Concart (05-11-2021), Phantasmal (05-11-2021)
The demand is to make the state turn over PASSWORDS AND ROUTERS .. which gives them access to SOCIAL SECURITY NUMBERS. Knowing this is legally impossible, it gives them a feeble and frail excuse for them not being able to prove fraud.
SHERIFF GOES BALLISTIC AFTER ARIZONA RECOUNTERS DEMAND ACCESS TO COUNTY PASSWORDS
Giving computer network router and password information to a firm run by a conspiracy theorist is mind-numbingly reckless, the Maricopa sheriff said.
HuffPost.com
AMERICAN HISTORY ITSELF IS A TESTAMENT TO THE STRENGTH AND RESILIENCE OF AFRICAN PEOPLE. WE, ALONG WITH THE COURGE AND SACRIFICES OF CONSCIOUS WHITE AMERICANS, LIKE VIOLA LIUZZO, EVERETT DIRKSEN, AND MANY OTHERS, HAVE FOUGHT AND DIED TOGETHER FOR OUR FREEDOM, AND FOR OUR SURVIVAL.
In America, rights are are not determined by what is just, fair, equitable, honest, nor by what Jesus would do. Rights are determined ONLY by what you can DEMAND.
Concart (05-11-2021), Phantasmal (05-11-2021)
AMERICAN HISTORY ITSELF IS A TESTAMENT TO THE STRENGTH AND RESILIENCE OF AFRICAN PEOPLE. WE, ALONG WITH THE COURGE AND SACRIFICES OF CONSCIOUS WHITE AMERICANS, LIKE VIOLA LIUZZO, EVERETT DIRKSEN, AND MANY OTHERS, HAVE FOUGHT AND DIED TOGETHER FOR OUR FREEDOM, AND FOR OUR SURVIVAL.
In America, rights are are not determined by what is just, fair, equitable, honest, nor by what Jesus would do. Rights are determined ONLY by what you can DEMAND.
Finding an intrusion in the logs is different from using the logs to find out information about the regular users. You have to dig through all the regular user info to try to find the attack in one case. In the other case you are simply using the data the same way Google and Facebook use it to find patterns about what the users do.
When doing a forensic analysis of an attack. You don't have to worry about who can see the password for the router because you are the one protecting the system.
"We are all born ignorant, but one must work hard to remain stupid."
"Any fool can criticize, condemn and complain - and most fools do."
Providing router information to a shadowy private company led by a conspiracy embracing CEO would compromise sensitive and highly classified law enforcement data and equipment. In addition, citizens’ private information, including voting history, addresses, phone numbers, and SOCIAL SECURITY NUMBERS could fall into the hands of Cyber Ninjas, a company run by a conspiracy theorist - Maricopa County sheriff[/b]
AMERICAN HISTORY ITSELF IS A TESTAMENT TO THE STRENGTH AND RESILIENCE OF AFRICAN PEOPLE. WE, ALONG WITH THE COURGE AND SACRIFICES OF CONSCIOUS WHITE AMERICANS, LIKE VIOLA LIUZZO, EVERETT DIRKSEN, AND MANY OTHERS, HAVE FOUGHT AND DIED TOGETHER FOR OUR FREEDOM, AND FOR OUR SURVIVAL.
In America, rights are are not determined by what is just, fair, equitable, honest, nor by what Jesus would do. Rights are determined ONLY by what you can DEMAND.
cancel2 2022 (05-11-2021)
Concart (05-11-2021), no worries (05-12-2021), Phantasmal (05-11-2021)
The dissertation only confirms my concerns since the author points out that one of the best ways to not alter the router is to download the logs so they can be searched. Once the logs are downloaded onto a computer they are like any other file that could be accessed by a bad actor and stolen by someone SSHing into the system or by someone with physical access if the information is not properly secured.
It seems you didn't bother to actually read the dissertation, did you? Either that or you didn't understand it. The dissertation details how one would try to find out information in the logs but it has nothing to do with how one would go about protecting all that information since it deals only with the forensic side of trying to find an intrusion. Someone conducting a forensic audit would need to have access to all the information I pointed out could be used by a bad actor to try to compromise the system in the future. (The dissertation further goes on to discuss how to find out if a router has been compromised with a rootkit but that is not the concern with the routers in Maricopa county since the issue is whether the election system was connected to the internet or not.)
"We are all born ignorant, but one must work hard to remain stupid."
"Any fool can criticize, condemn and complain - and most fools do."
The dissertation is about the forensic information one can gain from a router, as I was answering the question as to what information could be gathered from a router that could possibly be relevant to an election audit.
Basically, what you say the dissertation is not about would be because the dissertation is about something entirely different than what you are saying about how to secure a router. You ignore the question, pretend to answer something that nobody asked about, then try to spike the football and do an end zone dance you didn't earn.
Your supposed information here was nonsense in answer to the question the gentleman had asked.
Excellence is an art won by training and habituation. We do not act rightly because we have virtue or excellence, but rather we have those because we have acted rightly. We are what we repeatedly do. Excellence, then, is not an act but a habit.
- -- Aristotle
Believe nothing on the faith of traditions, even though they have been held in honor for many generations and in diverse places. Do not believe a thing because many people speak of it. Do not believe on the faith of the sages of the past. Do not believe what you yourself have imagined, persuading yourself that a God inspires you. Believe nothing on the sole authority of your masters and priests. After examination, believe what you yourself have tested and found to be reasonable, and conform your conduct thereto.
- -- The Buddha
It is the mark of an educated mind to be able to entertain a thought without accepting it.
- -- Aristotle
cancel2 2022 (05-11-2021), Stone (05-11-2021)
Of course it is possible to gain forensic information from the router. That doesn't mean that turning over the router doesn't present some real security concerns which is why the routers were not turned over. The title of the thread is Maricopa County Officials Refusing to Turn Over Routers to Auditors which is what I was responding to.
The original question was to SS numbers being on a router. I think we can both agree that they are not but by giving access to the routers SS numbers could be accessed if the wrong party uses information gleaned from the router. My response was to your claim that there was no threat in turning over the routers.
"We are all born ignorant, but one must work hard to remain stupid."
"Any fool can criticize, condemn and complain - and most fools do."
cancel2 2022 (05-11-2021)
no worries (05-12-2021)
no worries (05-12-2021)
cancel2 2022 (05-11-2021)
cancel2 2022 (05-11-2021)
Bookmarks