Hacker News new | past | comments | ask | show | jobs | submit login

I am sorry you feel that way. I am struggling to see how I can bridge this gap.

This is the link verifying the “opportunities” email. It also explains DKIM issues with other emails.

https://github.com/robertdavidgraham/hunter-dkim

I am truly having trouble understanding how this is a conspiracy theory. The alternative seems to require a massive conspiracy involving foreign intelligence agencies planting false information with true information - I mean, you don’t doubt the pictures, right? Moreover, the “false” information is not anything groundbreaking, it’s almost all the same information already reported by mainstream outlets with a few new bits added. And they somehow convinced other correspondents on the emails to come forward and speak lies? publicly. How is this not conspiratorial thinking?

Do you approach Trump stories with the same level of skepticism? For example, how do we know the tax returns are real? Absolutely nobody has confirmed them except anonymous sources speaking to the NYT.




The 'opportunities' email itself means nothing, which is why this whole exercise is laughable. What is being questioned is the rest of the so-called email dump. Emails that actually suggest damaging claims and which would be worth looking into. How strange it is that people like you cannot seem to come up with answers on those. It is so easy do to, just provide the full emails so that we can all continue to see the content and context of the entire conversation.

I could easily send you an email from my gmail account asking if you have managed to get burn all of the films Epstein made of you and those little kids on his island. It too would have a valid DKIM signature. Now show me the follow up from Hunter, or even proof the message was actually seen by him. If an actual hard drive was possessed as claimed then this would be trivial. The fact that it is not available is damning in this case. As has been noted repeatedly in this case an equally likely source of this data is an iCloud hack for some pics and the known hack of Burisma a while back. Mix in some fake messages and then add useful idiots who are willing to believe anything if it supports their cause.

Thankfully this story will return to obscurity along with the partisan hacks trying to push it. It was a lame attempt at an 'October surprise', it was executed poorly, and thankfully this time the means of viral distribution of same was limited while everyone looked into the story and then had a good laugh.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: