Discover and read the best of Twitter Threads about #cybersymposium

Most recents (8)

The #CyberSymposium is back for the last day. Mike Lindell is saying that he was attacked last night at this hotel and that his team has discovered threats against the conference and the guests. They're claiming this is all to discredit them. #CyberSymposiumX
1/
Also a "credible" threat about a "poison pill" in their "data stream." All of these statements need verification and validation. #CyberSymposium #CyberSymposiumX
2/
They're saying they will be turning over all of this evidence to the US government (interesting since they have consistently said they don't trust said government). #CyberSymposium #CyberSymposiumX
3/
Read 10 tweets
At the #CyberSymposium Ron Watkins' lawyer just told him that a "Coden(sp?) James Hayes" took, with authorization, physical hard drives from the Mesa County Clerk and he made illegal copies of them and they need to stop this "examination." #CyberSymposiumX
1/
So who knows what's going on. What they are looking at are images or allegedly copies of physical hard drives. Does this Hayes person know how to make a forensic imagine? #CyberSymposium #CyberSymposiumX
2/
Can they now prove what they're looking at came from an actual hard drive owned, used and verified by Dominion? Still no confirmed Chain of Custody here! #CyberSymposium #CyberSymposiumX
3/
Read 4 tweets
At the #CyberSymposium someone in a @VMware shirt just got on stage & explained that this alleged image is a web server (IIS) & that when IPv6 is enabled it shows an insecure configuration and that the logs shows something connected to it. #CyberSymposiumX
1/
And yeah, that's an incorrect assessment on IPv6 security. IPv6 security is a lecture I've actually given to IT Directors at conferences! #CyberSymposium #CyberSymposiumX
2/
Also, this logging doesn't show ill intent either because they can't be deciphered here to ID the IPv6 remote address and they haven't tried.
#CyberSymposium #CyberSymposiumX
3/
Read 6 tweets
Ok here is a serious problem with the #CyberSymposium claim of evidence and hear me out here. The first speaker walked the audience audience why the chain-of-custody is beyond important for voting. #CyberSymposiumX
1/
That if the chain is broken we can have fraud in an election. He's right about that. However chain-of-custody for ANY evidence is beyond important as it helps verify the evidence as legitimate, including evidence of election fraud. #CyberSymposium #CyberSymposiumX
2/
The first speaker also primed the audience that we'd see the evidence live shortly as Ron Watkins (aka CodeMonkey, aka "Q" himself most likely) would spend hours with the us sifting through evidence to show us how the voting machines were hit. #CyberSymposium #CyberSymposiumX
3/
Read 10 tweets
The explanation of a "packet capture" at the #CyberSymposium is somewhat right. But the pivot into requesting the routers isn't neccessarily right. They're making the assumption that routers are actually logging traffic in this nature. 1/
Basic routers don't typically have verbose logging that is stored. Enterprise routers will. We can easily ID by model if a router would have that information. #CyberSymposium 2/
Also, if those requests from voting machines are actually going to the internet odds are their traffic is being encrypted w/ TLS encryption. So unless that router is both enterprise & can decrypt/inspect SSL/TLS traffic, they're useless to Mike Lindell. #CyberSymposium 3/
Read 4 tweets
Still watching/listening to the #CyberSymposium when not in meetings. We have once again shifted away from talking about alleged evidence into politics again. They really need to stick to the evidence if they want a fair assessment by news organizations.
1/
"Why won't they let us into the voting machines to see what is going on?" Good question but there are clear reasons not to share Intellectual Property with the public, ie the theft of it. They were talking about China stealing IP so it can't be both ways. #CyberSymposium
2/
Also, third party independent auditors can get access into these systems by signing contracts and NDAs to protect the IP. The @CISAgov also has a solid breakdown of audit standards: cisa.gov/rumorcontrol
#CyberSymposium 3/
Read 5 tweets
As regular speaker at #CyberSymposium events/webinars/conferences, ~50-100 times yearly, I can honestly say I've never heard any of the following at any event:
-Jimmy Kimmel's politics
-Immigration opinions
-Shuttering a pipeline
-The progressive left
-the fake news media
1/
-the politics of COVID19
-secretly Chinese backed private equity firms
-"Patriot" business owners
-Crack addiction
-Defamation is a trick of the left
-George Soros

I'm watching the #CyberSymposium and I just want to hear and see the evidence!
2/
These other topics are undermining their case. Evidence should stand alone. Also the "experts" are not participating in this discussion in an unbiased manner. Independent audits need to be performed by independents. #CyberSymposium
3/
Read 11 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!