The ballots here ARE paper. The machine is simply an automatic counter. And in this case another machine for manual adjudications.

There is no lawyering up. Tina made an accusation and REQUESTED and investigation. The DA performed an investigation and directly explained the data conditions that Tina’s report falsely concluded could not be the product of human action.

You are making quite an effort to obfuscate the heart of the matter: Tina’s experts state that human action could not possible have created the second database. The DA showed that it can and that it did. The DA reproduced the actions and observed the same result.

This is simply a matter of judging the two reports and deciding which one to believe on this particular claim. The claim that is the heart of the report.

Also the DA is R. So your appeal to partisanship falls flat.

Reuters… the far far far left source. How does one even have the patience after that

1 Like

Blockquote

Yikes, I forgot RINO’s there are technically still part of the GOP. That being said I believe the Sec of State and Governor of Colorado are Dems.

Politico is supposedly right of Reuters but only by a thread. :cold_face:

Because when you don’t know how anything works, it’s easy to trick you into believing anything.

Funny tack to take. You have chastised me more than once for attacking the source rather than the content. But today it is a comfortable backstop for you?

1 Like

Again, in the jovial mood,so thought I mess with you all for a momentary change of pace.

1 Like

Simply” like the paper counting machines they use(d) in Las Vegas back in the day?

https://www.yellowpages.com/san-antonio-tx/mip/banker-money-counting-systems-22009964?lid=171489216

No since they operate on different premises.

In one system they rifle the pieces of paper and count the number of pages stacked in a hopper.

In the other a bright light is shined through a piece of paper and specific areas of the paper corresponding to specifically placed ovals/circles. The sensors can tell if a oval/circle has been marked because the light is blocked. Logic within the machine can reject the ballot if it is determined that more than one oval/circle is marked for the same office.

Glad to help some people understand the difference between a currency counting machine and a ballot tabulator.

WW

Have you seen this teaser of a report acknowledging significant voting machine vulnerability concerns yet?

https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01

If not, please take a look and let us know your initial thoughts.

2.2 VULNERABILITY OVERVIEW

NOTE: Mitigations to reduce the risk of exploitation of these vulnerabilities can be found in Section 3 of this document.
2.2.1 IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347

The tested version of ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.

CVE-2022-1739 has been assigned to this vulnerability.
2.2.2 MUTABLE ATTESTATION OR MEASUREMENT REPORTING DATA CWE-1283

The tested version of ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device.

CVE-2022-1740 has been assigned to this vulnerability.
2.2.3 HIDDEN FUNCTIONALITY CWE-912

The tested version of ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code.

CVE-2022-1741 has been assigned to this vulnerability.
2.2.4 IMPROPER PROTECTION OF ALTERNATE PATH CWE-424

The tested version of ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.

CVE-2022-1742 has been assigned to this vulnerability.
2.2.5 PATH TRAVERSAL: ‘…/FILEDIR’ CWE-24

The tested version of ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices from the EMS.

CVE-2022-1743 has been assigned to this vulnerability.
2.2.6 EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250

Applications on the tested version of ImageCast X can execute code with elevated privileges by exploiting a system level service. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.

CVE-2022-1744 has been assigned to this vulnerability.
2.2.7 AUTHENTICATION BYPASS BY SPOOFING CWE-290

The authentication mechanism used by technicians on the tested version of ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions.

CVE-2022-1745 has been assigned to this vulnerability.
2.2.8 INCORRECT PRIVILEGE ASSIGNMENT CWE-266

The authentication mechanism used by poll workers to administer voting using the tested version of ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment.

CVE-2022-1746 has been assigned to this vulnerability.
2.2.9 ORIGIN VALIDATION ERROR CWE-346

The authentication mechanism used by voters to activate a voting session on the tested version of ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization.

CVE-2022-1747 has been assigned to this vulnerability.

[quote=“WorldWatcher, post:7674, topic:237765”]

Thanks. I merely thought we might agree we don’t really need elaborate functionality these current voting machines possess to “simply” count ballots…

Personally I’m not a big fan of electronic voting machines which then print a paper ballot and then a receipt for the voter.

But I believe those are becoming less frequently used with hand-marked paper ballots that are optically scanned being now the predominant majority. Especially after the Florida “hanging chad” fiasco.

Optical scanned ballots are “simply counted”, that’s why they are called tabulation machines. I like them because in a tight race then recounts are much quicker and in the event of an “audit” you have the actual paper the voter completed.

As to why machine tabulations are better:

  • They are more efficient,
  • They require less manpower,
  • They are completed quicker,
  • Results are repeatable,
  • And, they are more accurate than hand recounts without having to have multiple people examine and sign off on each individual ballot.

WW

There are going to be problems counting, machine or otherwise. It is surprisingly complicated to manage things when the inventory stretches into the millions.

Humans, machines, trained crows…. Any counting system will produce issues and required additional cross checks to get to a reliable result.

I would not object to human counters, but there will still be mistakes, issues and irregular procedures that give rise to cries of FRAUD!

I don’t think we should use these machines. I also don’t like having our personal finance and medical records managed on unsecurable IT systems.

No surprise or wonder to me EVERY SINGLE DIGITAL SYSTEM is vulnerable given physical access.

An election system ALWAYS requires logic tests, result cross checks, and audits to verify correctness.

I have no problem with the argument that machines are vulnerable.

I do have a problem with FALSIFIED claims that machines did alter the election like Tina’s report has made.

There was a bill introduced to ensure paper ballots would be used in the general election in 2020. Dems introduced it. It had 40 Dem Senator co sponsors.
Republicans filibustered the bill.

This bill addresses election security through grant programs and requirements for voting systems and paper ballots.

https://www.congress.gov/bill/116th-congress/senate-bill/1540

Dinesh brings a lot of potential truth to this past election and offers material that should have all of us asking questions.

Wow are you late to the party.

Enlighten us with your background in GPS data and data science, please.

After this, please explain to us where in the movie, Dinesh and True the Vote actually SHOWED evidence of their claims, rather than just CLAIMED it.

Finally, seriously you believe DAVE RUBIN came to the 2000 Mules movie with a completely open mind about its claims? Seriously?

That’s as hysterical as Dennis Prager claiming he was an “agnostic” about 2020 election fraud claims.

2 Likes

That’s not a very high bar to clear.

4 Likes

Doesn’t Dennis Prager pay Dave Rubin’s salary?

I can’t keep track of all the relationships between these folks anymore.