T**** Tower?
This. I’m a white guy, and I probably don’t even see it all, but I see it every time I look.
On the face of it, it does seem pretty silly. These people may be crazy but they’re not stupid. We underestimate them at our peril.
Proof is a meaningless concept, they should know that there is no proof. But that is not the point, the point is to advance the agenda. Regardless of the costs, the ends justify the means.
They are now about to get hard dose of reality, those ends did not justify the means and those costs will come at a steep price. But there will be others with a better grasp on reality. They now know where the boundaries are and how to exploit them.
Throw the book at them, lock them up! Send a clear and convincing message that this behavior will not be tolerated.
There is no agenda with out facts and therefore proof. No fact, no proof = no agenda. There is nothing beyond the naked pursuit of power and in the process preventing democrats from having any. That is all there is. The anti voting laws, the gerrymandering are in pursuit of power. Close out the democrats. For a generation. At minimum. I know what constant GOP majority is like. Arizona, where I live has has GOP majority state House and Senate chambers for 53 years. That’s 1969… 46.8% of my state’s time as a member state in these United States (Admitted in 1912)
Okay, there is so much here that is head-splittingly migraine-inducingly stupid, but let me try to unpack a few things from the perspective of someone who has been dealing with computer security in one form or another for the last 30+ years.
-
That “trusted build” thing from May 25th is how they install or update the computer systems used to run the election. The Colorado SoS has published standards for their voting systems, including the specific process for a trusted build.
-
Procedurally, it looks pretty solid. To summarize the key points as jargon-free as I can, they start from a system that has been thoroughly wiped clean, and then they use program source code that they have inspected to see if there are any back doors or vulnerabilities, and they verify all the components to make sure they contain exactly what they’re supposed to. This is a very solid process if you want to be as close to 100% certain as possible that the software you’re installing does exactly what it’s supposed to, nothing more and nothing less.
-
When Peters, the MAGA County Clerk, says “I was suspicious that something was happening to that information, and decided to make an image before they came in", that “image” she’s blathering about is, presumably, a copy of the state of the system before it got rebuilt. Depending on the software and the procedure used, it might even be a reliable copy, but I don’t have enough info to judge that.
-
Given that the whole point of the trusted build process is to start from a known-clean baseline and then create the system from known-good inputs, I have to wonder why she thought it was important to make that (kinda-sounds-like-unauthorized) image copy. One possibility is that she thought there was something nefarious in the original system state, and the trusted build would wipe out the evidence. To which I’d say “uh, don’t you folks make backups?”
-
The comment from CISA in the article quoted below might point to something else. If you have an image of a system before and after a security vulnerability gets fixed, then by comparing the two it is often possible to figure out exactly what the change was, and therefore learn about what the vulnerability entailed. This is a popular way for the Bad Guys to learn about a security vulnerability that they can exploit – not on the system in question (because it just got fixed there) but on other systems that haven’t had the fix applied yet.
“CISA has worked with election officials to protect their systems with a starting assumption that vulnerabilities are known to malicious actors,” Geoff Hale, director of CISA’s Election Security Initiative, told TPM in a statement. “The published disk images confirm the risk that malicious actors have access to and may attempt to exploit vulnerabilities.”
- What Geoff Hale is saying there is a good fundamental security principle: Assume that the bad guys already know your weak points. In other words, do not rely on what the security pros call “Security by Obscurity”. Assume the worst, and plan your defenses accordingly. So, for example, when you have at least disk images, and possibly the actual hard drives, going walkabout and subject to all kinds of unsupervised, uncontrolled, unqualified people poking around with them, never mind the risk of unmonitored access to the hardware itself thanks to video surveillance being disabled, then it is prudent to assume that any secrets in the system are no longer secret.
I am now going to take some ibuprofen and wash it down with whiskey.
These people are complete idiots.
So, so close to “Stop Mandel.” I can be down with that.
[For those who don’t know Josh Mandel (R-moron (but I repeat myself)) is trying to run for Rob Portman’s (R-OH) Senate seat]
Therefore, someone had helped “lead” her to that conclusion and perhaps provided the “evidence” in the first place. OTOH, maybe she thought it up all by herself.
My guess is nothing will come of it even though it’s completely obvious Peters committed multiple felonies.
She’s already lost her job.
This man’s death is abominable. The degraded state of society in this country is sickening, and while we’re all human and flawed, it is one party (including its politicians, its corporate and rich top 0.1% percent funders, its mob of bigots, and its ignorant dupes) that is taking us down in most very regard, from covid to climate change to education to pretty much everything else. The fact that the mainstream media doesn’t report this basic fact of reality on a constant basis shows how deeply embedded in the problem they are.
Lost her assignment, yes, but is she off the payroll? I doubt they can do that with a state government employee until at least the investigation completes.
That’s how the con works: the conman runs through his pitch and waits for the marks to self-select. The con succeeds because the mark wants to believe.
OT and governors who aren’t up on history…
from cnn.com
Louisiana Gov. John Bel Edwards said Ida “will be one of the strongest hurricanes that hit anywhere in Louisiana since at least the 1850s.”
… … …
Has Gov. Edwards forgotten 2005’s Hurricane Katrina that hit New Orleans as a cat 5? Ida will be a cat 4 which is of course horribly destructive… and then there were the two within 6 weeks of each other a year ago one of which was Laura, a cat 4.
I’ll give him a break on this. It’s his job to maximize the incentive for coastal residents to bug out. Looks like Ida is going to be a direct hit at almost the same spot as Laura.
More like a “get-the-net”work.
I like that: the “Meh” Pillow guy.
In fairness to the owner of the truck (though not sure why I bother), the creative spelling is probably driven by a limit on the number of characters that can be on a license plate.
Probably.
Plus wind speeds still are increasing. It might be a cat 5 hurricane at landfall.
I hear they opened a GoFundMe site for this guy. I think I’ll donate an ivermectin gift certificate.
Yeah, that was cruel, but this motherfucker and people like him, dead or alive, can rot in hell. Hallmark and American Greetings really need to start marketing “Undeserving Of Sympathy” cards.
No info on casualties. The rocket did not reach the airport.