• 1 Post
  • 35 Comments
Joined 8 months ago
cake
Cake day: February 15th, 2025

help-circle



  • Certain addresses get flagged in bank and verification systems over time that are shared addresses among many people. Places where someone can get mail without a permanent legal address is one example. Shelters, general delivery at the post office, etc. So much of the concept of your identity is tied to your legal address. Courts can use this too and claim they can’t find someone then issue default judgements against them. Meanwhile, so many places are heavily monitored because they have turned into police states, it is not usually in question for the goverment who someone is and where they are located. The post office should provide long term PO boxes for unhoused people for free and these should be accepted as legal addresses. But often, you’ll find a PO Box isnt accepted.








  • The article fails to explain how the UPS was connected to the server, or if they were at all. Most use USB and there is no indication that even if some elaborate thing to connect to a battery backup over starlink was used, you still have to break out of the HID in Windows, gain kernel level access, then modify machines, some of which are airgapped, and the databases in a way that not only hides external reporting as they alleged with Palantir, but also removes any records of the database transactions being modified. Maybe you could have a USBHID zero day that lets the battery backup escape mitigations built in like Data Execution Prevention in Windows, then you have a second zero day that lets you modify SQLite where the tabulations were kept, and somehow all of this was coordinated remotely. Who knows, maybe the battery backups have a network connection on them meant to prevent electrical surges, and can operate as a man in the middle for any network traffic passing to the internet or other local servers. Even better, they were able to connect to a Tripp Lite device over StarLink, which acted as a man in the middle attack while protecting the network connection from a power surge, and then this was used to interface with the Intel Management Engine or another BIOS level attack, and they got in that way.

    So many options, and people can speculate all day. Proof is necessary and the voting machines and Tripp Lite devices are all still available to be audited. It’s important to remember that there are powerful forces inside the U.S. and other countries that want to move people away from Democracy and voting. The best way to do this is to have a repeat of the election denial from the right to now be on the left. If that becomes standard behavior then it’s game over for Democracy in the U.S.











  • From 2008 through Bidens term, when the GOP wanted to use the threat of a Govt shutdown against Democrats as leverage negotiating as a minority party. Now, the Democrats want to use the same methods as a way to have some power. The problem with this line of thinking is that the current administration does not want most of the Government open. They want to shut it down and give DOGE time to make sure none of the employees come back. This is the total opposite of the leverage the GOP had over Democrats who only wanted to keep the Government open. It was never going to work and they would have just been helping DOGE complete their goals. After all their goal is to dismantle as much of the Federal Govt as possible.