The Key to Understanding the Steal
Please Follow us on Gab, Minds, Telegram, Rumble, Truth Social, Gettr, Twitter
What if you walked out of a store, pressed your car’s remote key fob, and the engine of another car in the parking lot started instead? Or, worse, what if someone else came up, pressed a button, started your car and drove away? Some one stole your car by just pressing a button?!? Aren’t those fobs supposed to be configured for just YOUR car?
That is exactly how our votes are stolen - the encryption codes on the voting machines are insecure, and can be made to read anything (or, open any door, as in a keyfob). Your vote, as you marked your ballot, goes into the voting machine (tabulator), then is transferred from precinct to county to state. You always think that the choices you made are the ones that go on to be counted as part of the totals which eventually - IN A GENERAL ELECTION - go to Washington, DC, to be certified as final election results. If, however, the tabulator on which you cast your votes, was not encrypted securely, all bets are off, and anyone could have altered or discarded your vote at will
Most of us do not understand encryption keys and their crucial places in our lives.
Encryption is simply the science of using codes and ciphers to PROTECT messages., like the one your finger sends to your car to let you in, start the engine, honk the horn or whatever. When that encryption is correct, your car does what you tell it to, AND IT DOES NOT DO WHAT SOMEONE ELSE ASKS OF IT.
If there is no secure encryption to keep YOUR key fob connected to only YOUR CAR, you have big trouble. Your car could be stolen by anyone.
So it goes with your vote, cast on voting equipment which is not secured by the proper encryption codes.
The federal government began to get into our elections after the “hanging chad” debacle in 2000, where Florida’s punch card system didn’t produce clean holes in several thousand ballots. Many election experts believe that the 2000 confusion was created to move people towards voting by machines. There is a whole store behind this, which I am anxious to share with you, when I come up for air…
Whether intentional or accidental, voting machines became the future of elections.
Congress passed two major pieces of legislation, the National Voter Registration Act, (NVRA), or “Motor Voter Act”, in 1993, and HAVA, “Help America Vote Act” in 2002. The first security checks and encryption codes, were written into HAVA regulations, and are frequently ignored today, thus the controversy. Today’s machines, in every state, according to voting system standards expert, Clay Parikh, are illegally insecure.
Clay Parikh worked at the national voting machine testing labs for 9 years and during that time tested 7 different voting system vendors across multiple states.
Storage of the encryption keys IS the key.
In a recent hearing on election fraud in Georgia, Parikh testified that the keys are stored in “plain text”, unencrypted and in an insecure data base”, which is a violation of the law. Secure encryption keys are VITAL to the integrity of the election systems, he states. A sine qua non - “without which there is nothing” - as it were.
Insecure or unencrypted keys allow any bad actor to enter and change the votes, either when the results (cast vote records) in the tabulator are transferred to the county system, or alteration of the thumb drive between the county and the state.
That’s when they drive away with your vote.
Stay together and let your election officials know that we know, and will do our best to hold them accountable if the results of this election - which is already all but won by Donald Trump - does not show at the polls.