That was a rhetorical "scream," not directed to you personally (I am not here to attack anyone). And while I know enough about the DKIM process to wade my way through some of the emails capable of verification, I would want to work with others geared more tech-savvy towards the same goal. My point, though, is that we should actually assume that the information IS reliable for purposes of researching it, because the evidence more strongly suggests that it is reliable when looked at objectively. In the end, before people run to the press with the "smoking gun" in their hands, we want to do more verification, but we will only ever find that smoking gun if people still dive in and research this stuff. Cries of "don't download the insurance file, Wikileaks is compromised" doesn't help anyone except the establishment.
view the rest of the comments →
checksandbalances ago
That was a rhetorical "scream," not directed to you personally (I am not here to attack anyone). And while I know enough about the DKIM process to wade my way through some of the emails capable of verification, I would want to work with others geared more tech-savvy towards the same goal. My point, though, is that we should actually assume that the information IS reliable for purposes of researching it, because the evidence more strongly suggests that it is reliable when looked at objectively. In the end, before people run to the press with the "smoking gun" in their hands, we want to do more verification, but we will only ever find that smoking gun if people still dive in and research this stuff. Cries of "don't download the insurance file, Wikileaks is compromised" doesn't help anyone except the establishment.