll workers use to sign in voters at precincts — show that no such update occurred to the devices the night before Election Day, Ridley said in a statement to POLITICO on Thursday. However, she said she stands by her previous statements last week that a representative for the election technology vendor, Dominion Voting Systems, told her office that it had uploaded some kind of update the night before the election and that this had created the glitch.

NSA type intercepts of cell phones, internet, etc, will need to be used to find the real bad actors, but desoldering flash chips before applying power would help , if the battery clock battery is not used to drive the re-flash based off a timer tied to count odometer.

FBI should rip out all batteries pronto, and desolder Flash chips pronto.

=============

End of voat.co remarks from the week of the election.

[ - ] SilentByAssociation 0 points 2.8 yearsAug 3, 2021 12:18:17 ago (+0/-0)

Cool. Now watch nobody do anything about it. Maybe a little theater to quell the ones who are upset about it... it'll be cathartic. I wouldn't expect anything more.

[ - ] deleted -1 points 2.8 yearsAug 3, 2021 12:39:17 ago (+0/-1)*

deleted

[ - ] goatmeetupsanon 1 point 2.8 yearsAug 3, 2021 13:50:34 ago (+1/-0)

you realize no one reads your comments, right?