I also know IT. I discovered the flaw in OAuth 2 (because I built it from spec from scratch) before Intel's security team published the first report on it.
I would like to see that kraken report if you have a link to it.
My first suspicion was that they were waiting til the last minute to see who didn't vote, then using those people's names to stuff the ballot boxes. This is where the "large swath of votes at 5am" comes into play, after the window when they should have been counted by law (which they did anyway) and also after the time those vagrant voters could possibly cast their own vote (and find out they had somehow already voted). Gamed!
Cool story about the Diebold!
I also know IT. I discovered the flaw in OAuth 2 (because I built it from spec from scratch) before Intel's security team published the first report on it.
I would like to see that kraken report if you have a link to it.
My first suspicion was that they were waiting til the last minute to see who didn't vote, then using those people's names to stuff the ballot boxes. This is where the "large swath of votes at 5am" comes into play, after the window when they should have been counted by law (which they did anyway) and also after the time those vagrant voters could possibly cast their own vote (and find out they had somehow already voted). Gamed!