DB Main
@dbmain.bsky.social
170 followers 290 following 1.4K posts
Bell Labs Distinguished Member of Technical Staff Lead Econometrician, Corporate Strategy, Lucent That's my kid getting the Bronze at the World University Games. She's a beautiful enigma I keep a VanLife Blog here: https://dbmain.substack.com/
Posts Media Videos Starter Packs
Pinned
Thread of posts refuting 2024 Election Deniers.
You're garbling your own claims again. There was a lawsuit containing affidavits from voters who said their votes weren't counted, but they weren't Harris voters; they were LaRouchies voting for their senate candidate.
What's the claim? Because you showed a chart from a single precinct where Harris got votes proving your claim wrong.

And YOU need to be given patience because you're screwing up and we should have known what you meant?
OMG, "Forensic Audits!!!"

Just like MAGA in 2021.

And remember, you still haven't admitted your fuck-up.

It's a lesson you should learn. You uncritically repeat election fraud claims, garble them, and don't know any of the background.
bsky.app/profile/dbma...
Your claim, again. There were zero votes in a **county** for Harris.
When challenged to name the county where there were no votes for Harris, you pointed to a county where Harris got 65,000 votes.
app.enhancedvoting.com/results/publ...
They did check the machines.
They did do the audits.
They are legislatively mandated in all the swing states.

You just weren't paying attention. And now you want states to jump through hoops to placate your ignorance.
The lesson here for you SHOULD be that you don't pay careful attention to the claims you're repeating, and are incredibly sloppy about repeating them.
Just in this thread between us you've done this dozens of times. The density is remarkable.
Your claim, again. There were zero votes in a **county** for Harris.
When challenged to name the county where there were no votes for Harris, you pointed to a county where Harris got 65,000 votes.
app.enhancedvoting.com/results/publ...
Here's your claim again.
Your "proof" of fraud.
True or false: There were no votes for Harris in Rockland County?
Quit Gish Galloping.
You have an assignment. Name the county that recorded no votes for Harris.

Go.
bsky.app/profile/dbma...
There is no county in the US with zero Harris votes.

We're staying right here. I'm not Gish Galloping to your next incorrect claim.

Name the county where Harris got no votes. Next post. Go.
There is no county in the US with zero Harris votes.

We're staying right here. I'm not Gish Galloping to your next incorrect claim.

Name the county where Harris got no votes. Next post. Go.
1) No, it wouldn't have to be a change to the firmware. You're just pulling stuff out of your ass at this point.
2) The "story I heard" was based on that PDF. The blogger deliberately misquoted it to fool people who she knew were too lazy to read the ECO themselves. Ahem.
You have absolutely no evidence it was hacked.
You have a garbled understanding of the claims you're uncritically repeating.
That you assert I'm the one being "speculative" when you started this conversation by claiming it was a) a change to the firmware, and b) a "major change".

You didn't bother to inform yourself before repeating the claim, and you still don't know the basics.
Let me type more slowly: It is hackable. That's why there are layers of legislatively-mandated audits and EAC technological requirements built to detect fraud.
"I can think of 7 ways to bypass the thing I just was told about and have yet to inform myself upon. Because I just KNOW the election was hacked."
A) Do you think it's good practice to release source code of election systems to the public? If they did, you'd shout that it's a security vulnerability.
B) There are multiple layers of security. You didn't answer the second question.
bsky.app/profile/dbma...
You have been provided context; you refused to read it.

How does this "injected code" avoid detection during the Trusted Build process?
How are the manipulated vote totals not detected by the Risk Limiting Audits?
What's amazing about people like you is that...
A) It never dawned on you that people before you realized machines can be hacked and have been building layers of defenses for years, and
B) You're immediately sure there's a way around a cryptographic process that you just learned about.
Pro V&V, the EAC-accredited Voting System Test Laboratory you mistakenly libeled as an election system provider, verifies that all executables are included in the parts of the disk image that is scanned by the Trusted Build Verification process.
You have been provided context; you refused to read it.

How does this "injected code" avoid detection during the Trusted Build process?
How are the manipulated vote totals not detected by the Risk Limiting Audits?
You don't understand the process.

Pro V&V is NOT the "company who made the mistake".
Yes it does. If code is "injected" the cryptographic process (called "Trusted Build Verification") will see that the software image of the field system differs than the image of the system that was tested and certified by the EAC.
Correct. The reason you never saw them placed next to one another is that it blows up their claim about Russian Tail in the North Carolina election.
The chart on the left comes from one of their *references* on Russian tails.
Since a configuration can differ between customer deployments, it should be in the *second* list; the configuration file should NOT be compared against the certification system.
There's a file that contains a list of which files to include in the process. There's a file that contains a list of files NOT to include in the process. Someone mistakenly included a configuration file in the list of files to be analyzed.
As required by the EAC, voting systems must execute "Trusted Build Verification" when they are booted up.
The system conducts a cryptographic analysis, comparing the software image against the image certified by the EAC.