g5000
Diamond Member
- Nov 26, 2011
- 128,965
- 73,267
- 2,605
Link?I already posted it here in one of the election threads.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Link?I already posted it here in one of the election threads.
All the Ds have to do is say there's a leak in the bathroom...The one that says hackers would need to have physical access to the machines? That one?
Gee, I wonder how that can be prevented....hmmmmmm...
USB stick.Link?
This statement by you just proves there could never be any evidence you'd accept that caused you to change your mind on this topic. The other HALF of this nation's voters disagree and that is a reality that you cannot eliminate just by mocking or disbelieving. The number of independents that are beginning to question the legitimacy of this election is growing and you can't stop THAT, either.GOP commission refuses to certify New Mexico primary results over distrust of voting machines
Votes in a New Mexico community are at risk of not counting after a Republican-led commission refused to approve primary election results over distrust of Dominion vote-tallying machines.www.pbs.org
Just look at what the Big Lie has caused. This adds to the evidence that Dominion can present in their Billion dollar suits. Rudy better get drunk now....he won't be able to afford a beer later.
Ok, tell me about physical access then.
Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to ImageCast X devices. Jurisdictions can prevent and/or detect the exploitation of these vulnerabilities by diligently applying the mitigations recommended in ICSA-22-154A, including technical, physical, and operational controls that limit unauthorized access or manipulation of voting systems. Many of these mitigations are already typically standard practice in jurisdictions where these devices are in use and can be enhanced to further guard against exploitation of these vulnerabilities.
While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.
Yeah, or complain about being "tired" and wanting to finish it tomorrow. Any of the Lefties who accept that are just scummy shills for the theft.All the Ds have to do is say there's a leak in the bathroom...
What about it?Ok, tell me about physical access then.
What, specifically, are these protections?What about it?
The report clearly says there are already protections in place and that no election has been affected.
What more do you need to know?
The dipshits in New Mexico probably bleev Sideny Powell's bullshit that Italian military satellites were used to changed Trump votes to Biden votes.
That hoax has been debunked.All the Ds have to do is say there's a leak in the bathroom...
A government agency......What about it?
The report clearly says there are already protections in place and that no election has been affected.
What more do you need to know?
The dipshits in New Mexico probably bleev Sideny Powell's bullshit that Italian military satellites were used to changed Trump votes to Biden votes.
Link?That hoax has been debunked.
Sorry!
Ask CISA. Or DellDude. He's the one who claimed CISA said the machines could be hacked remotely.What, specifically, are these protections?
That what three or four cities shut down overnight and resumed the count the next day?That hoax has been debunked.
Sorry!
Ask CISA. Or DellDude. He's the one who claimed CISA said the machines could be hacked remotely.Ask CISA. Or DellDude. He's the one who claimed CISA said the machines could be hacked remotely.
Another hoax.
Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to ImageCast X devices. Jurisdictions can prevent and/or detect the exploitation of these vulnerabilities by diligently applying the mitigations recommended in ICSA-22-154A, including technical, physical, and operational controls that limit unauthorized access or manipulation of voting systems. Many of these mitigations are already typically standard practice in jurisdictions where these devices are in use and can be enhanced to further guard against exploitation of these vulnerabilities.
While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.
Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to ImageCast X devices. Jurisdictions can prevent and/or detect the exploitation of these vulnerabilities by diligently applying the mitigations recommended in ICSA-22-154A, including technical, physical, and operational controls that limit unauthorized access or manipulation of voting systems. Many of these mitigations are already typically standard practice in jurisdictions where these devices are in use and can be enhanced to further guard against exploitation of these vulnerabilities.
While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.
You are the one who said CISA was a reliable source, retard! Holy shit!A government agency......
Tell me about access......
Dominion was allowed to remove the machines before they were inspected.You are the one who said CISA was a reliable source, retard! Holy shit!
Sorry, but you have ZERO evidence the machines were, or can be, hacked. Your own source denies your claims.
None. It's a figment of your imagination. You manufactured bullshit on the fly and thought you could get away with it.
You do realize that in contested elections, a recount was done by counting the paper ballots by hand, right?Dominion was allowed to remove the machines before they were inspected.
I know, I know, you're going to claim that's a lie.
CISA is a reliable source but doesn't state a guarantee of non-data corruption.You are the one who said CISA was a reliable source, retard! Holy shit!
Sorry, but you have ZERO evidence the machines were, or can be, hacked. Your own source denies your claims.
None. It's a figment of your imagination. You manufactured bullshit on the fly and thought you could get away with it.