>>3910871 LB and Notable
I hope this information will be used to demonstrate 'foreign interference." I sent this to Dan Bongino and to Sundance at CTH.
Dear Dan,
We only have a few like you in whom we can place hope. This is what our POTUS is up against. Please peruse. Please help more people connect the dots.
I’m just becoming familiar with encryption keys that are privately controlled. These keys allow tracking/control of virtually every communication and transaction on computers that occur globally.
Michael McKibben maintains that globalists are in control of our voter computing technology. He seems to be the most knowledgeable on the subject and is fighting this criminality in the (often corrupt) courts. Currently, he is focusing on DJT’s EO addressing foreign interference in our elections. He offers a solution below. It seems like a self serving plug, however, he is a wealth of knowledge, and we’ll have to find a solution from somewhere. McKibben seems a better bet than a solution coming from the same actors in control today.
Project Ivy and overt censorship are additional ways that affect voting outcomes. If this doesn’t become common knowledge with concomitant public will for correction, we as a nation are forever lost.
I’m hoping that people far smarter than I can connect some more dots for the masses.
Thank you very much for giving this an initial perusal with your consideration for public comment.
Sincerely,
XXXOOOOXXX, MBA, BSN, wife, mother, patriot, a very small voice in a vast universe of knowledge.
PS, As an aside, it occurs to me that the purpose for two planes flying into Arkansas for evidence collection may be related to the Rose Law Firm and Jerry C. Jones.
CLOUDFARE and encryption keys
McKibben and his dream team took two years before achieving the creative “ah hah” moment in late 1999. They discovered the Achilles’ heel of existing client-server and groupware assumptions that were all the rage back then. So, he filed for patents.
While his invention was still on the drawing board in the early 2000s, the invention was hijacked by unscrupulous individuals. The thieves have stripped out the full range of privacy and security features so that they could abuse user privacy so completely that it makes even the KGB blush.
Encryption is a consistent theme in both Parties—the candidates below all support giving the NSA Spy State Cartel backdoor keys to all digital communications—NOTE: This is good for their personal investments and power, but it destroys your liberty, personal privacy and freedom from unlawful government intrusion. Power corrupts. Absolute power corrupts absolutely.
http://www.thelibertybeacon.com/how-the-us-midterm-election-was-rigged-according-to-socmed-pioneer/
————————————————————————————————
“It started back in the 1980s, while Hillary was a patent attorney at the Rose Law Firm, which for some odd reason represented the patent claims of many of the entities who would become today’s Tech Giants. (That’s a long story that I’ll attempt to unpack in future posts).
Focusing back on the fundamental encryption keys used on the Internet: McKibben says that back in 1993, the Clinton Administration began giving these backdoor encryption keys to the FBI. He says, “By that I mean, anytime you connect from one computer to another, those computers exchange keys and without those keys, you can’t encrypt or decrypt the signal coming from one machine to another.
McKibben continues, “Entrust became the certificate authority for issuing these digital keys for many organizations and we’ve had people looking at the securities filings for this company from 1998 to 2009, when they sold out to a San Francisco firm and what we discovered, astoundingly is that Hillary Clinton’s partner at the Rose Law Firm [Jerry C Jones] directs this company as a Class-One Director. He was slipped in in late 2003 and this means that we can show solid proof that the entire Internet has been compromised, in that Hillary Clinton and the Clintons have access to all the digital keys for all transactions on the planet.”
McKibben says that even the NSA is subservient to the Entrust Operation, which controls the entire Federal Public Key Infrastructure Architecture (FPKIA).
https://forbiddenknowledgetv.net/this-is-how-they-can-turn-off-your-chip/
———————————————
Encryption keys are in the hands of globalists, and this is how DJT's EO on election fraud might be used against them……we hope… https://www.youtube.com/watch?v=mehDPfrKs7A
——————————————————————————————————–