RE: lol is that what the Alachua Chronicle told you?
Posted on: November 2, 2022 at 08:16:18 CT
JayHoaxH8r
MU
Posts:
70666
Member For:
25.87 yrs
Level:
User
M.O.B. Votes:
0
Forensic analysis
In March 2022, The Washington Post published the findings of two forensic information analysts it had retained to examine 217 gigabytes of data provided to the paper on a hard drive by Republican activist Jack Maxey, who represented that its contents came from the laptop. One of the analysts characterized the data as a "disaster" from a forensics standpoint. The analysts found that people other than Hunter Biden had repeatedly accessed and copied data for nearly three years; they also found evidence that people other than Biden had accessed and written files to the drive, both before and after the New York Post story.[6] In September 2020, someone created six new folders on the drive, including with the names "Biden Burisma," "Big Guy File," "Salacious Pics Package" and "Hunter. Burisma Documents." One of the analysts found evidence someone may have accessed the drive contents from a West Coast location days after The New York Post published their stories about the laptop. [6]
Using cryptographic signatures to analyze the roughly 129,000 emails on the drive, one analysis was able to verify that 1,828 of the emails came from the indicated email accounts of origin, suggesting they were authentic and had not been tampered with; the other analysis was able to verify nearly 22,000 emails using similar methods, after overcoming technical issues the first analysis could not resolve. The analysts said emails from Burisma, where Pozharskyi was an advisor, were likely authentic, but cautioned that if Burisma had been hacked, it would be possible for hackers to use stolen cryptographic signatures to forge emails that would pass as authentic. The New York Times reported in January 2020 that Russian military intelligence had hacked Burisma beginning in November 2019; a co-founder of the firm that discovered the hacking said Russians were stealing email credentials. Both analysts acknowledged that cryptographic signatures are not a perfect way to authenticate emails, as some email services do not implement the technology as rigorously as others. About 16,000 of the 22,000 emails carrying cryptographic signatures came via Google, which rigorously implements the technology. The analysts noted that cryptographic signatures can only verify that an email originated from a certain email account, but not who controlled that account; there are other means for hackers to commandeer email accounts of others. According to the Washington Post, "Some other emails on the drive that have been the foundation for previous news reports could not be verified because the messages lacked verifiable cryptographic signatures." [6]
Among the emails that The Washington Post was able to authenticate was the Pozharskyi email that formed the basis of the New York Post's original article. An email referencing "10 held by H for the big guy?," an apparent reference to a rejected proposal to give Joe Biden a 10% share of a Chinese deal his son was negotiating, was not authenticated, though a recipient of the email publicly vouched for its authenticity.[6]
One of the analysts found that timestamps on documents and in operating system indexes matched, though he noted hackers could forge timestamps in undetectable ways. The analysts also noted that the drive had been handled in such a way that logs and other files used by forensic analysts to examine system activity had been repeatedly deleted. Neither analyst found evidence emails or other files had been manipulated by hackers, nor could they rule out that possibility.[6][53]
An analysis by Distributed Denial of Secrets of 128,755 emails allegedly copied from the laptop and circulated by allies and former staff of President Donald Trump showed "signs of tampering" including 145 modification dates and emails created more than a year after Hunter Biden had the laptop.[54][55] Matt Tait, a cybersecurity expert and former information security specialist for the U.K.’s Government Communications Headquarters, reviewed the analysis and said "it is clear the cache isn’t in its original form."[56]