GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Miss Gayle (missgayle@urbanists.social)'s status on Sunday, 06-Apr-2025 12:17:39 JST Miss Gayle Miss Gayle
    • AI6YR Ben

    @ashwin @ai6yr

    Did you miss the part where cheeto admitted they had hacked voting machines in swing states?

    https://www.newsweek.com/donald-trump-elon-musk-voting-machine-2017657

    I don't believe he *was* elected. They mercilessly went after states that had certain types of more secure voting machines, but were strangely silent about the brands that were more hackable. And now we know why.

    In conversation about 3 months ago from urbanists.social permalink
    • Embed this notice
      ⚡Lord of Misrule⚡ (toiletpaper@shitposter.world)'s status on Sunday, 06-Apr-2025 15:24:13 JST ⚡Lord of Misrule⚡ ⚡Lord of Misrule⚡
      in reply to
      • AI6YR Ben
      @MissGayle @ashwin @ai6yr

      That newsweek article only mentions one company "Dominion" (based on Toronto Canada, aka: Diebold, Sequoia, Premier, ES&S, etc) whose machines are absolutely notorious for being as secure as a wet paper bag. The government usually tries to deflect by saying they're not connected to internet, or they're protected by physical security, but that's well known to be complete BS. The bureaucrats don't understand the tech and don't know what they're talking about, just whatever their PR people tell them to read off the teleprompter.

      DEF Con has an annual voting machine hacking exhibit where random people including children as young as 6 years old successfully hack these machines, often in mere seconds, with and without physical access. The bureaucrats also don't account for how these machines are secured between elections where controls over physical and networked access (eg. to update firmware) are much more lax. You can also buy them used off ebay etc often for less than $100 each if you want to develop malware for them. Where I live in Canada the local government paid well above 6 figures for security consultants to audit a list of vendors before buying, and then proceeded to ignore their verdict and bought the absolute most vulnerable machines (made by Dominion) simply because they were produced locally. They were deployed right across the country and a large proportion of the machines malfunctioned (as expected) during subsequent elections, including by reporting bogus vote tabulations. Yet the government continues to do fuck all about it.

      Hackers have been warning about this shit from day one, but bureaucrats dgaf.

      https://media.defcon.org/DEF%20CON%2027/voting-village-report-defcon27.pdf
      https://www.theguardian.com/technology/2018/aug/22/us-elections-hacking-voting-machines-def-con
      https://odysee.com/@Qwinten:b/Kill-Chain--The-Cyber-War-on-America's-Elections-(2020):9

      That said, why go to the trouble of hacking the machines when you can just hack the opinions of gullible citizens using big data, AI and access to people's social media. That's why google and facebook etc were created with CIA VC (eg. In-Q-Tel) explicitly to do in the first place. Cambridge Analytica is a good case study, but it was just a sacrificial scapegoat, one of a dime a dozen still operating in full swing.

      https://archive.org/details/the.great.hack.2019.nf.webdl.dd5.1.x264ntgreducido
      https://www.youtube.com/watch?v=mIO893PtyxU

      Anyway, I'd like to see your evidence that "They mercilessly went after states that had certain types of more secure voting machines", because frankly as far as I'm aware there's no such thing as a "more secure voting machine". They're all garbage, and this sounds like a massive cope to try and point the finger at orange Hitler because your party lost, when quite frankly it was entirely likely (based on the available evidence) they themselves hacked the vote in prior elections.
      In conversation about 3 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: ia903009.us.archive.org
        The Great Hack
        Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle for control of our most intimate personal details. From award-winning filmmakers Karim Amer and Jehane Noujaim, THE GREAT HACK uncovers the dark world of data exploitation with astounding access to the personal journeys of key players on different sides of the explosive Cambridge Analytica/Facebook data scandal. Academy-Award nominees Amer and Noujaim (The Square, Control Room, Startup.com) continue their tradition of exploring the seismic ripples of social media with this riveting, complex film. THE GREAT HACK forces us to question the origin of the information we consume daily. What do we give up when we tap that phone or keyboard and share ourselves in the digital age? https://www.thegreathack.com/

      2. Domain not in remote thumbnail source whitelist: i.guim.co.uk
        Kids at hacking conference show how easily US elections could be sabotaged
        from https://www.theguardian.com/profile/alex-hern
        Changing recorded votes would be difficult for bad actors. But at Def Con in Las Vegas, children had no trouble finding another point of entry
      3. Domain not in remote thumbnail source whitelist: cdn.thumbs.odycdn.com
        Odysee
        Explore a whole universe of videos on Odysee from regular people just like you!
      4. Hacking Democracy (Full Movie)
        from History & Warfare Now
        Thanks to information technology, populist movements have increasingly mobilized public opinion and gained traction for people like the U.S.’s Donald Trump, ...
      pistolero likes this.

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.