Update
Only logged in members can reply and interact with the post.
Join SimilarWorlds for FREE »

Hunter Biden laptop ignored because of media 'conspiracy' to 'get rid' of Trump: Bill Maher

Washington Examiner

Real Time host Bill Maher accused the establishment media of a "conspiracy" to keep the Hunter Biden laptop story quiet until after the election — so they could "get rid" of former President Donald Trump.


"He's saying that's what they did, and that is what they did," Maher said. "They buried the Hunter Biden story before the election because they were, like, 'We can't risk having the election thrown to Trump. We'll tell them after the election.'"

"Is it OK to have a conspiracy to get rid of Trump," the host continued. "Look, let’s not pussyfoot around this — he was selling the influence of his father, Joe Biden. I mean, most political sons do, but let's not pretend at least that was going on."
This page is a permanent link to the reply below and its nested replies. See all post replies »
There are big big problems with the whole 'Hunter Biden laptop' story. The biggest problem has the legal name "chain of custody."

And if you know anything about forensics of Unix-derived operating systems, the missing log files are at least as large a problem.

Who all has touched that laptop since Hunter Biden allegedly dropped it off for repair? Republican activist Jack Maxey handed out several copies of the laptop hard drive to media organizations for analysis, and WashPost put some outside experts on it.
Among the reasons for the inconclusive findings was sloppy handling of the data, which damaged some records. The experts found the data had been repeatedly accessed and copied by people other than Hunter Biden over nearly three years. The MacBook itself is now in the hands of the FBI, which is investigating whether Hunter Biden properly reported income from business dealings.

Most of the data obtained by The Post lacks cryptographic features that would help experts make a reliable determination of authenticity, especially in a case where the original computer and its hard drive are not available for forensic examination. Other factors, such as emails that were only partially downloaded, also stymied the security experts’ efforts to verify content.
People who work as sysadmins all know that you can easily make a sector level copy of a drive using the 'dd' (drive duplicate) command. You can make as many copies as you like without modifying any file creation dates or access dates or anything else. If you want forensic evidence, don't EVER boot up or enter the file system!!

MacOS is derived from a BSD Unix spinoff called Mach, and like all Unix family OSs, it writes extensive log files of admin level activities.
Analysis was made significantly more difficult, both experts said, because the data had been handled repeatedly in a manner that deleted logs and other files that forensic experts use to establish a file’s authenticity.
Log files deleted. Really? Log files deleted?? Who would know how to do that and why??? Seriously, if you want to establish the validity of the laptop, deleted log files is a bigger problem than chain of custody.