2022-05-21 21:49:32
The substack article below attempts to poke some holes in the Hunter Biden Emails (whether their arguments are sound or not I haven't yet formed an opinion on.)
I have said from the beginning that there were things that should have been done to guarantee authenticity of all "downstream copies" of the Hunter Biden laptop that were not done.
Specifically, the very first "pristine copy" taken by Mac Issac should have been "digitally signed" with a hashing algorithm (SHA-256 or similar) so that any subsequent copies could be verified against this original "signature" to prove they were identical copies.
This wasn't done, leaving the door open for "different versions of truth" regarding the Hunter Biden laptop files. Jack Maxey comes to mind.
Additionally, the email headers can (and many probably do) contain DKIM signatures. These can be used to verify that the body and certain key header fields are unaltered.
However, someone would have to painstakingly verify all of the DKIM signatures against the email bodies to make sure the emails were not altered. Not sure if anyone has done this, yet.
https://ddosecrets.substack.com/p/release-hunter-biden-emails-36-gb?s=r
6.5K views18:49