It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Boadicea
From Arizona:
Arizona Audit To FINISH Paper Recount TOMORROW – They Need The ROUTERS
Question for anyone who knows: What exactly can they learn from the routers? And would they need this information if the audit's ballot count/vote tally matched (or almost matched) the County's ballot count/vote tally?
I have a general idea I think... but I'm also afraid I could be totally misunderstanding the situation too. So if you know please explain it to me like I'm a five-year-old... and thanks in advance!
originally posted by: IndieA
originally posted by: IndieA
Also, here's a little more about the situation with Ken Bennett. Warning, this article is bias and gets several facts wrong.
slate.com...
It basically says that Bennett has been kept in the dark on actual results, and that Bennett and the auditors had disagreements about it. Bennett claims to question the auditors trustworthiness, even though we now know that he wasn't getting the full picture. One strange aspect about this, is that this article claims that he is still working on the audit, just remotely.
This makes me wonder if he was trying to get inside information from the auditors, and why.
He seemed genuine about election integrity and this audit, but who knows where his loyalies lie. I do have to wonder if he came under serious threat, and or, was pushed to try to collect Intel.
originally posted by: MDDoxs
a reply to: Boadicea
So when will we actually see the results?
Will it be broken down by actual votes for each party or will they summarize by how many fake ballots there are?
originally posted by: bloodymarvelous
One of them can be debunked.
The tech guy explained what he did to protect the machines from tampering.
He says when he first made the virtual copy of the machine, he made a "hash" of the data and put the hash in a vault. I think he was assuming everyone knows what that means.
Hashing data is how Bitcoin protects its transaction history.
So in other words, anyone with the ability to hack in and change something without invalidating a hash, would also be able to hack bitcoin.
So there is no basis to "decertify".
Tampering with a hash protected machine would be pretty hard even if a nation state directed its whole network to doing it. Maybe aliens can defeat that.
originally posted by: Boadicea
Question for anyone who knows: What exactly can they learn from the routers? And would they need this information if the audit's ballot count/vote tally matched (or almost matched) the County's ballot count/vote tally?
originally posted by: bloodymarvelous
The answer, apparently, was that the system is so vulnerable that an average "script kitty" (entry level hacker that doesn't know how to write their own code, I think) could hack it in 10 minutes.
originally posted by: Boadicea
It basically says that Bennett has been kept in the dark on actual results, and that Bennett and the auditors had disagreements about it. Bennett claims to question the auditors trustworthiness, even though we now know that he wasn't getting the full picture. One strange aspect about this, is that this article claims that he is still working on the audit, just remotely.
It actually sounds to me like someone smelled a rat.
originally posted by: Boadicea
I get the feeling this says more to you than it does to me... I need it explained like I'm a five-year-old. All this says to me is that because this guy "hashed" the data, it is preserved as it was received. And this "hashing" would reveal anything changed after this. But this "hash" would not reflect all that went on prior to the hashing, correct? It would simply capture that particular moment in time, correct?
How would the hash prevent tampering?