While the term cyber symposium does not roll off the lips, it does define the crux of this event.
If Mike can make good his brags, we’ll see the science of who stole the November 3, 2020, election via the Internet and other means.
Could Lindell hand us a turning point? With so much big tech suppression, it is hard to say, but one thing is for sure, America was and continues to be attacked by enemies internal and external alike.
Nonetheless, the current ‘official’ corporate communist narrative is that the disenfranchised are a delusional minority and this propaganda has been effective in keeping the disenfranchised on back foot. Hence, they are mercilessly mocked by the left, Big Tech and the corporate communist media.
This propaganda begs a fundamental question. Could Lindell’s symposium play a role in removing a pretender from the While House? That’s hard to say, although Lindell has offered a five million dollar prize to anyone who can successfully attack the credibility of his data.
Nonetheless, one thing is sure; Lindell could deal a massive body blow to the delusional minority propaganda narrative. That we are a hopelessly stupid, disenfranchised minority, which brings us the crux of the matter.
On November 3, 2020, America was attacked by enemies internal and external alike. Since then, the ‘official’ corporate communist narrative is that the majority voted for Biden and that the “matter has been decided.”
The Matter Has Been Decided
Shortly after Lindell first announced his symposium, I’ve been talking with as many people as I can in public settings. Those on the left immediately parrot the official narrative, “the election has been decided.” This is how liberals justify leading America face first down a socialist iceberg into an abyss of corporate communism?
After dealing with this abyss a few times, I got an idea and tested it out on a liberal diehard. He’s a retired senior who likes to work as a volunteer greeter at the local YMCA where I swim. A nice fellow.
I told him about the symposium, and he shot back, “Oh that,” with a cocky smile. “It’s already been decided.”
Then I asked him, “Where in the law does it say that?”
He shrugged his shoulders and repeated, “It’s already been decided.” How odd that he didn’t know how our Constitution works. If you can steal an election and keep it, you own the country and like or lump it, that’s the law (or what’s left of it.)
It was time to change the line of questioning, and I asked, “If I stole your vote, how would you feel about it?”
He said he would be very upset but then added, “But it’s already been decided.”
Unimpressed by his lack of critical thinking, I asked, “Can you show me scientific proof that the election was free and fair.”
Again he said, “It’s already been decided,” with a smug smile.
I shot back with, “So you have no proof or science of anything. All you’ve got is an opinion.”
This wiped the happy greeting grin off his face, and he stared back at me with cynical eyes.
“Let’s see,” I observed, “You have no proof, no evidence or law to back you up. Obviously, you believe the Vote Fairy.”
After the vote fairy jab, he looked as though I’d just slapped him upside the face with a dead salmon, and being out of happy bullshit; he stopped talking.
That was the end of the conversation, but I would venture to say, mocking him as someone who believes in the Vote Fairy left a mark. So there you go folks – hope fairy is a great comeback line for liberal sophistry.
Tell them they believe in the Vote Fairy and have some fun. Do it quietly and do it often.
Nonetheless, my biggest concern with Lindell’s symposium is that we live in a click-bait world. When we are not entirely engrossed, plenty of entertaining distractions are placed before us to explore. Therefore, I fear the most susceptible to distraction will be computer illiterates.
Will Computer Illiterates Tolerate the Vote Fairy?
Complexity is a genuine concern, and the technical aspects could be too deep and difficult to understand for many. When hosting Zoom conferences, I often encounter this when working with seniors who cannot get their audio and video settings configured. They often go the whack em route out of frustration, which only gums things up good and proper.
To get things working again, I often ask a simple question. “Is there a ten-year-old in the house? You may think I’m joking, but I’m not.
If there is no child in the house, the question is a humorous ice breaker that helps me to work with frustrated seniors.
However, if a grandchild is in the home and is willing to help, getting the wheels on the wagon is a snap. I’ve done this many times, and these kids simply amaze me. I tell them what is needed, and it gets done fast to everyone’s amazement – without hours of hold music.
So, for you disenfranchised, including whack em all seniors and other computer illiterates at large, there are three basic terms you need to know, so let’s briefly cover them.
Three Critical Terms You Need to Know
What Lindell and his experts will be dissecting are data packets, so let’s define this and two related data tools in simple terms.
When we load a download a page from the Internet, many often think of them as whole objects. That being, the complete page is stored and transmitted intact, which is wrong.
Instead, the Internet sends information using a series of small data packets, each of which is divided into two parts: the header and the message.
An excellent way to imagine the pages, videos, audios, and so forth on the Internet is as pearl necklaces. Let’s use email as an example.
When n you send an email to a friend, a whole necklace is not what will arrive at their end. This is because to get content to its destination; the Internet must deconstruct the necklace and then transmit each pearl separately.
In this case, each pearl is a unique data packet and when the pearls arrive at your friend’s computer, the information stored in the data packet header tells it how to reassemble the pearls back into an authentic copy of the original necklace.
All this is possible thanks to two essential pieces of information in the data packet header: IP Address and MAC Address.
Internet Protocol (IP) Address
The Internet Protocol (IP) address is like the license plates on your car, which tell the police about who owns and operates the vehicle.
In essence, your license plate is your vehicle’s point of origin, and if you do not have current plates, you cannot operate on any public roads.
Similarly, an IP address tells your computer where the data packet originated and its designated destination. However, that is only one-half of the story. The other half of the story is about the vehicle itself.
MAC (Media Access Control) Address
The MAC address is like the VIN number on your car. Unlike a license plate, the VIN is about the hardware and not its owner. The MAC address is permanently assigned to the device, unlike license plates that can change with ownership and residence.
When you email your friend, both the send and receive devices use a unique MAC address to identify them, regardless of type. Ergo, every smartphone, tablet, laptop, computer, etc., has an individual MAC address assigned to it by the manufacturer.
When you go to a repair shot, they’ll look for the VIN number, which will be stamped on major components such as the engine and transmission. They know that no matter what the IP address is, the MAC address for your vehicle will never change.
Ergo, if you sell your laptop to a friend, the IP address will change with location, but not the MAC address, which is permanent. So how do these dots connect?
Connecting the Dots
When watching the symposium, remember three things. A pearl necklace is comprised of a string of pearls, and each pearl is a separate data packet.
What your computer receives and are handfuls of unstrung pearls. A the receiving computer uses the address information in the data packet header to restring a necklace in its proper sequence. Hence, each data packet has header information like your vehicle’s license plate, which says where it comes from and who owns it. That’s the IP address.
Furthermore, each data packet also contains machine-specific information using a MAC address. Like a VIN stamped on your vehicle, it is permanently unique to that device.
Used together, the IP address and MAC address in the header of each data packet contains a wealth of detailed pinpoint information. Now how does this work with Lindell’s cybersecurity experts?
They have captured images of every data packet sent and received by Dominion systems during the election, along with who sent them and from where right down to the actual computer used. Folks, this is solid data which is why Lindell is offering five million dollars to anyone who can prove he and his experts are spoofing the date.
So there it is. No matter what the talk about in this symposium, it all essentially comes down to a strings of pearls, license plates, and VIN numbers.
And to all of you whack em all seniors, if you keep these simple images in mind, I guarantee that you will be able to explain the meaning of all this to your grandchildren – after they fix your computer.