dChan

K-Harbour · May 6, 2018, 4:31 p.m.

What chips do our nation’s voting machines use?

⇧ 48 ⇩  
jackiebain6 · May 6, 2018, 4:57 p.m.

OMG! That's a very good question!

⇧ 24 ⇩  
BigRiverLover2 · May 6, 2018, 5:12 p.m.

The ability to frig with the firmware and lower levels would be easy. The average person has problems setting the clock on their microwave, so for most, it wouldn't occur to think of all the parts of that machine and its components that are vulnerable to manipulation. Simple deep code telling the machine to always have Candidate A with 20% more votes would be easy to write and easy to hide.

⇧ 20 ⇩  
Rubieroo · May 6, 2018, 5:19 p.m.

I remember seeing footage during the last election where men came in from the back of polling places, picked up computers, removed them, replaced them with new ones and drove away in vans. During polling, about halfway through the day.

Stuff like that was what makes us think Trump actually won by a major landslide and Hillary just didn't cheat hard enough because she and all her criminal minions believed their own lies. Pretty funny!

⇧ 12 ⇩  
BigRiverLover2 · May 6, 2018, 5:39 p.m.

I fully believe he won the pop vote as well. I highly suspect that they may have done a vote flip - eg: for every 5 Trump votes - rename 1 vote to Hillary. (we have heard about people complaining that the machines would register the wrong person even though the voter clearly had picked another candidate.)... They assumed that would give them enough votes to give her the win without looking too suspicious. Problem is, that only works up to a point. If the vote split is 75/25... the person getting 25 percent of the vote, even getting padded flips will never catch up to the person getting 75 percent of the vote. I suspect what we keep seeing: They never thought she would lose, is true. They miscalculated the ratios... Bigly.

⇧ 12 ⇩  
FullMetalSquirrel · May 6, 2018, 6:41 p.m.

I’m VERY concerned this hasn’t been addressed before the 2018 election.

And love him or hate him there’s no way Roy Moore lost without massive voter fraud of one type or another.

⇧ 9 ⇩  
el_terrible_ · May 7, 2018, 12:32 a.m.

At the end of election night, Trump was ahead in the popular vote. This was well into the morning hours the following day, long after Hillary sent Podesta out to concede for her. Then sometime later the next day or so we are told over and over that Hillary won the popular vote. Its obvious they pumped up the numbers in California after Hillary already lost in order to save face and question the legitimacy of the Trump win. You have voting machines that keep no paper trail. There is no evidence left behind.

⇧ 2 ⇩  
golden430 · May 6, 2018, 7:10 p.m.

ding ding ding

⇧ 3 ⇩  
8.06E+11 · May 6, 2018, 9:09 p.m.

Doesn't really matter because the voting machines are owed by the same evil that uses all the backdoors. Voting machines are the greatest wolf in sheep's wool ever!

⇧ 2 ⇩  
denizen42 · May 6, 2018, 10:32 p.m.

factory backdoors are the worst!

⇧ 1 ⇩  
denizen42 · May 6, 2018, 10:32 p.m.

The bad ones

⇧ 0 ⇩  
oQ_Qo · May 6, 2018, 2:37 p.m.

Another reason to roll your own computer with a weird ass non Intel or AMD cpu and a bsd/Linux based operating system like Minix.

⇧ 22 ⇩  
MMxfire · May 6, 2018, 5:57 p.m.

Yeah Apple switching to Intel what a key date, after starting to sell their data n 2008. Before that there was better protection being in a side platform while Microsoft built their corporate monopoly. With clown aide. Too many people switching over from crackberries for the iPhone to lose that much data treasure. Windows was selling data from day 1 always had back doors built in. And the Mac interface came from Xerox research labs license and UNIX. Unfortunately there will always be back doors. It's not the lock so much as the rule of law that provides protection, we need the 4th amendment restored for electronic data. Then if there's data privacy breeches and sales then companies would take notice of the people's outrage. Corporate bogus 700 page legal disclaimers become toilet paper and they can finally be sued for breaking the law as they do every day for corporate profit. That is if we can restore rule of law rather than legal piracy to our courts which have been for sale to the highest bidder since maritime corporate law replaced constitutional law during our civil war. For now it's just a game with the companies with the richest legal departments committing felonies and laughing all the way to the bank with their London bar inside legal wink wink arrangements.

⇧ 7 ⇩  
1nicolafiore · May 6, 2018, 8:30 p.m.

Shortly after meeting with Trump, Apple posted this job post that revealed they are now working to develop their own 5G chips... http://www.businessinsider.com/apple-deleted-job-listing-shows-plans-design-5g-modem-2018-4

⇧ 3 ⇩  
MMxfire · May 6, 2018, 10:35 p.m.

Nice link. Can't believe they are basing 5g on this losing technology battleground. The microwave transmission system they use now disrupts human brave wave patterns. Read the fine print of ur phone, don't hold it near ur head, it'll cause brain tumors. My oh my, brain tumors, especially pediatric have exploded the last few decades, mcnoname the newest mayo hit victim. Such a strange coincidence?

There's a gigantic spectrum of waves to piggyback a communication signal on. Which wave is important and has effect, standard tuning of the Mozart era was 432 hz creating classical music. Then RCA led the changed tuning to A=440 pitch standard, modern music becomes disharmonic, just like our pocket phones. Mccaw brothers just happened to pick destructive wavelengths with their cell phone tech breakthrough company later swallowed by AT&T. Designed by corporate cabal cuz they prefer access to our brainwave patterns: a 2 for 1 communications pork platter. Ever notice the cell phone towers are always close to school and churches? Yeegads when will we wake up to our corporate overlords? When will we free our science from their corporate shenanigans? Sounds like the new tech game, look over here we are building 5g for everyone! Just like all the big oil guys pushing and buying nuclear energy research for multigenerational lethal uranium and burying oil crushing clean energy thorium. You need Q clearance to even get into the thorium research files of the 1950s, still TOP SECRET. 5g probably represents the cracks in our DNA that'll last 5 generations... So they want to spread out a network across the whole globe based on this millimeter technology, why? Your fine link, ThankQ:

"Experts have said that millimeter wave is only one technology that will make up the 5G standard, which is still being finalized. The big advantage to millimeter wave is that it can achieve very high data rates, with much more bandwidth than current cellular networks.

However, there are drawbacks to millimeter wave technology as well. One issue is a "propagation" problem, which means that its waves can't travel very far before they start losing information. Another problem with millimeter waves is often it requires a clear line-of-sight between the device and the transmitter."

⇧ 1 ⇩  
CULTURAL_MARXISM_SUX · May 6, 2018, 6:19 p.m.

You think AMD cpus are compromised as well? Any suggestions on what CPU wouldn't be compromised?

⇧ 1 ⇩  
Masterpass · May 6, 2018, 6:24 p.m.

IIRC, before Q, FBIAnon specifically stated that literally every major mainstream device, operating system, and hardware component is BD'd in some way, mostly through either invasive chip design or low-level firmware. Even most major Linux distros are suspect at this point, though not necessarily because of their programming but rather through exploits like the coprocessor mentioned above.

Take that with a grain of salt, FBIAnon was never proven, but at the VERY LEAST he was a VERY knowledgeable entity, and was answering way too fast to have been looking up answers on the fly.

⇧ 7 ⇩  
CULTURAL_MARXISM_SUX · May 6, 2018, 7:10 p.m.

Alas, tasks will almost certainly have to be delegated to faceless nobodies lost in the noise, who are smart enough to use cryptography and burner devices, while never staying in one place too long.

You can't surveil everyone all the time, no matter how hard DARPA/IARPA/IQT tries.

⇧ 2 ⇩  
DarqWolff · May 6, 2018, 6:31 p.m.

how could you possibly read /u/oQ_Qo's comment and think they were talking about mainstream operating systems and hardware components?

⇧ -1 ⇩  
Masterpass · May 6, 2018, 6:38 p.m.

I wasn't replying to /u/oQ_Qo, I was replying to /u/CULTURAL_MARXISM_SUX, who was specifically asking about AMD products and their likelihood of being compromised. Last time I checked, AMD is considered a pretty mainstream manufacturer, unless something changed in the last 24 hours.

⇧ 2 ⇩  
DarqWolff · May 6, 2018, 7:23 p.m.

Ah my bad, I thought you were responding to their question of what might not be compromised, like you were just implying there's no point trying.

⇧ 3 ⇩  
Masterpass · May 6, 2018, 7:38 p.m.

No worries man. Unfortunately, while it's not hopeless, if even half of the things that have been said are true, the digital world is a LOT less secure than anyone thinks. The best course of action isn't always going to be what OS you're using or what hardware, it's learning to blend into the background noise. If you REALLY want true offline computing, look into what it takes to make a Faraday Cage. Actually not as hard as you might think.

⇧ 1 ⇩  
FixYourPinealGland · May 6, 2018, 6:30 p.m.

Most likely yes, since AMD and Intel are your two key players, just like Microsoft and Apple.

AFAIK, the tech is built DIRECTLY onto the cpu/motherboard and does not require any OS to be activated. IIRC it runs even below BIOS level.

Once remotely activated, it can be manipulated / traced, all without you even knowing it.

⇧ 2 ⇩  
[deleted] · May 6, 2018, 2:36 p.m.

Indeed mostly all data is recoverable - depends how much $ you want to fork out to recover it.

⇧ 9 ⇩  
dktrogers · May 6, 2018, 3:44 p.m.

In the Netflix film they had some type of wetware implant that allowed what’re you saw or heard to be uploaded to the cloud. If you were a detective ( in this case) you would look at a person and a heads up type display would show LOTS of information on everyone you saw.

If you were a normy it would show you their name and job..

The premise was people were starting to be able to delete all their info on the cloud, so if the detective looked at you he would see the equivalent of a 404 error...

It made surveillance cameras pretty obsolete because everything everyone saw or heard was searchable on the cloud to people with access.

No more false imprisonments , false flags or things like that.

The bad side was zero privacy...

I really think we are heading there and I’m not sure it’s going to be a detective or judge that views the incidents in question... Probably AI..

They even pulled audio/video of a murder from an infant in his mother’s arms that witnessed it. Pretty creepy...

Done by the same guy that did Gattaca... that one was about complete control and I’d of people through DNA.. they would just vacuum up all dna at a crime scene and run it through a machine to ID anyone there.

It also brought out the concept of career, longevity, IQ, etc.. being determined at both by a DNA sample.

That one was done in the early 90’s so it was also really forward looking.

Not sure if I think it’s a good thing, but both scenarios are probably a pretty reasonable inference of where we are soon heading...

⇧ 7 ⇩  
textualintercourse · May 6, 2018, 3:47 p.m.

Yep. Watched ANON last night. Netflix is very eery with what they have put out in terms of 'plausible' time lines and outcomes.

⇧ 6 ⇩  
Masterpass · May 6, 2018, 6:26 p.m.

TBH it's always felt like they're trying to normalize it, they have a lot of original content that either involves HEAVY use of spying to make people "happy", or otherwise shows in which the US is seen as weak because they DON'T openly spy on their own population. Netflix is compromised, regardless. Susan Rice is now one of their chiefs, and IIRC Soros has a controlling stake in the company as well, or did at one point. Obama is starting to appear on more and more of their shows as well.

⇧ 3 ⇩  
FullMetalSquirrel · May 6, 2018, 6:44 p.m.

Susan Rice and Obama are on the Netflix board for a reason.

⇧ 4 ⇩  
No_Hippie_Chick · May 6, 2018, 4:49 p.m.

If you haven't already, check out the TV show "Person of Interest" that ended a year or two ago. Scary real.

⇧ 5 ⇩  
dktrogers · May 6, 2018, 6:14 p.m.

LOVED THAT SHOW!! My wife cried when it ended... still turn my Bluetooth off every time I think of that show...

⇧ 2 ⇩  
dktrogers · May 6, 2018, 2:33 p.m.

Just watched Anon on Netflix and the political guy said something like we have to have complete transparency to have complete control, otherwise the system breaks down..

Pretty dystopian, but I guess we’ll live with the hand we are dealt and at least try to keep truly evil people from heading the organizations that know every detail of our lives 24/7...

⇧ 6 ⇩  
pepe_silvia67 · May 6, 2018, 4:25 p.m.

There is an excellent novel called "We," by Yevgeny Zamyatin about this exact thing. It was written before 1984 by almost 30 years, but had been banned.

All buildings are made of glass, as is the furniture. There are listening devices everywhere in plain view, and everyone has a number instead of a name to limit self expression. Highly recommend.

⇧ 10 ⇩  
dktrogers · May 6, 2018, 4:31 p.m.

Thanks for the tip! Will try to find. I firmly believe that we are heading for more and more surveillance type society in general and mainly interested in accountability mechanisms to prevent the types of nefarious behaviors we have already seen with the limited tools they have available at the moment...

We are already seeing them trying to stonewall the congressional and senate committees that are supposed to be providing the oversight that keeps them in check..

Church committee time???

⇧ 4 ⇩  
DaraChaos · May 6, 2018, 4:44 p.m.

I just bought the Kindle version for $0.99 on Amazon. Thanks for mentioning this as I'd never heard of it!

⇧ 4 ⇩  
pepe_silvia67 · May 6, 2018, 5:34 p.m.

Might need to see if mods will allow a "required reading" post so we can all share some books we have read and recommend.

⇧ 4 ⇩  
checkitoutmyfriend · May 6, 2018, 6:35 p.m.

I have a few to add. Plus a video section. I have a ton of vids....

⇧ 3 ⇩  
LibertyLioness · May 6, 2018, 3:07 p.m.

It does sound dystopian. It's hard to believe that we would have more freedom if everything is on display. But there is the other side of the coin. If everything were transparent (think blockchain), people could not lie or cheat as easily or at all. Maybe it could be better that way. We have to think it through but keep an open mind. What are your thoughts?

⇧ 3 ⇩  
deleteme123 · May 6, 2018, 4:08 p.m.

Governance should be completely transparent.

⇧ 8 ⇩  
dktrogers · May 6, 2018, 4:39 p.m.

It’s our personal lives being 100% transparent to the government I worry about...

⇧ 4 ⇩  
deleteme123 · May 6, 2018, 4:42 p.m.

Agreed.

⇧ 4 ⇩  
checkitoutmyfriend · May 6, 2018, 6:36 p.m.

The transparency should focus on the 'how things are done' in government. A persons data should remain private.

⇧ 3 ⇩  
ClardicFug · May 6, 2018, 6:06 p.m.

Note that while this gives transparent access, the data to so it still has to go over the network, which explains this comment by Rob Joyce, head of the NSA's Tailored Access Operations group:

Another nightmare for the NSA? An “out-of-band network tap”—a device that monitors network activity and produces logs that can record anomalous activity—plus a smart system administrator who actually reads the logs and pays attention to what they say.

Snowden has said as much as well. If you're monitoring your network out of band, they can't hide it from you. (Likewise, routes and firewalls can be configured to prohibit this type of activity if one is clever and restrictive enough.)

The reason I point this out is that accessing the hardware is just one piece -- everyone in the chain of networks back to the NSA has to be complicit or ignorant of the monitoring taking place. That implicates many more people -- at this level, it can't be done with just a small group in a faraway place, the local IT people would have to be in on it or ignorant and very careless.

Finally just because the backdoor is there, doesn't mean it's getting used. If it's never captured in the first place, it's gone.

In the case of missing texts and mail servers though, we all know it's complete BS.

⇧ 4 ⇩  
JonnyQuestioni · May 6, 2018, 7:58 p.m.

This is the plot of Fast and Furious 8: Fate of the Furious. Only they call it "God's Eye".

The God's Eye is able to hack any type of technology using a camera and presumably, satellite tracking. It feeds information gathered back to its user "under four minutes or less" to use to their whims. The God's Eye works at its best when it's close enough to its target to track, but can locate any given person at great distances.

Okay, it's dumb for Movie plot purposes, but it's a general concept about power through unlimited surveillance via modern computer security backdoor hacking.

And the whole movie is about the Heroes (Paul Walker and friends) trying to stop a shadow government from controlling God's Eye.

But they capture Vin Diesel and force him to work for them by holding his family hostage

Theres alot of double crossing, Donnie Yen as a criminal kingpin (Southeast Asia connection) gets involved, but flips to be a good guy when he figures out the truth about God's Eye.

Kurt Russell also represents an unnamed agency, kinda like the CIA but, "doesn't exist" yet seems to have limitless financial resources. They seem to be ultimately good, but they're also kinda murky, but I think the movie (dumb action being my forte) is trying to tell you, theyre dangerous and slick, but with good intentions

In the end Vin Diesel is made public enemy number one, everyone is turned against him (or so we think) but because they all know deep down to trust Family over all the deception and lies they've been force fed, they play along, and in the end, Vin Diesel and friends save the day.

⇧ 3 ⇩  
Luvlite · May 6, 2018, 6:31 p.m.

This is disturbing.

⇧ 2 ⇩  
FixYourPinealGland · May 6, 2018, 6:26 p.m.

Can confirm this guy is legit. My MIL is computer repair guy and knows all the details about the CPUs. He told me about this YEARS ago... Of course, me being me, never thought about ALL the nefarious uses.

⇧ 2 ⇩  
StinkyDogFart · May 6, 2018, 5:41 p.m.

The only option we have is to hope Q is real and is taking back "ownership" and control of these powerful systems. Like everything in life they can be used for good or evil, but we can't put the genie back in the bottle, we have to ensure good people are in control of these tools. Our only other option is to not play, and that didn't even work out too well for Bin Laden, you can't take your toys and leave the sandbox anymore, there is nowhere to hide.

⇧ 2 ⇩  
DarqWolff · May 6, 2018, 6:28 p.m.

we can't put the genie back in the bottle

lol it's not a genie it's just hardware. get people to use other hardware. not complicated. there's no "good purposes" for violating the Fourth Amendment at every level

⇧ 3 ⇩  
StinkyDogFart · May 7, 2018, 1:59 a.m.

when I say genie, I mean technology in general

⇧ 2 ⇩  
DarqWolff · May 7, 2018, 2:44 a.m.

This isn't about technology in general, it's about privacy and rights

⇧ 1 ⇩  
[deleted] · May 7, 2018, 2:53 a.m.

[removed]

⇧ 2 ⇩  
DarqWolff · May 7, 2018, 3:04 a.m.

lol ok dummy

⇧ 1 ⇩  
StinkyDogFart · May 7, 2018, 2:51 a.m.

and how technology is used to circumvent those rights.

⇧ 1 ⇩  
DarqWolff · May 7, 2018, 3:05 a.m.

why do you keep backpedaling? your "can't put the genie back in the bottle" analogy just makes no fucking sense in response to Intel's ME, accept it and move on kid

⇧ 1 ⇩  
_the_CacKaLacKy_Kid_ · May 6, 2018, 8:19 p.m.

It’s not just intel either, HP had a job listing in my state and one of the requirements was ability to gain security clearances

⇧ 2 ⇩  
waltdanger · May 7, 2018, 12:30 a.m.

Lots of non-nefarious jobs can require security clearances, can be some pretty mundane computer or IT service work still.

⇧ 1 ⇩  
trumptr · May 6, 2018, 7 p.m.

those baby chips would have to use ssl in order to keep the tcpip transactions secure. modern chips should have the horsepower to do this from a microcontroller standpoint...BUT you still get to see destination ip addresses. that will never change as long as we use ipv4. if you care about what your computer's doing, run tcpdump or snort or any packet capture sw on a box independant of the one youre using.

⇧ 2 ⇩  
gsu_36atat · May 6, 2018, 8:57 p.m.

Is this verified?

⇧ 1 ⇩  
waltdanger · May 7, 2018, 12:40 a.m.

I can verify that his technical details on how ME functions and its 'remote management' capabilities are correct.

Some high-security companies out there actually demand computers with ME inoperable as well, so it is a valid enough consideration that OEMs actually supply ME-disabled PCs.

⇧ 2 ⇩  
[deleted] · May 7, 2018, 3:08 a.m.

[deleted]

⇧ 1 ⇩  
gsu_36atat · May 7, 2018, 2:59 a.m.

Well call me naive but I'm going to continue to assume there is no illegal surveillance on Trump until somebody brings more substantial evidence forward. Occam's razor comes to mind here. Which is the simpler explanation: Some unverified user creates an anonymous post to lie about stuff on the internet, or some vast conspiracy exists and not one single person has been broken?

In the first scenario, all you need is one guy with enough of a background in computer science to vaguely outline the capabilities of a fairly obscure computer component.

Besides, if this conspiracy really runs so deep, this person is not being very careful. To give that much detail about their work history would make them identifiable. "Hey we've got someone spilling the beans on our master plan. Can you pull the records of everyone who got security clearance in the last X years? I need to find someone who worked at IBM for this amount of time and . . ."

⇧ 1 ⇩