Asking
Only logged in members can reply and interact with the post.
Join SimilarWorlds for FREE »

Anyone answer this?

Ask a Republican if Hunter should show up if he is subpoenaed by congress.

Then ask them why ?
This page is a permanent link to the reply below and its nested replies. See all post replies »
@Vin53 says [quote]The best part of this is that the GOP KNOWS that whatever is on this laptop of his has a chain of custody of about a dozen different handlers and locations. [/quote]
And it gets worse. Here's excerpts from a WaPo article - key phrase from the last paragraph: [i]"... because the data had been handled repeatedly in a manner that deleted logs and other files that forensic experts use to establish a file’s authenticity."[/i]
That's right, log files were deleted. Did someone modify the data and clumsily try cover their footprints? Can the "deleted" sectors still be found and read?? Whatever the case, handlers of the laptop along that chain of custody have some 'splainin' to do!

[b]https://www.washingtonpost.com/technology/2022/03/30/hunter-biden-laptop-data-examined/
[/b]
[quote][b]Here’s how The Post analyzed Hunter Biden’s laptop[/b]
Washington Post
March 30, 2022

Thousands of emails purportedly from the laptop computer of Hunter Biden, President Biden’s son, are authentic communications that can be verified through cryptographic signatures from Google and other technology companies, say two security experts who examined the data at the request of The Washington Post.

The verifiable emails are a small fraction of 217 gigabytes of data provided to The Post on a portable hard drive by Republican activist Jack Maxey. He said the contents of the portable drive originated from Hunter Biden’s MacBook Pro, which Hunter reportedly dropped off at a computer repair shop in Wilmington, Del., in April 2019 and never reclaimed.

. . .

Among the reasons for the inconclusive findings was sloppy handling of the data, which damaged some records. The experts found the data had been repeatedly accessed and copied by people other than Hunter Biden over nearly three years. The MacBook itself is now in the hands of the FBI, which is investigating whether Hunter Biden properly reported income from business dealings.


. . .

At The Post’s request, Matt Green, a Johns Hopkins University security researcher who specializes in cryptography, and Jake Williams, a forensics expert and former National Security Agency operative who once hacked the computers of foreign adversaries, separately examined two copies The Post made of the portable drive Maxey provided.

. . .

In their examinations, Green and Williams found evidence that people other than Hunter Biden had accessed the drive and written files to it, both before and after the initial stories in the New York Post and long after the laptop itself had been turned over to the FBI.

Maxey had alerted The Washington Post to this issue in advance, saying that others had accessed the data to examine its contents and make copies of files. But the lack of what experts call a “clean chain of custody” undermined Green’s and Williams’s ability to determine the authenticity of most of the drive’s contents.

. . .

Analysis was made significantly more difficult, both experts said, because the data had been handled repeatedly in a manner that deleted logs and other files that forensic experts use to establish a file’s authenticity. [/quote]