Lewdog
Gold Member
1. He posted an article stating how they successfully hacked a voting machine, and how it can be done remotely even though the voting machines are not connected to the internet. So you do know what he is saying.
2. You are saying that you know he is wrong, despite the fact he says it can be done. Thus, you are saying you know something he doesn't.
3. You don't ask for someone's IP unless you plan to hack them. Why don't you ask for my Skype ID to make a call? Then you can scan my computer and get the IP for yourself and then hack me? Seriously. I reported you for threatening to hack me. You don't like what I have to say, you could either not answer, or you could put me on ignore. threatening to hack me? Yeah that makes you worse than anything you can say about a Liberal.
Sure, he hacked voting machine. He had access to machine and it's software, I have no doubt he had plenty time to prepare the hack. Wait, but Russians...
Yes, I am saying that he's wrong, but not about possibility of hacking. You're still lying. If you had longer attention span than a gold fish, you would notice that I was referring to his claim the hack wouldn't leave the trace and that is false. Given that for removing every trace specialty tools/programs have to be used and for that you have to have full access to the hardware and software, which I don't think can happen.
You don't? You are making assumptions that my intent is to "hack" you. You're also making an assumption that I can't do the same thru the Skype. You're imagining things. Scratch that... you're lying, again. Pathetic prick.
Now, quote exactly the post where I "threatened" to hack you. A quote, not your interpretation of the post.
Yeah and give a good reason you would ask someone for their IP other than to hack them?
And here is exactly what I said in the email to him:
" My name is ------------ and I am a student at Easter Kentucky University. I read your article about the voting machine problems and shared it with a large online forum call usmessageboard.com. Some of the members, and in particular a member that graduated University of Michigan's Electrical Engineering MSE and Oakland University's Computer Science MSE said that your theory is impossible. In your theory on how malware could be transferred to the voting machines that are not hooked to the internet, you said the malware would be attached to the ballot file and then transferred to the voting machines using a memory card that is inserted into the voting machines. Then when the election is over, the malware can delete itself and not leave a trace. This member says that is impossible, unless you follow it up with some kind of program like Bleachbit. Is he correct or can you please tell me how this malware is able to do this. Also some members were curious how a hacker would know about how the machines are assembled, and what kind of programming it runs to be able to write malware that would work on it. Is this public knowledge? I really appreciate your time, as I know you have to be swamped with this issue and dealing with your own students!"