Proof: Leak not Hack

th (2).jpg

I do my best to make original content for this blog which is why I rarely link to anything outside of it. I am breaking this rule today because this issue is too important. I shared a link yesterday to an article providing forensic proof that the DNC files were obtained via leaks and not by hacks. The main response I got is that the article was too complicated and difficult to understand which is a fair assessment. Like I mentioned however it is too important to leave it at that. I will try to explain the article in simpler terms today.  This is a link to the article forensic proof.

In short the article claims that the speed of transfer is too fast for it to have happened over the internet. It could only have happened if someone accessed it over a LAN. This means that it could not have been a hack, done over the internet, but a leak done in person.

Transfer Speed

When you transfer data from one device to another it is slower when you go through the internet than when you transfer it in person like from a flash drive. This is mainly because of two reasons. First when you transfer data over the internet there are multiple layers of connections you have to pass thru which slow down the connection. As opposed to having a flash drive where the only connection is in between the device and your computer.  Second if you’re using the internet to transfer data it like you are making a delivery thru a crowded highway. Other users are on the road and you are only as fast as the conditions of the road will allow. If you transfer data directly from one device to another it is like you are using a private highway.

Let me provide a real world example to make things clearer. When you download porn via torrent and you only have one seeder it is very slow. Your computer has to connect with his and the speed of transfer depends on the quality of both of your internet connections. If you were transferring from a flash drive then these factors would not matter.

The forensic analysts determined that the transfer rate was 23 MB/s. It could not have been done thru the internet especially when the hacking computer is supposed to have been located all the way in Romania. Check the link provided earlier for the exact methodology used.

Seth Rich

In response to this the left will try to make this all about the murder of Seth Rich. In our hearts Republicans know that Seth was murdered most likely by the Clintons. In the same vein we also know that proof for this will never be found. By making the conversation about the murder they can ignore all the evidence regarding the leaks.

In any case we now have scientific data driven evidence available to the public that the data was obtained from a leak and not a hack.

What evidence have you seen to show otherwise?

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s