I've worked in IT for a few decades. The 2020 election is fraudulent. No one explained the core of the fraud, the configuration of the servers. I'm talking best practices
USB ports are disabled on every server and on many workstations to protect data and prevent intrusions.
Logs are reports of events on server functionality visible on screen or in print. Levels of users are defined w/ permissions. Administrators have full control over the server and software. They can read, edit, and write code or change internal server settings.
Next, there are Power Users. A Power User can't install new software. Others can read but can’t change anything. Access is severely limited. If the server is configured correctly their NAMES are visible.
Login are multifactor. Logs also show any intrusion attempts and can show the IP address (unique set of numbers identifying every computer) if the server is configured to do this. You can backtrack using the IP to identify the location of intruder.
Logs show backup schedules and data loss. Given the sensitivity of the data, assume a full backup. A couple of ways to do this. Another identical server, or the Cloud or RAID – Random Array of Inexpensive Disks. RAID disks located in the server itself capture pieces
information and an R5 can reconstruct any lost data. It is reliable. A cloud server receiving a backup is tricky. These servers can be anywhere in the world and there are no regulations I’m aware of regarding a cloud backup. No matter what anyone says, backup are done.
The trick is finding the backup and legally procuring it. Organizations maintain scrupulous documentation on their setups. Dominion, ES&S, should be able to produce the logs w/o subpoena. There are ISO standards as well.
Software can be updated while servers are fully operational. During the counting pause, what were they doing.? Another 2 am miracle, getting 300,000 votes miraculously tabulated for Biden with NO downstream ballot selections. If configured to best practice, this is on logs.
If Dominion can’t produce logs? That’s flat out fraud. Logs are saved in the server. Permitting USBs same as logs absolute fraud. Finding 37 USBs with recorded votes in a zip lock bag should invalidate an entire election. Watching poll workers walking around
taking USBs from one machine to another. I left out a lot of information and will add to this if anyone asks me. The logs are the key to fraud. I’d welcome hearing from CISSPs and anyone involved in Info Sec.
I apologize for any typos or errors. Twitter was refreshing as I was typing.
@threadreaderapp please unroll
You can follow @perlop.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.