Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- I'll be honest, to me it looks to have too many moving parts and leaps of the imagination with no real credible evidence.
- You need to get your hands on one of these altered tripp-lite-spikecube devices and prove it was altered and/or find some engineers working for these companies on somewhere like linkedin and question them.
- Also, the whole "AI altering the ballot images" is again, a leap. OCR/computer vision programs don't need AI to do that type of thing and all it does is serves to muddy the waters as normal people (who aren't programmers/AI-informed) will see "AI" mentioned and swallow whatever you're selling because they don't know any better.
- Apart from that, I'm still unconvinced that after the tripp-lite devices with sneakily added "RF emitters" are able to hijack WiFi signals of tabulators/voting machines already connected, to force them to connect to the starlink dtc thing -- that there'd be enough time to send and receive all of that data to/from the "AI supercomputer" to do something as simple as manipulate the image.
- Anyway, it's an interesting idea; I just need some proof rather than speculation.
- -------------------------------------------------------------
- By proof I mean proof of this attack vector and series of steps. The results we have indicate something happened but in any plan like this, you want to minimize the number of moving parts to reduce the likelihood of any single part breaking the whole process and preventing the outcome you seek.
- We have credible evidence for multiple real-world interventions such as voter suppression/challenging votes, ballot boxes being destroyed, mail-in ballots being dumped and so forth.
- We need an altered device that was part of the election to teardown, or somehing like a verified employee/part of the scheme to verify these opinions/parts of the attack.
- What we have right now is a lot of speculation and that's fine, that's how we come up with possible attack vectors but the more moving parts they have, the less likely they are to be a reliable attack vector.
- A tabulator SQL injection is just as likely (perhaps moreso because of its simplicity) as this. It could also be some other kind of pre-installed malware on the machines themselves, or any other number of vectors; at this point we just don't know enough.
- -------------------------------------------------------------
- (he asked me why I'm even here questioning his theory)
- Because I have been in this subreddit supporting the initiative to figure out how trump won since just after the election.
- Because I don't believe he won legitimately.
- Because I've been watching as russia has interfered with multiple elections in the EU and know that trump is a russian asset.
- Because I'm trying to stop people discrediting the real and important work people have been and are continuing to do by analysing the voter data.
- This subreddit has been trolled by people and bots to try to distract from voter data, to try to spread misinformation, to try to lump us in with fringe conspiracy theories to make it much more easy for people to discredit us.
- That's why I'm here dude, because I actually care and want trump in jail.
- -------------------------------------------------------------
- I see a detailed series of guesswork, I see no actual, viable proof.
- Connections can be made between almost everything if you look hard enough and squint your eyes, that means nothing until someone brings forward some undismissable evidence.
- I'm not saying this to try to stop you from investigating, I'm saying this to show that theories like this need something more substantial than some diagrams.
- -------------------------------------------------------------
- (this is my response after he accused me of trying to suppress his findings and after he responded "unlikely" with other disparaging comments to the "why I'm here" above)
- You see now you seem a little unhinged.
- Merely questioning your speculative series of diagrams and connections and asking for something more credible does not mean I'm trying to suppress anything.
- Ensuring you properly communicate what you're proposing by calling out the usage of "AI" here is also not pedantic, it is clearing up a term that muddies the water. Communicating something like this requires you be as clear and accurate as possible to maintain any credibility.
- I am not communicating in bad faith, I am trying to ascertain what evidence there is to support such a theory and being unclear or inaccurate in that process helps no one, least of all yourself.
- -------------------------------------------------------------
- (the edit below was in response to his claims that he had told me multiple times to leave him alone and claiming my issues with his theory were wrong/meaningless)
- Connecting the dots is fine, but evidence is what substantiates any speculation to be more than random ideas.
- For example, you left out the fact that the routers themselves are only vulnerable if the configuration setting is left on.
- "Security advisory: Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Arbitrary File Upload Vulnerability
- Workarounds
- There are no workarounds that address this vulnerability. However, administrators can disable the affected component of the web-based management interface by logging in to the device and disabling the RESTCONF option under Firewall > Basic Settings.
- While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment."
- I'm not sure what the security environment of the individual election sites are, but it's almost certain that the people maintaining those networks get notified by cisco as a customer on their website, I am unsure if they email out security advisories.
- Edit: I will note that the response below has been edited with extra comments and a claim that I was told to leave him alone. I am no longer responding but as my profession is literally computer security, I would like to add that there are too many leaps required here for the theory to work in general and for me to believe it.
- -------------------------------------------------------------
- (trying to calm him down and make him see reason that there are issues with his theory)
- I am not insulting you. I am trying to convey issues that I am seeing when trying to believe this is the attack vector that was used to swing the election.
- In this process you have repeatedly tried to dismiss my responses and are incredibly defensive about being asked to provide something more than speculation.
- There are holes in what you are presenting here and in trying to indicate these to you, you have responded with disbelief and tried to disparage my own attempts to understand and strengthen your theory by highlighting these issues.
- I'm not sure what more can be said or done here on my part so I'm just going to disengage at this point.
- -------------------------------------------------------------
- All of this was interleaved as he responded to me in two separate places so we were going back and forth. Anyway I think you can pick up the gist of how he was responding to me
Advertisement
Add Comment
Please, Sign In to add comment