TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion Systems, the owner of Sequoia and Premier, has a customer portal called dominion.dominionvoting/portal. This portal can be easily accessed and manipulated, allowing customers to view and modify data, including election results. It doesn't require a nation state's level of sophistication to manipulate these sites or gain unauthorized access. Even with limited resources, someone could potentially manipulate the election using these systems.

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Virginia has stopped using touchscreen computer voting due to vulnerabilities, and there is concern about the security of voting machines across the country. Researchers have shown that voting systems can be tampered with, and hackers with limited resources can breach machines in minutes. Instances of electronic voting machines deleting or switching votes have been reported. The biggest seller of voting machines has violated cybersecurity principles by installing remote access software, making the machines susceptible to hacking. Three companies control the majority of voting machines in the US. Many states have outdated and vulnerable machines, and some lack backup paper ballots. The machines often run on unsupported software, making them more vulnerable to cyber attacks. The use of modems in voting machines also poses a risk, as they can be connected to the internet. The lack of forensic evidence and audit trails further undermines the security of the machines. The vulnerabilities in the voting system could lead to a compromised election and a loss of faith in the democratic process.

Video Saved From X

reSee.it Video Transcript AI Summary
Cybersecurity experts have provided signed affidavits stating that Dominion Voting Machines were tampered with over Internet connections. The machines used an unencrypted VPN with easily accessible login credentials, allowing foreign adversaries to monitor and manipulate votes. IP addresses showed that China, Iran, and other countries accessed the servers, while Edison Research also communicated with these adversaries. Claims that Dominion machines were not connected to the Internet are false. Dominion Voting Systems is linked to a Chinese-owned company, and its software is licensed from a Venezuelan-owned company. Forensic audits revealed significant errors in the machines. Georgia recently signed a $100 million contract with Dominion, despite the machines being easily hackable.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Before elections, a supposed glitch prompts an emergency patch that opens backdoor access from a Serbian office, which is the true operational center of Dominion. This office, despite being presented as a U.S. company, has connections to Chinese nationals and operates on Huawei machines. Using virtual machines, they manipulate election results by creating a hidden environment within the county election equipment. After altering the data, they collapse the virtual machine, leaving no trace unless a forensic audit is conducted. This manipulation is facilitated through connections to China, raising concerns about the integrity of the election process. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting machines in the U.S. are highly vulnerable to hacking, with researchers demonstrating that even those with limited skills can breach them quickly. Many machines are outdated, using unsupported software, and some states lack adequate paper trails for verification. Remote access software on machines increases risks, and several states have been hacked without detection. The use of cellular modems for transmitting results further exposes systems to cyber threats. Election management systems, often connected to the internet, can be compromised, allowing attackers to manipulate vote tallies. Despite assurances from vendors, the reality is that many machines can be hacked, raising serious concerns about election integrity in close contests. The lack of forensic evidence makes it difficult to confirm whether votes have been altered, leaving the electoral process at risk.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting systems are designed to be closed systems without internet connectivity or external devices. Dominion, the company mentioned, does not have any remote access to the equipment or machines. No one has access to the information on the machines remotely.

Video Saved From X

reSee.it Video Transcript AI Summary
Signed affidavits from cybersecurity experts suggest that Dominion Voting Machines and Edison Research used an unencrypted VPN, allowing foreign adversaries to access and manipulate votes. The IP addresses showed communication between these adversaries and Edison Research. Claims that Dominion machines were not connected to the internet are false. Dominion Voting Systems is registered to a Chinese company, and UBS Securities has three Chinese nationals on its board. Dominion's software is licensed from Venezuelan-owned Smartmatic. Forensic audits of the machines revealed significant errors. Left-leaning news sources previously highlighted the vulnerability of voting machines. Georgia recently signed a contract with Dominion, despite concerns. An audit in Michigan's Antrim County exposed high error and adjudication rates.

Video Saved From X

reSee.it Video Transcript AI Summary
Virginia has stopped using touchscreen computer voting due to vulnerabilities, and there is concern about the security of all voting machines. Researchers have shown that voting systems can be tampered with, and hackers with limited resources can breach machines in minutes. Instances of electronic voting machines deleting or switching votes have been reported. The biggest seller of voting machines has violated cybersecurity principles by installing remote access software, making the machines susceptible to hacking. Three companies control the majority of voting machines in the US. Many states have outdated and vulnerable machines, and unsupported software increases the risk of cyber attacks. The use of modems in voting machines also poses a security threat. The lack of paper trails and audit trails further compromises the integrity of elections.

Video Saved From X

reSee.it Video Transcript AI Summary
A firm primarily owned by Venezuelan businessmen, Smartmatic, bought the US company Sequoia, which makes electronic voting machines. Concerns arose because Smartmatic has ties to the Venezuelan government, including a $91 million contract and a government minister on the board of directors of a related company. Critics suggest the Venezuelan government could manipulate US elections. Smartmatic's structure involves international holding companies, and the US government didn't review the sale when Smartmatic bought Sequoia. Experts claim Smartmatic machines were used to manipulate Venezuelan elections, reversing exit poll results that favored Hugo Chavez's opponent. Smartmatic also built a production facility for electronic voting equipment hardware just outside Beijing, China, and then shipped the hardware to a warehouse in Taiwan. The hardware was marked as manufactured in Taiwan and shipped to both Smartmatic and Dominion for use in US elections. Dominion voting systems manages elections in almost all the swing states in The US, which determines who wins the presidency. Dominion moved its research and development and servers which store swing state voting information to its office in Belgrade, Serbia, where Venezuelan, Chinese, and Serbian software engineers maintain system administrative status over swing state elections. Three Smartmatic executives were indicted in Florida for bribery during the 2016 Philippines election, allegedly to alter election results. The Venezuelan mafia, with assistance from China and Iran, has been rigging elections in 72 nations.

Video Saved From X

reSee.it Video Transcript AI Summary
Before every election, voting machines need to be programmed with the ballot design and candidate names. This is done by inserting a memory card into the machine. If an attacker infects the memory card with malicious code, it can change the programming on the voting machine and manipulate the election results. The programming is done on a desktop PC or workstation, often connected to the internet. In Michigan, during the 2016 election, 75% of counties outsourced their pre-election programming to three small companies. These companies had weak security measures, making it relatively easy to hack into their systems. By targeting vulnerable states and hacking into their election management systems, attackers can spread malicious code to individual voting machines and manipulate the votes. Even if there are paper records, they are often not thoroughly checked.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Before elections, a supposed glitch prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational hub of Dominion. This office, staffed by Chinese nationals, manipulates election results using virtual machines created within the election equipment. The manipulation is done through software, leaving no trace unless a detailed forensic audit is conducted. This process involves using Huawei servers, linking back to China. For more information, visit Stolen Elections Facts for documentation.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting machines have been proven to be vulnerable to tampering and hacking. Even with limited knowledge and resources, hackers can breach these machines within minutes. In 2018, electronic voting machines in Georgia and Texas deleted or switched votes. The biggest seller of voting machines violates basic cybersecurity principles by installing remote access software, making them attractive to fraudsters and hackers. Three companies control the majority of voting machines, posing significant risks. Many states still use outdated and hackable machines. Researchers have found serious security flaws in 43% of American voting machines. Aging systems rely on unsupported software, making them more vulnerable to cyber attacks. A hack in just one swing state or a few counties could impact a close presidential election. Concerns about the possibility of a successful hack are high.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting machines in the US are vulnerable to hacking and manipulation, according to researchers. These machines, which come in various models, have been found to have security vulnerabilities that allow attackers to inject malicious software and change election data. The machines can be hacked through the machine used to program them, and many of them have wireless modems that can connect to the internet, despite claims that they are not connected. The vulnerabilities in the voting machines, along with the lack of secure systems for voter registration and result reporting, pose a significant risk to the integrity of elections. It is crucial to address these vulnerabilities to ensure the trustworthiness of election results.

Video Saved From X

reSee.it Video Transcript AI Summary
A computer science professor explains how a voting machine can be easily manipulated by gaining physical access to it. By connecting a computer to the machine's serial port, one can rewrite the code and control the election results. The professor also highlights the lack of security measures on these machines, making them vulnerable to hacking. Another expert shares their experience of being left alone with voting machines after an election, emphasizing how easily someone could insert malware into them. The central count scanner discussed is widely used in America for counting ballots. The speakers mention the ease of obtaining the machine's software from a Russian server and the numerous individuals who have access to the machines, including potential adversaries. They conclude that the multitude of possible hacks and entry points make it unlikely that someone isn't taking advantage of these vulnerabilities.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting machines in the US are vulnerable to hacking and manipulation, according to security researchers. These machines, which come in various models, have been found to have security vulnerabilities that allow attackers to inject malicious software and change election data. The most efficient way to hack the machines is through the machine used to program them, as it can pass rogue software to the voting machines. Contrary to popular belief, many voting machines are connected to the internet, either through wireless modems or other means, making them susceptible to cyber attacks. The lack of proper security measures and outdated systems make it only a matter of time before election results are compromised.

Video Saved From X

reSee.it Video Transcript AI Summary
Contrary to the current political narrative, the speaker emphasizes that voting machines are not connected to the Internet, making them secure. However, in 2018, there were instances of electronic voting machines in Georgia and Texas deleting or switching votes. The speaker mentions that even hackers with limited knowledge and resources were able to breach these machines easily. They also highlight concerns about remote access software making the machines vulnerable to fraudsters and hackers. The speaker clarifies that Dominion, the company in question, has no involvement in switched or deleted votes, and has no ties to communism or China. However, there are indications that some machines may be connected to the Internet, despite being designed as closed systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion, a key player in vote tabulation, received a $400 million investment from Credit Suisse, a Chinese bank, just weeks before the election. Another company, Seidel, which recently declared bankruptcy, had its assets acquired by a new entity with ties to George Soros and Venezuela. Additionally, Kamala Harris' husband is linked to one of these companies. The software used for elections originates from Hugo Chavez's Venezuela, while the machinery and tabulation services are connected to Venezuelan and Chinese interests. This raises concerns about foreign influence in the election process, suggesting a potential manipulation of our electoral system.

Video Saved From X

reSee.it Video Transcript AI Summary
Contrary to the current political narrative, the speaker emphasizes that voting machines are not connected to the internet and the Department of Homeland Security claims the 2020 election was secure. However, in 2018, there were instances of electronic voting machines in Georgia and Texas deleting or switching votes. The speaker mentions that hackers were able to breach these machines easily, even with limited knowledge and resources. They also mention the concern of remote access software making the machines vulnerable to fraudsters and hackers. The speaker then addresses the controversy surrounding Dominion, stating that there were no switched or deleted votes involving their machines and that the company has no ties to communism or China. However, there are concerns that some machines may be connected to the internet despite being designed as closed systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting in America is conducted by private companies contracted by the county. However, there are no national security standards for these companies, making it easy to change votes without leaving a trace. Additionally, the votes from Texas and 28 other states are sent to a server in Frankfurt, Germany, owned by a multinational company based in Barcelona, Spain, which controls and reports the votes.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion voting machines are designed to be closed-networked, without internet or external connectivity. However, emails from Dominion employees show foreign nationals discussing accessing voting equipment. The U.S. Election Assistance Commission (EAC) certified Dominion voting machines, marking "no" to modem use for internet connection. An email from Dominion employees mentions retrofitting Alaska voting machines with dial-up modems. These modems contradict the CEO's sworn testimony and Dominion's statements to the EAC, potentially invalidating certifications and procurement processes funded by taxpayer dollars. This constitutes evidence of fraud, irrespective of whether Dominion cheated in the 2020 election. Dominion's alleged lies could allow Fox News to overturn its $787.5 million settlement and reclaim the funds.

Video Saved From X

reSee.it Video Transcript AI Summary
Smartmatic built a production facility in China and shipped hardware marked as Taiwanese to Smartmatic and Dominion, violating US law. Dominion manages elections in almost all US swing states. Evidence suggests the Venezuelan regime owns the source code used in Smartmatic and Dominion machines, which are manufactured in China. Dominion moved its R&D and servers with swing state voting information to Belgrade, Serbia, where Venezuelan, Chinese, and Serbian engineers alter elections as directed by foreign entities. Voter information is stored on Huawei servers linked to Hong Kong. CISA consulted Smartmatic and Dominion regarding election irregularities. Smartmatic executives were indicted in Florida for bribery related to altering election results in the Philippines. The CNE source code can prove election alterations. The FBI allegedly tried to obstruct investigations. Smartmatic was created at the direction of Hugo Chavez, and its source code was designed to alter election results. The Venezuelan CNE owns Smartmatic's source code. Smartmatic entered the US market and orchestrated Dominion's purchase of Sequoia, inheriting the Smartmatic source code. Smartmatic publicly broke with the Venezuelan regime in 2018. Dominion and Smartmatic's actions are controlled by the Cartel del Sol, the Cuban DGI, and the Chinese CCP.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities allow for manipulation. Just before elections, a supposed "glitch" prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational center of Dominion. This office, staffed by Chinese nationals, allows them to log into U.S. election machines and alter results. They use virtual machines to manipulate data without leaving traces. After the manipulation, they collapse the virtual server, making detection difficult unless a thorough forensic audit is conducted. This entire operation relies on Huawei equipment, linking back to China. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 presents a video focused on data and evidence of alleged irregularities in the 2020 election, asserting that there has been no comprehensive place to see widespread fraud until now. He states the video is “pure data” and invites viewers to consider the statistical anomalies in three states (Michigan, Wisconsin, Georgia) in the early hours of 11/04/2020, when Biden received major vote spikes after trailing Trump. - He analyzes 8,954 individual vote updates and identifies a clear statistical pattern across nearly all updates, with four notably aberrant updates: two in Michigan, one in Wisconsin, and one in Georgia, all occurring in the same five-hour window in the middle of the night when counting reportedly stopped in some places. - In Michigan, a 06:30AM update shows Biden at 141,258 votes to Trump’s 5,968, described as the most extreme update in all datasets across all states, followed by a noticeable ratio change in nearby updates. In Wisconsin, a single update allegedly moved Biden from trailing by over 100,000 votes into the lead. In Georgia, a 01:34AM Eastern Time update shows Biden at 136,155 to Trump’s 29,115. They claim these four spikes exceed the states’ margins of victory, making the spikes not only abnormal by percentage but also by magnitude. They conclude that if these four unlikely updates had not happened, the presidency could have been different. - Detractors are cited as arguing human error, but the video questions where evidence of corrections is, and notes that California shows only one anomalous update in percentage, not enough magnitude to shift outcomes. - A “consistently identical ratio of Biden to Trump votes across time” is highlighted as allegedly impossible, with a Florida example showing 100 identical ratios over several days. The video asserts a computer algorithm is involved, termed a weighted race distribution, associated with Diebold voting machines (known as early as 2001), implying values rather than simple counts. - In California, a single update is shown with Biden receiving about 65% and Trump 32% for one vote, raising questions about how one vote could go to more than one candidate. Speaker 0 then links these patterns to alleged connections between Diebold and Dominion Voting Systems, claiming Dominion acquired ESNS in 2010, which had previously acquired Diebold, and that Dominion’s software is licensed from Smartmatic. They also note that forensic audits show errors and that the mainstream narrative claims these issues are misinformation. They reference NBC News and PBS findings on how easy it is to hack voting machines or cast fake votes. Next, Speaker 0 notes eyewitness and video evidence from Georgia: poll worker Ruby allegedly was filmed in the backroom with absentee ballots, and at 10:30PM on November 3, media and poll watchers were told to leave, yet Ruby and others remained, pulling ballots from under a table and distributing them to counting stations. They describe Ruby running the same stack of ballots to the machine three times, observing a large Biden surge after 01:34AM Georgia time, and question whether a ballot can be counted more than once, citing Coffey County, Georgia as an example of someone claiming to scan the same batches repeatedly. Speaker 0 references Raquel Rodriguez, arrested for election fraud in Texas over video evidence of ballot harvesting, and asserts that cybersecurity evidence indicates Dominion and Edison Research used an unencrypted VPN with easily accessible credentials allowing foreign access, asserting that China, Iran, and other countries accessed the servers, contradicting claims that Dominion machines were not connected to the Internet. They mention Dominion’s association with a Chinese-registered domain, and board members with Chinese nationality, alleging conflicts of interest through corporate ownership and licensing from Smartmatic. Speaker 0 highlights that Antrim County, Michigan audits found high error and adjudication rates in Dominion, with an 68 o 5% error rate far above federal guidelines, missing logs for 2020, and reprogramming of election event designer cards during the safe harbor period. They point to subpoenas and the lack of access to logs, and to affidavits from poll workers claiming illegal activities, non-equal treatment of observers, counting without proper oversight, shredding ballots, and other irregularities. Speaker 7 concludes with a claim that many Americans distrust the 2020 election and urges viewers to download and share the video, demand election reform, and notes that the video’s credits will continue with data readers, while warning of erasure or fact checks by tech platforms.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting machines have been proven to be vulnerable to tampering and hacking. Even with limited knowledge and resources, hackers can breach these machines in minutes. In 2018, electronic voting machines in Georgia and Texas deleted or switched votes. The biggest seller of voting machines violates cybersecurity principles by installing remote access software, making them attractive to fraudsters. Three companies control the majority of voting machines in different states, posing significant risks. Many states still use outdated and hackable machines. Researchers have found serious security flaws in 43% of voting machines used by American voters. Aging systems rely on unsupported software, making them more vulnerable to cyber attacks. A hack in just one swing state or a few counties could impact a close election.
View Full Interactive Feed