When defense attorneys begin to challenge the provenance of GMail returns, talk to me. @joshtpm
-
-
Replying to @emptywheel @joshtpm
er .. the emails you have are plain text files. Explain to me how they can't be modified (wow)
1 reply 0 retweets 0 likes -
Replying to @agustin_hiponia
I'm not talking the emails I have. I'm talking the emails GMail still has. @N1ckFlynn
@joshtpm3 replies 0 retweets 0 likes -
Replying to @emptywheel
Oh, you are saying that Podesta or someone could provide originals to a news org to prove tampering?
1 reply 0 retweets 0 likes -
Replying to @SteveZiss0u
Yes. I've been saying that standards of legal process can be replicated. Which I said below.
1 reply 0 retweets 0 likes -
Replying to @emptywheel
Ok, that wasn't very clear to me at all (and I've been following the entire thread) - sorry for jumping your shit.
1 reply 0 retweets 0 likes -
Replying to @SteveZiss0u
Post leak it's very easy to tamper, no doubt. Point is w/credible ISP there's a verification trail that has been tested in courts
2 replies 0 retweets 1 like -
Replying to @emptywheel
The situation with Yahoo is more complicated, because it appears that hackers had totally compromised the entire site, AFAIK.
1 reply 0 retweets 0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.