TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Mike Lindell's “packet captures” are garbage data provided by serial con-man

73 pointsby lurksharkalmost 4 years ago

18 comments

legitsteralmost 4 years ago
&gt; Cybersecurity expert J. Kirk Wiebe, a former senior National Security Agency analyst and whistleblower, also said Mr. Lindell did not have the actual data sets.<p>&gt; He said the scrolling text was likely meant to resemble what the packet captures would look like in the data set but were not actual packet captures, which are vital to prove the claims.<p>You gotta love these non-technical people who think that any code on a screen is basically the Matrix. It reminds me when I was building webpages in HTML in a coffee shop and a guy saw it and accused me of hacking.
评论 #28157943 未加载
评论 #28157964 未加载
评论 #28157775 未加载
tedunangstalmost 4 years ago
Maybe if they had released the data sooner instead of waiting for a conference bombshell, the expert who provided the data would still be in a pre stroke condition and able to explain it. Amazing how the deadline needs to get pushed back right at the very latest moment.
barbazooalmost 4 years ago
What&#x27;s the point of linking every instance of his name as well as his pronouns to &quot;<a href="https:&#x2F;&#x2F;www.washingtontimes.com&#x2F;topics&#x2F;mike-lindell&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.washingtontimes.com&#x2F;topics&#x2F;mike-lindell&#x2F;</a>&quot;, is that some kind of SEO trick?
评论 #28158057 未加载
motohagiographyalmost 4 years ago
They should release hashed and signed files and disk images as torrents. It&#x27;s that easy.<p>I had hoped to see the captures and disk images online somewhere to see what kind of analysis they did, as I&#x27;ve done reverse engineering of protocols, devices, software, and large systems throughout my career. While I&#x27;m not an elite reverse engineer who presents new methods of obfuscated malware reversing at conferences, it has fallen to me to do it professionally on and off for the last 20 years and there are certainly some thousands of people with at least my level of skill who could weigh in on it.<p>Demonstrating technical uncertainty to present and frame risks is a lower standard than reproducing an exploit chain. As they say, POC||GTFO. I don&#x27;t know that their conference (symposium) has met that standard yet. There was a link to their conference being broadcast on rumble, and I watched some of it. What I saw wasn&#x27;t as good as a defcon presentation, let alone with the technical clarity and polished execution of a good blackhat presentation, which their concerns would need to be at to get serious popular consideration.<p>My impression right now is that the &#x27;cyber&#x27; aspect of this is really a vehicle for promoting the more serious and rigorous statistical case from a perhaps too colorful character named Dr. Douglas Frank (?), which if real, would be much more damning than technical voting machine vulnerabilities. Everyone knew a decade ago electronic voting was vulnerable. I commented multiple times here and to acquaintences involved in politics that electronic voting risks social unrest because it can be so easily discredited in a highly contested situation, and there is nothing surprising, unanticipated, or unforseeable about the consequences of using these machines. Elections that use them now have a foul smell about them. I don&#x27;t think any technology evidence these people present will change any minds, mostly because minds are not generally changed by evidence, but I do think they will set a new bar for elections scrutiny that will require the integrity of elections to withstand forensic analysis.<p>Until we have signed and hashed disk images that can be compared to sealed hardware that has a verifiable chain of custody, the Chinese hacking narrative will be bluster. Whether the &quot;election fortification,&quot; methods used in it were legal or will be tolerated in future ones, however, I think they may have made their point.
cryptozalmost 4 years ago
From TFA: &quot;Several cyber experts at the symposium became frustrated late into the first day with not being provided with packet captures.&quot;<p>I&#x27;m not sure they&#x27;re experts if they were expecting Mike Lindell to actually deliver on something.
评论 #28157825 未加载
评论 #28157881 未加载
评论 #28157736 未加载
whatshisfacealmost 4 years ago
This article is a soup of crisscrossing claims and motives, but after thinking that, I realize that&#x27;s what the news is actually like, and whenever it appears otherwise, it&#x27;s because of narrative-building.
评论 #28157651 未加载
评论 #28157782 未加载
评论 #28157788 未加载
was8309almost 4 years ago
This is for those here that think &#x27;fact checkers&#x27; are a bad idea. You don&#x27;t want a fact checker to deliver your opinion of hard questions, like &#x27;is there life after death&#x27;, but we need fact checkers because some people are on the fence over whether the earth is flat. this is cut and dried. you can argue fine points, but for people who aren&#x27;t sure, a fact check report that condenses everything that is known and summarizes as &#x27;scam&#x27; would be helpful to alot of people. I&#x27;d love to see a argdown platform for this stuff
dukeofdoomalmost 4 years ago
This is the biggest thing that came out of the conference.<p>Apparently a Bios password was leaked and one of the voting machine was possibly imaged in a county in Colorado, before and after dominion post election update.<p>Press Conference <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=Ro00TQuTUcc&amp;t=37s" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=Ro00TQuTUcc&amp;t=37s</a>
apialmost 4 years ago
These claims don&#x27;t need to be credible. They&#x27;re propaganda and theater to fire up the base, not something intended to stand up in court or convince anyone who knows what they&#x27;re talking about.<p>Very few people know what actual cyber forensic data would look like, and any packet capture would be meaningless without a lot of context information about when, where, and how it was captured.<p>My favorite bit of propaganda leading up to the &quot;pot dispensary putsch&quot; of January 6th was the comical Qanon military LARPing in some of the Q drops. Shit like &quot;testing alternate satellite route code (let cat walk on keyboard) trust the plan, Q&quot;. Meanwhile this junk is being posted on a shitty chan board with no cryptographic signature, because that&#x27;s exactly how a real &quot;Q-level&quot; intelligence expert would communicate.<p>A real spy would never ever even use a PGP signature to authenticate their literally world saving information. They would also pre-announce their intent to take down a super-powerful global criminal cabal to make sure their adversaries knew ahead of time.<p>Absolutely hilarious nonsense for people who know nothing about computers, telecom, encryption, the military, or intelligence.<p>Con artists often deliberately make their con stupid and ridiculous to select for gullible marks. A con artist <i>wants</i> fools.
评论 #28157956 未加载
评论 #28157874 未加载
paulpauperalmost 4 years ago
Isn&#x27;t mypillow a legit business, election fraud claims notwithstanding
评论 #28157997 未加载
an1sotropyalmost 4 years ago
You know the jig is up when even the Washington <i>Times</i> says that it&#x27;s a fraud.
excaliburalmost 4 years ago
Does Mike Lindell know anybody who isn&#x27;t a serial con-man?
verniealmost 4 years ago
I hope all these charlatans bleed him dry.
encryptluks2almost 4 years ago
These are the same people who create elaborate PizzaGate, QAnon, Wayfair, McAfee, etc conspiracies. They are in the business of creating conspiracies not cause they can ever prove them in court, at least not without a truly inept and likely corrupt judge, but because they attract certain types of people into their cult so they will hopefully have more mentally unwell seditionist show up next time.
评论 #28157896 未加载
评论 #28158026 未加载
edlyalmost 4 years ago
Is there a conversation that needs to be had around the security of voting machines? Yes. Is America&#x27;s electoral system fundamentally flawed? Yes. Should election machines be audited and held to the highest possible standard of information security? Yes.<p>Does this achieve any of that? No.<p>A lot of people had open minds about this whole situation, and I commend them. But it was obvious from the beginning this was going to go nowhere. It&#x27;s the same with every conspiracy theory, someone claims to have proof but won&#x27;t or can&#x27;t show it for some reason. Whatever reason that is changes with the wind. The claim that the elections were hacked to give Biden the victory has now boiled down to con men conning other con men.
评论 #28163631 未加载
bluehackeralmost 4 years ago
I watched most of the event over the past few days. Mostly fluff. However, there were some actual interesting things uncovered, like decades old iis software runnning and logs that clearly showed some sort of network activity on and around election day.<p>I find it hard to believe there&#x27;s nothing when politicians are trying so hard to stop any audit and sites like Twitter are banning any discussion of election fraud. You dont censor when you are correct. You censor when you have something to hide.<p>I also find it hilarious that the left laughs at this when the majority of leftist activists sites run on shitty outdated wordpress installations cobbled together with random scripts.
评论 #28158029 未加载
评论 #28158001 未加载
评论 #28157987 未加载
评论 #28157965 未加载
linuxftwalmost 4 years ago
&gt; He has been behind several other high-profile conspiracy theories, including allegations that U.S. security agencies wiretapped Trump Tower while Mr. Trump was running for president in 2016.<p>I mean, that was proven. There&#x27;s an entire wikipedia page dedicated to it [1].<p>I don&#x27;t trust this Lindell guy, but I trust the press even less.<p>1: <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Crossfire_Hurricane_(FBI_investigation)" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Crossfire_Hurricane_(FBI_inves...</a>
评论 #28158028 未加载
评论 #28158235 未加载
评论 #28158244 未加载
评论 #28158218 未加载
debaclealmost 4 years ago
This article is a factoid filled hit piece. Not defending Lindell, but I would encourage people to find better coverage of this event. Finding unbiased coverage is likely impossible, but try to find at least a few you regard highly and read through the mess.
评论 #28157766 未加载
评论 #28157716 未加载
评论 #28157721 未加载
评论 #28157950 未加载
评论 #28157692 未加载
评论 #28157748 未加载