Posted by: [deleted]
Posting time: 1 month ago on
Last edit time: never edited.
Views: 323
SCP: 135
135 upvotes, 0 downvotes (100% upvoted it)
~91 user(s) here now
Subverse anonymized: usernames are hidden and votes don't count.
NSFW: Yes
Authorized: No
Anon: Yes
Private: No
Type: Default
view the rest of the comments →
[–] 26407715? ago
The Parler CodeMonkeyZ probably is actually skilled and smarter than the real one the son Jim Watkins (8chan , 2Channel). And with 4,000 followers probably has real things to say instead of idiocy.
CODEMONKEY slowing down investigation....
The idiot REFUSES to accept illicit Dominion source code from dark web, that can be used by real engineers (not him) to look for exploits and backdoors.
Read his own words on the topic 15 hours ago:
https://nitter.dark.fail/CodeMonkeyZ/status/1327631773476425728#m
Ha also is not skilled by claiming shock that Javascript's JSON uses floating point to store integers, when its in the goddamned specification, even the latest specs on JSON schema 7.0.
From twitter big "pearl clutching shock" : https://twitter.com/CodeMonkeyZ/status/1327194074818912261
But a real programmer would know ALL numbers are doubles in JSON. Javascript testing will show only 53 bits of precision, ever, in 2020 VM, so that proves it uses DOUBLE floats (All numbers in JavaScript are actually IEEE-754 compliant floating-point doubles). Codemonkey got shocked over nothing, but did highlight a weird abuse of the floating point vote feature in a admin report module... a possible fraud setting.
He is a hack, but he got so many eyes looking at manuals and stolen Dominion emails, that he and his helpers found about 5 actual very sketchy things, including a spec requirement from PA to allow HUMAN OVERRIDES of already scanned ballots for PA firmware.
But he is no coder if he does not understand JSON and Javascript. Evidently he is just a PHP script hacker of legacy code.
NOV 11th 2020 Codemonkey ASKED for full stolen source code before later changing his mind! Read Proof:
https://nitter.dark.fail/CodeMonkeyZ/status/1326552844787310596
Then he pussied out and told everyone NOT to send anything like that to him (stolen confidential material, stolen source code, duplicated copyrighted works).
CodeMonkeyZ PUSSIED OUT YESTERDAY:
Hah! All he had to do was generate and publish his PGP encryption key for people to send him files, but he pussied out. He is no Snowden. He is no Assange.
He also pussied out Nov 3 election night saying :
Proof : https://nitter.dark.fail/CodeMonkeyZ/status/1323618794531532800#m
CODEMONKEY does not care about USA, and only care about himself! He is no true Patriot!
MY REVELATIONS (not so secret)
Source code defects in "Dominion Democracy Suite Voting System" I pronounce include :
The system allows the user to select the size of RSA keys, including 1024 bit, laughable in 2020.
SHA-1 in RSA signature generation !!!! :
https://threatpost.com/exploit-fully-breaks-sha-1/151697/
SHA-1 is a Shambles:
(PDF) https://eprint.iacr.org/2020/014.pdf
Use of MD5 : MD5 is only good for corruption detection, NOT security! NSA banned it in 2001. FIPS 140-2 from 2001 says to use approved secure hashes. People have published "collisions" of any MD5, if bytestream can be stretched.
Weak crackable AES 128 bits used!!! Should be AES 256, but the code silently drops it to AES 128 in undocumented fashion.
Debugging harness code hidden in production firmware builds allows anyone with debugger harness access to RAM space. (proven).
Hard coded encryption keys hidden in source code (yes really)
Sensitive keys are stored on disk unencrypted and a external device can trivially read these critical crypto keys.
Hard coded encryption keys hidden in source code of the master vote tabulator for the precincts (yes really)
Random number and entropy routine to make live challenge-response keys lacks enough entropy and thus makes VERY CRACKABLE transmission keys.
Note that the diversity hire chin-tapping retard code reviewers hired by State of California to find those exploits found NONE and put NONE in their August 2019 security overview report shown here : (PDF) https://votingsystems.cdn.sos.ca.gov/vendors/dominion/dvs510software-report.pdf
That corrupt Democrat-loving code review company is called "Gaming Laboratories International, LLC" A casino machine review company hired to look for gambling exploits in random number generators and nothing else, it seems.
https://gaminglabs.com/ found NOTHING I mentioned in the ICP2 firmware/hardware 473,991 lines of source code. They found NO PROBLEMS of democrat inserted cryto weakneses I listed! Bwah hah hah hah hah! Neither did CodeMonkey or his pals yet.
Are we living in CLOWN WORLD, when women and diversity skin retards are hired for penetration source code analysis?
But CodeMonkey is actually actively being a pussy.
If lame script-kiddie CodeMonkey was a patriot, he could have helped use PGP to distribute the actual source that ACTUALLY yielded the ACTUAL exploitable things I listed above.
He is a "poser" or "novice" but if his IQ is high, in 2 years he could educate himself into a real engineer. I saw people like him, thrust into the spotlight, as charlatans , rapidly educate themselves in coding arts, and make something of themselves. In 2 years to 3 years, he could become legit if his IQ is high enough.
For now...
CODEMONKEYZ's gutlessness and lack of skills DISGUSTS ME!
A True Patriot would Die for the US Constitution
TL/DR: CodeMonkey is merely the son Jim Watkins (8chan , 2Channel), and CodeMonkey has no actual engineering skills, other than dabbling in PHP , nor has Patriotism, and is now a Glory Hound.
[–] 26411620? ago
Why don't you use the entire tweet about Double Json???
It seems election votes are tallied then stored as a DOUBLE in JSON.
"can include a factional [sic] component in special cases"
I think its about votes being in fractions. That's how the dominion machines are stealing votes. So maybe it should be in Integers and not Doubles.
Why are you attacking codemonkey so much? Is he hurting you?