WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

161

CodeMonkeyZ, [11.08.21 16:43] [ Photo ] Was the DOMINION EMS server in your district artificially WEAKENED? Why does Dominion have a function that purposefully opens their servers up to cyber attack?

Is this part of the “trade secrets” that Dominion so desperately tries to hide?

CodeMonkeyZ, [11.08.21 16:54] [Forwarded from SkyNet Platforms] I have a security+ certification and 23+ years in IT/IS professionally, 35 years total.

That screenshot CMZ posted is a script to disable security features on windows and apply an unsecure "group policy" to the windows system that 'dehardens" it (eg: removes security settingSs) — included is a setting that exposes remote logon and file sharing vulterabilities by removing certificate-validation (untrusted logon sources) for file-share, remote-desktop and remote administration (RPC). This setting is ONLY needed for network connected systems - and, the setting itself creates a system vulnerability highly targeted by hackers for remote exploits (rootkits, code execution, machine reconfiguration, file sharing access, etc) It then stops and starts sql server.

The group policy file referenced is unknown (eg: no sample provided by CMZ), but based on the script ffile comments it likely does other things that remove security features.

@CodeMonkeyZ feel free to DM me if you need any more information - I saw your magnet links and could analyze it further if needed. I have strong credentials, re: long-time big-tech, government and private-sector tech who is in the top 1% of the field. This includes experience with content-moderation systems and how the platforms use them.

I can also tell you that considering machine configurations are included with "certified" election systems, that running this would contramand that regulatory requirement (no config changes without audit trail and oversight) and unless those scripts / components are listed in the certification as "allowed, for approved maintenance operations" they are rogue and their presence (even absent execution) would decertify the system. https://t.me/CodeMonkeyZ

CodeMonkeyZ, [11.08.21 16:43] [ Photo ] Was the DOMINION EMS server in your district artificially WEAKENED? Why does Dominion have a function that purposefully opens their servers up to cyber attack? Is this part of the “trade secrets” that Dominion so desperately tries to hide? CodeMonkeyZ, [11.08.21 16:54] [Forwarded from SkyNet Platforms] I have a security+ certification and 23+ years in IT/IS professionally, 35 years total. That screenshot CMZ posted is a script to disable security features on windows and apply an unsecure "group policy" to the windows system that 'dehardens" it (eg: removes security settingSs) — included is a setting that exposes remote logon and file sharing vulterabilities by removing certificate-validation (untrusted logon sources) for file-share, remote-desktop and remote administration (RPC). This setting is ONLY needed for network connected systems - and, the setting itself creates a system vulnerability highly targeted by hackers for remote exploits (rootkits, code execution, machine reconfiguration, file sharing access, etc) It then stops and starts sql server. The group policy file referenced is unknown (eg: no sample provided by CMZ), but based on the script ffile comments it likely does other things that remove security features. @CodeMonkeyZ feel free to DM me if you need any more information - I saw your magnet links and could analyze it further if needed. I have strong credentials, re: long-time big-tech, government and private-sector tech who is in the top 1% of the field. This includes experience with content-moderation systems and how the platforms use them. I can also tell you that considering machine configurations are included with "certified" election systems, that running this would contramand that regulatory requirement (no config changes without audit trail and oversight) and unless those scripts / components are listed in the certification as "allowed, for approved maintenance operations" they are rogue and their presence (even absent execution) would decertify the system. https://t.me/CodeMonkeyZ

(post is archived)

[–] 5 pts

Fuck him release it all justice delayed is justice denied just another attention whore.

[–] 2 pts

He and his father were deeply involved in the Q hoax, his dad was probably Q, probably the angel investor for old voat, and has ties to The CIA.

[–] 1 pt

Wow, that is blatant. Did they think no one would check out what was going on or just not care?

[–] 1 pt

notice the post itself...3 questions...just like late model Q.

[–] 1 pt

That's pretty interesting, and pretty damning if they have evidence it was either on the EMS servers, or the EMS servers were running like that.

[–] 1 pt

How is it damning? No court or judge gives a shit.

So why the fuck are you trickling out this shit? Put it out! Put it all out. Enough of the fucking theatrics! Just fact!

[–] 0 pt

Problem;

This is literally the same claim made by Snowden and greenkike. Nothing new has ever been released. Everything that was released by Snowden was already well known where the only new details were specific names of the programs. What the programs did was already known.

Now this is different, yes. But this similarity bugs me.

[–] -1 pt

CodeMonkeyZ

Incompetent.

[–] -1 pt

OK /u/NoisySilence explain to me how someone who isn't able to successfully implement a captcha on 8chan is a competent programmer, or are you just a qtard faggot?