[–] 26555412? 0 points 1 point (+1|-0) ago  (edited ago)

A dumbocrat coder would come up with

if (voteForBiden) bidenVoteCount = bidenVoteCount + 10;

if (voteForTrump) trumpVoteCount = trumpVoteCount + 1;

[–] 26556476? 0 points 2 points (+2|-0) ago  (edited ago)

Nope, if they wanted to conceal rogue code they would trigger an overwrite of the biden subroutine, and then overflow that with stack data.

The whole concept of running voting software on a windows PC is flawed, the vote needs to be done by sealed hardware supplied by a security org, and then multiple independent counters both record what was output. Then post election, the hardware is independently audited.

Relying on ONE software company is not how mission critical industrial control systems are built.

Banking already uses sealed encryption hardware

[–] 26556968? ago  (edited ago)

then overflow that with stack data

Please don't throw around terms you don't actually understand. It would make no sense to do that and it would be counter to their goals.

[–] 26557191? 1 point -1 points (+0|-1) ago  (edited ago)

honestly, go fuck yourself, I was writing code on the Z80 before your Dad was a sperm

if you don't know how to overwrite malicious code on purpose, by using code from legit subroutines to overwrite the space it's sitting in, then it's YOU that doesn't know what they are talking about

[–] 26555357? 0 points 2 points (+2|-0) ago  (edited ago)

Would you be able to have code that does the fraud and then deletes the offensive bits?

There are so many points of failure - the whole system stinks from top to bottom. Just tabulating in foreign nations presents a thousand holes to exploit.

In a well designed system there should be a FULL audit trail from the ballot to the final count, that anyone can go back and verify each step.

Why do banks never get their numbers wrong?

[–] 26555427? [S] 1 point -1 points (+0|-1) ago  (edited ago)

To do that, you would have to have a CPU that could overwrite it's own code and I don't think that is possible. You could do that with a coprocessor and if the exact location of the code on the CPU was known, which would be easy, then you could have it so that at a certain time, that code was overwritten with a harmless and unsuspecting comment, but, then the code on the coprocessor would be there, showing what storage loations were overwritten, or it could delete its own firmware but then you'd have this blank coprocessor sitting there connected to the main CPU like "what's this for?". We would have to forensically analyze the hardware and the software, which is possible.

[–] 26556930? ago 

What the fuck are you jabbering about? Of course code can delete itself.

[–] 26555620? ago 

You underestimate the unlimited skills of the Venezuelan and Serbian programmers LOL

[–] 26555544? ago 

It wouldn’t take that. Just some code to clean up after itself... I’ve written a few exploits in my day

[–] 26555491? 0 points 1 point (+1|-0) ago 

Don't worry the nations most trusted organization is on it, the FBI.

[–] 26558399? ago 

Banks do get their numbers wrong. But they keep their mouths shut and eat the errors if necessary. Database recovery program developers know this is true.

[–] 26555437? 0 points 3 points (+3|-0) ago 

thanks for the info.

[–] 26556013? 0 points 3 points (+3|-0) ago 

Don't thank him for the information.
All compilers do is convert higher level languages into Assembly, and Assembly can be read by humans, or coded in.
https://en.wikipedia.org/wiki/Assembly_language
Roller Coaster Tycoon was coded entirely in Assembly, by a grade SSS+ Autist.
http://www.alearned.com/roller-coaster-tycoon-programmed-one-guy-assembly/
The code can be analyzed, as is, without the need of a decompiler.
A decompiler just makes the analysis faster for junior-mid level programmers.
And yes. I am claiming that you are not a high level programmer, unless you can read and write in Assembly.

[–] 26557659? ago 

Compiled code gets converted into machine language, essentially just a bunch of numbers. The following instruction x86 instruction:

MOV eax, 1

Raw can look like this:

00 15 00 00 00 04 00 00 00 01

These numbers are just random, unless you assign meaning. 00 15 could be the x86 opcode for 'MOV' and then the CPU knows that MOV takes 2 operands, a destination and src and reads a certain number of bits ahead for each operand. This is how compiled code works, it reads a number, this gets converted to a CPU operation, and then each CPU operation has a number of operands that the computer has to read.

This is why you have to compile for each target machine x86 vs ARM vs SPARC or 32 vs 64 bit. And to reverse engineer any compiled program, you need a decompiler because it gives you context to the bits.

[–] 26557498? ago 

True. But tedious as hell.

[–] 26556236? 0 points 1 point (+1|-0) ago 

Hey man, I know nothing about code or how any of this shit works. Was just thanking the dude for posting information that was interesting. Didn't even know what the hell a "compiler" was. Actually I still don't really know, but hey, at least it's got me interested.

[–] 26556585? 0 points 3 points (+3|-0) ago 

The code can be analyzed, as is, without the need of a decompiler

while technically true, in practice it is not. it sounds from your post that you're a fanboy of coding, but not an actual assembly coder beyond perhaps a "hello world". even just following JMPs around is such a huge pain in the ass that we have made tools to make our lives easier which includes disassemblers. and if the code is intentionally obfuscated it becomes arbitrarily difficult to read without toolkits. would you really want to follow a thousand references in a row by hand?

or are you going to tell me that all the best crackers in the world are junior-mid level programmers because they use tools instead of wading through printouts of raw assembly?

btw nobody codes in assembly unless they're autistic or have to (which is a tiny number of cases). from a practical standpoint, C is a tool for writing and reading assembly faster and with fewer mistakes. and, given the state of compilers these days, the assembly that C generates is faster than hand-written assembly outside of a handful of toy examples.

A decompiler just makes the analysis faster for junior-mid level programmers. And yes. I am claiming that you are not a high level programmer, unless you can read and write in Assembly.

that's like saying you're not a good construction worker unless you can move a large pile of dirt with a spoon instead of a shovel. and that bulldozers are for noobs.

[–] 26555268? 0 points 3 points (+3|-0) ago 

Would the machine confiscated in Germany possibly be the machine needed to prove this?

[–] 26555294? [S] 0 points 2 points (+2|-0) ago  (edited ago)

It all depends on where the offending code resides.

[–] 26555343? ago 

The Military must have thought or known it was in Germany if they raided a building for one machine. Personally, I would put my money on that machine.

[–] 26555521? 0 points 1 point (+1|-0) ago 

On AWS servers that went down yesterday...

[–] 26555421? 0 points 5 points (+5|-0) ago 

Yes, determining that the machines were programmed for a specific outcome will take time though.

We don't have that much time. Like Rudy said, it could take 6 mo to a year or more to prove this in court.

The afidavids of eye witnesses and their testimony in court and data showing massive spikes of vote dumps in a few minutes, is I think enough to declare that election invalid.

[–] 26559332? 0 points 1 point (+1|-0) ago 

Not if you used FISA and caught all the players playing....

[–] 26556849? 0 points 1 point (+1|-0) ago 

Once fraud is proven, POTUS wins. The beneficiary of the fraud should face repercussions, especially given that so many of those connected have obvious connections to the DNC/Biden candidacy.

Proving and showing how everything happens is how we get safe, secure elections moving forward.

[–] 26555919? 0 points 2 points (+2|-0) ago 

Precisely, and what the globalists are counting on is that these timescales are not what make population-level representative choices. They know that if Biden slides in while we wait for this proof, then by the time proof arrives, it will be old news. That's all it takes. Truth is not truth at the level of large groups. It gains a different character taken across hundreds of millions of people - truth is subordinated to the group mind, where stability predominates. People simply don't like to rethink things that they take to be old news. Think about it, the further back in time you have to reach to "edit" reality, the less stable your entire reality becomes - hence, the reason why old news is concrete news.

The democrats understand this psychology. It's also why they couldn't let headlines like the "Russia hoax" and things die in the news cycle. If they let that pause for too long, it would have become old news. For every thinking person, it did, but now we also have to account for desire. Desire plays a big part of interpreting our reality as well.

[–] 26555461? [S] 0 points 2 points (+2|-0) ago 

I think you're right. This is all so outrageous.

[–] 26555207? 0 points 5 points (+5|-0) ago  (edited ago)

LMFAO. I'll write in Apple Basic too

05 Input JoeBiden$

10 (JoeBiden$=JoBiden$+1)

20 Goto 10 sub 2000000000000

30 return

50 end

[–] 26555383? ago 

60 do not pass go, do not collect $200.00

[–] 26555229? [S] 0 points 2 points (+2|-0) ago 

Lol, that would be a better example.

[–] 26555371? 0 points 3 points (+3|-0) ago  (edited ago)

Apple 2c (compact) No hard drive, one 5.25 inch floppy drive, 128 kilobytes of RAM, clock speed 1 Megahertz, Green monochrome monitor. I had to break open the case and hard-wire a used metal 10 key kepad to the mother board so that I could input hundreds of receipts. Loved it! And I could run a word processor, database, and spreadsheet simultaneously and switch between the three programs.

[–] 26555382? 0 points 6 points (+6|-0) ago 

Compile error: Variable JoBiden$ not found

[–] 26555396? 0 points 3 points (+3|-0) ago 

You are correct lol. It's early.

[–] 26555590? 0 points 12 points (+12|-0) ago  (edited ago)

It will take a while to do the computer forensics on the hardware, software and network communications but when completed it will paint an unambiguous picture of what happened here.

  • Traitors conspired with foreign countries to utilize a voting system that was created to rig elections. It has been used for that purpose in several countries already.
  • The system had little or no security to prevent data breaches. Administrator access was very easy. Youtube vids show this.
  • The system was not standalone as required by election law. In fact, they were internet connected and in some cases to servers in foreign countries.
  • Ballots could be over-ridden by poll workers.
  • Ballots could be"assigned" to another name on the registration list
  • Ballots could be run through the tabulator multiple times without zeroing the counter.
  • Ballots could be grouped in folders and discarded or switched to another candidate by dragging and dropping.

This mess will all be proved in court. Trump will serve a 2nd term. The MSM will be going down too!

[–] 26555606? [S] 0 points 2 points (+2|-0) ago 

As long as some fucked up judge doesn't just shit all over the court proceedings.

[–] 26559326? ago 

Hence military tribunals, and GITMO which are both mocked by shills but now appear possible given the foreign actors aspect and that fact that this would be an act of war according to EOs Trump signed. What none of us know is.....is FISA in play right now? It’s still available...and it goes both ways.

[–] 26555643? 0 points 1 point (+1|-0) ago 

Well there is always that too. Maybe the Supreme Court will have to get involved (if John Roberts decides to accept the case).

load more comments ▼ (1 remaining)