Pages

Friday, November 27, 2020

Is Navid Keshavarz-Nia The Kraken?

TGP has a link to the affidavit of an expert consultant to Sidney Powell in her legal challenges to the election. Here's the TGP blog--it's been up for a while but I've been occupied reading a variety of stuff, including the affidavit:


HUGE! Sidney Powell Witness Whom NY Times Described as “Always the Smartest Person in the Room” Concludes Hundreds of Thousands of Votes Transferred from Trump to Biden IN ALL BATTLEGROUND STATES


Keshavarz-Nia, it turns out, is the hero of a NYT article from just this past September, 2020, which TGP quotes:


17. Navid Keshavarz-Nia, those who worked with him said, “was always the smartest person in the room.” In doing cybersecurity and technical counterintelligence work for the C.I.A., N.S.A. and F.B.I., he had spent decades connecting top-secret dots. 


This is the conclusion of the affidavit that TGP quotes:


I conclude with high confidence that the election 2020 data were altered in all battleground states resulting in a hundreds of thousands of votes that were cast for President Trump to be transferred to Vice President Biden. These alterations were the result of systemic and widespread exploitable vulnerabilities in DVS, Scytl/SOE Software and Smartmatic systems that enabled operators to achieve the desired results. In my view, the evidence is overwhelming and incontrovertible.


Where is that evidence? Because it's not enough to cite vulnerabilities--you have to show a likelihood that the fraud actually happened. The evidence Keshavarz-Nia cites is in paragraph 15. Here's a link to the 9-page affidavit, which also gives Keshavarz-Nia's full background.

I'm not qualified to assess the evidence, but others may be able to. I've pasted in paragraph 15 and have highlighted what appear to me to be significant parts of the argument. Naturally, the findings in this paragraph follow upon the preceding portions of the affidavit, but I can't paste it all in:


15. I have not been granted access to examine any of the systems used in the 2020 Election. However, I have conducted detailed analysis of the NY Times data sets and have discovered significant anomalies are caused by fraudulent manipulation of the results. In my expert judgment, the evidence is widespread and throughout all battleground states I have studied. I conclude the following:

a. The vote count distribution in PA, WI, MI, AZ, NV, and GA are not based on normal system operation. Instead, they are caused by fraudulent electronic manipulation of the targeted voting machines.

b. On approximately 2:30 AM EST, TV broadcasts reported that PA, WI, AZ, NV and GA have decided to cease vote counting operations and will continue the following day. The unanimous decision to intentionally stop counting by all 5 battleground states is highly unusual, possibly unprecedented and demonstrates prior coordination by election officials in battleground states. There would be no legitimate reason battleground states need to pre-coordinate election activities and stop on-going adjudication processes. However, it is equally puzzling that the vote counting did not stop, as reported. In fact, it continued behind closed doors in early hours of November 4, 2020. This activity is highly unusually and demonstrates collusion to achieve desired results without being monitored by watchers.

c. When analyzing the NYT Times data for the 2020 election, I conclude that the software algorithm manipulated vote counts forging between 1-2% of the precinct results to favor Vice President Biden. The software performed data alteration in real-time in order to maintain close parity among the candidates and without raising red flags. The specific software algorithm was developed by Smartmatic and implemented in DVS machines to facilitate backdoor access by a nefarious operator to manipulate live data, as desired.

d. The DVS Democracy Suite’s ImageCast Central optical scanner failed to correctly verify and validate absentee ballots, as described in its own literature. There is reported evidence that the optical scanner accepted and adjudicated ballots that did not have signatures or other key features that is required for ballot validation and verification. This indicates that the DVS system configuration was modified to accept invalid ballots when they should have been rejected.

e. After the DVS ImageCast scanner validates a ballot, by design, it is required to tabulate and store the results in a cast vote record along with a human-readable image of the ballot that has been scanned. The image, called AuditMark provides the user with scanned results that is verifiable. However, media reports indicate that not only did the ImageCast fail to properly verify absentee ballots; it also failed to maintain records of the AuditMark that would be necessary to conduct an audit. The only way to alter this protocol is to alter the system configuration and prevent the ImageCast scanner from rejecting illegal ballots; and reprogram AuditMark to store ballot image that could be verified. This is evidence of fraud perpetrated to prevent investigators to discover the number of invalid votes that were cast.

f. The cryptographic key store on DVS thumb drive (reported stolen in Philadelphia) was used alter vote counts prior to up chain reporting. Since DVS uses the same cryptographic key for all its voting systems in all battleground states, the key allowed a remote operator to conduct massive attacks on all battleground state data set without being detected.

g. Beginning on approximately 4:30 AM EST on November 4, 2020, the vote counts favored Vice President Biden by nearly 80% in many jurisdictions. The data distribution is statistically congruent [sic; incongruent?], even when considering a larger number of absentee ballots were collected for Vice President Biden.

h. The data variance favoring Vice President continues to accelerate after 4:30 AM EST on November 4, 2020 and continues until it momentum through November 9, 2020. This abnormality in variance is evident by the unusually steep slope for Vice President Biden in all battleground states on November 4, 2020. A sudden rise in slope is not normal and demonstrates data manipulation by artificial means. For example in PA, President Trump’s lead of more than 700,000 count advantage was reduced to less than 300,000 in a few short hours, which does not occur in the real world without an external influence. I conclude that manually feeding more than 400,000 mostly absentee ballots cannot be accomplished in a short time frame (i.e., 2-3 hours) without illegal vote count alteration. In another case for Edison County, MI, Vice President Biden received more than 100% of the votes at 5:59 PM EST on November 4, 2020 and again he received 99.61% of the votes at 2:23 PM EST on November 5, 2020. These distributions are cause for concern and indicate fraud.

i. DVS has acknowledged that Chinese made parts are used in its voting machines. However, the company is unwilling to share details on its supply chains, foreign ownership, or its relationship with China, Venezuela and Cuba. In particular, I have seen USIC intelligence reports showing China’s espionage activities in the United States and efforts to infiltrate elections. Since these countries are our enemies, I conclude that FIS and other operators were involved to influence the outcome of the 2020 election.

j. A Man-in-the-Middle (MITM) cyber attack was carried out by covert operators using sophisticated tools, such as Hammer and Scorecard. The MITM attack occurred in two ways. Initially, remote operatives used USB memory cards containing cryptographic keys and access system backdoors to alter votes in battleground states. Subsequently, the results were forwarded to Scytl/SOE Software servers located in Frankfurt, Germany (previously, Barcelona, Spain). The MITM attack was structured to ensure sufficient data alteration had occurred prior to forwarding the tallied results to the Scytl/eClarity Software Electronic Night Reporting (ENR) system. The reason election data are forwarded overseas is to avoid detection and monitoring by the USIC to obfuscate the MITM.

k. In my expert opinion, the DVS Democracy Suite, Scytl/SOE Software/eClarity and Smartmatic have not produced auditable results in the 2020 election. It is evident that ballots were not properly validated, system records were not kept, and the system experienced considerable instability even several days prior to November 4, 2020 that required DVS to implement software changes at the last minute. In addition, the disparity in data distribution after 4:30 AM on November 4, 2020 indicates significant systemic anomalies that were widespread among all battleground states. The evidence is both extensive and persuasive and indicates large-scale fraud by remote operators.



64 comments:

  1. The above makes complete sense. I would however differ that the vote altering was limited to just 6 states. Your post from earlier that they wanted to juice the national vote for Biden I think is spot on. Wouldn't be hard to prove, but we certainly want to win the war since the clock is ticking and mop up the rest afterwards.

    ReplyDelete
  2. I have a MS in Cybersecurity and various security certifications (CISSP, CEH, CHFI). The allegations in paragraph 12 [theft of USB the cryptographic keys] and 15(f) [same keys used by DVS in all states--which is crazy] make the MITM in 15(j) child's play (metaphorically speaking).

    ReplyDelete
    Replies
    1. Thanks. It seemed compelling to me for purposes of Powell's suit. Again, it's necessary to remember that this is a civil lawsuit looking for specific remedies that don't require proof beyond a reasonable doubt. Whether criminal prosecution ever results isn't Powell's concern.

      Delete
  3. I wish there were links to 15 (d) and (e) because I would like to look at the specific references he is making.

    Otherwise this is quite literally exactly what I speculated took place in the data movement and changes between precinct level to state level as the most vulnerable entry point.

    I was missing the overseas refinement portion... Forgive me for not being in the IC.

    If they really did raid / confiscate the servers in germany they should be able to lay waste (large scale) to that portion of the changes.

    However... I still stand by my old adage that where the US government is concerned when one organization gets caught red handed in the cookie jar the outcome is to always deny and bury it as deep as possible. The only evidence you will ever find is the standing non-denials.

    I have no faith in the FBI or DOJ in suddenly doing the right thing for once where the IC is concerned. Especially in this election!!!

    The Jill Stein case I linked earlier in another thread could crack the nut on full blown auditing and inspection for this side of the pond.

    https://m.facebook.com/drjillstein/posts/4920676651305819

    However if what he is saying is correct you will find the ability to do so with very little evidence being left of it happening.

    If that is the case it leaves one side trying to prove something occured that you can find no evidence beyond anecdotal. But you leave the other side wide open on not having a chain of custody or auditable logs that should exist.

    That's uncomfortable and sounds like a 5+ year litigation case.

    ReplyDelete
    Replies
    1. If you leave the other side wide open, on not having a chain of custody, or auditable logs that should exist, shouldn't that be enough, for SCotUS to authorize/ encourage state legislatures to take Bull By Horns?

      Delete
    2. I'm sure that will be part of Powell's argument.

      Delete
    3. If they don't have documentation then the election can't be call free and fair, not by a long shot.


      Rob S

      Delete
  4. Previous try showed error message. Mark, expert starts off by saying he “has not been granted to systems”. SP needs to convince judge to allow discovery
    and get him access? Also, when does SP get to depose election supervisors and other decision makers who stopped counts to get to the bottom of this. Nothing focuses the mind like the realization of personal exposure under oath.
    Being a “member of the team” is far less appealing when you are under oath by yourself. These are things that everyone can understand once you force their cooperation. Is SP on that road? Thx.

    ReplyDelete
    Replies
    1. If you followed the pattern of her tactics in the Flynn case--which are simply the tactics that any good lawyer would use--she'll be asking for the moon. And if someone says the moon isn't available she'll argue that that shows fraud. And I think that's a good argument.

      Delete
    2. I'm stealing that... 😂🤣😁

      Delete
  5. Now watch as the Left and NYT circles Navid Keshavarz-Nia like hyenas and tee him up for brutal character assassination.

    Dave

    ReplyDelete
  6. This sounds a lot more substantive than the commenter was suggesting the other day

    ReplyDelete
  7. When you read Mr. Keshavarz-Nia's statements they put a lot of meat on the bones of a massive fraud scheme. He raises many questions that demand answers, such as who was coordinating the multi-state stoppage of vote counting? We've never seen such an occurrence previously by even one state on election night, much less several states that all happened to be 'battleground' states at virtually the same time. Evidence such as this, whether it be circumstantial or anecdotal, is compelling in making a case for proving that a concerted plan was in place before election day to 'steal' the election from Trump.

    DJL

    ReplyDelete
  8. People have been wondering why the R's haven't been chasing voter fraud more aggressively. Here's one reason.

    From Turley -

    Michigan Attorney General Resumes Threats Of Criminal Prosecution Against Those Alleging Voter Fraud

    "We have been discussing the use of the criminal code by Michigan Attorney General Dana Nessel (D) to threaten people who post videos on alleged voter fraud or legislators who raise such objections in the state."
    ...
    "Nessel continued her threats of prosecution on Monday in warning that a former state senator could be prosecuted for alleging possible voter fraud at a meeting of the Michigan Board of State Canvassers. So, raising voting fraud at the board overseeing voting is now a possible basis for prosecution in Michigan."
    ...
    " In other words, you must submit your allegations of fraud to me but I may prosecute you if you submit your allegations of fraud to me."

    Feels like something out of Kafka.

    https://jonathanturley.org/2020/11/24/nessel-resumes-threats-of-criminal-prosecution-against-those-alleging-voter-fraud/

    Frank

    ReplyDelete
    Replies
    1. The remedy is impeachment.

      Delete
    2. I’m not sure. You’d impeach the old loon and his cheating Ho, but that still leaves the country in the hands of communists. How would the entire party be thrown out?

      Delete
  9. Question: If Navid Keshavarz-Nia is correct and the reported results in PA are false and cannot be audited, because "ballots were not properly validated [and] system records were not kept" in large enough numbers to change the result, then how can the results be certified? (Or if certified, how can the result stand?)

    If they can't be certified, who chooses Pennsylvania's electors to sit in the Electoral College?

    And, similarly, in GA, MI, WI, AZ and NV?

    Seems like the Supreme Court will have its work cut out for it in fashioning a remedy if it is found that Keshavarz-Nia is correct.

    ReplyDelete
    Replies
    1. The state legislature choose.


      Rob S

      Delete
    2. The state legislature can either send Trump electors to vote in the electoral college vote or can withhold electors. If no one gets 270, the President is selected by the House of Representatives with each state getting one vote.

      Delete
    3. That's merely the lawful remedy.

      Both here and in Bush vs Gore, a liberal state court took it upon itself to usurp a conservative state legislature's role. In Pennsylvania's case, the state court declared that late ballots (even without postmarks, so long as no one "proved" that the ballot arrived late) were to be counted, contrary to the laws the state legislature passed and they specifically refused to change for this election.

      Delete
    4. @Rob S

      Of course you're right. Ultimately the power to choose the members of the Electoral College rests with the several state legislatures.

      But what if the state legislature is inclined to certify a fraudulent or constitutionally infirm election?

      What if the Supreme Court finds fraud or unconstitutionality and the legislature goes ahead and certifies the corrupt result anyway?

      Here's a link to an article, published yesterday in the American Spectator, which begins to address the awesome responsibilities the Constitution reposes in the state legislatures.

      https://spectator.org/a-reminder-state-legislators-have-constitutional-power-over-elections/

      Delete
    5. @ missprism

      Or, say in the case of PA, could the legislature ignore the fraud alleged by litigants (and possibly confirmed by the Supreme Court) and send Biden electors to the Electoral College?

      Delete
    6. Here's a recent article updating steps being taken by Pennsylvania legislators to assert their authority:

      https://www.theepochtimes.com/pennsylvania-republicans-to-introduce-resolution-disputing-election-results_3596434.html

      Delete
  10. @Frank

    And consider:

    If there were no fraud, why would the Michigan AG threaten prosecution for merely alleging fraud?

    ReplyDelete
    Replies
    1. This strikes me as a great way to stiffen some Republican spines.

      Delete
  11. This level of expertise is golden. This raises claims of fraud to the level of FACT rather than just opinion:

    "I have performed forensic analysis of electronic voting systems, including the DVS Democracy Suite,
    ES&S (acquired by DVS), Scytl/SOE Software, and the Smartmatic systems used in hundreds of precincts
    in key battleground states. "

    ReplyDelete
    Replies
    1. Yeah, the expertise based on past experience of such systems ...

      Delete
    2. This guy Navid Keshavarez-Nia seems 100% expert-level, persuasive solid info, knows what he's talking about. As compared to the other guy (redacted) talking about DNS records & BGP peerings who sounds like an Introduction-To-Internet-101 student.

      Delete
  12. These systems were designed to facilitate fraud. That maybe not be the intent, except by Smartmatic, though.

    To have a system create ballots is inherently wrong philosophical. This means the trust of your mark on a clay fragment is completely a fabrication (industrial sense, not faking sense) of only your input, but not your creation. This means you have no real way to assert your vote was your vote. You can’t see your mark on the fragment. You have to trust it’s correct.

    Worse, they are designed not only to create a ballot, but to mimic voters who cannot color completely or within the lines, a kindergartner skill.

    Anything network is vulnerable. Anything using tcpip is vulnerable. Secure Sockets Layer is highly vulnerable. The Internet/Web was never designed for security. Security is an add on and just not that secure. Even if you use the best security internet standard, simple human intervention makes this moot (stolen keys or a simple click of the mouse that installs malware/trojans/etc as what happened with Podesta of Hillary’s/DNC’s team).

    Thinking of this even more programmatically, though, injecting code cannot work unless the system itself can compile executables. Yes, you have to have a system recreate itself or parts of itself for it to work which makes the system more like artificial intelligence.

    Betcha, though, it was more basic and possibly still advanced. Betcha it was stuff like BASIC like scripts (batches of commands) to circumvent the system itself. Betcha it was also using the truly functionality of the system to do the same.

    Flow charts of the system should show the vulnerable points and betcha they were ignored by the stuff suits of these companies.

    Any wonder the stiff suits of these companies are silent? Yep, Dominion had to hire an outside PR flak to defend itself. A hired gun tied to the GOPe.

    When a got a dude not long ago celebrated by the NYT as a smart dude saying this is BS, you know it’s real.

    ReplyDelete
    Replies
    1. According to Navid Keshavarez-Nia and last year's DEF CON hackers conference, Dominion's OS is Busybox Linux. As such, it's a trivial matter to modify anything in the Dominion machine once you're connected. It's the antithesis of a "secure" system.

      Delete
  13. OT

    I commend J E Dyer's latest piece to your attention.

    https://libertyunyielding.com/2020/11/25/he-doesnt-get-it-marco-rubio-calls-biden-national-security-picks-polite-orderly-caretakers-of-americas-decline/

    We have touched on this phenomenon here in various dimensions.

    What to make of Mitt Romney, Paul Ryan and John McCain?

    What to make of Richard Burr?

    What to make of Chris Christie, Pat Toomey and Liz Cheney?

    What to make of Andy McCarthy?

    Now, what to make of Marco Rubio?

    I think Dyer nails it. Biden's picks are hardly polite and orderly caretakers of America’s decline. Even if Rubio was being 'sarcastic', his sarcasm falls far short of truth and reality. He doesn't get it.

    To the contrary, Dyer says, these "are, instead, stop-at-nothing ideologues who are actively trying to reshape America’s position and role in the world, in a way that guts our national sovereignty and the protection of our rights, and imposes more and more onerous burdens and disadvantages on the American people".

    And, lest you think that's all that Dyer really thinks, read the comments where she has some 'open kimono' back and forth with her readers.

    As for me, I'm with her...and I'm left wondering how the Dems keep getting away with their spin...

    ReplyDelete
    Replies
    1. Hmmm. Just worked for me...Here's a link to Liberty Unyielding home page...Dyer's column on Rubio is a couple days old now.

      https://libertyunyielding.com/latest-columns/

      Upon reflection, I think my point is that the Marco Rubios of the Republican Party need to reflect a bit more about whether a Biden administration would be an unpleasant, but bearable return to some kind of innocently misguided normalcy or whether it isn't an existential threat to our national enterprise.

      Delete
    2. Yes. Worked this morning. Good article.

      Delete
    3. I'm with Cassandar and JE Dyer on Rubio.

      Being a Florida native and watching the rise of the tea party and then the co-opt take over I point the finger directly at guys like him as an example of what the Republican party really is.

      Voters have 3 day amnesia on their politicians. How we have not primaried that weasel out yet is beyond me.

      His stand-in chairmanship for Burr makes me wanna throw things!

      Delete
    4. This is tantalizing, from one of Dyer's responses to a commenter:

      "If I'm right about what I think, flipping the switch on the "transition" funding at GSA is the key. Trump's officials need a vehicle for sitting down with Biden. the forms of a transition give them one.

      I'm not ready to go to press with what I suspect they're going to tell him, but that 2018 EO would have been the foundation for it."

      Things are never what you might think!

      Frank

      Delete
  14. https://twitter.com/marcorubio/status/1331238258509045761

    But...just to see what a polarized world we live in...compare JE Dyer's (and my) take on Marco's tweet with the overwhelming assault on his tweet coming from the Left...

    ReplyDelete
  15. Navid Keshavarez-Nia did not kill himself.

    ReplyDelete
  16. This particular preference cascade will be interesting to watch, what I mean is any cyber security professional who wishes to go on record refuting the Dr's points? No, not when the whole point of being a cyber security professional is to you know have expertise that clients will trust. The liberal game if pretending not to know things doesn't work here. And refers to the overseas server? Uh oh.

    ReplyDelete
  17. https://www.legis.state.pa.us/cfdocs/Legis/CSM/showMemoPublic.cfm?chamber=S&SPick=20190&cosponId=32629

    ReplyDelete
  18. Maybe Ramsland is Kraken. His Georgia affidavit says the votes reported by Dominion aren't whole numbers. They're computed numbers containing fractions. That in itself is proof that the REPORTED vote numbers aren't ACTUAL vote numbers. The votes weren't counted - they were computed.

    ReplyDelete
  19. Wow on this challenge growing legs!!!

    Pennsylvania State Judge Upholds Halt To Certification, Finds Likelihood Mail-In Balloting Procedures Violate PA Constitution

    https://legalinsurrection.com/2020/11/pennsylvania-state-judge-halts-certification-finds-likelihood-mail-in-balloting-procedures-violate-pa-constitution/

    ReplyDelete
  20. Well, since this Hammer and Scorecard has been in the service of US Gov for quite a while, at some point, someone will point at the elephant in the room.

    Why has this been allowed to run in US? Local administrations might (e.g TX) or might not (e.g GA) be able to assess its full dangers. But isn't there responsibility at top echelons for allowing this travesty?

    IOW, this Kraken might bite back Trump Admin and many previous admins such as Bush and Obama, as well. I guess that's why it's called a Kraken, and that's why Powell needed POTUS permission to release it, and was excluded from the legal team.

    ReplyDelete
  21. Just remember folks that allegations sound great in the filing, but don't necessarily reflect reality or what will be accepted as fact by the court. So remember that this looks big, but might turn out to be a blowfish.

    ReplyDelete
  22. Just finished reading the exhibit. One thing is certain, that guy labeled this election as cleanest in history and then got fired by POTUS, should be in jail.

    ReplyDelete
  23. It seems the massive election fraud campaign omitted California as the democrats probably thought they had that state in the bag. Just read where another CA congressional district flipped to the Rs. How many is that now? It seems to be an example of what would have happened this election if not for the massive fake/false/illegal ballot dumps in the swing states. There was never any enthusiasm for Biden and the BLM/Antifa assaults and defund the police rhetoric (and actions) greatly contributed to a major pushback against the democrats IMO.

    DJL

    DJL

    ReplyDelete
    Replies
    1. This is funny.

      https://twitchy.com/dougp-3137/2020/11/28/ouch-nrcc-thanks-rep-ted-lieu-for-last-years-house-election-taunt-that-has-aged-like-milk/

      The only thing funnier would be for Lieu to be denounced to the FEC for making an undeclared contribution to the NRCC.
      Tom S.

      Delete
    2. Nice catch DJL. It is curious how every anomaly seems to evaluate to the benefit of Joe Biden.

      Delete
    3. Yes, a comparison of voting percentages (for Biden) should be made between the suspect cities (Philadelphia, Atlanta, Pittsburg, Milwaukee, etc.) and those in non-battleground bastions such as LA, San Francisco, New York City as to turnout. That would be another indication of election fraud as well, as the only upticks were likely seen where they needed to manufacture votes to keep Trump from winning.

      DJL

      Delete
  24. "In another case for Edison County, MI, Vice President Biden received more than 100% of the votes at 5:59 PM EST on November 4, 2020 and again he received 99.61% of the votes at 2:23 PM EST on November 5, 2020. These distributions are cause for concern and indicate fraud."

    The fact that there is no "Edison" county in Michigan or any other US state is cause for concern about Mr. Keshavarz-Nia's attention to detail.

    I wanted to check this data, but now I have no idea where he is referencing. "Edison" is the name of the company that provides the election data. Understandable mistake in a high school assignment, but embarrassing in a legal filing.

    ReplyDelete
    Replies
    1. Easily identified and fixed. You seem to embarrass easily. Lawyers make typos, too--not just HS students. Hey, Cassander caught me typing 'criminal' when I meant 'civil'. I didn't even blush. I recommend you toughen up a bit.

      Delete
    2. Yup.

      The perfect is the enemy of the good.

      I, too, used to be pretty old school on errors in written work to be seen by others.

      I've come around. Especially where we are now. Better to get the essence of the story out than worry about 'embarrassing' (to who?) typos, esp when they are obviously not intended to mislead and easily corrected.

      Powell and Giuliani and others are under huge time pressure now to make the case. They are also highly experienced and well aware that mistakes are being made as they race to finish. I trust they are quite competent to weigh the various competing demands and risks and make the right decisions.

      Delete
    3. Might be Kent County, Michigan, but I am just going from memory of other posts I have seen describing the live feed.

      Delete
  25. There is no such thing as "Busybox Linux".

    Even to mention it throws the whole affadavit into question. Did this person really file this affadavit? The person whise name is on it would certainly know that there are "busybox" and "linux", but not "busybox linux". Specific versions of each of Linux and Busybox, and of whatever system they were part of, determine whether and how the system was vulnerable. Just mentioning the name does not tell anything about what vulnerabilities the system once had, still has, or has since got.

    There are other claims, such as details in 15j, that are not supportable by the evidence available.

    So, I call shenanigans on the affadavit.

    ReplyDelete
    Replies
    1. I call shenanigans on YOU:

      "BusyBox is a software suite that provides several Unix utilities in a single executable file. It runs in a variety of POSIX environments such as Linux, Android, and FreeBSD, although many of the tools it provides are designed to work with interfaces provided by the Linux kernel. It was specifically created for embedded operating systems with very limited resources. The authors dubbed it "The Swiss Army knife of Embedded Linux", as the single executable replaces basic functions of more than 300 common commands. It is released as free software under the terms of the GNU General Public License, version 2."

      You're obviously trying to obfuscate rather than enlighten.

      Here's a little bit of enlightenment for you: the word is "affidavit."

      Delete
    2. "No such thing" as Busybox Linux?

      The Busybox Linux developers would disagree:
      https://www.busybox.net/about.html
      "BusyBox: The Swiss Army Knife of Embedded Linux"

      Anonymous trolls usually exhibit more intelligence.

      Delete
    3. Right. And of all people, Bruce Perens originally wrote it.

      Delete
  26. Bottom Line, If the Democrats cannot show that the votes were valid, no matter how, they should be tossed out. This Purposeful FRAUD needs to not just be investigated but ALL those involved, no matter how small, need to be sent to PRISON for a minimum of 15 years, with longer sentences for the leaders...50 years, NO PAROLE!

    ReplyDelete
  27. When I came to America over half a century ago things were bad post Watergate & Nixon resigning then into Carter days but never imagined things will get so fucked up as of these days! America is a Chinese mercantilist territory and the Beltway denizens along with other pols had facilitated that fact when Obushintons offshored manufacturing capability after grifting!
    Trump tried to make a stand that Chinese agents in America fixed through power of money, money talks and bullshit walks is still true in Disunited America!

    ReplyDelete