er .. the emails you have are plain text files. Explain to me how they can't be modified (wow)
When defense attorneys begin to challenge the provenance of GMail returns, talk to me. @joshtpm
-
-
-
I'm not talking the emails I have. I'm talking the emails GMail still has. @N1ckFlynn
@joshtpm -
Oh, you are saying that Podesta or someone could provide originals to a news org to prove tampering?
-
Yes. I've been saying that standards of legal process can be replicated. Which I said below.
-
Ok, that wasn't very clear to me at all (and I've been following the entire thread) - sorry for jumping your shit.
-
Post leak it's very easy to tamper, no doubt. Point is w/credible ISP there's a verification trail that has been tested in courts
-
The situation with Yahoo is more complicated, because it appears that hackers had totally compromised the entire site, AFAIK.
-
Agree.
End of conversation
New conversation -
-
-
I assume when GMails accounts are used in court, there is a chain of custody from GMail to the attorneys. Not the same.
-
Actually, what I am suggesting IS that chain of custody. NOT post hack.
@joshtpm
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.