[–] 26555590? 0 points 12 points 12 points (+12|-0) ago (edited ago)
It will take a while to do the computer forensics on the hardware, software and network communications but when completed it will paint an unambiguous picture of what happened here.
Hence military tribunals, and GITMO which are both mocked by shills but now appear possible given the foreign actors aspect and that fact that this would be an act of war according to EOs Trump signed. What none of us know is.....is FISA in play right now? It’s still available...and it goes both ways.
[–] [deleted] 0 points 1 point 1 point (+1|-0) ago (edited ago)
[–] 26556476? 0 points 2 points 2 points (+2|-0) ago (edited ago)
Nope, if they wanted to conceal rogue code they would trigger an overwrite of the biden subroutine, and then overflow that with stack data.
The whole concept of running voting software on a windows PC is flawed, the vote needs to be done by sealed hardware supplied by a security org, and then multiple independent counters both record what was output. Then post election, the hardware is independently audited.
Relying on ONE software company is not how mission critical industrial control systems are built.
Banking already uses sealed encryption hardware
[–] 26557191? 1 point -1 points 0 points (+0|-1) ago (edited ago)
honestly, go fuck yourself, I was writing code on the Z80 before your Dad was a sperm
if you don't know how to overwrite malicious code on purpose, by using code from legit subroutines to overwrite the space it's sitting in, then it's YOU that doesn't know what they are talking about
[–] 26555475? ago
Happy Thanksgiving