US election Cyber-hacking by algorithm
Media reaction: Silence.
EU reaction at possible fraud on the most massive scale imaginable: Silence.
The EU has its own anti-'disinformation' investigators. It has its own cyber security agency, ENISA.
The EU authorities are zip-mouthed on possibly the most outrageous affront to democracy in the world.
Between 30 percent of Americans used to believe that fraud and cheating took place in the 3 November US election. That was a few months ago. Today the figure is around 50 percent or more. A large number of them are Democrats. They wonder how allegedly Joe Biden gained millions of votes more than Barak Obama, and broke his record turn out. Biden is older, forgetful, lethargic, bumbling and accused of dementia. Hardly the characteristics to gain votes.
They have good reason. The evidence is flowing out. Joe Biden himself said:
"We have put together, I think, the most extensive and inclusive voter fraud organization in the history of American politics," Biden said in the video.
Law-makers with cyber experts from 50 of America's 50 States interacted this summer with other experts analysing software tricks and criminal activities that altered election results and the means to analyse them from the computer based records. Key ballot files have been shown to be deleted. That should automatically and of necessity lead to prosecution. It hasn't.
We are aware of the press reports both on this story and on the cybersecurity symposium but we would have no specific comments to make.
- No. (Number): As mentioned, you can find the exact number of captured packets in this column. The digits will remain the same even after filtrating the data.
- Source: It shows where the packet originated.
- Destination: It shows the place where the packet will be kept.
- Protocol: It displays the name of the protocol, typically in an abbreviation.
- Length: It shows the number of bytes contained in the captured packet.
- Info: The column includes any additional information about a particular packet.
As Wireshark analyzes the network traffic, each captured package is time stamped. The timestamps are then included in the packet list pane and available for later inspection.
Wireshark doesn’t create the timestamps themselves. Instead, the analyzer tool gets them from the Npcap library. However, the source of the timestamp is actually the kernel. That’s why the accuracy of the timestamp can vary from file to file.
You can choose the format in which the timestamps will be displayed in the packet list. In addition, you can set the preferred precision or number of decimal places that are displayed. Apart from the default precision setting, there’s also:
- Tenths of a second
- Hundredths of a second
As the name suggests, the source of the packet is the place of origin. If you want to obtain the source code of a Wireshark repository, you can download it by using a Git client. However, the method requires you to have a GitLab account. It’s possible to do it without one, but it’s better to sign up just in case.