Pages

Friday, February 05, 2021

Absolute proof

Mike Lindell's new video on the details of the 2020 election fraud. I haven't watched it yet so I can't testify to its accuracy.

UPDATE: If you want to save to your hard drive for whatever reason, you can do so here.

65 comments:

  1. Clipgrab does work on bitchute if anyone wants to download a copy for their harddrive or to maybe even burn on a dvd.

    ReplyDelete
  2. it's good. if normies/newbies will watch that long.

    ReplyDelete
  3. I just listened to the first half. Well presented with very good experts. What was new to me: the Scytl server in Francfurt had a malware that recirded all the ligin credentials of every US precinct which allowed them to then access and change the data in every single precinct.

    ReplyDelete
  4. The Biden's son is a raging crack addict and Lindell is a former one.
    As insane as he may appear Mike may have profound insight here.

    ReplyDelete
    Replies
    1. @canada78bear
      Just what I would write if I were a troll, but did not want the moderators to notice immediately...

      Delete
  5. I have been hearing about this all day.

    Note the "how we saved the election [from the autocrat]" article and this piece by Mike Lindell on the same day.

    These are salvos. I wonder how close they actually released/posted/etc?

    Will watch later.

    ReplyDelete
  6. I suppose it may be meaningful to folks who've not seen the various horrifying presentations to various state groups, nor watched Jovan Pulitzer's stuff, or Col Waldron or or or... I was underwhelmed and dismayed by the amateur hour aspects... I hope it is more shocking to folks who haven't been immersed in the data all along?

    ReplyDelete
  7. It’s long. It needs a time breakdown by state... hopefully lindell organized it that way. He does an overview of each contested state and numbers of validly fraudulent ballots, promising to show evidence for each state. I didn’t get past that. Family Time beckoned.

    ReplyDelete
  8. Goes without saying, but... archive offline, folks.

    ReplyDelete
  9. First he saved our sleep cycles...then he saved America
    .

    ReplyDelete
  10. Anyone know how to archive this off of Bitchute?

    ReplyDelete
    Replies
    1. Use F12 on desktop and search for the file sources playing

      Delete
    2. It's Bitchute. Just use the download/torrent function.

      Delete
  11. It's indisputable.....what the Vox are you doing....sleeping.

    ReplyDelete
  12. The dramatic aspect I hadn't seen before is the claim that they have a real-time vote-by-vote log of every cyber-transaction in every precinct complete to the exact number of votes switched.

    ReplyDelete
  13. >I haven't watched it yet
    VD will never watch a video.

    Exception: When The Hu posts a video.

    ReplyDelete
  14. To believe in “no election fraud” memes three things:

    1. Trump didn’t cheat to win.
    2. Jews don’t cheat to win.
    3. Niggers don’t cheat to win.

    ReplyDelete
  15. If you are pressed for time start just after 1:40. In twenty minutes you will see the proof. Like President Trump said, 'We have it ALL'. No shit!!

    ReplyDelete
  16. A source tells TruNews that @RealMikeLindell went into a secure location today after receiving a significant amount of death threats.

    ReplyDelete
  17. From the article "I heard different claims about who should get the credit for thwarting Trump’s plot." As though Trump was plotting to destroy our 'Democracy.'

    ReplyDelete
  18. I appreciate what the guy's doing and at least someone is out there putting all the elements of the election shit-show in one place.

    It was far too long however, and felt pretty amateurish. In the first few minutes he had a retired Army Colonel and cyberwarfare expert on named Phil Waldron. The banner under his name was spelled "Phi" Waldron and not Phil Waldron. I know it's a small detail but come on! I didn't watch much further than that as I had seen the voting irregularity numbers before. I agree that time stamping for the individual states, server details, and foreign interference data would make the production much more watchable and useful.

    Amateurishness aside, thank you for this effort Mike Lindell.

    ReplyDelete
  19. Neon is reporting that both Youtube and Vimeo are censoring the video. In other, perhaps related news, Lou Dobbs is out at Fox Business.

    ReplyDelete
  20. Thank You, Vox, for that mp-4 save link. I wanted to do this and you just saved me bunch of time with no guarantee of success.
    By the way, I now have internet again, with misgivings. I may ask Miles to do one of his patented deep dives into the provider TDS telecom in Cherokee county AL. They replaced what was claimed to be a bad modem, when nothing had changed at my end. I suspect a 'kill' signal sent from them to my old modem to have an excuse to change it. I further suspect that this new modem may have enhanced abilities to keep track of me. I want so much to cancel them and may yet, though there is for now no other alternative in this rural environment.
    Now, at least, I can sign up for UATV shortly and I hope it still has an invite to social galactic attached.

    ReplyDelete
  21. ...but Vox Mike Lindell is crazy, disqualified, disqualified! SNL even made fun of him.

    Seriously though, I would click the download link everyone, Bitchute has buffering issues.

    ReplyDelete
  22. > Anyone know how to archive this off of Bitchute?

    Youtube-dl is downloading it to my computer as I type this.

    ReplyDelete
  23. Addition to my last comment. I will be able to finalize joining UATV sometime tomorrow, I think. Have a great fear if credit card numbers on databases, so this afternoon purchased a pre-paid Mastercard to be dedicated to UATV only.
    Or, will use it to buy a full year subscription. These type pre-paid have a 24 hour delay in funds available. In my mind this limits my exposure to hackers, though, it's hard to imagine any such creatures getting through a Vox system, probably setup by Markku.

    ReplyDelete
  24. @10. map February 05, 2021 8:32 PM
    Anyone know how to archive this off of Bitchute?

    Use JDownloader2, or any other decent browser-extension video stream-capture utility.

    The one Vox linked is a lower-quality re-upload. Instead of it, there are plenty of nice 720p copies on Bitchute now.

    ReplyDelete
  25. This is excellent. The first hour and a half is a review of things we already know. The good stuff starts at 1:36:00. Great visualizations of the IP packets.

    ReplyDelete
  26. They're so close. I want to see a true packet capture with all the relevant data highlighted showing the manipulation. I think they have it, if they have the timestamps, source and dest IP's and MACs, but it needs a one step deeper explanation of the manipulation for it to be an open and shut case.

    ReplyDelete
  27. That the election was stolen is a fact, proven beyond a reasonable doubt.

    ReplyDelete
  28. I'm going to guess US Space Force showed the Myanmar military their election was cooked. Not simply to help Myanmar get their election/s right now and going forward. The point was to send a message to the deep state. "We know how you cook elections, standby to being exposed." Myanmar was the impetus for the Time Magazine 2020 election article. It is also why the biden administration is at a total loss on how to even address the situation. Space Force has the biden admin completely baffled.

    ReplyDelete
  29. Thank you SO MUCH for the link to download.

    ReplyDelete
  30. Also, they show the audit log of every digital attack showing:
    1) Source
    2) Method
    3) Goal
    4) Outcome
    5) Time
    6) Target

    He alleges vote totals only counting dominion interference and NOT physical interference were:
    DJT: 79 million
    JB: 62 million

    ReplyDelete
  31. If you do not want to watch the whole video, just go to about 1.36 hr and watch the discussion with the lady who discusses foreign interference in real time and shows the detailed evidence. That is the killer punch.

    ReplyDelete
  32. You can just jump straight to 1:36:00 and save yourself the rehash of everything that's already known beforehand. It is interesting after that point.

    ReplyDelete
  33. Most of the video is fairly solid. The presentation about the forensic analysis in Antrim County, MI is well done. Any honest person ought to find the Michigan AG's threats to investigate and disbar political adversaries chilling. They should wonder why the AG would make such brazen threats if she had nothing to hide.

    But the "100 percent proof" starting around 1:36:15 is disappointing. There's no information about who gathered this data or how exactly it was obtained, other than a vague reference to "cyber security experts." And in the data there's a column labeled "ID Source" that looks like it's supposed to be MAC address data, and is described as being an ID specfic to the remote computer, even though MAC addresses aren't routinely broadcast over IP networks.

    ReplyDelete
    Replies
    1. I don't know about you, but if I were one of the "cyber security experts", I would definitely not want my name out there on some video. I think I would hold onto my anonymity until it was "go time" and something was actually happening before putting myself out there to be "suicided". This video doesn't give us justice, only more fuel to our fire.

      Delete
  34. Noah B
    I do not think it is reasonable for them to elaborate, in detail, about where the information on the foreign interference (after 1.36hr) comes from, at this stage. It could endanger lives if it was all in the open . When and if it gets to Court is the time to elaborate.

    ReplyDelete
  35. Noah B. wrote:And in the data there's a column labeled "ID Source" that looks like it's supposed to be MAC address data, and is described as being an ID specfic to the remote computer, even though MAC addresses aren't routinely broadcast over IP networks.
    Not sure why you find it strange there is a source MAC address.

    IP networks run on top of physical networks, which is predominantly ethernet. MAC addresses are part of the ethernet networking standard. Every IP packet is transmitted as a series of ethernet frames, and each frame has an embedded source and destination MAC address in the frame headers.

    This voter fraud system was running over the Internet, so there is a packet stream to and from the controller to all of the nodes. A strategically placed wiretap will capture that data stream, which will have MAC address information.

    ReplyDelete
  36. @SirHamster

    Even if the route were along ethernet - which it often isn't - then the source and destination MAC addresses still change at each hop. Ethernet doesn't alter the payload to include MAC addresses from previous hops.

    ReplyDelete
  37. Can you imagine if Biden actually received 62 million votes? What would that say about the intelligence and political awareness of those 62 million voters?

    ReplyDelete
    Replies
    1. @unknown.this alone let's you know that it's a spiritual deception as well as mental.

      Delete
    2. Rember that those numbers still include the enormous fraud that occured at the ballot level.

      Delete
  38. MAC addresses are often sent along over ethernet for any case where you want to definitely identify a piece of physical or virtual hardware. Don't be a twat.

    ReplyDelete
  39. https://www.bitchute.com/video/g0qZruQzEynl/
    Charlie Ward now says his sources tell him martial law has been in place for a while, it has been fully activated yesterday, and the military will soon seize all fake media and also shake up various European governments for creating a false pandemic to change the outcome of the US elections.

    ReplyDelete
  40. Brad Raffensperger is the Secretary of State of Georgia. What an odd name for a son of the South. The same "people" are always behind our enemies. What is this guy even doing in Georgia, let alone serving as the Secretary of State?

    ReplyDelete
  41. My ARP is bigger than your ARP, network neophytes.

    ReplyDelete
  42. ND wrote:I don't know about you, but if I were one of the "cyber security experts", I would definitely not want my name out there on some video. I think I would hold onto my anonymity until it was "go time" and something was actually happening before putting myself out there to be "suicided". This video doesn't give us justice, only more fuel to our fire.

    Thank God, not everyone thinks like that; some people stick their neck out and risk something for good causes. Now as important as it ever was.

    ReplyDelete
  43. Packet sniffers can log. Those logs are gold.

    ReplyDelete
  44. https://michaeljlindell.com/ - Mike Lindell's site has it, looks like 720p

    ReplyDelete
  45. The info was good. I wish those logs were posted on Pastebin or Mega and linked on the chans. Why? No reason...

    ReplyDelete
  46. Jack Ward wrote:I want so much to cancel them and may yet, though there is for now no other alternative in this rural environment.
    Look into satellite internet. You're far enough south that it shouldn't be hard to get a clear view of a satellite.

    ReplyDelete
  47. So, according to Lindell it was all China's doing and the country will unite because the Democrats had nothing to do with the election fraud?

    ReplyDelete
  48. "Thank God, not everyone thinks like that; some people stick their neck out and risk something for good causes."

    The cause doesn't change, only whether you chose a valley or a fortified hill to die on. Telling random idiots what they already know? That's a dumb valley to stick your neck out on.

    ReplyDelete
  49. SirHamster wrote:Noah B. wrote:And in the data there's a column labeled "ID Source" that looks like it's supposed to be MAC address data, and is described as being an ID specfic to the remote computer, even though MAC addresses aren't routinely broadcast over IP networks.

    Not sure why you find it strange there is a source MAC address.

    IP networks run on top of physical networks, which is predominantly ethernet. MAC addresses are part of the ethernet networking standard. Every IP packet is transmitted as a series of ethernet frames, and each frame has an embedded source and destination MAC address in the frame headers.

    This voter fraud system was running over the Internet, so there is a packet stream to and from the controller to all of the nodes. A strategically placed wiretap will capture that data stream, which will have MAC address information.


    Not sure that is true about MAC addresses. Other experts are already disputing that MAC addresses would be captured that way.

    ReplyDelete
  50. Noah B. wrote:Even if the route were along ethernet - which it often isn't - then the source and destination MAC addresses still change at each hop. Ethernet doesn't alter the payload to include MAC addresses from previous hops.
    So what if it changes on the next hop? The point is that you have a forensic record that the packet sniffer at a specific hop identified traffic from MAC address A to MAC address B.

    JWM in SD wrote:Not sure that is true about MAC addresses. Other experts are already disputing that MAC addresses would be captured that way.
    Without more specific information on what they are disputing, that statement is meaningless.

    The chances that there was 0 ethernet transmission of a packet from point A to point B over the Internet is nil.

    And as a legal tactic, think through the objection.

    "You couldn't have wiretapped that, all my packets never went through your network!"

    "Oh really. Why don't you tell us more about what you know about where these illegal packets moved to and from."

    ReplyDelete
  51. So now we know, and we can prove it. What changes?

    ReplyDelete
  52. A strategically placed wiretap definitely will have machine MAC addresses. Said strategic location being on the internal subnet for the polling precinct.

    It doesn't need a big team, either. One skilled person with a laptop, perhaps a little extra range extension amplifier/antenna could do it if they put WiFi on the network. Could even set it up to operate automated at less critical locations to expand the net.

    ReplyDelete
  53. Convincing. But one is reminded of how Mueller's FBI, Zelikow's "Commission", captive politicians and the monolithic media machine deep-sixed "absolute proof" that the official account of 9/11 was a monstrous fraud and persecuted the "conspiracy theorists" without mercy. What is the cost of allowing that betrayal to stand? What have we learned?

    http://forthesonsofthewest.home.blog

    ReplyDelete
  54. @55 "The cause doesn't change, only whether you chose a valley or a fortified hill to die on. Telling random idiots what they already know? That's a dumb valley to stick your neck out on."

    Sure. But assuming the storm is nigh somebody has to speak the truth before the storm comes just to mentally prepare the public to accept and welcome what is coming.

    ReplyDelete
  55. Gregory the Tall wrote:But assuming the storm is nigh somebody has to speak the truth before the storm comes just to mentally prepare the public to accept and welcome what is coming.

    Hopefully, for once, conservatives will be just as willing to listen to someone right as they are to listen, and adapt, leftist views. By this I mean all the conservative cucks that have, and still, refer to 1/06 as a "riot." Just like the left wants them to. I've gotten to the point where any conservative I see use that term I dismiss. It's like they just don't want to stop letting the left define terms for them, even within their own minds.

    ReplyDelete
  56. I don't know the motive of putting out the video, could be Lindell making an effort on his own.
    What I DO KNOW is that somebody said something, did something. After weeks of not hearing from the good guys,a long video. YES!!

    ReplyDelete

Rules of the blog