RemoveRestrictions.bat on a usb stick did actually that.
>>16440518 pb
Once again: RemoveRestrictions.bat from Mike Lindell Sympossium proves widespread election fraud. Essentially what the script does is switches a voting machine local security to point to a temporary database so nefarious activities can be logged there and leave no trace. Then after the machine reboots, it utilizes the normal database that is on the local hard drive.
Echo off means no output to console
Echo on means output to console, used for debugging
Line by Line
1 Shut off output to console window and set a local variable enableextensions to true
2 types Removing Security Restrictions out to console, when Echo is on
-
sets the configuration for the database, db, to a temp database and silently overwrites the initiatization file. This is the database that the windows local security authority logs all information, metrics, and changes to the system. It is the machines system of records.
-
Overwrites the GroupPolicy for the windows/system32 giving it new authority rules and policies.
-
Modifies the windows registry to force it to accept the new security providers
-
if errorlevel os negative or 0 pause
-
types Critical restrictions disabled when Echo is on, set on line 1, and types Registry value that indicates the current hardening state
-
Modifies Dominion SQL database registry key Hardened variable and forces a Dehardened-WS2016 string to be set.
-
Sets the local machines SQL server socket network library to disable encryption
10 stop the SQL database
11 start the SQL database without encryption
12 starts the SQLServerAgent
Because this is a script, it takes a long time to write and test to get correct. This is only done when one wants to repeat the same tasks on many many machines instead of doing commands by interacting with the mouse and keyboard. Because it tampers with a machines local security on a voting machine it is a crime. In addition, to run a web server on a voting machine is remote access; which is also illegal.