It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: StarsInDust
a reply to: digital01anarchy
I would disregard any of the new emails as not being valid at this point in time. Wikileaks has been acting strange in their twitter and website responses.
I have had this fear myself. I would be very cautious about what is coming out right now. Until I see an image of Julian with today’s newspaper. I think everything now could be suspect. Our own government may have even been the ones pretending to be Julian the other day during the cyber -attacks telling everyone to stop attacking our internet. So sad...
originally posted by: jedi_hamster
a reply to: IAMTAT
not that stupid kid again. i thought twitter has banned him already.
let's stay on topic, shall we?
Digital signatures are the public-key primitives of message authentication. In the physical world, it is common to use handwritten signatures on handwritten or typed messages. They are used to bind signatory to the message. Similarly, a digital signature is a technique that binds a person/entity to the digital data. This binding can be independently verified by receiver as well as any third party. Digital signature is a cryptographic value that is calculated from the data and a secret key known only by the signer. In real world, the receiver of message needs assurance that the message belongs to the sender and he should not be able to repudiate the origination of that message. This requirement is very crucial in business applications, since likelihood of a dispute over exchanged data is very high.
originally posted by: JacKatMtn
This article from the Daily Caller, in regards to the authenticity of the Wikileaks email pertaining to Donna Brazille, claims that through cryptography, it was determined to be authentic..
Now what they discuss in the article is WAY over my head, I was wondering if any more proficient in knowledge could verify, confirm or deny what is claimed in the article? If it is confirmed to be a tool to authenticate the WL emails, wouldn't that be of help?
dailycaller.com...
WikiLeaks staff examine all documents and label any suspicions of inauthenticity based on a forensic analysis of the document, means, motive and opportunity, cost of forgery, what the authoring organization claims and so on. We have become world leaders in this and have an enviable record: as far as can be determined, we have yet to make a mistake. This does not mean we will never make a mistake, but so far, our method is working and we have a reputation to protect.
originally posted by: JacKatMtn
Well I hope that this can be confirmed as a TOOL for folks with the skill, to authenticate any of the leaked emails that are important.. I have been a bit wary of WL since that 1hour twitter person surfaced, and perhaps this tool could be a hedge against any attempt to push FAKE/HOAX documents out of WL, should it be compromised by outside actors..