Lady Tehilah 🏴‍☠️
@ladytehilah.bsky.social
620 followers 290 following 9.7K posts
Trigger Warning: I say controversial things. I'm Elder High Priestess of the Coven of the Open Mind, a Cloud Architect, Web Designer, Speech Writer, and Author. https://ladyfirewind.com https://youtube.com/c/covenoftheopenmind
Posts Media Videos Starter Packs
Pinned
See the other post. Rockland County, NY. And there is a lawsuit that was just pushed back to November for the initial phases, but people like you will probably get it canceled. And we'll probably never have a fair election again until I die. Thanks, gramps.
Man, you are good at being wrong. Rockland County, NY. Widely publicized by the people online saying they voted Harris.
Reposted by Lady Tehilah 🏴‍☠️
If a person can modify the firmware, say in the factory when they build it, then they can bypass all integrity tests of the software later. So keep thinking you know everything, gramps.
If a person can modify the firmware, say in the factory when they build it, then they can bypass all integrity tests of the software later. So keep thinking you know everything, gramps.
Great, so you have debunked a single story that misquoted a PDF that does not by itself prove the devices were not hacked. Got it. Thanks for clarifying that, grandpa.
Or do you want to ASSUME it was ALL FINE AND DANDY and the Trump's owned the election machine patent for NO REASON during the first presidency, because you don't actually care if we EVER have a fair election again, then by all means, keep being an insufferable misogynist. Bye.
be capable of this?? They hid the exectubales deeper in the design of the device? You have no idea. You are telling people that the EAC is wrong for pursuing audits, and you literally don't even know that the devices were not hacked. You're calling it "disinformation" and you don't know the Truth.
plainly voted for Harris in a county where ZERO VOTES WENT TO HARRIS?! Some of the times, the machines they rigged messed up, and excluding ANY vote to Harris. Just one case of that demonstrates there could be a problem with all of them. They OWNED the patents! What if they were made years ago to
There is a lot of evidence it was hacked, and there is no way to verify it wasn't without inspecting the actual code on the machine. I would hope we agree someone should be doing that, considering the other evidence. Why would Elon run a drive to collect millions of users data then? The people who
Yeah, well it would have to be a change to the firmware, and the story I heard was about a major change marked as minor. I assumed that must be about this. The change did not have to be a large change to permit injection. It doesn't. Never thought it did
PDF that doesn't actually confirm there was no hack, and there is no injector code added. It could even be a single line of a binary, and they could easily mark it dynamic, add it to a file that is dynamic, or fool the hash in other ways. I think you are just, dumb to conclude this isn't possible.
Let me type more slowly: it was hacked. There is more evidence even than we have discusses here, like who owned patents when, how accurately they predicted it, that Elon acquired the data that was later inserted, all of that has NOTHING to do with EAC's data processing methods. And you shared a
This is not a complex topic for me. I work for a tech giant. You're the one who assumed I am an informed moron who can't use a Linux terminal for some reason, probably because I am a woman.
Right, but so you do not know lol everything about this is speculative. You haven't reviewed it, you don't know the system architecture or the code base is my piece of it enough to know anything you say to be true.
I can think of 7 ways these protocols were bypassed. You're not the only person who knows how computers work, and you are overestimating yourself.
You haven't seen the hash files? You haven't seen any contents of the files on the machines? What OS is it, RHEL? No, this document does not eliminate the possibility that the devices were hacked. Tell me you have more information than that behind this condescension.
What's amazing is that people like you still don't know how hackable this process is.
Man 40 years in the field and the most basic of Cybersecurity alludes you. Read this comment again and you'll find you have already answered your own question.

bsky.app/profile/dbma...
There's a file that contains a list of which files to include in the process. There's a file that contains a list of files NOT to include in the process. Someone mistakenly included a configuration file in the list of files to be analyzed.
Exactly. Like everything you're telling me is out of context here. But I understand software well too, and code injection is easy to hide and could well go overlooked, and if you haven't seen the source code yourself, you're speculating.
Unless the modifications are within a file it says not to check
Ok, but I don't even recall this graph on the right. I reviewed many of their charts, and the ones that obviously had Russian tails looked like the one on the left. So I have to get it all up and look at it again, I guess, it has been some moons since then, but I feel like you have the narrative
None of this eliminates a potential for code injection.
This does not contain the contents of the files. We're supposed to take their word on it, the company who made the mistake that may have put a fascist dictator in power illegally. Just their word that there is no additional line in that file that allows for injection. Yeah right dude.
Oh yeah people think all kinds of things about you on here. You really just cannot care about which lists you get added to lol I am a racist, transphobic, woke snowflake, who is somehow also antisemitic, anti Zionist, pro-zionist, islamphobic, ableist and sexist simultaneously. Duh. 😏😵‍💫🫠
I have dug into all of their papers, and literally never seen these two charts side by side before, so I don't feel like this is a good faith discussion right now. Why don't you share their actual works and cite a page of that to discuss?