Domain: tiger-web1.srvr.media3.us My Pillow Guy Talk | Page 10 | Political Talk
Started By
Message

re: My Pillow Guy Talk

Posted on 8/6/21 at 8:01 pm to
Posted by Korkstand
Member since Nov 2003
29074 posts
Posted on 8/6/21 at 8:01 pm to
quote:

Fantastic! Will you please share with the class where that real-time IP traffic inbound from foreign sources generated on the map from his absolute proof documentary came from?
Wow, people are legit fooled by that hollywood knockoff bs graphic?
quote:

I know a group of people who have been working tirelessly since that absolute proof documentary was published who would like to get their hands on that data

Posted by Esquire
Chiraq
Member since Apr 2014
14487 posts
Posted on 8/6/21 at 8:10 pm to
quote:

I know a group of people who have been working tirelessly since that absolute proof documentary was published who would like to get their hands on that data
Posted by Korkstand
Member since Nov 2003
29074 posts
Posted on 8/6/21 at 8:26 pm to
quote:

I know whatit means leftard.
You said it wasn't a word.
quote:

How do you know what his method for finding truth is? I know it can be proven through packet captures.

quote:

What is your hypothesis for why it can't? Are you saying the material has been compromised?
First I'm saying that in order to get the material, countless computers around the country and world must be compromised. You can't just get PCAPs for whatever machine you want. You need to know how to locate them all (insanely difficult, especially given most/all voting machines don't even have network hardware). Then you either need physical access to all of the local networks, or you need to compromise a machine that is on each of the local networks. You need to do this to thousands of machines, and you need to hope that no one notices any of it. If the claim is that a lot of this was done from/by china, that makes it even more difficult because a lot of security software pays special attention to traffic from china. And I would have to imagine that if, for some reason, a machine with sensitive election data was connected to the network, it would be firewalled off from anything outside the room/building/state/country. I would also imagine that actual certified professionals poked and prodded the machines during the certification process.

Then if you manage all that, you have to somehow show that the machines actually complied with the requests. And I believe that if I were to design a voting machine that would change votes upon request, I would make it do it silently instead of fricking blasting back out over the wire "hey I committed fraud!" so that could be captured.

Then you have to prove that it's all legit.

quote:

What makes you think Lindell is lying or is not credible?
Because he's a crackhead pillow salesman? Because he admittedly knows jack shite about what he claims to have (he just trusts his "cyber guys")?
Posted by hubertcumberdale
Member since Nov 2009
6898 posts
Posted on 8/6/21 at 8:28 pm to
quote:

Fantastic! Will you please share with the class where that real-time IP traffic inbound from foreign sources generated on the map from his absolute proof documentary came from?


Lol how does that Google Earth Map prove election fraud?
Posted by VoxDawg
Glory, Glory
Member since Sep 2012
76149 posts
Posted on 8/6/21 at 8:33 pm to
You could've just said you didn't watch Absolute Proof.

Those images are stills I took.
Posted by boosiebadazz
Member since Feb 2008
84904 posts
Posted on 8/6/21 at 8:36 pm to
quote:

Those images are stills I took.


Will Mike release the source of the data that encompasses those graphics?
Posted by hubertcumberdale
Member since Nov 2009
6898 posts
Posted on 8/6/21 at 8:37 pm to
quote:

You could've just said you didn't watch Absolute Proof.

Those images are stills I took.




Anyone can make a fuggin map with lines on it, extremely easy lmao
Posted by Whiznot
Albany, GA
Member since Oct 2013
7598 posts
Posted on 8/6/21 at 8:42 pm to
Trump lost because he is a loser like the pillow dude.
Posted by hubertcumberdale
Member since Nov 2009
6898 posts
Posted on 8/6/21 at 8:42 pm to
quote:

Will Mike release the source of the data that encompasses those graphics?



No bc it’s all completely fake. How would the pillow guy acquire any of this information?
Posted by OldManRiver
Prairieville, LA
Member since Jan 2005
7452 posts
Posted on 8/6/21 at 8:53 pm to
quote:

Fantastic! Will you please share with the class where that real-time IP traffic inbound from foreign sources generated on the map from his absolute proof documentary came from?

Well that image looks a lot like this image from the documentary



Unfortunately for Mike, it appears all that data was bullshite by a guy named Dennis Montgomery who has a long history of fraud. Gateway Pundit actually did an article back in February getting ahead of the story and discreditng Montgomery, and a lot of the data in the documentary

quote:

Unfortunately, hucksters like Dennis Montgomery have inserted garbage data into the narrative in an attempt to discredit the fraud investigations and related crimes. We don’t know who’s paying him.

Montgomery was behind data that made it into the hands of some of the top individuals who are fighting for President Trump. Montgomery claimed to prove that President Trump won the election based on his data. (We believe the election was stolen but Montgomery’s data doesn’t prove it.)


GP Link
Posted by Korkstand
Member since Nov 2003
29074 posts
Posted on 8/6/21 at 8:54 pm to
quote:

You could've just said you didn't watch Absolute Proof.

Those images are stills I took.
You seem to believe there's some juicy data behind that map. What do you think it means? I have news for you, computers in china try to contact computers in the US constantly, probably in the neighborhood of millions of times every second.

I could open a hole in my firewall, and within minutes computers in china will begin probing my network and I can capture that traffic. But then I could just change all the addresses to ones assigned to other countries, or generate a new PCAP with whatever data I want and use the chinese addresses, or locate some IPs near polling places and fill those in, and no one would be able to tell which set of data was legit.

Except, of course, the "cyber guys" in charge of the IPs that I faked, who would say "that traffic is not in our logs". And I would say "of fricking course it's not you cheater!"

Because it's pretty easy to modify logs too, you see.
Posted by texridder
The Woodlands, TX
Member since Oct 2017
14941 posts
Posted on 8/6/21 at 9:25 pm to
quote:

The problem we face is that people are waiting for a smoking gun thinking that will matter. We already have multiple smoking guns. Yet here we are waiting for something we already have.

The problem is that you don’t have a single objective, concrete smoking gun.

Your problem is you can’t or won’t recognize that.
Posted by boosiebadazz
Member since Feb 2008
84904 posts
Posted on 8/6/21 at 9:26 pm to
Oof
Posted by BabylonNTing
[Redacted]
Member since Jul 2021
140 posts
Posted on 8/6/21 at 10:18 pm to
In its most basic form, a packet contains a header and a payload. Headers include source and destination IP addresses, and the payload would the text I am writing now to post on the board.

Theses are incredibly impossible to forge because packets dont all follow each other (in a sequence, like say a train for a simple analogy) and travel different paths along the internet and assemble themselves at the destination.

Wireshark is a packet capture (pcaps) software I use, and is free to use. There are videos on it if one wants to learn more. Below is diagram of what packet looks like which is really amazing considering its just a blip of electrical current for lack of a better term. finally, not all fields are used adding to difficulty to trying to forge a over the network in real time where there are hundreds,thousands, even millions and higher of packets for a transmission session (think video games or Methflix).

Posted by Finkle is Einhorn
Member since Sep 2011
4374 posts
Posted on 8/6/21 at 10:43 pm to
Let’s don’t forget about voter turnout in cities like Milwaukee that was 200-300% above voter registration in some voting precincts

Meaning more people voted than they even had registered to vote
This post was edited on 8/6/21 at 10:44 pm
Posted by Korkstand
Member since Nov 2003
29074 posts
Posted on 8/7/21 at 12:04 am to
quote:

Theses are incredibly impossible to forge because packets dont all follow each other (in a sequence, like say a train for a simple analogy) and travel different paths along the internet and assemble themselves at the destination.
quote:

not all fields are used adding to difficulty to trying to forge a over the network in real time where there are hundreds,thousands, even millions and higher of packets for a transmission session
To be clear, I'm not claiming that Lindell or his "cyber guys" modified packets in real time, which is incredibly hard/impossible to do undetected. The hardest part is doing all the hackery required to do the prerequisite eavesdropping, and that's what Lindell is claiming to have pcaps of.

But it is trivial to forge pcap data after the fact. You don't even have to do all the hard stuff, you can just make it up.

Posted by Korkstand
Member since Nov 2003
29074 posts
Posted on 8/7/21 at 12:05 am to
quote:

Let’s don’t forget about voter turnout in cities like Milwaukee that was 200-300% above voter registration in some voting precincts

Meaning more people voted than they even had registered to vote
Posted by BabylonNTing
[Redacted]
Member since Jul 2021
140 posts
Posted on 8/7/21 at 4:30 am to
To be clear, I was talking to the OP, not the shill trying to impersonate them.
This post was edited on 8/8/21 at 12:45 pm
Posted by omegaman66
greenwell springs
Member since Oct 2007
26694 posts
Posted on 8/7/21 at 5:40 am to
Wow the dim downvote bots are strong in this thread. That would indicate they are afraid of something. Maybe, just maybe Mr. Pillow is on to something.
Posted by Marye
Member since Oct 2020
549 posts
Posted on 8/7/21 at 6:17 am to
quote:

Unfortunately for Mike


At the very least I believe Mike actually believes
he has something....OTOH, if he were so easily duped,
what does that say about our very own intelligence agencies?

"The Justice Department, which in the last few months has gotten protective orders from two federal judges keeping details of the technology out of court, says it is guarding state secrets that would threaten national security if disclosed. But others involved in the case say that what the government is trying to avoid is public embarrassment over evidence that Mr. Montgomery bamboozled federal officials."

"The C.I.A. never did an assessment to determine how a ruse had turned into a full-blown international incident, officials said, nor was anyone held accountable. In fact, agency officials who oversaw the technology directorate ? including Donald Kerr, who helped persuade George J. Tenet, then the director of central intelligence, that the software was credible ? were promoted, former officials said. “Nobody was blamed,” a former C.I.A. official said. “They acted like it never happened.”


LINK

Aren't these the same people who keep telling us
"the cover-up is worse that the crime?

first pageprev pagePage 10 of 13Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on X, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookXInstagram