Page 2 of 7 FirstFirst 123456 ... LastLast
Results 16 to 30 of 104

Thread: Maricopa County Officials Refusing to Turn Over Routers to Auditors

  1. #16 | Top
    Join Date
    Apr 2009
    Location
    Earth
    Posts
    95,511
    Thanks
    48,460
    Thanked 29,523 Times in 22,580 Posts
    Groans
    39,524
    Groaned 4,285 Times in 4,085 Posts
    Blog Entries
    53

    Default

    Quote Originally Posted by Darth Omar View Post
    I’m far from a computer geek but that seems a stretch to me as well.
    They could find out certain IP addresses I suppose from the routing tables, and presumably the access lists to determine what traffic is allowed into and out of the router network. Although access to their firewall ingress and egress rules would be more useful.

    Egress Filtering

    Description

    Egress filtering is the practice of monitoring, controlling and restricting traffic leaving a network with the objective of ensuring that only legitimate traffic is allowed to leave and that unauthorised or malicious traffic is prevented from doing so.

    Egress filtering is primarily achieved through the use of predefined security rules and policies implemented on the perimeter firewall, to block outbound traffic that uses protocols and destination ports that are unnecessary or subject to abuse. Network administrators are advised to ensure that appropriate measures are taken to prevent unauthorised access to the internet access router, as it is located outside the perimeter firewall, and if SNMP enabled, that apprioate measues are implemented to prevent it from being exploited.

    While Egress filtering is not primarily focused on protecting one's own network, it does serve to protect the networks of other organisations, by preventing the spread of malware or traffic with a forged source (spoofed) IP address from leaving the network that has been compromised, either through the deliberate malicious activity of an individual user or the malicious activity caused by infections, botnets and other malware within the network


    Ingress Filtering

    Description

    Ingress filtering is the practice of monitoring, controlling and restricting traffic entering a network with the objective of ensuring that only legitimate traffic is allowed to enter and that unauthorised or malicious traffic is prevented from doing so.

    Ingress filtering is primarily achieved through the use of predefined security rules (e.g. packet filtering) and policies implemented on the perimeter firewall, to ensure that inbound traffic is from the network from which it claims to originate from. Network administrators are advised to ensure that appropriate measures are taken to prevent unauthorised access to the internet access router, as it is located outside the perimeter firewall, and if SNMP enabled, that apprioate measues are implemented to prevent it from being exploited.

    Ingress filtering is a simple and effective method to limit the impact of a Denial of Service (DoS) attack, by denying traffic with a forged source (spoofed) IP address access to the network, and to help ensure that traffic is traceable to its correct network.
    https://www.ncsc.gov.ie/emailsfrom/D...ess/index.html

  2. The Following User Says Thank You to Primavera For This Post:

    ExpressLane (05-11-2021)

  3. #17 | Top
    Join Date
    Apr 2009
    Location
    Earth
    Posts
    95,511
    Thanks
    48,460
    Thanked 29,523 Times in 22,580 Posts
    Groans
    39,524
    Groaned 4,285 Times in 4,085 Posts
    Blog Entries
    53

    Default

    Quote Originally Posted by reagansghost View Post
    grampsy falls in and out of consciousness, didn't know the election was already over
    I should do a poll: who is the biggest Calicunt?


    Reagan's Gizzards

    Daesh

    McSlobber

    IQ64

    Crypiss

    Cawacko

    Bill

    The last two are really only for the sake of completeness.
    Last edited by Primavera; 05-09-2021 at 04:38 AM.

  4. #18 | Top
    Join Date
    Apr 2019
    Posts
    19,588
    Thanks
    10,348
    Thanked 9,706 Times in 6,717 Posts
    Groans
    179
    Groaned 336 Times in 330 Posts
    Blog Entries
    1

    Default

    Quote Originally Posted by volsrock View Post
    Maricopa County Officials Refusing to Turn Over Routers to Auditors
    https://www.newsmax.com/politics/mar...07/id/1020526/


    if the election was legitimate, why is the Media-Dem Party fighting against an audit so hard? They are hiding the evidence of election fraud.

    that is why

    How about some jail time for refusing to comply with a subpoena
    IMAGINE THAT....
    TRUMP WILL TAKE FORTY STATES...UNLESS THE SAME IDIOTS WHO BROUGHT US THE 2020 DUNCE-O-CRAT IOWA CLUSTERFUCK CONTINUE THEIR SEDITIOUS ACTIVITIES...THEN HE WILL WIN EVEN MORE ..UNLESS THE RED CHINESE AND DNC COLLUDE, USE A PANDEMIC, AND THEN THE DEMOCRATS VIOLATE ARTICLE II OF THE CONSTITUTION, TO FACILLITATE MILLIONS OF ILLEGAL, UNVETTED, MAIL IN BALLOTS IN THE DARK OF NIGHT..


    De Oppresso Liber

  5. The Following User Says Thank You to Grokmaster For This Post:

    ExpressLane (05-11-2021)

  6. #19 | Top
    Join Date
    Sep 2009
    Posts
    80,864
    Thanks
    5
    Thanked 19 Times in 18 Posts
    Groans
    0
    Groaned 2 Times in 2 Posts

    Default

    Quote Originally Posted by Damocles View Post
    Here is a graduate thesis on router forensics.

    https://dione.lib.unipi.gr/xmlui/bit...the%20Internet.

    There simply is too much to talk about, but to tell it simply. Like any computer equipment cache and other information is stored and using forensic techniques you can obtain information about hacking events or changes to data packages at the router itself. (This is VERY simplified).
    Hence the secrecy?

  7. #20 | Top
    Join Date
    Aug 2010
    Posts
    57,826
    Thanks
    77,254
    Thanked 36,341 Times in 23,342 Posts
    Groans
    2,482
    Groaned 4,312 Times in 3,993 Posts
    Blog Entries
    7

    Default

    Quote Originally Posted by Damocles View Post
    Yeah, that is unlikely, nor is it likely the folks doing the audit would reveal or use that personally identifying information for any nefarious purpose. They clearly do not want any inspection of the routers, this is usually because they know there is some "there there"... likely somebody left open the internet connection during voting which is a violation of the law and leaves the election open for election fraud (not voter fraud, Jarod, this is a different animal).
    . How do you know they won’t use it for nefarious purposes? The whole recount sounds hinky. QAnon guys business conducting audit, bamboo fiber theory by another QAnut. It’s a joke and some AZ Senators are starting to regret their vote to audit.

  8. The Following User Groans At Phantasmal For This Awful Post:

    Primavera (05-11-2021)

  9. The Following 2 Users Say Thank You to Phantasmal For This Post:

    blackascoal (05-11-2021), no worries (05-12-2021)

  10. #21 | Top
    Join Date
    Apr 2020
    Posts
    10,462
    Thanks
    731
    Thanked 6,051 Times in 3,676 Posts
    Groans
    100
    Groaned 1,172 Times in 1,112 Posts
    Blog Entries
    2

    Default

    Quote Originally Posted by volsrock View Post
    When accused of a crime, innocent people do not block the evidence of their innocence from coming forward.
    Like Derek Chauvin?

    Ooops.

  11. #22 | Top
    Join Date
    Apr 2020
    Posts
    10,462
    Thanks
    731
    Thanked 6,051 Times in 3,676 Posts
    Groans
    100
    Groaned 1,172 Times in 1,112 Posts
    Blog Entries
    2

    Default

    Talk about much ado about nothing. Seriously. When a request is made of a government entity, lawyers will review the request and respond. In this case, they responded by saying the request was overly broad. IT HAPPENS EVERY FUCKING DAY. This is what we have courts for. They will hear the arguments and make a decision.

    Why is Trump so desperately trying to hide his tax returns?

    Oops.

  12. The Following User Groans At Concart For This Awful Post:

    Primavera (05-11-2021)

  13. The Following 3 Users Say Thank You to Concart For This Post:

    evince (05-11-2021), no worries (05-12-2021), Phantasmal (05-11-2021)

  14. #23 | Top
    Join Date
    Jun 2007
    Posts
    28,582
    Thanks
    10,236
    Thanked 13,293 Times in 8,006 Posts
    Groans
    12
    Groaned 1,132 Times in 1,059 Posts
    Blog Entries
    10

    Default

    Quote Originally Posted by Grumpy View Post
    Unless the dims are running the election
    THEY ARE NOT AUDITORS AND THEY ARE DEMANDING PASSWORDS THAT WILL PUT THE ENTIRE STATE IN JEOPARDY.
    AMERICAN HISTORY ITSELF IS A TESTAMENT TO THE STRENGTH AND RESILIENCE OF AFRICAN PEOPLE. WE, ALONG WITH THE COURGE AND SACRIFICES OF CONSCIOUS WHITE AMERICANS, LIKE VIOLA LIUZZO, EVERETT DIRKSEN, AND MANY OTHERS, HAVE FOUGHT AND DIED TOGETHER FOR OUR FREEDOM, AND FOR OUR SURVIVAL.

    In America, rights are are not determined by what is just, fair, equitable, honest, nor by what Jesus would do. Rights are determined ONLY by what you can DEMAND.

  15. The Following 2 Users Say Thank You to blackascoal For This Post:

    evince (05-11-2021), Phantasmal (05-11-2021)

  16. #24 | Top
    Join Date
    Jul 2006
    Posts
    136,040
    Thanks
    41,166
    Thanked 22,842 Times in 17,734 Posts
    Groans
    9
    Groaned 18,900 Times in 17,510 Posts
    Blog Entries
    8

    Default

    How many times does a state get to certify the vote?


    The votes have been verified and counted and certified



    Why did the republicans wait so long to PRETEND there was fraud?

  17. #25 | Top
    Join Date
    Jul 2006
    Posts
    136,040
    Thanks
    41,166
    Thanked 22,842 Times in 17,734 Posts
    Groans
    9
    Groaned 18,900 Times in 17,510 Posts
    Blog Entries
    8

    Default

    Let’s remember how many times republicans have turned voter information over to the Russians


    Republicans can’t be trusted with this information

  18. The Following User Says Thank You to evince For This Post:

    no worries (05-12-2021)

  19. #26 | Top
    Join Date
    Dec 2018
    Posts
    3,416
    Thanks
    4
    Thanked 1,387 Times in 949 Posts
    Groans
    0
    Groaned 180 Times in 170 Posts

    Default

    Quote Originally Posted by Damocles View Post
    Yeah, that is unlikely, nor is it likely the folks doing the audit would reveal or use that personally identifying information for any nefarious purpose. They clearly do not want any inspection of the routers, this is usually because they know there is some "there there"... likely somebody left open the internet connection during voting which is a violation of the law and leaves the election open for election fraud (not voter fraud, Jarod, this is a different animal).
    What a crock from you guys as you pretend to understand computer security.

    When it comes to computer security of any kind the first rule is you don't give out your passwords. Period. End of Security lesson.



    First rule of a router is you change the default password so others can't access your router. If someone is managing all the routers they may have given every router an unique password but that is unlikely. That means someone likely reused a password. Now you are saying they should give that password to a company that while it may be well intentioned you have no idea as to what computer security they have in place. This isn't just about Cyber Ninjas being bad actors, it is a question of how competent they are when it comes to securing their own equipment. We already have reports of laptops being left out in the open during this recount. We have no clue as to whether they even test their equipment for intrusions or if they are compromised in any way by failing to update as new avenues for attack are revealed. Bad actors could be in Cyber Ninjas computers already without them knowing it.

    The logs for a router aren't going to reveal someone's SS number but they do contain lots of information that will make it easier to try to get that information from the computers behind the router. Have you ever actually looked at router logs?

    By turning over the routers if the information is compromised in some way it does the following:
    It reveals the router user/password which can then be used to attack all other county routers in case it was reused.
    It reveals the type/brand of router so bad actors can direct known attacks against any security holes known to exist for that type of router.
    It would likely reveal the email address of the router administrator since advanced routers routinely send reports by email.
    It reveals the router's IP address meaning that any bad actor knows the IP of the router so can concentrate attacks knowing who their target is.
    It reveals the open ports so any bad actor can concentrate attacks on those ports.
    It reveals web locations that are routinely visited making it easier to do phishing since a bad actor can spoof the website or direct emails based on companies they know people use routinely.
    It would reveal the IP address of any administrator that logs into the router which would then reveal any activity by that administrator that passes through the router.
    It allows a deep dive into the data to compare to other data that has been stolen to find possible security holes. A county officer who's personal email has been hacked or someone who has reused passwords making it easier to attack their accounts.

    Turning over a router and/or the logs would clearly create security issues. It might not result in a successful attack but it makes it more likely.
    He that tweets much, is much mistaken

  20. The Following 2 Users Say Thank You to Poor Richard Saunders For This Post:

    LV426 (05-11-2021), no worries (05-12-2021)

  21. #27 | Top
    Join Date
    Jul 2006
    Location
    Colorado
    Posts
    79,459
    Thanks
    1,989
    Thanked 11,592 Times in 7,579 Posts
    Groans
    2
    Groaned 457 Times in 425 Posts
    Blog Entries
    5

    Default

    Quote Originally Posted by Poor Richard Saunders View Post
    What a crock from you guys as you pretend to understand computer security.

    When it comes to computer security of any kind the first rule is you don't give out your passwords. Period. End of Security lesson.



    First rule of a router is you change the default password so others can't access your router. If someone is managing all the routers they may have given every router an unique password but that is unlikely. That means someone likely reused a password. Now you are saying they should give that password to a company that while it may be well intentioned you have no idea as to what computer security they have in place. This isn't just about Cyber Ninjas being bad actors, it is a question of how competent they are when it comes to securing their own equipment. We already have reports of laptops being left out in the open during this recount. We have no clue as to whether they even test their equipment for intrusions or if they are compromised in any way by failing to update as new avenues for attack are revealed. Bad actors could be in Cyber Ninjas computers already without them knowing it.

    The logs for a router aren't going to reveal someone's SS number but they do contain lots of information that will make it easier to try to get that information from the computers behind the router. Have you ever actually looked at router logs?

    By turning over the routers if the information is compromised in some way it does the following:
    It reveals the router user/password which can then be used to attack all other county routers in case it was reused.
    It reveals the type/brand of router so bad actors can direct known attacks against any security holes known to exist for that type of router.
    It would likely reveal the email address of the router administrator since advanced routers routinely send reports by email.
    It reveals the router's IP address meaning that any bad actor knows the IP of the router so can concentrate attacks knowing who their target is.
    It reveals the open ports so any bad actor can concentrate attacks on those ports.
    It reveals web locations that are routinely visited making it easier to do phishing since a bad actor can spoof the website or direct emails based on companies they know people use routinely.
    It would reveal the IP address of any administrator that logs into the router which would then reveal any activity by that administrator that passes through the router.
    It allows a deep dive into the data to compare to other data that has been stolen to find possible security holes. A county officer who's personal email has been hacked or someone who has reused passwords making it easier to attack their accounts.

    Turning over a router and/or the logs would clearly create security issues. It might not result in a successful attack but it makes it more likely.
    Did you see this guy pretend he knows more about it than the guy who wrote the dissertation for his degree? LOL.

    Man, you are a HOOT!
    Excellence is an art won by training and habituation. We do not act rightly because we have virtue or excellence, but rather we have those because we have acted rightly. We are what we repeatedly do. Excellence, then, is not an act but a habit.
    - -- Aristotle

    Believe nothing on the faith of traditions, even though they have been held in honor for many generations and in diverse places. Do not believe a thing because many people speak of it. Do not believe on the faith of the sages of the past. Do not believe what you yourself have imagined, persuading yourself that a God inspires you. Believe nothing on the sole authority of your masters and priests. After examination, believe what you yourself have tested and found to be reasonable, and conform your conduct thereto.
    - -- The Buddha

  22. #28 | Top
    Join Date
    Jun 2018
    Location
    Dirty South
    Posts
    42,832
    Thanks
    4,919
    Thanked 9,536 Times in 7,134 Posts
    Groans
    2
    Groaned 2,785 Times in 2,575 Posts

    Default

    Quote Originally Posted by Damocles View Post
    Did you see this guy pretend he knows more about it than the guy who wrote the dissertation for his degree? LOL.

    Man, you are a HOOT!
    He doesn't wing it and make shit up like you do, so you should probably listen to what he has to say.
    "While you're worried about bad apples
    We're wary of the roots
    Because no healthy tree
    Naturally bears strange fruit"


    -Jessica Foster, June 2020

  23. The Following User Says Thank You to LV426 For This Post:

    no worries (05-12-2021)

  24. #29 | Top
    Join Date
    Dec 2018
    Posts
    3,416
    Thanks
    4
    Thanked 1,387 Times in 949 Posts
    Groans
    0
    Groaned 180 Times in 170 Posts

    Default

    I forgot to include the easiest way to compromise information once you have access to a WIFI router and it's settings.


    Once you have access to the information from a WIFI router, you know the SSID, the MAC address and the password. This is what is used by everyone that connects using WIFI. Most people set up their devices to automatically connect when they are in range of the router.

    By simply knowing the SSID and password used, you can run a man in the middle attack. Go to the coffee shop a block away and spoof the WIFI SSID/password. Everyone that comes into the coffee shop whose device is set to automatically connect will connect to you and you can record everything they send and receive. It's a simple thing to turn off the HTTPS on a router forcing all the information to be not encrypted. Who ever checks to see which network they are connected to when they are automatically connecting or checks to see if they are really using a secure connection?
    He that tweets much, is much mistaken

  25. #30 | Top
    Join Date
    Jul 2006
    Location
    Colorado
    Posts
    79,459
    Thanks
    1,989
    Thanked 11,592 Times in 7,579 Posts
    Groans
    2
    Groaned 457 Times in 425 Posts
    Blog Entries
    5

    Default

    Quote Originally Posted by LV426 View Post
    He doesn't wing it and make shit up like you do, so you should probably listen to what he has to say.
    I will not engage in any conversation with you because I believe you are disingenuous and incapable of a conversation based on information when such is introduced to you. If I see you act differently in the future I may begin to engage with you again (this post doesn't bode well for that though). But until then, this will be my only response to you.
    Excellence is an art won by training and habituation. We do not act rightly because we have virtue or excellence, but rather we have those because we have acted rightly. We are what we repeatedly do. Excellence, then, is not an act but a habit.
    - -- Aristotle

    Believe nothing on the faith of traditions, even though they have been held in honor for many generations and in diverse places. Do not believe a thing because many people speak of it. Do not believe on the faith of the sages of the past. Do not believe what you yourself have imagined, persuading yourself that a God inspires you. Believe nothing on the sole authority of your masters and priests. After examination, believe what you yourself have tested and found to be reasonable, and conform your conduct thereto.
    - -- The Buddha

Similar Threads

  1. Meanwhile in Maricopa county......
    By Stone in forum Current Events Forum
    Replies: 4
    Last Post: 05-07-2021, 06:07 PM
  2. Why are they fretting over Maricopa County?
    By Darth Omar in forum Current Events Forum
    Replies: 22
    Last Post: 04-28-2021, 07:38 PM
  3. Maricopa County AUDIT - April 22nd - Question for Libtards
    By gfm7175 in forum Current Events Forum
    Replies: 187
    Last Post: 04-20-2021, 08:53 AM
  4. Biden First Dem to Win Maricopa County Since Truman
    By katzgar in forum Current Events Forum
    Replies: 2
    Last Post: 11-13-2020, 08:08 AM
  5. Replies: 1
    Last Post: 03-17-2020, 08:27 PM

Bookmarks

Posting Rules

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •