Posted on 11/11/2020 12:58:18 PM PST by Golden Eagle
Footage from a DEFCON hacker conference in Las Vegas shows a female hacker demonstrating how to gain admin access on a voting machine in less than two minutes.
In the video from 2018, SocialProof Security CEO Rachel Tobac shows how an election machine used in most states can be easily compromised in seconds with no tools needed.
According to a press release, voting machines made by Premier Election Solutions, which was acquired by Dominion Voting Systems in May 2010, are currently in use in over 1,400 jurisdictions in 33 states and serve nearly 28 million American voters.
(Excerpt) Read more at infowars.com ...
I guess we are screwed
Gaining admin access to the voting systems is easy. The hard part is finding the password.
No wait. The password is actually accessible within the system itself. A fifth grader could manipulate the US voting results.
Makes you wonder how many thousands of users manipulated these millions of votes for Biden.
It’s not a bug, it’s a FEATURE!.........................
Dominion software / hardware was designed for open access. the admin password is even stored in clear text. The audit file is completely open to editing or even replacing. All the files are open. If was designed to allow voting files to be read, edited, replaced followed by editing the audit files removing entries that documented the tampering. Don’t even need anything sophisticated. I’m just very surprised that they didn’t bother to created a menu system to expedite the process.
A security firm in Texas did a thorough analysis of Dominion. Went to the FBI, went to Homeland Security CISA, DOJ, even the Texas AG and SoS. Nobody would even take a meeting to listen to the findings. Video link was posted here on FR within the past couple of days. Plenty of credible details. Wish that I could find the either briefing with explicit technical details.
If would be impossible through incompetence to make software that open to tampering. It could only be that open by design.
How hard is it to guess “ORANGE MAN BAD”?.....................
Wow.
Everyone should watch this. Cyber security company deep dives our voting system. They got in from the street outside, in three minutes using their cell phone. You will be astonished if you watch this. Well worth your time.
https://www.bitchute.com/video/scUpSRkNoJ9g/
Post 9 has a link to what you are describing.
Yep, our elections are worthless.
bkmk
But, are these machines connected to the Internet ?
P
“But, are these machines connected to the Internet ?”
Yes, the machines were connected to the Internet. There is a Ga story about an update the night before that indicated it was connected to the internet.
An IT person testified the Detroit location was connected to the internet too.
“Post 9 has a link to what you are describing.”
Post 9 is very interesting. The votes pass through a server overseas.
Yes, the machines were connected to the Internet.
That should be enough to disqualify both states - GA & MI
You need to watch the video on Post 9. Looks like all of the voting software solutions are connected to the internet.
Following the manual, turing the machine on, booting it up, and running administrative operations is not hacking it. Running a machine or computer as it was designed is not hacking. What she did, in no way alters the programming to flip votes. This is not to say this is a good way for a voting machine to operate.
She only showed turing it on. Now how to program it for elections, the testing, storage or other security procedures that are supposed to be in place.
(my recollection) In Bell County, Texas, every voting device had wifi configuration to both Verizon and AT&T.....a feature. /s
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.