Archived material Access restricted Article
Rantburg

Today's Front Page   View All of Fri 01/01/2021 View Thu 12/31/2020 View Wed 12/30/2020 View Tue 12/29/2020 View Mon 12/28/2020 View Sun 12/27/2020 View Sat 12/26/2020
1
2021-01-01 Home Front: Politix
Must Watch Video: Jovan Pulitzer Reveals Electronic Voting Machines in Georgia Communicating with Vendor in China
Archived material is restricted to Rantburg regulars and members. If you need access email fred.pruitt=at=gmail.com with your nick to be added to the members list. There is no charge to join Rantburg as a member.
Posted by Bob Tojo4624 2021-01-01 00:33|| || Front Page|| [9 views ]  Top

#1 Is the screenshot the evidence? All that shows is a device with a vendor ID that indicates it was made by a Chinese company. It looks like he created a wireless network named "Hidden Network" and connected the device to his 75" Roku-enabled TV.

I *really* hope the evidence is more solid than the screen shot indicates.
Posted by Rob Crawford 2021-01-01 01:03||   2021-01-01 01:03|| Front Page Top

#2 The point is that these stupid machines are connected to the Internet and are easily hacked.

Why we have such an idiotic system for something as simple as counting votes is beyond rational comprehension
Posted by Pherenter Phinter9671 2021-01-01 03:34||   2021-01-01 03:34|| Front Page Top

#3 That wasn't the claim made. The claim was the machines were "communicating with vendor in China". It's right there in the title to this post.
Posted by Rob Crawford 2021-01-01 06:20||   2021-01-01 06:20|| Front Page Top

#4 so did they check the machines for covid010101010101010101010000000001?
Posted by Angatch Clasing5036 2021-01-01 06:54||   2021-01-01 06:54|| Front Page Top

#5 Isn't this the guy who claimed he found a Roman sword near the Oak Island money pit?
Posted by John Frum 2021-01-01 07:24||   2021-01-01 07:24|| Front Page Top

#6 There is no excuse for these machines to be connected to the Internet because of the obvious potential for fraud and hacking. Whether these machines communicated directly and/or intentionally with the CCP or not, it was felony stupid to the point of malfeasance of election officials to sign off on it and they really should go to jail.

It must be a part of any meaningful election reform that any machinery involved not be connected to the Internet. Violators should get mandatory hard time in prison.
Posted by Abu Uluque 2021-01-01 12:52||   2021-01-01 12:52|| Front Page Top

#7 Mr. Crawford,

Screenshots are more than adequate as evidence of system activity. What you see on a screen (aka screen shots) is in almost all cases the primary thing a remote operator sees also.

Three popular programs that have been around for some time are PC Anywhere, TeamViewer, and recently RemotePC. These programs give a remote operator the same screen visual and full control of a system as the local Administrator.

For our voting systems to have components manufactured in China allows for a backdoor for China access the system via programs embedded in chips on the circuit board of that voting machine component. Embedded programs that can determine the IP Addresses of the voting machine, local and wide area addresses and the port numbers of various software components on the system which is then used to send the exact screen view the local people seen to "vendors" in Communist China.

They MUST see the same thing end users see as confirmation that remote data manipulation changes ARE passing through to the screen being viewed by the end users.

In many cases it is the ONLY way that one can confirm that data changes being made is reflected properly to local users because then you know that the data change is not only in the database on a hard drive or internal flash drive but is also updated in the video memory area of the main system processor on the mother board that the screen rendering occurs.

The power of remoting is that not only can you get and modify information on the system but that you can do many other things over the internet to other systems in the building or across the world and make it look like the hacking is coming from a voting machine that is online.

The sky is the limit. I once found a small program on a system that had replicated itself across 21 other systems around the world (also known as a worm) and was sending who knows what from all 21 systems to someone in the Ukraine.

Never, never disregard evidence of any type a system is producing.
Posted by Ebbomoger Speaking for Boskone4589 2021-01-01 17:08||   2021-01-01 17:08|| Front Page Top

#8 One other comment is that one of the pieces of information displayed is the Mac Address of the component in the system and normally that is unique which is another name of the unique serial number of the component in that machine.
Posted by Ebbomoger Speaking for Boskone4589 2021-01-01 18:05||   2021-01-01 18:05|| Front Page Top

#9 Screenshots are more than adequate as evidence of system activity. What you see on a screen (aka screen shots) is in almost all cases the primary thing a remote operator sees also.

I have 28 years experience writing software; I started learning computers when I was 9; I've administered Linux machines since the first distributions hit the 'net.

I spent a few years working at an ad agency -- and as a result, I know a screenshot ain't worth spit. The graphic designers could make an image of near anything you wanted. Anyone with a bit of skill in Photoshop or the open-source equivalent Gimp could do as well.

But in any case, that screenshot doesn't show what is claimed. It isn't communicating with a vendor in China -- it's reporting the vendor id from another device on a local network inexplicably named "Hidden Network".

Every piece of network hardware produced has a vendor ID as part its MAC (Media Access Control) address. This is the low-level identifying address used by Ethernet, WiFi, or whatever physical layer network is in use. The vendor ID is the last 24 bits of the MAC address -- and all it does is say who produced the chip running that network interface.

For example, the Ethernet chip on my network-attached storage identifies has a vendor ID segment of 88:33:FE. A lookup says it's from Synology company in Taiwan. That doesn't mean when I connect to it I'm connecting to a machine in Taiwan -- it's actually in my basement. It just identifies who fabricated (or contracted for) the ethernet chip.

So the headline to this post is WRONG, and the screenshot headlined at Gateway Pundit doesn't show squat. I haven't watched the video, because if that screenshot is the call-out, there's nothing to it.

It's a MASSIVE jump from "the chip was made in China" to "China hijacked the results". All this shows is that a Chinese company that makes wireless components made the wireless components for some device. It doesn't show any communication with China. It doesn't show any data manipulation from China.

I have no doubt the Democrats committed fraud on a monumental scale. But I don't trust any "expert" who lies about so basic a fact as what that screenshot shows, and I don't think it was through any complicated technological process involving China. They "adjusted" the software so it produced more ballots to be "adjudicated", fed in blank ballots and "corrected" them, "farmed" ballots, and the usual dead and fictional voters.

Nail down the reason Dominion pushed updates (if they did); require an audit of their source; require the rejection of any ballots that cannot produce a repeatable count -- and prosecute the criminals who carried out the fraud, regardless of party.
Posted by Rob Crawford 2021-01-01 19:41||   2021-01-01 19:41|| Front Page Top

#10 He is exposing serious illegal activities testifying under oath under penalty jail time if lying while you are doing nothing but sitting in your living room being the typical Sunday arm chair quarterback.

Besides, I won't go into the 46 years of straightening out systems developed by "know-it-all programmers" at Citibank, Shuttle Program at NASA, McAfee, Federal Bureau of Prisons, etc. etc. etc. and featured in articles such as Computer World magazine and major newspapers for finding major issues like this gentleman has clearly found and truthfully testifying about under oath using forensic tools he is using that I have used as well.

This is not a PC, it is a DEVICE unlawfully on a HIDDEN NETWORK broadcasting under its MAC Address as the BSSID, streaming through a Chinese ROKU TV component which is impressive use of WLAN ROKU technology for two way voter data manipulation by Dominion for Biden.
Posted by Ebbomoger Speaking for Boskone4589 2021-01-01 20:31||   2021-01-01 20:31|| Front Page Top

#11 The issues under discussion in the post and here are far beyond my ability to understand or judge, so I published in the hope of exactly this conversation. Carry on.
Posted by trailing wife 2021-01-01 21:08||   2021-01-01 21:08|| Front Page Top

#12 The claim was that there was 2 way data transfer between the networked consumer devices and the Dominion Voting machines via WiFi. That means the investigators were running a packet sniffer. Hopefully they can recreate the data transferred in the network, including the routing info of the destination for the Dominion Voting packets.

During the GA investigative committee conference Mr Pulitzer claim they were "in" the network. Did they gain access into a Dominion balloting machine or just intercepting WiFi packets?
Posted by Threatle Slater3107 2021-01-01 22:09||   2021-01-01 22:09|| Front Page Top

22:54 Elmerert Hupens2660
22:09 Threatle Slater3107
21:31 trailing wife
21:22 trailing wife
21:19 trailing wife
21:17 trailing wife
21:08 trailing wife
20:51 DarthVader
20:43 trailing wife
20:31 Ebbomoger Speaking for Boskone4589
20:28 trailing wife
20:27 Hupusoter Theremp1466
19:59 Hupusoter Theremp1466
19:41 Rob Crawford
19:35 Jan
19:20 Hupusoter Theremp1466
19:12 Claiting Grotch4752
19:08 Hupusoter Theremp1466
19:05 Bobby
19:01 Spats Lumplump4765
19:00 gorb
18:59 Skunky Ulart5534
18:55 Frank G
18:50 jpal









Paypal:
Google
Search WWW Search rantburg.com