I have been saying this all along. Without examples of this code in use, it's all up to the reader to interpret it at will. The code is the cornerstone of this investigation. If the cornerstone won't hold up under intense scrutiny, it serves no purpose to us.
I think we should post ALL the controversial emails and try to debunk one by one. If they stand heavy scrutiny, then it's probably code. The problem is: in most emails that are being talked about, some of them I don't think have code at all.
view the rest of the comments →
momadona ago
I have been saying this all along. Without examples of this code in use, it's all up to the reader to interpret it at will. The code is the cornerstone of this investigation. If the cornerstone won't hold up under intense scrutiny, it serves no purpose to us.
thezodiac ago
I think we should post ALL the controversial emails and try to debunk one by one. If they stand heavy scrutiny, then it's probably code. The problem is: in most emails that are being talked about, some of them I don't think have code at all.