lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <B99D046F7F16A34EA7926E14DD82F5A114CE02@exchny28.ny.ssmb.com>
From: jan.m.clairmont at citigroup.com (Clairmont, Jan M)
Subject: 8->OT: U.S. 2004 Election Fraud.

I think we should keep this discussion going as long as 
we are able, just to frustrate the thought police Nazi's
on this group. It is really ironic that a legitimate discussion
of electronic voting and Diebold and other voting systems, that
are not secure, is considered off-limits by some so-called
authorities.

So please continue the discussion and I am interested as well
as many others who would like to know more about irregularities
and vulnerabilities of voting machines.  Some use windows as their
servers and windows OS's so they are liable to hacking like any 
on-line system.  Does anyone know anything about the OS versions
Diebold was using and what testing was done to ensure the integrity
of the count?

Warm Regards to the Thought Police?->
Jan Clairmont
Firewall Administrator/Consultant


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ