251
She Won. They Didn't Just Change the Machines. They Rewired the Election.
(thiswillhold.substack.com)
Welcome to !usa@midwest.social, where you can share and converse about the different things happening all over/about the United States.
If you’re interested in participating, please subscribe.
Rules
Be respectful and civil. No racism/bigotry/hateful speech.
Post anything related to the United States.
The Common Coalition Report
Ok, here's the deal. If you want to make a case for this, that's fine. HOWEVER (and it's a big 'however') we can't just sound like the same people who cried foul over Trump's lost election. We have to provide verifiable and independently verified proof.
In the primary article, we're lacking evidence that Tripp Lite UPS devices actually manipulated votes. There's no documentation of vote manipulation occurring at all, no verified communications proving coordination between the named parties, and the statistical anomalies are described but not rigorously analyzed or peer-reviewed.
The article builds an elaborate theory by connecting real business relationships and technological capabilities, but it doesn't provide evidence that these connections were actually used for election manipulation. It assumes malicious intent based on proximity and capability rather than proving actual wrongdoing.
The Common Coalition Report has many of the same flaws, chief among them being a lack of peer-reviewed evidence. Claims about man-in-the-middle attacks are technically possible, but unproven, and the connection between corporate partnerships and vote manipulation is purely speculative.
If you want to present this as the truth, then we need transparent statistical methodology, which means we don't cherry-pick data, and we can't mix legitimate concerns with unsubstantiated technical claims. While this report contains some legitimate concerns about voter suppression and references some real statistical analysis, the core claims about systematic vote manipulation through satellite networks and corporate conspiracies remain largely unsubstantiated. The evidence presented is primarily circumstantial, and extraordinary claims require extraordinary proof that simply isn't provided here.
The document appears designed more to persuade than to present rigorous evidence, using emotional appeals and political rhetoric alongside data points. That isn't necessarily a bad thing, but it isn't something we should be presenting to the general public as fact, lest we look like conspiracy theorists. Verify the facts, then present the evidence—all else is folly.
You are the one here denouncing the credibility of these claims.
You and the bots...
"Everyone who doesn't agree with me is a bot."
The ones pushing propaganda are functionally indistinguishable from bots yes
By all means, keep accepting everything you read at face value. You'll be a fucking Republican in no time.
We're at war, sorry you don't like how propaganda can be used against fascists.
Sorry you support talking points that forward the interests of fascists.
It's really unfortunate you let yourself be controlled by Republicans like this.
Stupid? Social media has already been used for manipulation. Apart from that, Trump always accuses his opponents of doing what he himself ultimately does.... Yes, all the accusations of manipulation from the last lost election were already targeted manipulation, and by a criminal... It was precisely with these accusations that he managed to keep the Democrats quiet and he was able to create even more of a mood with his fascist behavior.
Besides this all the lie's etc 24/7..
Oh yes, the arbitrary closing of polling stations and the premature ending of the vote count. The ignoring of so many declared votes...
But the evidence has to be ironclad to be actionable or else we're no better then them.
Context: I worked in IAM (computer security) at a past job.
In computer security, we don't wait to get proof that a vulnerability was exploited. We have to operate under the assumption that any vulnerability was immediately exploited, and take immediate action to fix it and limit the impact. Doubly so when the stakes are high.
We need popular support to get real security experts to investigate these claims. If there was even a single path that could have led to a vulnerability of this scale, we need to completely secure these systems and do an immediate recount/re-vote.
I'll also say, I was surprised to learn that these voting systems and their specs are not fully public and open source. That alone makes me very uncomfortable. Security through obscurity is not security at all.
That may be true. However, there were no accusations of vote rigging from either politicians or the public. Nor was this investigated... The election was not even checked for manipulation even though there were so many indications of it. Up to that point, however, there had been more than enough that would have more than justified investigations, but absolutely nothing was done.
However. Not counting and ignoring countless legal ballot papers and arbitrarily ending postal voting early etc. is actually proof enough of election manipulation. Since this itself is a means of manipulating the election results and this was even made public without opposition.