Posted on 11/12/2020 12:44:25 PM PST by Red Badger
It's amazing how so many jurisdictions, mostly controlled by Democrats, didn't take the time to examine the weak security of this voting software. Unless...
=========================================================================
Anyone with minor IT knowledge and a desire to manipulate election results could do so through the software provided by Dominion Voting Systems, an IT professional has determined.
Ron,, who goes by @CodeMonkeyZ on Twitter, has gone through as much documentation as he can get his hands on regarding Dominion Voting Systems. A former Admin for 8kun, Ron has and continues to comb through manuals in search of vulnerabilities within the software. What he has found so far is an avalanche of information that points to a few conclusions regarding this and possibly previous elections.
But the biggest takeaway is that the software appears to be designed with many vulnerabilities that would allow nefarious forces to easily manipulate election results with the click of a few buttons. His research is so startling, its baffling that so many jurisdiction1700 according to their websitehave chosen to allow this software to operate their elections. Was that by design?
Much can be learned by the state of the software and folders holding (or no longer holding) information about the election, according to a Tweet Ron sent in reply to President Trump this morning.
Look in the "C:pathtoprojectNotCastImages" folder on all the ICC hardware for ambiguous ballots. Arizona had a lot of issues with sharpie markers. The ICC hardware might have marked such ballots as ambiguous. Ambiguous ballots are not counted, but are saved to a folder. pic.twitter.com/hgZ3NcnigK
Ron (@CodeMonkeyZ) November 12, 2020
Some of the vulnerabilities are so glaring, many jurisdictions that are mostly managed by Republicans chose to pass on the solution. This lends to the theory that those who chose to use the software did so either not knowing how bad it was or with full knowledge that it could be easily manipulated.
Smells like FREEDOM. Order Founders Blend Organic Coffee from Freedom First Coffee. Use "NOQ" as the promo code for 10% off!
An analysis commissioned by the Texas Department of State last year recommended against using the software and hardware for a number of reasons:
Computer systems should be designed to prevent or detect human error whenever possible and minimize the consequences of both human mistakes and equipment failure. Instead the Democracy Suite 5.5-A is fragile and error prone. In my opinion it should not be certified for use in Texas.
If certification should be granted, it should be with the condition that all open network and USB ports be sealed.
A thread yesterday by Ron revealed how easy it is to make changes to election results as desired, as well as the conspicuously lax security protocols inherent to both the software and hardware.
What we have learned so far from reading the Dominion Voting System manual:
Ron (@CodeMonkeyZ) November 12, 2020
2. Network Security is very weak since all software access keys use the same cryptographic pair. This gives plausible deniability to whoever potentially decides to mess around with voting settings. It cant be proven who changed a setting since everybody has the same key
Ron (@CodeMonkeyZ) November 12, 2020
4. Cryptic "split rotation" function that features the ability to "force a maximum deviation". There is no definition of a "split rotation", so we cannot know what "force a maximum deviation" means in this instance.
Ron (@CodeMonkeyZ) November 12, 2020
6. Dominion is a black box with votes ultimately tabulated in a central server system. Who has access to the central server and where is the manual and security reviews of that server software?
Ron (@CodeMonkeyZ) November 12, 2020
8. State of Pennsylvania requested semantic changes to the Dominion voting software, possibly to aid in their lawfare efforts. The word "Cast" became "Print", obfuscating the moment when your vote becomes officially cast. For what reason is currently unknown.
Ron (@CodeMonkeyZ) November 12, 2020
More to come later. Many people have sent me (completely publicly available) Dominion security audits, documents, manuals, and state contracts. Have a lot of reading to do.
If there are any potential election fraud settings hiding in plain sight, I will do my best to find it.
Ron (@CodeMonkeyZ) November 12, 2020
Ron has been dropping other information about Dominion Voting Systems throughout the day and night.
After reviewing the Dominion Voting System user manual, it seems the local IT guy who services the machines is theoretically the ultimate political gatekeeper. He has absolute power to decide elections.
Ron (@CodeMonkeyZ) November 11, 2020
What if election fraud was as easy as dragging votes from one folder to another? Who are the county representatives (between 2 and 6 people per county) that had official training for the ICC device in their county? Do you trust those two to six people with your election results?
Ron (@CodeMonkeyZ) November 12, 2020
If I had forensic access to the live configuration data, logs, settings, and intranet setup of the Dominion voting system used in the districts reporting anomalies, im confident I could quickly and conclusively blow the lid off digital election fraud if it had actually occurred.
Ron (@CodeMonkeyZ) November 12, 2020
Ballots are 100% interlinked with the voting software. Sending a blank ballot allows the software to tabulate votes differently from a ballot that is correctly populated.
Whether these blank ballots were used for fraud is an exercise for investigators to prove. https://t.co/rAsvw2X2vW
Ron (@CodeMonkeyZ) November 12, 2020
If you were an election official in Pennsylvania who was trained to work on the Dominion Voting System, please contact me. Im interested in learning about what training you had regarding the technical aspects of the Dominion system.
Ron (@CodeMonkeyZ) November 12, 2020
Has Pennsylvania ever sent blank ballots to constituents? If yes, what eventually happened to those blank ballots?
Ron (@CodeMonkeyZ) November 12, 2020
Are your election workers being monitored during this process? If so, who is watching them take data from the tabulator machine, copying it to a flash drive, and delivering it to the county office? Is a proper chain of custody maintained?
Ron (@CodeMonkeyZ) November 12, 2020
Perhaps the biggest takeaway from all of this is that it does not take an army of people to manipulate vote results through Dominion Voting Systems. The vulnerabilities Ron found reveal many points of attack that could be initiated by a very small number of people. Again, one has to wonder if this was by design.
Its up to the Presidents team to determine if any voter fraud took place. What Ron@CodeMonkeyZ has demonstrated is how easy voter fraud could happen through Dominion Voting Systems if someone chose to do so.
Its in their user manual even (screen shots here)
http://freerepublic.com/focus/chat/3905192/posts?page=171#171
Good find, thanks!
Good heavens! It’s a ‘HOW TO’ Manual for cheating!..................
This was a pre-planned, widespread, systematic attack on our election by corrupt democrats and their shadowy enablers. I would use that word, too, attack. Turn the dems language they invented for their phony Russian collusion hoax back on them, and shove it in their faces.
And make it crystal clear that the Dominion system wasnt exploited because of vulnerabilities, but rather was used exactly as designed by democrats to attack our election by stealing votes from their opponents.
“His research is so startling, its baffling that so many jurisdiction1700 according to their websitehave chosen to allow this software to operate their elections. Was that by design?”
“It’s a feature” wasn’t a joke after all.
I worked at a department store where failure to lock the doors and set the alarms was a fireable offense, Leaving the premise unsecured so buddies could steal grocies got one manager fired and arrested.
It was written as designed.
Unfortunately, it was probably designed to be exploitable.
“Seeeeee-it, Man. We wuz jus doin’ what day told us.”
Sadly showing it was possible is not the same as proving it was done.
Would they love their ACCOUNTING SOFTWARE to do the same?
OR
Their BANK’S software?
Take a few dollars here, a few dollars there, give them to ANOTHER ACCOUNT?..............
Having e-mails and telephone conversations recorded of the people involved coordinating these crimes is................
Of course, we know the answer: these monstrous hypocrites only care if their ox is gored. No morality that was ever held by any Western society will stop them from lying, cheating, stealing or even murdering to obtain total power.
By Any Means Necessary (BAMN).........................
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.