The #CyberSymposium is back for the last day. Mike Lindell is saying that he was attacked last night at this hotel and that his team has discovered threats against the conference and the guests. They're claiming this is all to discredit them. #CyberSymposiumX
1/
Also a "credible" threat about a "poison pill" in their "data stream." All of these statements need verification and validation. #CyberSymposium #CyberSymposiumX
2/
They're saying they will be turning over all of this evidence to the US government (interesting since they have consistently said they don't trust said government). #CyberSymposium #CyberSymposiumX
3/
So here is a possible angle here, this is my speculation: Since there was no verifiable evidence presented so far, & his own "Expert" disclosed to the Washington Times that they didn't have evidence, & that Lindell learned that Dominion's lawsuit continues... #CyberSymposium
4/
I'm wondering if this is a ploy to keep his followers motivated and here me out here... Could there be no cyberattack against them here? Could there be no bad actors in the crowd as they claim? #CyberSymposium #CyberSymposiumX
5/
Could there be no "poison pill" in their data stream? Could they instead turn over evidence of this to the US gov, only to have the gov say there is no evidence which then gives them leverage to say that the Biden Admin is clearly corrupt? #CyberSymposium #CyberSymposiumX
6/
They invoked a 2015 Obama Executive Order about cybersecurity. That's the EO that apparently allows them to submit this evidence to the gov for review. Definitely not complaining about that. I just find it odd since this is a group that wasn't a fan of Obama.
#CyberSymposium
7/
They're already saying that our First Amendment rights are over thanks to this activity. The thing is, I'm watching him live say this on his own platform that hasn't been shut down by anyone or any government. #CyberSymposium #CyberSymposiumX
8/
Mike Lindell is also saying tens of millions of people have been watching. It's an interesting dichotomy. #CyberSymposium #CyberSymposiumX
9/
Again, that is my speculation here. As always I need to see the evidence and verify it's legit before coming to a conclusion, which is the way it should be. Everything else, like my theory, is just speculation. #CyberSymposium #CyberSymposiumX
end/

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Nick Espinosa

Nick Espinosa Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @NickAEsp

11 Aug
At the #CyberSymposium Ron Watkins' lawyer just told him that a "Coden(sp?) James Hayes" took, with authorization, physical hard drives from the Mesa County Clerk and he made illegal copies of them and they need to stop this "examination." #CyberSymposiumX
1/
So who knows what's going on. What they are looking at are images or allegedly copies of physical hard drives. Does this Hayes person know how to make a forensic imagine? #CyberSymposium #CyberSymposiumX
2/
Can they now prove what they're looking at came from an actual hard drive owned, used and verified by Dominion? Still no confirmed Chain of Custody here! #CyberSymposium #CyberSymposiumX
3/
Read 4 tweets
11 Aug
At the #CyberSymposium someone in a @VMware shirt just got on stage & explained that this alleged image is a web server (IIS) & that when IPv6 is enabled it shows an insecure configuration and that the logs shows something connected to it. #CyberSymposiumX
1/
And yeah, that's an incorrect assessment on IPv6 security. IPv6 security is a lecture I've actually given to IT Directors at conferences! #CyberSymposium #CyberSymposiumX
2/
Also, this logging doesn't show ill intent either because they can't be deciphered here to ID the IPv6 remote address and they haven't tried.
#CyberSymposium #CyberSymposiumX
3/
Read 6 tweets
11 Aug
Ok here is a serious problem with the #CyberSymposium claim of evidence and hear me out here. The first speaker walked the audience audience why the chain-of-custody is beyond important for voting. #CyberSymposiumX
1/
That if the chain is broken we can have fraud in an election. He's right about that. However chain-of-custody for ANY evidence is beyond important as it helps verify the evidence as legitimate, including evidence of election fraud. #CyberSymposium #CyberSymposiumX
2/
The first speaker also primed the audience that we'd see the evidence live shortly as Ron Watkins (aka CodeMonkey, aka "Q" himself most likely) would spend hours with the us sifting through evidence to show us how the voting machines were hit. #CyberSymposium #CyberSymposiumX
3/
Read 10 tweets
10 Aug
The explanation of a "packet capture" at the #CyberSymposium is somewhat right. But the pivot into requesting the routers isn't neccessarily right. They're making the assumption that routers are actually logging traffic in this nature. 1/
Basic routers don't typically have verbose logging that is stored. Enterprise routers will. We can easily ID by model if a router would have that information. #CyberSymposium 2/
Also, if those requests from voting machines are actually going to the internet odds are their traffic is being encrypted w/ TLS encryption. So unless that router is both enterprise & can decrypt/inspect SSL/TLS traffic, they're useless to Mike Lindell. #CyberSymposium 3/
Read 4 tweets
10 Aug
Still watching/listening to the #CyberSymposium when not in meetings. We have once again shifted away from talking about alleged evidence into politics again. They really need to stick to the evidence if they want a fair assessment by news organizations.
1/
"Why won't they let us into the voting machines to see what is going on?" Good question but there are clear reasons not to share Intellectual Property with the public, ie the theft of it. They were talking about China stealing IP so it can't be both ways. #CyberSymposium
2/
Also, third party independent auditors can get access into these systems by signing contracts and NDAs to protect the IP. The @CISAgov also has a solid breakdown of audit standards: cisa.gov/rumorcontrol
#CyberSymposium 3/
Read 5 tweets
10 Aug
As regular speaker at #CyberSymposium events/webinars/conferences, ~50-100 times yearly, I can honestly say I've never heard any of the following at any event:
-Jimmy Kimmel's politics
-Immigration opinions
-Shuttering a pipeline
-The progressive left
-the fake news media
1/
-the politics of COVID19
-secretly Chinese backed private equity firms
-"Patriot" business owners
-Crack addiction
-Defamation is a trick of the left
-George Soros

I'm watching the #CyberSymposium and I just want to hear and see the evidence!
2/
These other topics are undermining their case. Evidence should stand alone. Also the "experts" are not participating in this discussion in an unbiased manner. Independent audits need to be performed by independents. #CyberSymposium
3/
Read 11 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(