Quote Posted by Cipheron
For a start, there are several easily checked things here.
They focus on the website dominionvotingsystems.com, pointing out that it's registered in China.
You can "who is" easily for dominionvoting.com, and you can see that they registered their actual page 15 years ago, and they do it through a third-party IT provider.
(
https://who.is/whois/dominionvoting.com)
Whereas the one mentioned in the paper was only registered a few months ago, was registered anonymously instead of through Dominion's normal provider, and there's no page at that location
(
https://who.is/whois/dominionvotingsystems.com)
So, it's clearly just a fake.
Also, the guy is citing LinkedIn and shit as his "sources".
Yeah the guy is just dribbling shit at this point. There is no such software as scorecard in the first place, and the idea that a spin-off of community services NGO ACORN is involved in high-tech shenanigans? You'd have to really be drinking the koolaid to believe this stuff.
(
https://scorecard.indivisible.org/)
Ok so there's a subdomain on a pro-Obama website that says "scorecard". What this page contains is a list of policy areas and it's scoring Biden vs Trump on each of those areas. Wow, such proof of the "scorecard" software.
---
He then goes on (about sections 13-16) to show a "similar domain" report. But
all "similar domain" means is that it two sites are similarly spelled, they don't indicate that the owner of one domain has anything to do with the owner of the different domains. The "similar" domains are just similarly-spelled sub-domains, they're completely unconnected.
His "proof" is that Dominion's old website was
dvscorp.com and there's a misspelling of dvscorp that they picked up as well, just to be safe, dvscopr.com. And there are several other websites that have a sub-domain which includes "dvscopr". What is Dominion hiding? The plot thickens /sarcasm
For example he notes that "dvscopr.hasura-app.io" is "similar" to "dvscopr.com" so therefore infers there's some nefarious link between these two entities, because they happen to have an (actual) subdomain of dvscopr, which is spelt the same as the (non-existent btw) website dvscopr.com, which is a misspelling of dvscorp.com. Following this yet? And he notes that some of the companies with these "dvscopr" subdomains exist in China, Iran etc. Therefore they're secret links between Dominion and those other nations /sarcasm
The point here is that dvscopr is a typo. Web providers will sometimes register a range of misspellings for the client in order to pick up common typos. But why then would an actual company in China working with DVS use the typo'd version? The very fact that this "proof" needed to go via a
misspelling of Dominion's old website should indicate how bullshit this claim is. If there was any more direct (i.e
not misspelled) connection then he would have used it. You don't have to be any sort of network expert to realize these claims are outright bullshit. The question of course is what's actually *at* those other "similar" websites would of course be the smoking gun, but apparently the high-level hacker behind this PDF wasn't interested to go *that* far down the rabbit hole, the same as he just mentions "scorecard.indivisible.org" without actually telling you what's there. He's relying on his readers being too dumb to do their own research.
---
As a programmer I know this one. The idea that a "decorator" "smooths the data" is bullshit. There's a whole wikipedia page about this:
(
https://en.wikipedia.org/wiki/Decorator_pattern)
Looking at the "evidence" all that really says is that it's a thing for determining how you want the final results to be displayed, as in formatting.
This guy is supposedly some kind of expert. No actual "computer expert" of any type would say "ahah, they said decorator! that means they're rigging the data!" without further evidence that something is going on.
What you have here is the classic Gish Gallop with 100 stupid claims and hoping that the sheer amount of dumb things adds up to one good thing.
---
Reading the entire PDF makes me believe in the voting fraud LESS, not more, because if there was anything to it, complete amateur shit like this isn't what would have made it in front of my eyeballs.
The author of the paper used automated tools to track network activity.
It is common for "botnets" to use typo-squat hosts and there are even references to the type of "Advanced Persistent Threats" (ATP) used in this operation.