As regular speaker at #CyberSymposium events/webinars/conferences, ~50-100 times yearly, I can honestly say I've never heard any of the following at any event:
-Jimmy Kimmel's politics
-Immigration opinions
-Shuttering a pipeline
-The progressive left
-the fake news media
1/
-the politics of COVID19
-secretly Chinese backed private equity firms
-"Patriot" business owners
-Crack addiction
-Defamation is a trick of the left
-George Soros

I'm watching the #CyberSymposium and I just want to hear and see the evidence!
2/
These other topics are undermining their case. Evidence should stand alone. Also the "experts" are not participating in this discussion in an unbiased manner. Independent audits need to be performed by independents. #CyberSymposium
3/
Now they're talking about the "indisputable" evidence that voting machines were hacked. No cybersecurity researcher would deny that any type of device couldn't be hacked. The real question is were these machines actually hit? #CyberSymposium
4/
They're not showing the evidence though. So far this is speculation only about possibilities. Look at any actual #CyberSymposium event and the discussion centers around the facts and research. We just went through Black Hat & there were deep technical discussions on research! 5/
A video just played of an election official showing the interviewer how she can over vote but is there evidence that was the actual case on election night? I can show you how to set your car on fire but that doesn't mean I actually set it on fire. 6/
Now there is video about China and their privacy violations etc of US Citizens. That is no doubt a serious issue but the focus here is supposed to be the voting systems and the "evidence." This is a separate and needed discussion but it detracts from the point. #CyberSymposium 7/
I'm listening to the "algorithm expert" that explained how the scam would work. He's right on the methodology but he also claims he has forensic evidence. We'll see if this moves from speculation to evidence.
8/
The biggest question I have is their chain of custody that proves they didn't tamper with it themselves. That's part of a legit forensic examination and I've written about that previously for @smerconish. #CyberSymposium
9/
I really hope this #CyberSymposium actually releases a complete report on the evidence they found without the political discussion. I've repeatedly tried to contact them to say I would independently review the information given my credentials. 10/
If this is what the next 2 days are about then this is more reinforcement of a political belief & less about a discussion on the vulnerabilities in a voting system and honestly that doesn't serve the greater good. I'll keep watching though. We'll see!
#CyberSymposium
end/

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Nick Espinosa

Nick Espinosa Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @NickAEsp

12 Aug
The #CyberSymposium is back for the last day. Mike Lindell is saying that he was attacked last night at this hotel and that his team has discovered threats against the conference and the guests. They're claiming this is all to discredit them. #CyberSymposiumX
1/
Also a "credible" threat about a "poison pill" in their "data stream." All of these statements need verification and validation. #CyberSymposium #CyberSymposiumX
2/
They're saying they will be turning over all of this evidence to the US government (interesting since they have consistently said they don't trust said government). #CyberSymposium #CyberSymposiumX
3/
Read 10 tweets
11 Aug
At the #CyberSymposium Ron Watkins' lawyer just told him that a "Coden(sp?) James Hayes" took, with authorization, physical hard drives from the Mesa County Clerk and he made illegal copies of them and they need to stop this "examination." #CyberSymposiumX
1/
So who knows what's going on. What they are looking at are images or allegedly copies of physical hard drives. Does this Hayes person know how to make a forensic imagine? #CyberSymposium #CyberSymposiumX
2/
Can they now prove what they're looking at came from an actual hard drive owned, used and verified by Dominion? Still no confirmed Chain of Custody here! #CyberSymposium #CyberSymposiumX
3/
Read 4 tweets
11 Aug
At the #CyberSymposium someone in a @VMware shirt just got on stage & explained that this alleged image is a web server (IIS) & that when IPv6 is enabled it shows an insecure configuration and that the logs shows something connected to it. #CyberSymposiumX
1/
And yeah, that's an incorrect assessment on IPv6 security. IPv6 security is a lecture I've actually given to IT Directors at conferences! #CyberSymposium #CyberSymposiumX
2/
Also, this logging doesn't show ill intent either because they can't be deciphered here to ID the IPv6 remote address and they haven't tried.
#CyberSymposium #CyberSymposiumX
3/
Read 6 tweets
11 Aug
Ok here is a serious problem with the #CyberSymposium claim of evidence and hear me out here. The first speaker walked the audience audience why the chain-of-custody is beyond important for voting. #CyberSymposiumX
1/
That if the chain is broken we can have fraud in an election. He's right about that. However chain-of-custody for ANY evidence is beyond important as it helps verify the evidence as legitimate, including evidence of election fraud. #CyberSymposium #CyberSymposiumX
2/
The first speaker also primed the audience that we'd see the evidence live shortly as Ron Watkins (aka CodeMonkey, aka "Q" himself most likely) would spend hours with the us sifting through evidence to show us how the voting machines were hit. #CyberSymposium #CyberSymposiumX
3/
Read 10 tweets
10 Aug
The explanation of a "packet capture" at the #CyberSymposium is somewhat right. But the pivot into requesting the routers isn't neccessarily right. They're making the assumption that routers are actually logging traffic in this nature. 1/
Basic routers don't typically have verbose logging that is stored. Enterprise routers will. We can easily ID by model if a router would have that information. #CyberSymposium 2/
Also, if those requests from voting machines are actually going to the internet odds are their traffic is being encrypted w/ TLS encryption. So unless that router is both enterprise & can decrypt/inspect SSL/TLS traffic, they're useless to Mike Lindell. #CyberSymposium 3/
Read 4 tweets
10 Aug
Still watching/listening to the #CyberSymposium when not in meetings. We have once again shifted away from talking about alleged evidence into politics again. They really need to stick to the evidence if they want a fair assessment by news organizations.
1/
"Why won't they let us into the voting machines to see what is going on?" Good question but there are clear reasons not to share Intellectual Property with the public, ie the theft of it. They were talking about China stealing IP so it can't be both ways. #CyberSymposium
2/
Also, third party independent auditors can get access into these systems by signing contracts and NDAs to protect the IP. The @CISAgov also has a solid breakdown of audit standards: cisa.gov/rumorcontrol
#CyberSymposium 3/
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(