- Mike Lindell Claims that Dominion "flipped votes"
- Dominion claims that he's lying and is suing Lindell and others making such claims.
- It's possible that Dominion (and other election machine companies) are innocent of such claims, and that the internet packets were intercepted, and then spoofed with confabulated payload, and the original packets DROPPED.
- Such an attack is called a QUANTUMINSERT man-in-the-middle attack, and the US intelligence community and the department of defense are the ONLY groups in America that is capable of this
- Why only them? Because Quantuminsert requires having a much much FASTER connection in order to "beat" the original packets to the destination.
- This requires not only a high level quality-of-service but also an actual medium that is quite different from the regular interent, specifically LIGHT. Light is faster than elections.
- Fiber optic networks that only the spooks and military have access to.
How's this all work then? Dominion transmits their election data per a request from a remote host, one that is involved in election night reporting (ENR), the system used by ALL US media to be on the same page regarding the totals. This ENR system essentially collates, aggregates data from all the 3143 counties in america.
The ENR system makes a request to Dominion, Dominion responds with the requested dataset. Typically, today, this is done using either json data or xml, or its a series of smaller responses. It could even be something as primitive as an xsls (excel file) traunch inside of a zip file. I wouldn't put it past them...these people use outdated, very insecure, very old dumb government tools.
So Dominion responds with the data payload of some kind. The [ NSA / CIA / DOD / QUANTUMINSERT ] system intercepts the payload, confabulates the NEW payload, strips all the metadata from their fake / spoof packet, and then adds the original packet information onto the packet and sends it own to the intended recipient ip address.
Of course, to confabulate the data, the QUANTUMINSERT system would have to be aware of what data they want to modify...if they modify it TOO obviouslky, they get caught. This means they will have a backdoor installed into the web-facing dominion servers.
They could have done this by having a CIA / NSA spy on the inside of Dominion who could have installed something;
Or they could use an exploit to gain access to the same system.
Or they could even use exploits in the system's hardware such as spectre/meltdown and opcode cache edge exploits recently discovered in intel cpus OR they could use the built-in INTEL hardware rootkit called the remote management engine, which seems to have been designed, specifically so that the CIA could access ANY INTEL CPU based computer at ANY time, possible for the last 2 or more decades.
So they'd have privileged 'view' into Dominion's servers
This would allow them to then know what data they have to change
And then they'd have their supercomputers come up with the target packets and then have this computer listen for those packets with some kind of advanced DEEP PACKET INSPECTION + AI to be able to find the packet that needs to be intercepted, modified and confabulated / spoofed in an instant
Trust me, they have all the technology to do this
I've actually seen them use this in realtime. I believe this was exposed in 2012 or 2013. Imagine what they have now, 7 yrs later?????