https://t.me/KanekoaTheGreat/1178
KanekoaTheGreat, [03.08.21 18:07]
[ Video ]
Kim Zetter, a top cybersecurity author featured in the NYT, VICE, Washington Post, WIRED, and Motherboard, gives a presentation on the multiple ways hackers can compromise the cellular modems used by voting machine companies. (February 7, 2020)
Video:
https://rumble.com/vkpe2z-top-cybersecurity-author-kim-zetter-on-election-hacking-february-7-2020.html
@KanekoaTheGreat
KanekoaTheGreat, [03.08.21 18:48]
[ Video ]
Joe Oltmann (@joeoltmann) maps out the security vulnerabilities of our voting system in "The Deep Rig".
Nefarious actors have the ability to bypass the integrity of the voting system by manipulating the signature inspection process, discarding envelopes of absentee ballots, adding fake ballots or phantom ballots during tabulation, and finally, through the adjudication process.
During adjudication, a new ballot image is created replacing the original ballot image.
Watch & Share:
https://deeprigmovie.online/
@KanekoaTheGreat