One Political Plaza - Home of politics
Home Active Topics Newest Pictures Search Login Register
Main
How to steal an e******n in one easy lesson...
Page 1 of 2 next>
Nov 23, 2020 02:02:09   #
JW
 
Below is a computer flowchart showing how to structure the software to provide any result you wish and leave leave a false audit trail that provides a v****g receipt to the v**er and provides an audit log of the actual v**e while never indicating where the v**e actually went. The ONLY way to catch the fraud is to compare the total v**e distribution to the recorded b****t log. That means checking every single v**e by hand and doing the tabulating by hand. You could add one more step and remove that option as well. Then the only way to verify the v**e would require every v**er to turn in their receipts and compare those to the audit log.

I've written a lot of software in my time and believe me this will do exactly what I say it will.



Reply
Nov 23, 2020 02:10:09   #
dtucker300 Loc: Vista, CA
 
JW wrote:
Below is a computer flowchart showing how to structure the software to provide any result you wish and leave leave a false audit trail that provides a v****g receipt to the v**er and provides an audit log of the actual v**e while never indicating where the v**e actually went.

I've written a lot of software in my time and believe me this will do exactly what I say it will.


An endless loop.

Reply
Nov 23, 2020 02:14:02   #
PeterS
 
JW wrote:
Below is a computer flowchart showing how to structure the software to provide any result you wish and leave leave a false audit trail that provides a v****g receipt to the v**er and provides an audit log of the actual v**e while never indicating where the v**e actually went.

I've written a lot of software in my time and believe me this will do exactly what I say it will.

Gosh, you convinced me! Take it before a judge and I'm sure it's a slam dunk to get the e******n overturned...

Reply
 
 
Nov 23, 2020 02:15:18   #
JW
 
dtucker300 wrote:
An endless loop.
An endless loop. img src="https://static.onepol... (show quote)


It goes through those steps with every v**e.

Reply
Nov 23, 2020 02:19:54   #
JW
 
PeterS wrote:
Gosh, you convinced me! Take it before a judge and I'm sure it's a slam dunk to get the e******n overturned...


Why would I do that. What I flowcharted is just one way to do it. I could produce at least a dozen more complex flowcharts showing alternate methods. My only point is that if the software designer is a crook, so is his software. When you v**e, you are putting your trust, 100% of it, in the hands of every person in the production line. C***ting ain't rocket surgery. Not even with computers.

Reply
Nov 23, 2020 02:46:51   #
Radiance3
 
JW wrote:
Below is a computer flowchart showing how to structure the software to provide any result you wish and leave leave a false audit trail that provides a v****g receipt to the v**er and provides an audit log of the actual v**e while never indicating where the v**e actually went. The ONLY way to catch the fraud is to compare the total v**e distribution to the recorded b****t log. That means checking every single v**e by hand and doing the tabulating by hand. You could add one more step and remove that option as well. Then the only way to verify the v**e would require every v**er to turn in their receipts and compare those to the audit log.

I've written a lot of software in my time and believe me this will do exactly what I say it will.
Below is a computer flowchart showing how to struc... (show quote)

=================
That would be a good flow and control of the v**es effectively. I would suggest further to using control number for both the registration and the b****t cast. That is why ID number is very important. This number must be used to v**e, can reconcile how many people v**ed versus how many people were registered. This will prevent duplicate v**es, illegal v**es, several blank b****ts filled up to add to the v**es, prevent dead people v**es.

Reply
Nov 23, 2020 04:03:52   #
PeterS
 
JW wrote:
Why would I do that. What I flowcharted is just one way to do it. I could produce at least a dozen more complex flowcharts showing alternate methods. My only point is that if the software designer is a crook, so is his software. When you v**e, you are putting your trust, 100% of it, in the hands of every person in the production line. C***ting ain't rocket surgery. Not even with computers.

What you haven't flow charted was whether it actually happened but I guess so long as you believe it happened that's all that really matters.

Reply
 
 
Nov 23, 2020 04:37:48   #
Radiance3
 
PeterS wrote:
What you haven't flow charted was whether it actually happened but I guess so long as you believe it happened that's all that really matters.


==================
You don't understand how to read and analyze the flow chart.

Reply
Nov 23, 2020 05:45:17   #
Kickaha Loc: Nebraska
 
PeterS wrote:
What you haven't flow charted was whether it actually happened but I guess so long as you believe it happened that's all that really matters.


There is only one way to prove that it actually happened is to physically do a hand recount. If you trust the machines, and the machines themselves are suspect, you can't verify whether or not there was a fault in the machines. Without physical access to the information, all anyone can do is speculate and make an educated guess.

Reply
Nov 23, 2020 08:29:18   #
lpnmajor Loc: Arkansas
 
JW wrote:
Below is a computer flowchart showing how to structure the software to provide any result you wish and leave leave a false audit trail that provides a v****g receipt to the v**er and provides an audit log of the actual v**e while never indicating where the v**e actually went. The ONLY way to catch the fraud is to compare the total v**e distribution to the recorded b****t log. That means checking every single v**e by hand and doing the tabulating by hand. You could add one more step and remove that option as well. Then the only way to verify the v**e would require every v**er to turn in their receipts and compare those to the audit log.

I've written a lot of software in my time and believe me this will do exactly what I say it will.
Below is a computer flowchart showing how to struc... (show quote)


If it's so effective..........................how do you know it ever occurred?

Reply
Nov 23, 2020 08:37:33   #
Kickaha Loc: Nebraska
 
lpnmajor wrote:
If it's so effective..........................how do you know it ever occurred?


There have been mathematicians that have reversed engineered an algorithm that produces the same results as found in the e******n. Although this is not evidence that this is the same algorithm as was used to switch v**es, it raises the possibility that it or a similar one did change v**es. No one can be sure without examining the actual machines and software.

Reply
 
 
Nov 23, 2020 08:43:47   #
DASHY
 
JW wrote:
Why would I do that. What I flowcharted is just one way to do it. I could produce at least a dozen more complex flowcharts showing alternate methods. My only point is that if the software designer is a crook, so is his software. When you v**e, you are putting your trust, 100% of it, in the hands of every person in the production line. C***ting ain't rocket surgery. Not even with computers.


A new whack at overturning an e******n: "the software designer is a crook"

Is the brilliant designer a Republican or Democrat? C***ting ain't rocket surgery and Trump is finding out, it ain't easy to prove in court.

Reply
Nov 23, 2020 14:23:54   #
JW
 
lpnmajor wrote:
If it's so effective..........................how do you know it ever occurred?


My point is for the people who keep saying it can't be done, yes, it can be done. I have no 'proof' that such a thing occurred but the v****g trajectory tracked by the process provides 'evidence that it occurred. In PA, suddenly, at 4:00 AM, 180,000 v**es show up for Biden and not a single v**e for Trump. That is not even rational.

Reply
Nov 23, 2020 14:26:06   #
JW
 
DASHY wrote:
A new whack at overturning an e******n: "the software designer is a crook"

Is the brilliant designer a Republican or Democrat? C***ting ain't rocket surgery and Trump is finding out, it ain't easy to prove in court.


Nothing brilliant about it. Any high school level computer enthusiast could write the program. Word is, the original designer worked for Hugo Chavez.

Reply
Nov 23, 2020 14:27:39   #
Radiance3
 
JW wrote:
My point is for the people who keep saying it can't be done, yes, it can be done. I have no 'proof' that such a thing occurred but the v****g trajectory tracked by the process provides 'evidence that it occurred. In PA, suddenly, at 4:00 AM, 180,000 v**es show up for Biden and not a single v**e for Trump. That is not even rational.


===============
That is massive 180,000 fraudulent v**es for Biden. Not a single one for the president.
Democrats believing that those 180,000 for Biden v**es are soooo DUMB and CROOKED.
Zero for president Trump.
180,000 for Biden v**es. Massive corruptions involved. This is the way how Biden got more v**es.

Reply
Page 1 of 2 next>
If you want to reply, then register here. Registration is free and your account is created instantly, so you can post right away.
Main
OnePoliticalPlaza.com - Forum
Copyright 2012-2024 IDF International Technologies, Inc.