>>74912
CodeMonkeyZ, [22.07.21 20:04]
PCAP is an abbreviation for βPacket Captureβ.
Data travels over the internet in packets that can be easily intercepted with specifically designed software or hardware.
CodeMonkeyZ, [22.07.21 20:06]
Packets are relayed over many nodes and jumps between the origin and the recipient.
Any of these relays or networks in between are able to capture packets which pass through.
CodeMonkeyZ, [22.07.21 20:09]
Just having 100 Gorillabytes of packet captures means nothing on its own since packets are being sent constantly back and forth over the internet.
The fact that you are able to read this message means you are receiving packets in real time.
CodeMonkeyZ, [22.07.21 20:11]
Since packets are sent back and forth constantly with any amount of jumps or networks in between, anybody along the route could theoretically capture the packets holding your online banking password and steal your money.
CodeMonkeyZ, [22.07.21 20:14]
Now why isnβt everyoneβs online bank account getting hacked every day by people who get the smart idea to run packet capturing software?
CodeMonkeyZ, [22.07.21 20:18]
TLS, or Transfer Layer Security, encrypts your data before sending it over the network.
If anybody captures your packets while youre using TLS, then they just see a garbled mess.
CodeMonkeyZ, [22.07.21 20:19]
Only the recipient and sender of the packet will know what the packet contains if TLS is used.
CodeMonkeyZ, [22.07.21 20:19]
Now letβs think for a second about Mike Lindellβs PCAPs.
CodeMonkeyZ, [22.07.21 20:22]
If Mike Lindell has PCAPs that prove there was a cyber operation that targeted the election networks, then first we need to think about how he got the PCAPs.
CodeMonkeyZ, [22.07.21 20:29]
If we assume TLS was enabled, then Mike Lindell would only be able to get intelligible PCAPs if the person logging the packets was either the sender, receiver, or cracked the encryption of the packets.
If Mikeβs team was able to crack TLS then we will have a major problem for anybody who uses the internet.
There are man-in-the-middle techniques which could grab packets thought to be end-to-end encrypted but very few groups are in position to do so. (see: nsa, cloudflare, etc).
CodeMonkeyZ, [22.07.21 20:32]
Now letβs assume that the sender/receiver of the packets didnβt use TLS.
If Mikeβs team was able to run the packet capturing mechanism somewhere along the network routes that the election data took, and TLS was not enabled, then we can essentially conclude that
He. Has. It. All.
CodeMonkeyZ, [22.07.21 20:35]
The barrier to entry to use TLS is very low. It takes but a minute to enable on a server or software, and takes seconds as an end-user (https is TLS, http isnt).
CodeMonkeyZ, [22.07.21 20:37]
If election management software sent packets over the internet without at least enabling TLS, then that indicates that they are careless at implementing security at the least, and might even be potentially malicious.
CodeMonkeyZ, [22.07.21 20:39]
I have not seen Mike Lindells PCAPs and donβt know the circumstances and data he has, but this could potentially be HUGE if he is able to verify and properly analyze what happened on the networks on election night.
CodeMonkeyZ, [22.07.21 21:04]
[Forwarded from Kathy Dannenberg]
Packets consist of two portions: the header and the payload. The header contains information about the packet, such as its origin and destination IP addresses (an IP address is like a computer's mailing address). The payload is the actual data
https://t.me/CodeMonkeyZ/854