Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: butterdezillion
As I alluded, the previous code (quite possibly extant at the time of the forgery) would be compared to the current code (claiming to do these counter-intuitive resolution changes and layerings for a scan).

One exploratory level would be to examine whether the earlier code (on a different, not-updated Xerox7655) does the same layering and resolution changes. If that machine doesn't do the layering claimed or even demonstrated on either the White House machine, or a machine that has updated driver software, you've exposed the lie. If someone were to examine the "nuts and bolts" of the actual code (object, or better yet, source), one might find the unique conditions where such an anomaly occurs, e.g., 'FaxID=White House' and 'greensecuritypaper=true'.

A likely, potentially troublesome aspect would be that a Xerox or Adobe coder may have backdated an update module, such that loading a driver that was supposedly current at the time of the forgery from a Xerox or Adobe website for the Xerox7655 might exhibit the same anomaly as the most current version. Finding a Xerox 7655 that hasn't been updated more recently than the forgery date and observing its behavior will be very helpful toward exposing the truth.

HF

143 posted on 08/10/2013 9:01:00 AM PDT by holden (Alter or abolish it yet?)
[ Post Reply | Private Reply | To 126 | View Replies ]


To: holden

Ah, you got to my posts before I remembered to alert you to them.

Shouldn’t Xerox have a way to audit the updates to see when they were really made?

I think it would be hard to find somebody using that expensive a machine who didn’t have the machine connected to the web and set to do automatic updates. Even if they weren’t set to do automatic updates, if the machine was connected to the web at all they could force an update, if what Snowden says is correct.

And then there’s the raising-the-bar technique they always use. If you show that the system was not working this way at 1 second before the long-form was scanned, they’ll claim it was changed within that millisecond and then reverted back to the other way immediately afterwards - all coincidentally, of course. They’re gonna do the same thing with the security background. And it’s the same thing that they’ve done with the BC#’s. They’ll do it again with the 1961 death certificates if they think I’ll bother to pursue the anomalies on Virginia Sunahara’s death certificate. This is why you can’t win against a thugocracy. When the whole thing is corrupt and they have the means to spy on everybody researching their crimes and corruption as well as to seemingly alter/manipulate reality (through back-dating, etc) it’s a rigged game.

Thing of it is, by saying anything about any of these things, both you and I have clued the regime in to how they could evade detection. But we may as well say it in public because they will know what we’ve said even if we try to say it privately (that’s what the spying is all about) - and if we say it in public maybe enough people will get on the ball and do something BEFORE the thugs can make the fix.

So - if anybody has a Xerox WorkCentre that has been unplugged from the internet since before April of 2011... time to come forward. Maybe a company that has had one of these machines in stock and it hasn’t sold yet...


146 posted on 08/10/2013 9:22:59 AM PDT by butterdezillion (,)
[ Post Reply | Private Reply | To 143 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson