Technical Debunk — Peru 2026 First‑Round Fraud Narrative

During the first round of Peru’s 2026 presidential election, a viral narrative claimed that the alleged fraud happened not at the polling stations but inside the ONPE’s digital routing layer. The argument attempts to reinterpret normal HTTP behavior, private IP addressing, and load‑balancer logic as “forensic evidence” of a hidden vote‑manipulation pipeline.

The problem is simple: every technical claim in that narrative is based on a fundamental misunderstanding of how networks, load balancers, encryption, and backend segmentation actually work.
Below is a point‑by‑point breakdown of what the narrative says and why it collapses under technical scrutiny.


1. Claim: “The 302 redirect to SharePoint is a forensic sanitization maneuver to hide node 10.21.71.47.”

What they say:

They argue that the 302 redirect is a deliberate “mirror defense” designed to eject auditors from the internal gateway and hide the existence of node 10.21.71.47.

Why this is false:

  • A 302 redirect is the most common response a BigIP issues when a request:
    • lacks authentication tokens
    • violates an access policy
    • hits a protected virtual server
    • arrives without the expected headers or cookies
  • BigIP’s Access Policy Manager (APM) uses 302 redirects as part of its normal session‑validation workflow.
  • Redirecting unauthorized traffic to a public page is default behavior, not a concealment tactic.
  • 10.21.71.47 is an RFC1918 private IP. These addresses are never exposed publicly. Their inaccessibility is a security requirement, not evidence of a hidden system.

A 302 redirect is not a “forensic signal.” It is the most boring, standard behavior a load balancer can produce.


2. Claim: “Node 10.21.71.47 is an isolated ‘Black Box’ where 900,000 votes are filtered or altered.”

What they say:

They claim this internal node is a segregated computation silo where presidential votes are intercepted and modified before publication.

Why this is false:

  • Backend segmentation is mandatory in any secure architecture.
  • Private nodes like 10.21.71.47 typically host:
    • internal APIs
    • authentication services
    • logging systems
    • caching layers
    • monitoring agents
  • There is zero evidence that this node:
    • receives vote data
    • processes actas
    • performs tally computation
    • has access to electoral databases
  • Backend nodes are isolated precisely to prevent unauthorized access, not to hide manipulation.

Calling a private IP a “Black Box” is not analysis; it’s a misunderstanding of basic network design.


3. Claim: “BigIP’s behavior proves it is hiding the vote database.”

What they say:

They argue that because BigIP returns a 302 instead of a 403, it must be executing a special rule to hide the physical route to the alleged vote database.

Why this is false:

  • BigIP’s Local Traffic Manager (LTM) and Application Security Manager (ASM) frequently use redirects instead of 403s.
  • Reasons include:
    • session expiration
    • missing cookies
    • policy enforcement
    • fallback routing
  • A 302 is not a “cover‑up.” It is a session‑handling mechanism.
  • BigIP cannot “hide a database.” It only:
    • terminates TLS
    • enforces policies
    • routes traffic
    • applies WAF rules

The claim confuses reverse‑proxy behavior with intentional obfuscation.


4. Claim: “The 301 redirect proves a downgrade attack from HTTPS to HTTP to manipulate votes.”

What they say:

They claim the 301 redirect to an HTTP URL is an intentional downgrade attack to move auditors out of encrypted channels.

Why this is false:

  • A 301 redirect is used for:
    • URL restructuring
    • domain consolidation
    • legacy endpoint migration
  • The redirect affects only the browser, not the internal systems.
  • Internal vote transmission uses:
    • TLS termination inside BigIP
    • encrypted backend channels
    • private VLANs
    • non‑public APIs
  • No election system sends vote data through public HTTP endpoints.
  • A browser‑level redirect cannot downgrade internal backend encryption.

This claim confuses frontend redirection with backend cryptographic channels, which are completely separate.


5. Claim: “The 0.78‑second latency spike is proof of an internal algorithm filtering votes.”

What they say:

They argue that the redirect delay indicates BigIP consulted an internal node to decide whether to “expel” the request.

Why this is false:

  • Latency spikes occur due to:
    • WAF inspection
    • TCP retransmissions
    • DNS delays
    • backend health checks
    • congestion
    • TLS renegotiation
  • BigIP performs:
    • header normalization
    • signature checks
    • rate‑limiting evaluation
    • policy matching
  • Any of these can add 0.5–1.0 seconds.
  • There is no technical mechanism by which a redirect delay could indicate vote filtering.

Latency is not evidence of computation. It is evidence of network security doing its job.


6. Claim: “A middleware script overwrites presidential votes while leaving congressional votes intact.”

What they say:

They claim an interception layer analyzes each acta and zeroes out presidential votes while preserving congressional ones.

Why this is false:

  • Election systems use:
    • cryptographic signatures
    • hash chains
    • immutable logs
    • mirrored databases
    • cross‑audits
  • Any modification would break:
    • signature validation
    • hash integrity
    • reconciliation checks
    • external observer logs
  • Real‑time manipulation would require:
    • privileged access to multiple isolated systems
    • bypassing hardware security modules
    • altering redundant audit trails
  • No logs, packet captures, or system traces support the claim.

This scenario is technically impossible without leaving catastrophic forensic evidence.


7. Claim: “Redirecting to SharePoint breaks the digital chain of custody.”

What they say:

They argue that sending auditors to a Microsoft SharePoint page erases traceability of internal data flows.

Why this is false:

  • SharePoint is a fallback endpoint, not part of the election system.
  • A redirect does not interact with internal data.
  • Chain of custody is maintained through:
    • backend logs
    • database signatures
    • hash validation
    • redundant storage
  • Redirecting an unauthorized user has zero impact on internal audit trails.

This is a misunderstanding of what “chain of custody” means in digital systems.


Conclusion (Non‑Technical)

The entire narrative collapses because it takes normal, everyday behaviors of web servers and load balancers and reinterprets them as signs of fraud. Redirects, private IPs, latency spikes, and internal nodes are not suspicious—they are how modern infrastructure works everywhere. None of the claims show access to vote systems, none show manipulation, and none provide actual evidence. They are interpretations built on technical misunderstandings.


Technical Closing: Why This Narrative Works

This narrative spreads because most people do not work with:

  • load balancers
  • WAFs
  • TLS termination
  • backend segmentation
  • private IP routing
  • cryptographic validation
  • distributed logging

When someone presents normal infrastructure behavior as “forensic anomalies,” it sounds convincing to non‑experts.
But to anyone familiar with network engineering, the claims are not just incorrect—they are structurally impossible.