Anonymous ID: c93568 Aug. 16, 2020, 8:43 p.m. No.10314080   🗄️.is 🔗kun   >>4110

Nobody ever needs to get sick from COVID

If you just fix your nutritional deficiencies

And avoid the over processed convenience foods

That created the problems in the first place.

 

COVID was designed to harvest the people

Who bought into the Big Pharma lifestyle

Promoted by their Big Food Company partners

The Eugenics plot against America

Anonymous ID: c93568 Aug. 16, 2020, 8:47 p.m. No.10314116   🗄️.is 🔗kun   >>4134 >>4197

>>10314064

Election data was sent to Germany for counting

And the stuff from the NSA collection and all the other Five Eyes systems

Was sent to Ukraine

Ukraine is the epicenter

Created and owned by the Neocons

And the data from Hillary's server was sent to Ukraine also.

 

Do you know who Kolomoisky and his partners are?

Anonymous ID: c93568 Aug. 16, 2020, 9:10 p.m. No.10314314   🗄️.is 🔗kun

ShadowGate talked about a Data Bridge and twinning of a dataflow to make a secret copy on Shadownet using servers in the Ukraine.

 

This is actually incredibly easy to do anywhere that servers are connected, because servers generally connect using Ethernet. While you can configure an Ethernet Switch to do this twinning, it is simpler and less obvious to hide it on a server. Configure the switch so that the connection to the server is in monitor mode. Also called 'port mirroring', 'port monitoring', 'Roving Analysis' (3Com), or 'Switched Port Analyzer' or 'SPAN' (Cisco). This way all the traffic going through the switch gets to the server. Usually you would do this, in the intel community, when you connect a server that is analyzing the traffic or looking for something (Arabic text email messages). But the key thing is that all the traffic goes to the server.

 

https://help.ubuntu.com/community/NetworkConnectionBridge

 

On the server, you can bridge two ethernet ports so that all the traffic from one port, appears on the other. This is the 'twinning.

 

It is possible to "bridge" two Ethernet adapters together (for example, eth0 and eth1). When you bridge two Ethernet networks, the two networks become one single (larger) Ethernet network.

 

One reason you would bridge Ethernet connections is to monitor traffic flowing across an Ethernet cable. For example, an inline sniffer to monitor the traffic flowing between these two devices, such as a router and the switch. (Using tools like ntop, Wireshark, and tcpdump.)

 

If that second Ethernet port goes to a router with a circuit going to a data center in Germany, you are now sending all that data somewhere else. Shadownet!

 

Some Anons may remember an incident in 2017 at an industrial building in Germany where witnesses described armed men dressed in black doing an operation. I suspect this was a hub where all the Five Eyes spy data flowed in and from which the data flowed into Ukraine.

 

This is likely what Snowden did in Hawaii, i.e. not copy data, but just send it to some other data center in Hawaii that was then connected into Shadownet. Remember there were some strange happenings at a certain Hawaiian military base in 2017 too.

Anonymous ID: c93568 Aug. 16, 2020, 9:14 p.m. No.10314359   🗄️.is 🔗kun   >>4397 >>4491

>>10314055

>>10314313

>Tamper proof voting

>>10314132

 

People have been working on these types of ideas for a while. The paper describing this one is attached. A bit of research will dig up many other ideas

VoteBox: A Tamper-evident, Verifiable Electronic Voting System.

 

https://www.researchgate.net/publication/221260547_VoteBox_A_Tamper-evident_Verifiable_Electronic_Voting_System

 

Abstract

Commercial electronic voting systems have experienced many high-profile software, hardware, and usability fail- ures in real elections. While it is tempting to abandon electronic voting altogether, we show how a careful application of distributed systems and cryptographic techniques can yield voting systems that surpass current systems and their analog forebears in trustworthiness and usability. We have developed the VoteBox, a complete electronic voting system that combines several recent e-voting research results into a coherent whole that can provide strong end-to-end security guarantees to voters. VoteBox machines are locally networked and all critical election events are broadcast and recorded by every machine on the network. VoteBox network data, including encrypted votes, can be safely relayed to the outside world in real time, allowing independent observers with personal computers to validate the system as it is running. We also allow any voter to challenge a VoteBox, while the election is ongoing, to produce proof that ballots are cast as intended. The VoteBox design offers a number of pragmatic benefits that can help reduce the frequency and impact of poll worker or voter errors.

Anonymous ID: c93568 Aug. 16, 2020, 9:17 p.m. No.10314375   🗄️.is 🔗kun   >>4410 >>4502 >>4623 >>4738

BLOCKCHAIN E-VOTING IS REAL: WHERE, HOW, WHEN?

 

https://irishtechnews.ie/blockchain-e-voting-is-real-where-how-when/

 

Cyber-security issues continue to remain one of the hottest topics during presidential elections, as fears have often been raised that domestic or foreign actors could try to skew the results of the election.

 

While many see a solution in dumping all forms of electronic voting and defaulting back to offline, paper-based systems — especially as electronic voting machines have proven to be extremely vulnerable — others are hoping new technologies can make elections more secure. Blockchain technology, especially, is drawing a lot of interest on this front.

 

Many blockchains currently exist, and a number of these could serve as possible platforms for voting services. Follow My Vote is a Virginia-based startup hoping to move people toward blockchain-based voting. The startup will be testing its platform in a mock online election that will run in parallel with the U.S. presidential election.

 

There’s also NYC-based Blockchain Technologies Corp., which is taking a hybrid approach of a blockchain-powered voting system coupled with paper ballots that use QR codes to ensure each vote is only cast once.

 

But we’re seeing more movement in blockchain voting outside the U.S.

 

The government-owned Australian Post service, for example, is using blockchain technology to create a location agnostic, tamper-proof voting system that is traceable and anonymous, and would prove to be resilient against denial of service attacks. For the moment, the service is testing the waters with corporate and community elections, but the directors of the project hope to one day be able to handle full parliamentary elections.

 

Russia’s central securities depository, NSD, is also dabbling in blockchain with a fully functional e-proxy voting system, a ledger on which voting instructions are transmitted and counted. The technology has already been used at bondholder meetings and will be extended to other business areas of the NSD.

 

Another country looking to leverage blockchain technology for voting is Estonia, which is already a leader in politics technology with its e-residency program, an electronic identity platform that enables foreigners to do business and access government services. The country is now complementing previous efforts with a blockchain-based e-voting system that enables both Estonian nationals and e-residents to securely vote in company shareholder meetings.

Anonymous ID: c93568 Aug. 16, 2020, 9:29 p.m. No.10314457   🗄️.is 🔗kun   >>4466

>>10314360

 

The Coronavirus is a retrovirus which requires human cells to reproduce. It cannot spread unless it a) enters human cells and b) reproduces its RNA.

 

Antibodies, whether from serum of cured people or in a vaccine form, prevent entry to cells.

 

Zinc, pulled into the cell by a Zinc ionophore like HCQ, clioquinol, ivermectin, Quercetin or EGCG from Green Tea, blocks the mechanism by which the RNA is reproduced inside the cell.

 

The biggest problem most people have with the incompetent fumblers on TV is that they ignore these two fundamentals of science. Sure, avoiding crowd is a good idea, because viruses can't attack if they can't reach you, but there are treatments that will slow/stop the viral infection when people get it

 

And there are prophylactics that everyone can consume. Something as simple as vitamins, minerals and Green Tea, could actually cut the incidence of ALL RESPIRATORY VIRUSES every year, if people were more aware of them.

 

And no matter how bad Coronaviruses are, it turns out that almost all the most susceptible people can battle the virus and win, if only they can survive long enough. The survival problem is caused by pneumonia and SARS which are manifestations of the cytokine storm internally. But we now know that steroids like Dexamethasone and corticosteroids like Prednisolone and Budesonide will stop and reverse the storm, allowing the patient the time to recover.

 

The panic, and stupidity coming out of the mouths of politicians, media figures and so-called public health officials (incompetent bureaucrats with fake medical degrees) is impeding the ability of physicians to properly diagnose and treat patients. Not everyone is the same, therefore physicians should be in charge. Not politicians or pompous authority figures who are now guilty of criminal negligence and will pay for that in the court cases to come.

Anonymous ID: c93568 Aug. 16, 2020, 9:34 p.m. No.10314491   🗄️.is 🔗kun   >>4510 >>4623 >>4738

>>10314359

–From 2014. The PDF of this pamphlet/article on secure voting is attached.==

End-to-end verifiability

 

https://www.semanticscholar.org/paper/End-to-end-verifiability-Benaloh-Rivest/6c80c54929caba1135dd4e242e7822a7bea1b4f6?p2df

 

Abstract: This pamphlet describes end-to-end election verifiability (E2E-V) for a nontechnical audience: election officials, public policymakers, and anyone else interested in secure, transparent, evidence-based electronic elections. This work is part of the Overseas Vote Foundation's End-to-End Verifiable Internet Voting: Specification and Feasibility Assessment Study (E2E VIV Project), funded by the Democracy Fund.

Anonymous ID: c93568 Aug. 16, 2020, 9:37 p.m. No.10314510   🗄️.is 🔗kun   >>4545 >>4623 >>4738

>>10314491

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System

 

STAR-Vote is a collaboration between a number of academics and the Travis County (Austin), Texas elections office, which

currently uses a DRE voting system and previously used an optical scan voting system. STAR-Vote represents a rare opportunity for a variety of sophisticated technologies, such as end-to-end cryptography and risk limiting audits, to be designed

into a new voting system, from scratch, with a variety of real world constraints, such as election-day vote centers that must

support thousands of ballot styles and run all day in the event of a power failure. This paper describes the current design of

STAR-Vote which is now largely settled and whose development will soon begin.

 

PDF of the article is attached

Anonymous ID: c93568 Aug. 16, 2020, 9:42 p.m. No.10314545   🗄️.is 🔗kun   >>4623 >>4738

>>10314510

From 2006. Better balloting has been a topic for a long time

Secret-Ballot Receipts: True Voter-Verifiable Elections

 

https://web.archive.org/web/20061110074050/http://www.voterverifiable.com/article.pdf

 

A new kind of receipt sets a far higher standard of security

by letting voters verify the election outcome—even if all

election computers and records were compromised. The

system preserves ballot secrecy, while improving access,

robustness, and adjucation, all at lower cost.

Anonymous ID: c93568 Aug. 16, 2020, 9:57 p.m. No.10314647   🗄️.is 🔗kun

I believe this Chinese calligraphy character may be ambiguously written to look like

 

猊 Lion

泥 Water

 

Could water ever roar like a lion???

Anonymous ID: c93568 Aug. 16, 2020, 9:59 p.m. No.10314657   🗄️.is 🔗kun

>>10314110

Cold viruses are real. Coronavirus is one of over 200 RNA retroviruses that cause cold symptoms and in susceptible people a bad cold can lead to pneumonia and SARS.

 

Look at the pneumonia stats for 2019 if you want to understand how the COVID scam used a real disease.