{"id":68587,"date":"2016-10-25T06:45:24","date_gmt":"2016-10-25T10:45:24","guid":{"rendered":"http:\/\/valorguardians.com\/blog\/?p=68587"},"modified":"2016-11-02T14:31:35","modified_gmt":"2016-11-02T18:31:35","slug":"the-corruption-runs-deep","status":"publish","type":"post","link":"https:\/\/www.azuse.cloud\/?p=68587","title":{"rendered":"Yet More Falsehoods"},"content":{"rendered":"<p>Remember those claims by Clintoon supporters that you couldn\u2019t believe the Wikileaks emails?\u00a0 You know, especially those claims by DNC chief Donna Brazile that the <em><a href=\"http:\/\/www.foxnews.com\/politics\/2016\/10\/24\/tech-blogger-finds-proof-dnc-chiefs-emails-werent-doctored-despite-claims.html\">Wikileaks emails had been \u201cdoctored\u201d<\/a><\/em>?<\/p>\n<p>Well, looks like it\u2019s indeed time to raise the \u201cbullsh!t\u201d flag.\u00a0 But the reason <span style=\"text-decoration: underline;\">is not<\/span> because the emails have been \u201cdoctored\u201d.<\/p>\n<p>You see, the Clintoon email server \u201chillaryclinton.com\u201d that processed the email Brazille was specifically questioned about &#8211; the email where she stated that she\u2019d been slipped debate questions in advance and was passing one of them on to Clintoon &#8211; uses a verification process for outgoing email.\u00a0 The process it uses is an accepted industry standard called <em><a href=\"http:\/\/www.dkim.org\/\">DomainKeys Identified Mail, or DKIM<\/a><\/em>.<\/p>\n<p>DKIM verifies a given email\u2019s source using a digital signature, ensuring that it actually came from the host that purports to have sent it and isn\u2019t a fake from a spammer.\u00a0 A side benefit of such a digital signature is that the message\u2019s content is also verified \u2013 and any later alterations to that content can be readily detected.<\/p>\n<p>As noted in this article, <em><a href=\"http:\/\/blog.erratasec.com\/2016\/10\/yes-we-can-validate-wikileaks-emails.html\">the Brazile email in question checks out<\/a><\/em>.\u00a0 Its DKIM signature validates correctly; that means the email in fact came from the domain in question and <span style=\"text-decoration: underline;\">has not been altered<\/span>.<\/p>\n<p>Oopsie.<\/p>\n<p>Further: \u00a0<em><a href=\"https:\/\/protodave.com\/tools\/dkim-key-checker\/?selector=.default&amp;domain=hillaryclinton.com\">per this publicly-available tool<\/a><\/em>, the Clintoon email server \u201chillaryclinton.com\u201d which sent the Brazile email in question uses a 1024-bit RSA key.\u00a0 (To check that yourself, enter &#8220;google&#8221; in the selector field and &#8220;hillaryclinton.com&#8221; for the domain.)\u00a0 That in turn means it\u2019s not vulnerable to known feasible attacks on shorter RSA keys which might allow alteration without detection.<\/p>\n<p>Finally, Google hosts the \u201chillaryclinton.com\u201d email domain.\u00a0 They know a thing or two about security and key management.\u00a0 So a \u201clost private key\u201d claim (which might also allow alteration without detection) is likewise specious.<\/p>\n<p>In short:\u00a0 yeah, they\u2019re lying.\u00a0 Through their teeth.\u00a0 Yet again.\u00a0 And the press is aiding and abetting their lies.<\/p>\n<p>Surprised?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remember those claims by Clintoon supporters that you couldn\u2019t believe the Wikileaks emails?\u00a0 You know, especially &hellip; <a title=\"Yet More Falsehoods\" class=\"hm-read-more\" href=\"https:\/\/www.azuse.cloud\/?p=68587\"><span class=\"screen-reader-text\">Yet More Falsehoods<\/span>Read more<\/a><\/p>\n","protected":false},"author":623,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[220,47],"tags":[],"class_list":["post-68587","post","type-post","status-publish","format-standard","hentry","category-the-floggings-will-continue-until-morale-improves","category-liberals-suck"],"_links":{"self":[{"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=\/wp\/v2\/posts\/68587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=\/wp\/v2\/users\/623"}],"replies":[{"embeddable":true,"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=68587"}],"version-history":[{"count":0,"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=\/wp\/v2\/posts\/68587\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=68587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=68587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=68587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}