In 2017 they refused. And because the govt was on the side of refusing, they disobeyed a court orderI doubt Kenya has qualified cybersecurity experts; he may have to look around the globe. In such a task, you need at minimum CISSP, CISA officials with 10 years of experience ranging from Computer Forensic Analyst, Cyber Forensic Analyst, Network Forensic examiner, Fraud analyst, Cryptologic Forensic Examiner, Computer Hacking Forensic Investigator, and many more titles under RVHH's belt. Also, his advisor should tell him to find experts who can audit all the Defense-In-Depth nature covering logical and physical security. It is sad that they can see government people trying to mess with the perimeter and IEBC stuff if they audit the physical side. Further, I wouldn't be surprised to find the government's script kiddies or full-blow black and gray-hat hackers once they go to the logical side of the equation. For instance, IDS/IPS, encryption, firewall, Vlans, access, etc. Complete audits based on what is in the public domain may incriminate Azimio, especially if the IT staff supervising them are Smartmatic IT people!
Then and now, this one fact about servers has not changed: Any Access onto a server always leaves foot prints.
UDA need not hold their breath, they will be "Smoked out" & Baba better spend his money well - even if he does not have it - to pull in a very qualified system forensic security expert.
In 2017 they refused. And because the govt was on the side of refusing, they disobeyed a court order
Then and now, this one fact about servers has not changed: Any Access onto a server always leaves foot prints.
UDA need not hold their breath, they will be "Smoked out" & Baba better spend his money well - even if he does not have it - to pull in a very qualified system forensic security expert.
In 2017 they refused. And because the govt was on the side of refusing, they disobeyed a court order
Then and now, this one fact about servers has not changed: Any Access onto a server always leaves foot prints.
UDA need not hold their breath, they will be "Smoked out" & Baba better spend his money well - even if he does not have it - to pull in a very qualified system forensic security expert.
I like to add that they had no problem pouring out the entrails of the server for the uncontested rerun, even though nobody ordered them to. A small, but revelatory detail. If they were consistent by not opening it the second time, it would be easier to sell the generally unconvincing lie that they were concerned about security. By contrast, they remain in defiance of the first order to this moment.
That aside, I can't make head or tail of why they want to access the server in this case. What are they trying to find? Hacking is an ill-understood term and conjures up all manner of unhelpful things, and paranoia. Hacking most often involves perfectly "authorized" access carrying activities that on the surface are authorized and leave no useful scent depending on a lot of variables. I feel that this is a wild goose chase in this particular case. But again, without really knowing what they want, I might of course be wrong.
Despite the delays in receiving the 34A tally.
forms at the national level, the IEBC did not take
advantage of the seven-day deadline provided by
the law to announce results. Instead, the IEBC
hastily declared presidential election results on
Aug. 11, just three days after election day. The
Kenya Elections Act requires the IEBC to publish
the presidential election results forms on an online
public portal. Out of 40,883 results forms, only
30,000, or three-fourths of the scanned 34A forms,
were published on Aug. 9. The remaining 34As
were only uploaded after the deadline for filing
petitions on Aug. 25. Constituency results forms
(34Bs) were posted only two days before the dead-
line for filing a petition to challenge the results of
the presidential elections.35
This breakdown in the results-transmission
system critically undermined the transparency of
the tallying process and severely hindered verifica-
tion efforts by parties and independent observers,
leading to legitimate questions about the accuracy
of the results. The failure of the system to work as
expected fueled NASA’s challenge of the presiden-
tial election results as well as the court’s ruling to
annul the election.
After the presidential results were announced,
NASA scrutinized the results forms and compared
the 34As and 34Bs gathered from the IEBC with
those of their party agents. It alleged significant
irregularities in the results tally forms and said
that the IEBC information technology system had
been hacked and the results changed. NASA’s
claims were included in their petition challenging
the results, which included a request to access
the IEBC server to verify whether it had been
infiltrated. The IEBC could have avoided some of
these issues if it had used the time available to it
before announcing the results to collect and post
all the 34A forms, enabling all sides to compare
them to the county-level 34B forms
Raila is on wild goose chase.,he should stick to the paper and leave technology alone. he has no team to help him unravel any manipulation that requires people trusted with controls to give up those controls to bad actorsNjamba you are another one. What lead to the 2017 presidential election being annulled was the 'process' - more specifically problems were detected with the transmission of results. This was a technical thing. we have renegades like Chirchir roaming free and it is okay to let them do as they please? Remember the parties are putting their case to non-technical people (Judges) who have decided that the standard of proof need only be: The balance of probabilities. This is a lower standard than in a criminal case which requires 'beyond reasonable doubt'. This is a low hanging fruit
In 2017 they refused. And because the govt was on the side of refusing, they disobeyed a court order
Then and now, this one fact about servers has not changed: Any Access onto a server always leaves foot prints.
UDA need not hold their breath, they will be "Smoked out" & Baba better spend his money well - even if he does not have it - to pull in a very qualified system forensic security expert.
I like to add that they had no problem pouring out the entrails of the server for the uncontested rerun, even though nobody ordered them to. A small, but revelatory detail. If they were consistent by not opening it the second time, it would be easier to sell the generally unconvincing lie that they were concerned about security. By contrast, they remain in defiance of the first order to this moment.
That aside, I can't make head or tail of why they want to access the server in this case. What are they trying to find? Hacking is an ill-understood term and conjures up all manner of unhelpful things, and paranoia. Hacking most often involves perfectly "authorized" access carrying activities that on the surface are authorized and leave no useful scent depending on a lot of variables. I feel that this is a wild goose chase in this particular case. But again, without really knowing what they want, I might of course be wrong.
Woyee, Surely Termie, you can't be that clueless: one thing they would want to do is find out who accessed the server. Apparently a lot of roles in IEBC were gazetted. So No. 1 is there anybody who accessed the server that was not gazetted to do so? No.2 Were there any server write-access intrusions from outside the network locations that were gazetted? Deal with that before going onto finding what was changed.
Termie, Azimio are claiming some of the forms sent on election night by KIEMS are not what's on the portal. That's they were intercepted and replaced. That in their case, the physical forms are not what was done on election night but replacements whose copies were later uploaded onto the portal to look like they came from the KIEMS/polling stations. They claim it happened only on some forms and the changes were small figures. Is that not tracable in the server? Personally, this is the ONLY thing I want to see. If it never happened, then I'll be satisfied. I think this is also what the court wants to sMoses ledama sunkuli of iebc says they verified original against online.. perfect match...only one mathematical error in kilifi.Raila has presented forged 2017 logs and more ominous forged online form 34A...instead of agent carbon copies..he was entitled to four copies...and could also take pictures of original in the phone .Let hear tomorrow the evidence...but Raila relying on hacking using githongo crap, forgeries of form 34 and finally cheroro iebc split
Termie, Azimio are claiming some of the forms sent on election night by KIEMS are not what's on the portal. That's they were intercepted and replaced. That in their case, the physical forms are not what was done on election night but replacements whose copies were later uploaded onto the portal to look like they came from the KIEMS/polling stations. They claim it happened only on some forms and the changes were small figures. Is that not tracable in the server? Personally, this is the ONLY thing I want to see. If it never happened, then I'll be satisfied. I think this is also what the court wants to see.
Termie, Azimio are claiming some of the forms sent on election night by KIEMS are not what's on the portal. That's they were intercepted and replaced. That in their case, the physical forms are not what was done on election night but replacements whose copies were later uploaded onto the portal to look like they came from the KIEMS/polling stations. They claim it happened only on some forms and the changes were small figures. Is that not tracable in the server? Personally, this is the ONLY thing I want to see. If it never happened, then I'll be satisfied. I think this is also what the court wants to see.
Termie, Azimio are claiming some of the forms sent on election night by KIEMS are not what's on the portal. That's they were intercepted and replaced. That in their case, the physical forms are not what was done on election night but replacements whose copies were later uploaded onto the portal to look like they came from the KIEMS/polling stations. They claim it happened only on some forms and the changes were small figures. Is that not tracable in the server? Personally, this is the ONLY thing I want to see. If it never happened, then I'll be satisfied. I think this is also what the court wants to see.
Termie, Azimio are claiming some of the forms sent on election night by KIEMS are not what's on the portal. That's they were intercepted and replaced. That in their case, the physical forms are not what was done on election night but replacements whose copies were later uploaded onto the portal to look like they came from the KIEMS/polling stations. They claim it happened only on some forms and the changes were small figures. Is that not tracable in the server? Personally, this is the ONLY thing I want to see. If it never happened, then I'll be satisfied. I think this is also what the court wants to see.
If you put it that way, then it becomes interesting. If true, then it would leave a few people with serious legal liability. So basically they want to audit the process from polling station to the server. Then they have to prove that the files on the server are not identical to the ones sent by KIEMS kit. I don't know the workings of KIEMS, but if they retain a copy(it seems logical) of the file they send, then this can be determined.
Chebukati wanted his commission NOT to be demolished like Kivuitu and Isaac Hassan's; that is why he ticked all the boxes. Even with Chebukati's honest work, the cabal is manufacturing things along the way to soil his commission because of the humiliating defeat. I hope they will learn to be honest, have a tested plan, campaign aggressively, and, most importantly, avoid going into bouts with a meticulous calculator like Ruto. Against all odds, WSR kneecapped them wide open [Thrilla in Manila rope a dope of politics!]
Which kind of verification was Azimio doing at the Bomas if this is the case. Unlike in 2017 where they could cast doubt using this tactic. These time around Chebukati took time and ensured all Form 34A were verified at Bomas.Termie, Azimio are claiming some of the forms sent on election night by KIEMS are not what's on the portal. That's they were intercepted and replaced. That in their case, the physical forms are not what was done on election night but replacements whose copies were later uploaded onto the portal to look like they came from the KIEMS/polling stations. They claim it happened only on some forms and the changes were small figures. Is that not tracable in the server? Personally, this is the ONLY thing I want to see. If it never happened, then I'll be satisfied. I think this is also what the court wants to see.
The Server, I fairly presume, is not IEBC/UDA/Azimio. Is it tracable or not? Iyo tu. Story zingine sina haja, I know them all. :)
Nothing in life merits being overly complicated. :DTermie, Azimio are claiming some of the forms sent on election night by KIEMS are not what's on the portal. That's they were intercepted and replaced. That in their case, the physical forms are not what was done on election night but replacements whose copies were later uploaded onto the portal to look like they came from the KIEMS/polling stations. They claim it happened only on some forms and the changes were small figures. Is that not tracable in the server? Personally, this is the ONLY thing I want to see. If it never happened, then I'll be satisfied. I think this is also what the court wants to see.
If you put it that way, then it becomes interesting. If true, then it would leave a few people with serious legal liability. So basically they want to audit the process from polling station to the server. Then they have to prove that the files on the server are not identical to the ones sent by KIEMS kit. I don't know the workings of KIEMS, but if they retain a copy(it seems logical) of the file they send, then this can be determined.
Thanks! That's 90% of the case and is literally the only thing I'm interested in finding out. :)
Server belong to IEBC/Smartmatic - and if they were to do monkey games - they would have the wherewhitall to clean up - and so you wont find anything incriminating. This just desperation.
The best defence against hacking in this process was simple - make videos of pronouncement by the PO via whatsapp, get picture of the original, & have it whatsapped, get the four carbon copies as original delivered to you physically, get picture of the pinned one in classroom. CONFRONT CHEBUKATI with this - and he has NO DEFENCE.
Otherwise server - Smartmatic have remote and backdoor access - and will clean up their mess way before any System Audit arrive. It's their server and systems. It's them to determine what get logged and the level of details. What do you think they've been doing two weeks btw election and now - clean up any mess that might be incriminating! Make sure all everything ticks the boxes.The Server, I fairly presume, is not IEBC/UDA/Azimio. Is it tracable or not? Iyo tu. Story zingine sina haja, I know them all. :)
Let's not hear of open the server https://nation.africa/kenya/news/politics/supreme-court-orders-iebc-to-allow-raila-odinga-access-to-election-results-servers-3931164This will be first & foremost a Forensic undertaking. In the snippet from your link you can see double mention is made of the technology system security policy. A computer policy will lay out how often the system backups are made. If IEBC religiously followed the policies, then system backups must be produced for inspection at moments notice. Saying they did make them or that they were deleted will not fly. You cant clean up a backup unless you anticipate exactly what you want to hide. Backups are compressed & in machine language. They need to be restored to be read.
The IEBC was also ordered to provide them with copies of its technology system security policy comprising but not limited to password policy, password matrix and owners of system administration password(s).
They will also be given information on the system users and levels of access, workflow chats for identification, tallying, transmission and posting of portals.
Still on technology, IEBC will provide its technology system security policy comprising any application programming interface (API) that had been integrated and the list of human interface and controls for such intervention. However, the provision is subject to any security related issues.
Bull crap. Your problem pundit is that you give us links that you youself do not read:
In 2017 they refused. And because the govt was on the side of refusing, they disobeyed a court order
Then and now, this one fact about servers has not changed: Any Access onto a server always leaves foot prints.
UDA need not hold their breath, they will be "Smoked out" & Baba better spend his money well - even if he does not have it - to pull in a very qualified system forensic security expert.
I like to add that they had no problem pouring out the entrails of the server for the uncontested rerun, even though nobody ordered them to. A small, but revelatory detail. If they were consistent by not opening it the second time, it would be easier to sell the generally unconvincing lie that they were concerned about security. By contrast, they remain in defiance of the first order to this moment.
That aside, I can't make head or tail of why they want to access the server in this case. What are they trying to find? Hacking is an ill-understood term and conjures up all manner of unhelpful things, and paranoia. Hacking most often involves perfectly "authorized" access carrying activities that on the surface are authorized and leave no useful scent depending on a lot of variables. I feel that this is a wild goose chase in this particular case. But again, without really knowing what they want, I might of course be wrong.
This is the most reasoned argument one can make in this case. Chebukati claims all form 34As are in the portal but theft can be hidden in plain sight. If false 34As were created and uploaded, he will claim Maina Kiai ruling to uphold them. But few people pay attention to the fact that East Africa Data Handlers showed Chebukati PA Kwanusu accessed the server and did many things around 27 times. Kwanusu is not gazetted to have access but the assumption is that being Chebukati's PA grants him access. How about Chebukati's wife, hairdresser, secretary, advocate, cousin and uncle? Hacking will not appear if authorized users make "legal" edits and changes in the server.
https://www.iebc.or.ke/news/?IEBC_Gazettes_Returning_Officers
IEBC gazetted ROs for a reason. Access to servers is critical in IEBC business. You cannot allow anybody to access, delete and do funny things on server because they are Chebukati hairdresser or driver. It has to be controlled and gazetted.
In 2017 they refused. And because the govt was on the side of refusing, they disobeyed a court order
Then and now, this one fact about servers has not changed: Any Access onto a server always leaves foot prints.
UDA need not hold their breath, they will be "Smoked out" & Baba better spend his money well - even if he does not have it - to pull in a very qualified system forensic security expert.
I like to add that they had no problem pouring out the entrails of the server for the uncontested rerun, even though nobody ordered them to. A small, but revelatory detail. If they were consistent by not opening it the second time, it would be easier to sell the generally unconvincing lie that they were concerned about security. By contrast, they remain in defiance of the first order to this moment.
That aside, I can't make head or tail of why they want to access the server in this case. What are they trying to find? Hacking is an ill-understood term and conjures up all manner of unhelpful things, and paranoia. Hacking most often involves perfectly "authorized" access carrying activities that on the surface are authorized and leave no useful scent depending on a lot of variables. I feel that this is a wild goose chase in this particular case. But again, without really knowing what they want, I might of course be wrong.
This is the most reasoned argument one can make in this case. Chebukati claims all form 34As are in the portal but theft can be hidden in plain sight. If false 34As were created and uploaded, he will claim Maina Kiai ruling to uphold them. But few people pay attention to the fact that East Africa Data Handlers showed Chebukati PA Kwanusu accessed the server and did many things around 27 times. Kwanusu is not gazetted to have access but the assumption is that being Chebukati's PA grants him access. How about Chebukati's wife, hairdresser, secretary, advocate, cousin and uncle? Hacking will not appear if authorized users make "legal" edits and changes in the server.
From where I am sitting, the one thing that would scream system compromised, because of Dear Mama's scenario, is if the files on the server and KIEMS kit are not identical. Not knowing much else about the system, I like to hope that guys like Chebukati(and any other normal users) cannot just change whatever they want, whenever they want, on any IEBC system.
In 2017 A - they were digital plus scanned forms. Digital entries you can easily change. This IEBC discountinued - although it made the process very fast...now we are slow but sure.
Now these are images. Not easy to change. Even in PDF - you'd have to OCR.
Or totally replace with new images.
KIEMS kit had many security features - all these were demonstrated twice to satisfication of everyone - that KIEMS kit would not relay any fake form. PO had to log in with their fingerpints. They were many checks done before the forms could be submitted.
The digital copy itself is send to THREE SERVERS - one at CONST - one at BOMAS - and the Portal (web server)
CRO had access to documents of his const outside the portal. Chebukati the same - he had his own server. The portal was for everyone else.
To make any change - you need to cascade the changes on all the three servers.
Again if you change the form in the server - you need to cascade the changes in the physical forms.From where I am sitting, the one thing that would scream system compromised, because of Dear Mama's scenario, is if the files on the server and KIEMS kit are not identical. Not knowing much else about the system, I like to hope that guys like Chebukati(and any other normal users) cannot just change whatever they want, whenever they want, on any IEBC system.
In 2017 A - they were digital plus scanned forms. Digital entries you can easily change. This IEBC discountinued - although it made the process very fast...now we are slow but sure.
Now these are images. Not easy to change. Even in PDF - you'd have to OCR.
Or totally replace with new images.
KIEMS kit had many security features - all these were demonstrated twice to satisfication of everyone - that KIEMS kit would not relay any fake form. PO had to log in with their fingerpints. They were many checks done before the forms could be submitted.
The digital copy itself is send to THREE SERVERS - one at CONST - one at BOMAS - and the Portal (web server)
CRO had access to documents of his const outside the portal. Chebukati the same - he had his own server. The portal was for everyone else.
To make any change - you need to cascade the changes on all the three servers.
Again if you change the form in the server - you need to cascade the changes in the physical forms.From where I am sitting, the one thing that would scream system compromised, because of Dear Mama's scenario, is if the files on the server and KIEMS kit are not identical. Not knowing much else about the system, I like to hope that guys like Chebukati(and any other normal users) cannot just change whatever they want, whenever they want, on any IEBC system.
Which is the point I make. If the files(whatever the format) are not identical we can know right away something is wrong. If the changes are somehow cascaded to make them identical, then we don't know whether or not something wrong happened merely by comparing files. Depending on that actual design and implementation, that could be the end of it. Dear Mami's scenario(really Azimio's, she is just relaying it) assumes that physical forms have also been replaced.
In 2017 A - they were digital plus scanned forms. Digital entries you can easily change. This IEBC discountinued - although it made the process very fast...now we are slow but sure.
Now these are images. Not easy to change. Even in PDF - you'd have to OCR.
Or totally replace with new images.
KIEMS kit had many security features - all these were demonstrated twice to satisfication of everyone - that KIEMS kit would not relay any fake form. PO had to log in with their fingerpints. They were many checks done before the forms could be submitted.
The digital copy itself is send to THREE SERVERS - one at CONST - one at BOMAS - and the Portal (web server)
CRO had access to documents of his const outside the portal. Chebukati the same - he had his own server. The portal was for everyone else.
To make any change - you need to cascade the changes on all the three servers.
Again if you change the form in the server - you need to cascade the changes in the physical forms.From where I am sitting, the one thing that would scream system compromised, because of Dear Mama's scenario, is if the files on the server and KIEMS kit are not identical. Not knowing much else about the system, I like to hope that guys like Chebukati(and any other normal users) cannot just change whatever they want, whenever they want, on any IEBC system.
Which is the point I make. If the files(whatever the format) are not identical we can know right away something is wrong. If the changes are somehow cascaded to make them identical, then we don't know whether or not something wrong happened merely by comparing files. Depending on that actual design and implementation, that could be the end of it. Dear Mami's scenario(really Azimio's, she is just relaying it) assumes that physical forms have also been replaced.
Azimio are claiming that the KIEMS were made to first send to one thing/place/app, stuff would happen to them, then from this second stop, they would be dumped ont the Tallying centers/portal etc. In other words, they were not coming directly to the tallying center/portal but there was some kind of program mediating between KIEMS and the destinations they were supposed to be sent to. They're saying that this was done illegally/secretly. That's why the debate about PDFs started, because they wouldn't have the same identifying info on them (like which KIEMS sent them, from where and when). The suggestion was that they were converted to PDFs for precisely this. Is this something they could hide by 'cleaning up' as Pundit says?
To prove that, they still need to demonstrate that KIEMS files are not identical to the ones on the portal. The format would be irrelevant as far as the KIEMS metadata is concerned(I confess ignorance on the exact claims here though).
“Cleaning up” would be to “push back” these different files to KIEMS and wherever else they should be matched. While I think that is getting ahead of ourselves, this again is something that ought to be discoverable if the IEBC system has any integrity worth a penny.
Then the thread is falsely titled. If they don't examine what came from the KIEMS, which is the whole dispute, then what's the point? Some of us just want third-party assurance that we have the docs scanned and sent by KIEMS on election night. If that's not available, then there's nothing we're waiting for. :D Thread gave false hope.
Nonsense. In 2017 my sister worked as ICT something for IEBC. IEBC is not Chebukati. Chebukati can and does delegate to IEBC - his PA is IEBC staffer - ICT clerks - ICT managers - to generate and access the database. You cannot restrict access of IEBC system to internal IEBC staff. That would be crazy.
What was gazetted are the ROS. Chebukati as presidential RO will delegate everything he wants to IEBC staff except declaration and final signing staff. The same for const RO. You dont expect Chebukati to download 46,000 forms - and tabulate them all by himself. Jinga wewe.
Chebukati gave many IEBC staff jobs to do - as Presidential RO - he gave the rogue commissioners jobs like managing the choir, refreshments, announcing the results, smilling at cameras - others were to log in to systems, download the forms, compare with physical forms, name it, enter into excel, format, do the maths.
And this main contention - Che-error group says rightly that Chebukati is not IEBC - but they assume wrongly that IEBC is commissioners.
Nope IEBC is the entire body - right from clerks to Chebukati PA. Even now in Supreme Court - each judge has 20 people working for them - maybe 10 lawyers - researchers - 10 admin/clerical staff - then they have Registar (who is CEO of the Judiciary) - also assisting in executing orders.https://www.iebc.or.ke/news/?IEBC_Gazettes_Returning_Officers
IEBC gazetted ROs for a reason. Access to servers is critical in IEBC business. You cannot allow anybody to access, delete and do funny things on server because they are Chebukati hairdresser or driver. It has to be controlled and gazetted.
Can Chebukati sweeper and lawyer make edits on server because they work for Chebukati? You don't know what your saying.
I know - in fact I have since seen read IEBC affidavit - that confirm PA was given access to server - after Chebukati authorized him - and his job was to continously download the data - for the commissioners to read out.
Remember this election - Presidential one - the boss was Chebukati - he was one to hire people to help him in Bomas - including fellow commissioners, IEBC staff and all that.
The idea that someone need to be gazetted to be granted server access is pretty dumb. Chebukati authorized many IEBC staff to have requisite access to help him - because he cannot do the job alone.Can Chebukati sweeper and lawyer make edits on server because they work for Chebukati? You don't know what your saying.
If you want to full postmorteum of the election - it cannot be done in a week - the constitution doesnt envisage full audit being done - to help the loser deal with acceptance of their loss and closure - in 14 days of hearing and determing this case.
The constitution in fact doesnt anticipate the nullification of the election except where IEBC totally mess up that evidence is very apparent - if you have to go fishing for evidence - then clearly you cannot be helped.
What you want is full audit of IEBC, full recount, full retallying - and those things take time. All IEBC kits would have to be brought back to Nairobi - 46,000 of them, 46,000 ballot boxes - and then scrutiny - this would take weeks.Then the thread is falsely titled. If they don't examine what came from the KIEMS, which is the whole dispute, then what's the point? Some of us just want third-party assurance that we have the docs scanned and sent by KIEMS on election night. If that's not available, then there's nothing we're waiting for. :D Thread gave false hope.
If a sample of boxes can come to Nairobi, why not a sample of KIEMS Kits?
Server belong to IEBC/Smartmatic - and if they were to do monkey games - they would have the wherewhitall to clean up - and so you wont find anything incriminating. This just desperation.
The best defence against hacking in this process was simple - make videos of pronouncement by the PO via whatsapp, get picture of the original, & have it whatsapped, get the four carbon copies as original delivered to you physically, get picture of the pinned one in classroom. CONFRONT CHEBUKATI with this - and he has NO DEFENCE.
Otherwise server - Smartmatic have remote and backdoor access - and will clean up their mess way before any System Audit arrive. It's their server and systems. It's them to determine what get logged and the level of details. What do you think they've been doing two weeks btw election and now - clean up any mess that might be incriminating! Make sure all everything ticks the boxes.The Server, I fairly presume, is not IEBC/UDA/Azimio. Is it tracable or not? Iyo tu. Story zingine sina haja, I know them all. :)
So there was tampering.
I'm very disappointed in this; this is all I wanted out of this whole process: original scans from KIEMS, so (1) we know the truth and (2) move on, without any weird crises. I don't care about anything else. So I'm switching off. Kumbe was waiting for nothing.
I'm very disappointed in this; this is all I wanted out of this whole process: original scans from KIEMS, so (1) we know the truth and (2) move on, without any weird crises. I don't care about anything else. So I'm switching off. Kumbe was waiting for nothing.
I'm very disappointed in this; this is all I wanted out of this whole process: original scans from KIEMS, so (1) we know the truth and (2) move on, without any weird crises. I don't care about anything else. So I'm switching off. Kumbe was waiting for nothing.
Come back. They are physically opening the ballot Boxes and pulling out the FORM 34As. Shockingly some boxes don't have the FORM 34A inside. What were agents at the polling station given? FAKE FORM 34As?
There will be an explosive report from the ballot scrutiny.
So Agents knowingly signed fake Form 34As and or signed a different set of 34 As which are now being currently being pulled out from the ballot boxes .????
Do some people even listen to themselves ?I'm very disappointed in this; this is all I wanted out of this whole process: original scans from KIEMS, so (1) we know the truth and (2) move on, without any weird crises. I don't care about anything else. So I'm switching off. Kumbe was waiting for nothing.
Come back. They are physically opening the ballot Boxes and pulling out the FORM 34As. Shockingly some boxes don't have the FORM 34A inside. What were agents at the polling station given? FAKE FORM 34As?
So Agents knowingly signed fake Form 34As and or signed a different set of 34 As which are now being currently being pulled out from the ballot boxes .
Do some people even listen to themselves ?First when you post something cross check that it makes sense. Your low IQ shows at every turn. You must be the only member of this forum who does not know that AFTER COUNTING, one copy of the signed FORM 34A had to be deposited in the ballot box BEFORE being sealed. Why then do some boxes not have them; in some boxes, was this copy not the 'final' copy one and so still need massaging? The Supreme court will want to know.So Agents knowingly signed fake Form 34As and or signed a different set of 34 As which are now being currently being pulled out from the ballot boxes .????
Do some people even listen to themselves ?I'm very disappointed in this; this is all I wanted out of this whole process: original scans from KIEMS, so (1) we know the truth and (2) move on, without any weird crises. I don't care about anything else. So I'm switching off. Kumbe was waiting for nothing.
Come back. They are physically opening the ballot Boxes and pulling out the FORM 34As. Shockingly some boxes don't have the FORM 34A inside. What were agents at the polling station given? FAKE FORM 34As?
?s=20&t=8kWi3glD4pL8JzgA6gVIkwWe have been given restricted access to only one server and it is established that the IEBC has 8 servers. There is no compliance in terms of the orders the court gave - Senior Counsel James Orengo#KenyasChoice2022 pic.twitter.com/DFhgkBjAPH
— Citizen TV Kenya (@citizentvkenya) August 31, 2022
?s=20&t=8kWi3glD4pL8JzgA6gVIkwMore than 24hrs later, IEBC staff are still waiting for the Venezuela mercenaries to send them the keys to the IEBC servers. Njoro Wa Kamiti has addressed the media telling Chebukati that many Kenyans have been jailed for less crimes.
— Gabriel Oguda (@gabrieloguda) August 31, 2022
Justice Smokin Wanjala: Can the hackers change the physical Forms 34A being delivered by road to Bomas? pic.twitter.com/LkC7F22xVm
— Kenyans.co.ke (@Kenyans) August 31, 2022
Azimio is kaput and is waiting for Samoei's Kiboko. Kenya elections are primarily manual. I remember Chebukati saying, 'we are not relying on forms at the portal; we have to wait for returning officers with physical forms". After they arrived, all commissioners in good faith verified them; then they started tallying. When they reached around 80% tallying, Samoei Ruto shattered that sucker and hit 50%+1. That is when all hell broke loose right there. Wanjala, as the other sane judges knows the same!Justice Smokin Wanjala: Can the hackers change the physical Forms 34A being delivered by road to Bomas? pic.twitter.com/LkC7F22xVm
— Kenyans.co.ke (@Kenyans) August 31, 2022
Justice Smokin Wanjala: Can the hackers change the physical Forms 34A being delivered by road to Bomas? pic.twitter.com/LkC7F22xVm
— Kenyans.co.ke (@Kenyans) August 31, 2022
I read somewhere that Kiems kit emulated blockchain that is used by Bitcoin. In that both are designed to be irreversible and once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks and the consensus of the network.
I read somewhere that Kiems kit emulated blockchain that is used by Bitcoin. In that both are designed to be irreversible and once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks and the consensus of the network.
I read somewhere that Kiems kit emulated blockchain that is used by Bitcoin. In that both are designed to be irreversible and once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks and the consensus of the network.
I read somewhere that Kiems kit emulated blockchain that is used by Bitcoin. In that both are designed to be irreversible and once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks and the consensus of the network.
Oh really? I'll take that with a large dollop of salt thanks.
I read somewhere that Kiems kit emulated blockchain that is used by Bitcoin. In that both are designed to be irreversible and once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks and the consensus of the network.
Oh really? I'll take that with a large dollop of salt thanks.
Bro, don’t shoot me. I’m just an emissary. Please see the link below
https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3 (https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3)
I read somewhere that Kiems kit emulated blockchain that is used by Bitcoin. In that both are designed to be irreversible and once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks and the consensus of the network.
Oh really? I'll take that with a large dollop of salt thanks.
Bro, don’t shoot me. I’m just an emissary. Please see the link below
https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3 (https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3)
I read somewhere that Kiems kit emulated blockchain that is used by Bitcoin. In that both are designed to be irreversible and once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks and the consensus of the network.
Oh really? I'll take that with a large dollop of salt thanks.
Bro, don’t shoot me. I’m just an emissary. Please see the link below
https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3 (https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3)
Then it should even be easier and more reassuring to establish whether KIEMs transmitted data was interfered with or not. But you can only do that if given access to the files on KIEMs kits.
It isn't as easy as you make it seem. If there is clear evidence of voter fraud, hacking or tampering with voting machines, azimio needs to hire an accredited voting system testing lab to do a forensic audit of KIEB kits to make sure there was no vote manipulation, external or backdoor access or any other hackable workaround.
I read somewhere that Kiems kit emulated blockchain that is used by Bitcoin. In that both are designed to be irreversible and once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks and the consensus of the network.
Oh really? I'll take that with a large dollop of salt thanks.
Bro, don’t shoot me. I’m just an emissary. Please see the link below
https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3 (https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3)
I read somewhere that Kiems kit emulated blockchain that is used by Bitcoin. In that both are designed to be irreversible and once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks and the consensus of the network.
Oh really? I'll take that with a large dollop of salt thanks.
Bro, don’t shoot me. I’m just an emissary. Please see the link below
https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3 (https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3)
Then it should even be easier and more reassuring to establish whether KIEMs transmitted data was interfered with or not. But you can only do that if given access to the files on KIEMs kits.
I read somewhere that Kiems kit emulated blockchain that is used by Bitcoin. In that both are designed to be irreversible and once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks and the consensus of the network.
Oh really? I'll take that with a large dollop of salt thanks.
Bro, don’t shoot me. I’m just an emissary. Please see the link below
https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3 (https://www.forbes.com/sites/rufaskamau/2022/08/11/bitcoin-blockchain-inspires-kenyan-electoral-board-to-implement-a-transparent-voting-system/?sh=1280005a7eb3)
Then it should even be easier and more reassuring to establish whether KIEMs transmitted data was interfered with or not. But you can only do that if given access to the files on KIEMs kits.
They hacked the election and now pretending that the election was blockchain based and therefore unhackable. One of the Learned folks even claimed it was military grade. Jokes.