I'm a data architect with almost 40 years experience in IT with a PhD and 2 Masters Degrees in Software Engineering and Computer Technology. They converted obviously plain text format Email messages to PDFs and some idiot tried to use the attributes of the PDF file to determine the origin.
Total and utter nonsense and stupidity. You're going to see a lot of bogus technical experts coming out with all kinds of stupid technical gibberish to fool the masses. It's nauseating and people like this should lose all of their certifications and credentials for doing it.
To answer your question more simply. No, the attributes of the PDFs have nothing to do with the veracity of the Email. That would be determined by the hashes in the raw message header which weren't extracted into the PDFs. Based on cross collaboration from other recipients of the Emails, the proof by message hash really is superfluous at this point.
I'm a data architect with almost 40 years experience in IT with a PhD and 2 Masters Degrees in Software Engineering and Computer Technology. They converted obviously plain text format Email messages to PDFs and some idiot tried to use the attributes of the PDF file to determine the origin.
Total and utter nonsense and stupidity. You're going to see a lot of bogus technical experts coming out with all kinds of stupid technical gibberish to fool the masses. It's nauseating and people like this should lose all of their certifications and credentials for doing it.
To answer your question more simply. No, the attributes of the PDFs have nothing to do with the veracity of the Email. That would be determined by the hashes in the raw message header which weren't extracted into the PDFs. Based on cross collaboration from other recipients of the Emails, the proof by message hash really is superfluous at this point.