Anonymous ID: cf3a33 Aug. 14, 2021, 7:10 p.m. No.14354980   🗄️.is 🔗kun   >>5012

>>14354911

>How do we demonstrate that the data within are not fraudulent?

I appreciate your energy, but ultimately we do not. The forensic images prove what changed on the machine, together with the time of the change, proved in the forensic images, and access to the source hardware to confirm the forensic images are from that machine (hence the eeprom partitions) you have a crime/investigation. Yes there are deleted DBs but there is nothing that juicy in there, for example I was unable to find actual ballot images or anything like that (only focused on pres, there are heaps more elections in the dbs). The de-hardening and deleted dbs and logs are the info that needed to get out. The torrent was the most appropriate method to disseminate information of that size and type, no matter how hot the material is.

Anonymous ID: cf3a33 Aug. 14, 2021, 7:23 p.m. No.14355082   🗄️.is 🔗kun

>>14355012

>How do we prove

Ultimately we don't. If I had my skills on the denial side you could not convince me without physical access to the machine the image came from. What you can do though is use this as probable cause for your SOS/State Legislature to inspect their own machines for similar evidence.