Dominion is trying to hide their relationship with Solar Winds.
We reported yesterday that late Sunday night the Cybersecurity and Infrastructure Security Agency (CISA) issued a rare Emergency Directive 21-01, in response to a KNOWN COMPROMISE involving SolarWinds Orion products.
It turns out that Dominion was trying to hide the fact that they were connected with Solar Winds:
Dominion deleted the reference and link to “SolarWinds” from their website, but we have the archive still.
Now you see it… now you dont.https://t.co/oSdLXpWSJPhttps://t.co/JDWWFVfofr pic.twitter.com/NpuWdlS238
— Ron (@CodeMonkeyZ) December 15, 2020
One reader shared with us some thoughts about Solar Winds technology:
I work in IT and I am now left wondering if Solar Winds was used as a backdoor “jump host” to get into Dominion machines. If the machines each had a unique hostname and they were being connected to a central network it is a rational way to explain it. A “jumphost” is a server (which is very bad security practice, by the way) that contains all the hosts on a network with their hostnames and ip addresses so you can just “jump” to them or remote to them. If they did indeed put a backdoor in Solar Winds and connected these to a network, this is how they would do it: Solar Winds might be hacked to be a jumphost. I cannot say this is true for sure, but it is worth digging into. A “jumphost” is bad because it puts all your hosts and devices into one basket and if a hacker gets in there, you can only imagine what a nightmare they can create.
No wonder Dominion is trying to hide their connection to Solar Winds.
The post Dominion Voting Machines Are Trying to Hide Their Relationship with Solar Winds – Why’s That? appeared first on The Gateway Pundit.