26406458? ago

What if you instead only vote for one candidate now and watch it do it's magic while the world watches. Instead of dissecting the program ,as a programmer I would put a code that if you try to look at the code it resets and flashes the program to it's original form.

26407754? ago

as a programmer I would put a code that if you try to look at the code it resets and flashes the program to it's original form.

THATS WHY YOU DESOLDER

26405057? ago

There's nothing secret about our Vote manipulation software. Its 3 letter agency common knowledge. Their biggest flaw at this point is how easy it would be to demand accountability and expose it all.

These people have compartmentalized themselves as well, for plausible deniability, limiting the pool of actors to be punished.

Podesta Email via wikileaks BLATANTLY admitted they had a code book as well, so innocuous conversations could be used to deliver instructions. https://twitter.com/ReportBread/status/1327291653217021953

Guilt is obvious. We may need a modern day inquisition. But cooler heads than my own make the decisions around here..

A 5-D victory of epic proportions is quite possible.

/hopium will never be enough however, so get your rifle ready.

They have most of the soap box, now they are after the ballot box.

26404448? ago

I agree, remove all power sources I just hope it's done in time

26404079? ago

πŸ—ž

πŸ—‘ er uh πŸ–‹

🀺

Unless antifa wanna show up........

πŸ“’

πŸ”¨πŸ”©πŸ”§πŸ”ͺπŸ‘πŸπŸΉ err uhh wait, leaVe those at home πŸΈπŸ—‘πŸ’πŸ₯„πŸ₯•βœ‚πŸ–‡πŸŽΆ

πŸ‡ΊπŸ‡ΈπŸ₯πŸ‡ΊπŸ‡Έ

26404185? ago

My safari browser shows almost none of what you typed. you should check conformance. I did see these few :

πŸ“’ πŸ”¨πŸ”©πŸ”§πŸ”ͺ βœ‚ 🎢 πŸ‡ΊπŸ‡Έ

26403831? ago

These anonymous threads are only good for zogs, nogs and trolls.

26404013? ago

anonymous threads are only good for zogs, nogs and trolls

I (the OP) assure you every exploit I list, is 100% in the source code.

I am no troll. I barely gave a fuck until about a day ago when I determined no one out there seems to discuss deliberately injected weaknesses, a forte of NSA.

The NSA pays an engineer a breifcase of cash ($500,000 for iPhones allegedly) to put special "missing lines of code" in logic. The human mind is notoriously bad at spotting exploits in C/C++ (the language used in this firmware) that rely on REMOVING a line of code from prior legacy working code releases.

Likewise, choosing ANY of the crypto weakness I mentioned is highly suspect. I listed true absolute critical defects in security.

  • I cant be ZOG, zogs want trump gone, as they lean over 40 times more democrat. I want Trump.

  • I cant be NOG, I am not a negro, as evidence by my technical skills

  • I cant be a TROLL, I could give a fuck about anyone's opinions. I can assure you, If I wanted to troll, and I have in the past, I made it into countless magazines and books, and it was tormenting normies. I dont consider anyone on this site, a Normie.

Puttitout and u/Tallest_skil (Member for: 5.7 years) both know who I am, presumably.

My name is Legion

26403708? ago

Is this original brainstorming or a copypaste?

26403740? ago

100% absolutely original and only on voat, by me.