Hacker News new | past | comments | ask | show | jobs | submit login

I would expect any half decent prosecutor to focus on how the emails were acquired when a verifiable DKIM signature is missing. Then the defense doesn't even need to bring that argument up, just challenge the provenance of the evidence.



Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: