right, but 14 total accounts with the email address could be indicative of use. and if it was added, wouldn't there be logs from the companies records showing it isn't authentic?
It is proof someone attempted to login using those credentials. Likely, it was a phishing attack that went nowhere, so the person attempting the logins attempted multiple times, with slightly different credentials, revealing two passwords.
Additionally, the database has more podesta.com email addresses with passwords that are seen in wikileaks and in other sources, confirming that the phishing attacks seem to be working.
New John Podesta email addresses are there, including one at jpmchase.com.
Does it prove anything definitively? It's pretty close to definitive in some cases and, if you are a whistleblower or law enforcement, it is enough to discover new lines of inquiry and discovery. Like, if you need to file a subpoena.
For example, I had a subject in a court case where a PI told me they were operating with an alias to hide property. This Collection #1 leak allowed me to find this person's alternate email addresses because they used the same password for everything. As a result of this leak, I found where someone hid over $500k. If I need more info, as the case proceeds, I know which email services and accounts to submit subpoenas for.
I expect that was created to login, create a draft that is not sent, then a Podesta logs into the same address, reads the draft and leaves a reply. After the correspondence is read and replied to within the draft, the text is deleted, and the draft is deleted. The email is never sent so it cannot be traced. Used to be able to do the same in most web based email programs until they (Gmail) began saving the drafts making it less secure for clandestine messaging.
16288665? ago
Related discussion at https://voat.co/v/QRV/2987333
16288094? ago
https://www.dailymail.co.uk/sciencetech/article-3344341/Have-PWNED-Site-reveals-email-address-millions-leaked-recent-hacks-VTech-Adobe-Ashley-Madison.html
http://archive.fo/TFUOk
16288052? ago
http://archive.fo/DAMLW
16286984? ago
would this be considered quality enough investigation to be reported to fbi/doj?
16287700? ago
No. Because there's zero proof this email wasn't added later.
16287827? ago
right, but 14 total accounts with the email address could be indicative of use. and if it was added, wouldn't there be logs from the companies records showing it isn't authentic?
16286930? ago
lolz... clever. nice way to connect people
16286824? ago
Creative use of the site. Nice work.
16287067? ago
Credit goes to databaseanon. However, this is a simple proof to show people.
16287680? ago
How do you think this is a PROOF of anything?
16290606? ago
It is proof someone attempted to login using those credentials. Likely, it was a phishing attack that went nowhere, so the person attempting the logins attempted multiple times, with slightly different credentials, revealing two passwords.
Additionally, the database has more podesta.com email addresses with passwords that are seen in wikileaks and in other sources, confirming that the phishing attacks seem to be working.
New John Podesta email addresses are there, including one at jpmchase.com.
Does it prove anything definitively? It's pretty close to definitive in some cases and, if you are a whistleblower or law enforcement, it is enough to discover new lines of inquiry and discovery. Like, if you need to file a subpoena.
For example, I had a subject in a court case where a PI told me they were operating with an alias to hide property. This Collection #1 leak allowed me to find this person's alternate email addresses because they used the same password for everything. As a result of this leak, I found where someone hid over $500k. If I need more info, as the case proceeds, I know which email services and accounts to submit subpoenas for.
16286443? ago
I expect that was created to login, create a draft that is not sent, then a Podesta logs into the same address, reads the draft and leaves a reply. After the correspondence is read and replied to within the draft, the text is deleted, and the draft is deleted. The email is never sent so it cannot be traced. Used to be able to do the same in most web based email programs until they (Gmail) began saving the drafts making it less secure for clandestine messaging.
16287731? ago
The saving of the drafts is the only way it worked. You would delete it after you read it. But how else would it work?
And that speculation is just absolutely amazing.
16286327? ago
Nice catch