16288665? ago

Related discussion at https://voat.co/v/QRV/2987333

16286984? ago

would this be considered quality enough investigation to be reported to fbi/doj?

16287700? ago

No. Because there's zero proof this email wasn't added later.

16287827? ago

right, but 14 total accounts with the email address could be indicative of use. and if it was added, wouldn't there be logs from the companies records showing it isn't authentic?

16286930? ago

lolz... clever. nice way to connect people

16286824? ago

Creative use of the site. Nice work.

16287067? ago

Credit goes to databaseanon. However, this is a simple proof to show people.

16287680? ago

How do you think this is a PROOF of anything?

16290606? ago

It is proof someone attempted to login using those credentials. Likely, it was a phishing attack that went nowhere, so the person attempting the logins attempted multiple times, with slightly different credentials, revealing two passwords.

Additionally, the database has more podesta.com email addresses with passwords that are seen in wikileaks and in other sources, confirming that the phishing attacks seem to be working.

New John Podesta email addresses are there, including one at jpmchase.com.

Does it prove anything definitively? It's pretty close to definitive in some cases and, if you are a whistleblower or law enforcement, it is enough to discover new lines of inquiry and discovery. Like, if you need to file a subpoena.

For example, I had a subject in a court case where a PI told me they were operating with an alias to hide property. This Collection #1 leak allowed me to find this person's alternate email addresses because they used the same password for everything. As a result of this leak, I found where someone hid over $500k. If I need more info, as the case proceeds, I know which email services and accounts to submit subpoenas for.

16286443? ago

I expect that was created to login, create a draft that is not sent, then a Podesta logs into the same address, reads the draft and leaves a reply. After the correspondence is read and replied to within the draft, the text is deleted, and the draft is deleted. The email is never sent so it cannot be traced. Used to be able to do the same in most web based email programs until they (Gmail) began saving the drafts making it less secure for clandestine messaging.

16287731? ago

The saving of the drafts is the only way it worked. You would delete it after you read it. But how else would it work?

And that speculation is just absolutely amazing.

16286327? ago

Nice catch