Win / Conspiracies
Conspiracies
Sign In
DEFAULT COMMUNITIES All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Reason: None provided.

Cool story about the Diebold!

I also know IT. I discovered the flaw in OAuth 2 (because I built it from spec from scratch) before Intel's security team published the first report on it.

I would like to see that kraken report if you have a link to it.

My first suspicion was that they were waiting til the last minute to see who didn't vote, then using those people's names to stuff the ballot boxes. This is where the "large swath of votes at 5am" comes into play, after the window when they should have been counted by law (which they did anyway) and also after the time those vagrant voters could possibly cast their own vote (and find out they had somehow already voted). Gamed!

3 years ago
1 score
Reason: Original

Cool story about the Diebold!

I also know IT. I discovered the flaw in OAuth 2 (because I built it from spec from scratch) before Intel's security team published the first report on it.

I would like to see that kraken report if you have a link to it.

My first suspicion was that they were waiting til the last minute to see who didn't vote, then using those people's names to stuff the ballot boxes. This is where the "large swath of votes at 5am" comes into play, after the window when they should have been counted by law.

3 years ago
1 score