They noticed
Posted on: January 18, 2024 at 08:45:59 CT
JayHoaxH8r
MU
Posts:
70666
Member For:
25.34 yrs
Level:
User
M.O.B. Votes:
0
In March 2022, The Washington Post published the findings of two forensic information analysts it had retained to examine 217 gigabytes of data provided to the paper on a hard drive by Republican activist Jack Maxey, who represented that its contents came from the laptop. One of the analysts characterized the data as a "disaster" from a forensics standpoint. The analysts found that people other than Hunter Biden had repeatedly accessed and copied data for nearly three years; they also found evidence that people other than Hunter Biden had accessed and written files to the drive, both before and after the New York Post story.[4] In September 2020, someone created six new folders on the drive, including with the names "Biden Burisma", "Big Guy File", "Salacious Pics Package" and "Hunter. Burisma Documents". One of the analysts found evidence someone may have accessed the drive contents from a West Coast location days after The New York Post published their stories about the laptop.[4]
Using cryptographic signatures, one analyst verified that 1,828 of the roughly 129,000 emails on the drive came from the indicated email accounts of origin, suggesting they were authentic and had not been tampered with. The other analysis verified nearly 22,000 emails using similar methods, after overcoming technical issues the first analysis could not resolve. The analysts said emails from Burisma, where Pozharskyi was an advisor, were likely authentic but cautioned that if Burisma had been hacked, it would be possible for hackers to use stolen cryptographic signatures to forge emails that would pass as authentic. The New York Times reported in January 2020 that Russian military intelligence had hacked Burisma beginning in November 2019; a co-founder of the firm that discovered the hacking said Russians were stealing email credentials. Both analysts acknowledged that cryptographic signatures are not a perfect way to authenticate emails, as some email services do not implement the technology as rigorously as others. About 16,000 of the 22,000 emails carrying cryptographic signatures came via Google, which rigorously implements the technology. The analysts noted that cryptographic signatures can only verify that an email originated from a certain email account, but not who controlled that account; there are other means for hackers to commandeer email accounts. According to the Washington Post, "Some other emails on the drive that have been the foundation for previous news reports could not be verified because the messages lacked verifiable cryptographic signatures."[4]