YEAH AND YOU GAVE HIM MISINFORMATION…
THAT IS WHAT I’M POINTING OUT…
THE ROUTERS WERE NEVER A NEED TO HAVE THE PCAPS…
YOU MADE THAT SHIT UP…
YEAH AND YOU GAVE HIM MISINFORMATION…
THAT IS WHAT I’M POINTING OUT…
THE ROUTERS WERE NEVER A NEED TO HAVE THE PCAPS…
YOU MADE THAT SHIT UP…
Why would I provide misinformation? What purpose would that serve? It isn’t like GSC or you are working on the election investigation.
Lol. GSC- you need to up your standards.
You seem personally vested in all of this. What is your connection outside of being a strong patriot? Friends with Trump or Jr or staff member?
First off, I said clear as day that you can use pcaps without a router!
Second off, pcaps is the software used not the data. The data would be called packets. Which is why they call it Packet Sniffing.
![]()
![]()
I mean ![]()
0 to many routers. Pcap doesn’t care as it is scanning the local network for packets. The end!
How packets can get from the pcap device to other people is nearly endless! Think of how many ways you move data round. This also means it could have been streamed live to another location (if connected to the internet) OR as slow as a USB drive tied to a carrier pigeon OR lost in the USPS mail for months.
Does that help?
CAN YOU VALIDATE THE PCAPS WITHOUT THE ROUTERS?
THAT WAS THE QUESTION…
HERE YOU SAID NO…
THAT IS COMPLETE BULLSHIT…
YOU LIED OR YOU ARE CLUELESS FRAUD IT FAKE MILLIONAIRE STUGOTZ…
I BELIEVE YOU ARE CLUELESS…
90’s why can’t they decrypt the data?
Either by figuring it out (I’m sure it has to be possible to decrypt data on some level) or by having a court demand the decryption of the data?
At a minimum you need the MAC address for the router to validate it was the router used. Preferably, the logs to confirm data was routed to said location. Then do the same for all hops(routers) until you confirm you are on the public internet.
90’s why can’t they decrypt the data?
Either by figuring it out (I’m sure it has to be possible to decrypt data on some level) or by having a court demand the decryption of the data?
Decryption is possible IF they have the private key to the encryption. Depending on the strength of the encryption used and amount of processing power, it is possible to crack some weaker encryption tech which is why 128 bit SSL isn’t the standard now but it was the standard in the 90s.
Let’s assume data was transferred to/from China or Russia, I doubt they will freely hand over the private key. Even if it was to/from Dominion, you would likely need the routers to validate the end point was dominion for the courts to step in (I said likely as I don’t know if they understand how the internet works).
Lastly, mr pillow claims to have hacked TLS. Well, hacking the encryption protocol could potentially work. They would first have to know the encryption protocol(s) used then get lucky with a bad implementation on one side(client or server). Those weaknesses usually happen during the handshake not the encryption which allows someone to steal the session vs decrypt client data.
Here is a good article on TLS:
https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/
Encryption doesn’t require internet connections but it is the most common means.
I BELIEVE YOU ARE CLUELESS
Thanks. This just confirms how blind you are with your own beliefs. If anyone is clueless, you may need to check the mirror.
I believe the quote is “ people who live in glass houses shouldn’t throw stones.” Fitting that the clueless liar is calling others it.
ALL THAT SHIT YOU POSTED IS BULLSHIT…
THE PCAPS STAND ON THEIR OWN AS UNDENIABLE EVIDENCE…
YOU DON’T NEED ANYTHING ELSE…
Says the hammer slinger!
Let me simplify for dipshit.
Having pcap data is like having a billion envelopes. You can see the to/from addresses but the letters inside are hidden with a special ink(encryption). Now you can see the to/from but can you confirm that the sender is really the from sender and the receiver actually got the letter.
Kindergarten analogy
Storm- this is his field of expertise.
He knows what he’s talking about. Just like you deferred to your expertise on the building collapse, he deserves to be listened to here.
I work with tech guys everyday because I sell enterprise software solutions and we have to have meetings about 3rd party integrations, compatibility and security requirements.
From what I’ve read he obviously knows his shit. And I don’t know how much you understand the tech side (I’m an admitted layman… not because I don’t have the capacity to learn it, I just never did learn it to this degree) but it would be wise to listen. He’s actually giving me good info in this thread.
I honestly don’t care about or respect him. He is so stuck to his beliefs that he is a compromised poster. He has no ability to admit fault. He has no ability or interest to learn. He has no ability to communicate as an adult.
No need to defend me against Storm. I’m a big boy.
90, I think you and Storm need a reset. He’s not a bad guy. He’s simply passionate about his beliefs.
But yea- not defending you more than I’m really saying- “Storm, just stop and listen and you may learn.”
He’s not a bad guy.
Except for calling everybody who disagrees with him a dumbass…
But kudos to you GSC for attempting to get Storm to listen.
He’s not a bad guy.
Right. I call him putz, dipshit, moron. He calls me a liar and fraud even after posting proof. That is when he doubles down because he can’t believe it. Now he sees that I know WTF I’m talking about with IT which further validated how I made millions and he tripled down. Not to mention he claims everyone that disagrees with him is a liberal.
His flaws don’t allow me to believe you. He is not reasonable much like DJ but on the other end. He is narcissist, has never admitted fault. He is close minded, just see this post alone. Lastly, his unwillingness to use clear communication leads to many of the disagreements.
I will admit that I like to push his buttons. Lol
https://www.washingtontimes.com/news/2021/aug/11/mike-lindells-lead-cyber-expert-says-they-cant-pro/
Whoops! Looks like MrPillow will likely lose his case against Dominion costing him millions more.
Imagine holding a 3-day symposium claiming to be able to prove widespread election tampering with terabytes of hard data…
And then imagine NOT releasing that data.
And then imagine one of the hired experts saying the data wasn’t legitimate.
I honestly think the Flower Symposium had more bombshells in it.