An exploit, known as the "reverse refraction" exploit has been discovered in the votifier public source code. It was created because the server lists wanted to increase performance, so servers now cache their votes in votifier, and when a vote is made, they return these cached votes to the server lists to be accounted for. It conceptually works by falsifying the vote count in that initial handshake packet, and then sending it to the server lists. This can allow for any number of votes, and I've chosen to make it 2x the number of votes that would be sent, every time the cache is loaded. These packets can be faked using the Votifier information (public key, ip, and port) and a custom application I have developed. If you wish to utalize this, please contact me.