[–] 15106287? 0 points 10 points 10 points (+10|-0) ago
You can bet that the DS lost most of these capabilities during this election. Q pretty much stated this. Many machines were equipped with PROMIS style intrusion systems which used a variety of means to change tallies undetected...until these were nullified. Probably since the 'agency' has lost most of their servers and access ahead of time. This would explain why DS had to go back to hand stuffing ballot boxes in CA, GA, FL, AZ, etc... They are now inventing new paths to accomplish what they cannot do manually. All those man hours in these various states were not only wasted, but they actually worked their tails off providing EVIDENCE to convict themselves. This 'security' scheme described above will end in similar fashion. Remember, never interrupt your enemy when he is in the process of destroying himself!
[–] 15106333? 0 points 20 points 20 points (+20|-0) ago
In Q post 1197 he is responding to an anon who asks will election fraud be revealed soon and q responds yes, midterms are safe, watch CA. Was Q telling us to watch certificate authority? I believed it was Cailfornia and it may be or it may have double meaning.
[–] [deleted] 0 points 40 points 40 points (+40|-0) ago (edited ago)
[–] 15104587? 0 points 9 points 9 points (+9|-0) ago (edited ago)
Technically, the CA doesn't hold the keys, they only sign the certificate to attest authenticity. The private key is on the server that generated the key. What could happen though, is the CA could generate a false certificate that can be used in a man-in-the-middle attack.
Now, if the CA offers to generate the public/private key pair for the customer, it requires the CA to "forget" the private key, which is where some shenanigans could occur. It would still require the CA to mount a man-in-the-middle attack between the election polling endpoint and the receiving server in order to use the keys.
In that scenario, if you're talking about the local wifi in the polling location, someone would need to have a device planted in each polling location to use the Mana Toolkit. If you're talking about an election board's server transmitting results to the State's election board, they would need to hack into a device between the two servers. The "easiest" option I see would be planting a device at polling places in fraud-friendly counties.
[–] 15104735? 0 points 3 points 3 points (+3|-0) ago (edited ago)
So basically that means all voting records should be audited to find the difference between intercepted and original ones. The problem is the SSL system is designed on trust to highest authority-in this case the certificate issuing authority. This is by design and we understand why now .
[–] 15103648? 0 points 9 points 9 points (+9|-0) ago
Thank you for your work. A though or question, how much further and deeper can election fraud go? Clearly, the scope of the problem unknown, it seems we can only begin to eliminate the fraud only after we have the bad actors boxed in.