101
Comments (5)
sorted by:
4
dataonly 4 points ago +4 / -0

Never was. Transfer times inconsistent w/ hack. These files were dumped locally to a portable device.

In my lunch group was telling them from day 1, that no way this was a russian hack. Furthermore, they could not have traced it.

1st rule of hacking: make it look like someone else did it

2nd rule: application or virus signatures that tie back to geographic areas are only good the first time you see them. After that, its public domain they would be used for deception.

W/ Tails op system and Tor browser, it is actually possible to walk into a public library, and boot a computer from a thumb drive. Run a set of instruction. Take the drive and leave. There would be no trace of any activity on the computer from which it originated.

But this was not a hack. It was a local transfer.

Now for the Podesta emails:

Again, not a hack. Pedesta was fished. His password was "password". He gave away his emails out of ignorance.

On Hillary's email server:

Again was not hacked. More than likely after your donation to the Clinton Foundation you were provided w/ a user account and privileges or they may have been dumb enough to allow root access. i.e. She was using her email server exclusively to allow foreign snooping in exchange for cash. That was the intent from the beginning.

3
Nerf 3 points ago +3 / -0

What was his name again?

3
CommonSense [S] 3 points ago +3 / -0

S

3
Pepega 3 points ago +3 / -0

E

3
dataonly 3 points ago +3 / -0

Hmm.

SETH RICH comes to mind