Musk started tweeting the full Hunter Biden story

Discussion in 'Latest US & World News' started by Destroyer of illusions, Dec 3, 2022.

  1. Eleuthera

    Eleuthera Well-Known Member Donor

    Joined:
    Jun 13, 2015
    Messages:
    22,904
    Likes Received:
    11,859
    Trophy Points:
    113
    It's called "being in denial of reality", a human condition.
     
  2. dixon76710

    dixon76710 Well-Known Member

    Joined:
    Mar 9, 2010
    Messages:
    59,101
    Likes Received:
    4,600
    Trophy Points:
    113
    Yes. The FBI would prefer that it be kept hidden. It evidences their failure to enforce the law when democrats are concerned.
     
    USVet, ricmortis and ThatOneSecond like this.
  3. Nemesis

    Nemesis Well-Known Member

    Joined:
    May 29, 2012
    Messages:
    17,181
    Likes Received:
    9,496
    Trophy Points:
    113
    I always go to Twitter for hard-hitting "facts" and newsiness.
     
  4. Eleuthera

    Eleuthera Well-Known Member Donor

    Joined:
    Jun 13, 2015
    Messages:
    22,904
    Likes Received:
    11,859
    Trophy Points:
    113
    That's just you. Sleepy Joe and the DNC went to Twitter to achieve political goals in manipulating the public perception.
     
  5. Nemesis

    Nemesis Well-Known Member

    Joined:
    May 29, 2012
    Messages:
    17,181
    Likes Received:
    9,496
    Trophy Points:
    113
    Nobody but conspiracy theorists go to Twitter for "facts" and "reporting".

    *COUGH*you*COUGH*
     
  6. Aleksander Ulyanov

    Aleksander Ulyanov Well-Known Member

    Joined:
    Mar 9, 2013
    Messages:
    41,184
    Likes Received:
    16,184
    Trophy Points:
    113
    Gender:
    Male
    HOW are they confirming it? By what actual process do you determine that ANY record you find on ANY computer is genuine?

    If anything illegal has been found why hasn't he been arrested?

    This is all like hiring little kids to run up to your political rival shouting "Daddy, daddy"
     
    Nemesis likes this.
  7. Nemesis

    Nemesis Well-Known Member

    Joined:
    May 29, 2012
    Messages:
    17,181
    Likes Received:
    9,496
    Trophy Points:
    113
    Bbbbbbbbbbbbbbut it's been "confirmed"!

    "It" = ???
     
  8. ThatOneSecond

    ThatOneSecond Newly Registered

    Joined:
    Apr 1, 2021
    Messages:
    126
    Likes Received:
    51
    Trophy Points:
    28
    Gender:
    Male
    https://en.wikipedia.org/wiki/Computer_forensics

    You'll have to ask the corrupt DOJ about that.
     
  9. dixon76710

    dixon76710 Well-Known Member

    Joined:
    Mar 9, 2010
    Messages:
    59,101
    Likes Received:
    4,600
    Trophy Points:
    113
    Because they are Democrats of course.
     
  10. LibDave

    LibDave Newly Registered

    Joined:
    Sep 14, 2022
    Messages:
    604
    Likes Received:
    333
    Trophy Points:
    63
    Gender:
    Male
    There are numerous ways computers can be examined to determine authenticity. Utilizing a combination of several of these techniques together provides an even clearer picture regarding the evidence. As an example, Charge-Coupled Devices (CCD's) are devices which record video. Essentially you can think of them as a digital camera on a single chip. Like the camera on your phone, computer or dash cam, etc. All materials/particles have a fixed amount of binding energy. This Binding energy is a measure of the amount of energy necessary to free the valence electrons from the material. The energy contained in a single photon is proportional to its frequency. Mathematically, E = hf (referred to as Planck's relation). The energy of a photon (or any particle) is equal to the frequency multiplied by Planck's constant (a number which does not change). In simple terms, the higher the frequency the more energy a particle contains (and it is linear - follows a line). If you plot a graph of Energy vs Frequency the result will be a straight line. Valence electrons are "attached" to atomic nuclei by a fixed amount of attraction. If a particle (e.g., a photon) strikes an atom, the atom can absorb the energy of the photon, exciting a valence (i.e., outermost) electron to a higher orbit (i.e., greater distance from the nucleus). When the electron returns back to a lower orbit it releases some or all of the energy absorbed by the original photon in the form of 1 or more photons whose total energies will exactly equal the energy absorbed. In other words, energy is conserved (fixed amount).

    If the frequency of the photon is below the level needed to excite the electron to a larger orbit the atom will not absorb the electron at all. It will pass straight through the atom and continue on unaffected. If the energy of the incoming photon is above the binding energy of the electron it will free the electron completely from the atom (see photoelectric effect). This is the principle by which a simple photodiode/photodetector works. Examples are photodiodes on some new cars which turn on the lights at night when it doesn't detect sunlight, and photodiodes on your garage door opener which prevent the door from closing if something is blocking the light emitted by an LED across the opening of the garage. When the light strikes the surface electrons are "kicked" free of the atoms and are collected and detected by the presence of a small amount of current or voltage. CCD cameras are similar except instead of having a single photodetector they typically have millions of these photodetectors, all separated from one another in a rectangular grid. When a lens focuses an image onto this rectangular grid each photodetector (pixel) will receive light from a particular spot on the image. Each incoming photon will free an electron, increasing the voltage or current slightly. Subsequently measuring this voltage or current therefore indicates the amount of light present at that point on the image. Millions of these measurements can then be used to recreate the image. That's how CCD cameras work!!!

    Variances in the construction of these millions of photodetectors result in some of the detectors having slightly different characteristics. For instance, one detector might measure the amount of light as 163 while an adjacent detector might only read 161 for the same light intensity. But they are close enough to recreate an image of sufficient quality. Some of the pixels won't work at all due to errors in manufacturing. Modern CCD's have the ability to replace bad pixels by automatically averaging adjacent pixels. This is done at the time of manufacture. Each pixel is tested, and the digital detection circuitry is adjusted by the amount necessary to remove some of the variances due to manufacture of a particular pixel. But this isn't perfect, and each pixel will still exhibit slight differences in sensitivity. This serves as a fingerprint of sorts and an examination of the video can determine whether a particular device was used to create the image.

    Furthermore, inside the digitally stored files additional data is recorded which is unique to each device. Such as serial numbers of the camera, the username logged onto the computer at start-up, the date, time and location of the device when the image was recorded (all kinds of stuff). All such evidence taken as a whole identifies an image and authenticates the data. The images can be correlated to the camera on the device and also verified to be unaltered. Photoshopping even a portion of an image is readily apparent as that portion of the video won't match the fingerprint of the CCD pixel sensitivities. There are many different software applications which can be used to do just such an examination. Reportedly there are also stickers on the laptop which refer to the organization run by the Bidens and used to funnel much of the payoff money from various foreign governments. Hunter was in charge of this money as well as money received from various entities for which he lacked the skills to earn. The amounts were well in excess traditionally paid to someone with his training. Emails on the devices further contain discussions which possibly relate to money Hunter funneled to "the big guy" (presumably and reasonably referring to Joe Biden). Other audio recordings of discussions with family members have been leaked which reportedly include Hunter telling the family member he was having to give half of the money to Joe. Apparently, Hunter was in charge of the rest and had to use it for family related expenses, keeping some for himself. Of course, there should also be records of any financial transactions at the banks and other financial institutions which might further corroborate any payoffs.

    Regarding Hunter Biden's laptops there isn't one single laptop, there are four (maybe 5) devices in question so in some cases it may be necessary to distinguish between them. Several outlets have confirmed through multiple sources the devices/information are authentic. CNN, MSNBC, Fox, CNBC. The first to confirm their authenticity were the New York Times and the WP. They obtained confirmation from various sources (presumably the FBI) the devices/data have been confirmed as authentic. There is also signature evidence on the authorization forms at the computer shop, fingerprints from Hunter Biden himself on the device, and purchasing records indicating the devices were purchased by Hunter. There are also known to be numerous copies of the hard drives outside the possession of the FBI.

    As for the devices in question my understanding is the FBI has the laptop Hunter Biden left at the computer repair shop. Additionally, on previous occasions Hunter brought in 3-4 other devices (another laptop, a phone, a tablet and a notebook). Where these additional devices are is not unknown. The repairman states he doesn't know what happened to them. He may have disposed of them or sold them. He notified Hunter he could come get them and Hunter told him to keep them and use them for scrap if he wanted to as Hunter had no use for them. The reason it isn't clear as to how many is because it could be some journalists are referring to one of the devices by two different descriptions. For example, is it a tablet or a notebook or a palm pilot or all 3. The most reputable source is the owner of the computer repair shop who indicated 4 in total. One is the actual laptop (at the FBI), the other 3 are copies of the drives for these 3 other devices brought in by Hunter. At the time Hunter brought them in, he provided the passwords to log onto the devices so the guy would work on them. To avoid any mishaps the repairman's first step was to record the data on the drives and place it on his network in the event he accidentally deleted some of the data during the repair process. So, one piece of the evidence is Hunter's actual laptop, and the other evidence is copies of the drives stored on the network (and apparently numerous copies of the copies are known to exist). Republican senators have admitted to having copies of this data from all 4 devices in question. One such Senator attempted to submit a copy of this data for the Record during Congressional hearings and the Democratic Chairman of the Committee (Nadler) refused to allow it without stating a reason.

    Emails on the devices can and have also been retrieved and corroborated from the communication devices used by the recipients and originators of the emails to and from Hunters devices.

    Suffice it to say, the laptop and the additional data is real and authentic.
     
    Last edited: Dec 7, 2022
  11. Aleksander Ulyanov

    Aleksander Ulyanov Well-Known Member

    Joined:
    Mar 9, 2013
    Messages:
    41,184
    Likes Received:
    16,184
    Trophy Points:
    113
    Gender:
    Male
    Given all this why hasn't Hunter been arrested?

    And how did the computer repairman break the encryption?

    And if the computer had all this incriminating stuff on it but Hunter didn't even care enough to come get it then why didn't he just throw it away?

    And why was Hunter patronizing a computer repairman who sees himself as an arm of both law enforcement and the RNC?
     
    Last edited: Dec 7, 2022
  12. LibDave

    LibDave Newly Registered

    Joined:
    Sep 14, 2022
    Messages:
    604
    Likes Received:
    333
    Trophy Points:
    63
    Gender:
    Male
    Hunter hasn't been arrested because the FBI and the DOJ are evidently staffed by politically motivated agents in charge. It's the only viable conclusion one can come to unfortunately. With just the information on-hand it would be a simple cut-and-dried case even a first-year law student could prosecute. It is without question we now have Agencies which are not conducting themselves in an impartial manner. They have lost all integrity and serve only to promote their political leanings. This is indeed a very serious concern. These rogue agencies either need to be completely disbanded/replaced or gutted of the subversive agents who refuse to conduct themselves in accordance with their oath to the US Constitution. As a result, nothing they do and no evidence they collect in attacks on their political advisaries can be trusted. They are a rogue institution, acting outside the bounds of the Constitution. Simple as that.

    When Hunter brought the 4 devices in for repair the computer repairment asked for Hunter's passwords so he could work on the devices. It is a routine request and Hunter provided the passwords. Otherwise, there would be no way to work on them. Once the repairman had access to the devices there is no "encryption". It's just a matter of copying the data. It wasn't like Hunter was all that concerned with security. He was a major drug addict and didn't much concern himself with security. He even received and recorded phone calls on the devices, sent incriminating emails, did banking transactions. In quite a few cases leaks indicate he received replies warning him not to say certain things. In short, he was a loose cannon.

    As for why he didn't come get it you would have to ask Hunter. The obvious answer is once again, he is a major drug addict. After 6 months he had not returned to retrieve the devices. The repairman called him and told him he could come pick them up. According to an interview with the repairman he said, "Hunter said he had already purchased and was using other devices and no longer had a need for them. Just keep it and do whatever you want with it." After 6 months according to state law it then became property of the computer repair shop. It wasn't until the story leaks anyone realized the security breach. It was only then the FBI showed up to collect the laptop and even though it was the repairman's property he eagerly complied not wanting to get involved as people tend to show up dead.
     
    Last edited: Dec 7, 2022
  13. dixon76710

    dixon76710 Well-Known Member

    Joined:
    Mar 9, 2010
    Messages:
    59,101
    Likes Received:
    4,600
    Trophy Points:
    113
    He is a Democrat and his father is a Democratic politician, of course. Any arrest would be up to the FBI or DOJ, both working feverishly to suppress the story.
     
  14. Aleksander Ulyanov

    Aleksander Ulyanov Well-Known Member

    Joined:
    Mar 9, 2013
    Messages:
    41,184
    Likes Received:
    16,184
    Trophy Points:
    113
    Gender:
    Male
    And it couldn't be because no court in the world would prosecute based on "evidence" both easily faked and impossible to verify?

    RW do this constantly. You come in with EXPOSEs from Nutbar McQ's Blog of Absolute Fascist Truth (Hitler Did Nothing Wrong); and then go on about how the Congress isn't holding hearings where they subpoena the entire Knesset about the torture chambers in the PM's basement, and if they don't this it's absolute proof that the ZOG is in charge everywhere.
     
    Last edited: Dec 7, 2022
    bobobrazil likes this.
  15. Destroyer of illusions

    Destroyer of illusions Banned

    Joined:
    Aug 8, 2014
    Messages:
    16,104
    Likes Received:
    2,371
    Trophy Points:
    113
    I like it too. That's why I showed this screenshot. Don't forget - there are KGB agents around.
     
  16. Jolly Penguin

    Jolly Penguin Well-Known Member

    Joined:
    Jul 17, 2020
    Messages:
    8,499
    Likes Received:
    3,947
    Trophy Points:
    113
    Either way, if Twitter was repressing speech and covering stuff up, this is an interesting move to out it. Interesting PR relations strategy. Will it boost Twitter's image or diminish it?
     
  17. yabberefugee

    yabberefugee Well-Known Member Past Donor

    Joined:
    Feb 23, 2017
    Messages:
    20,802
    Likes Received:
    9,081
    Trophy Points:
    113
    Gender:
    Male
    and don't forget.....Hunter never denied the laptop.
     
    ThatOneSecond likes this.
  18. ToughTalk

    ToughTalk Well-Known Member

    Joined:
    Oct 31, 2018
    Messages:
    12,632
    Likes Received:
    9,580
    Trophy Points:
    113
    Gender:
    Male
    Twitter is just EXPOSURE to news stories and events. It's not journalism. What Elon is exposing is the DNC'S manipulation of twitter to control what stories got exposure and which ones didn't. It's no different then goggle burying search results and controlling what comes up first.

    And you and I both know that has an impact on perception and information and if you don't, then I can't help you.
     
  19. dixon76710

    dixon76710 Well-Known Member

    Joined:
    Mar 9, 2010
    Messages:
    59,101
    Likes Received:
    4,600
    Trophy Points:
    113
    ????? Well, the evidence that government suppressed the Laptop story comes from Twitter who helped them suppress it and the contents of the laptop comes from Hunters laptop. No blogs involved.
    And I know little of computers but you know nothing. Its very easy to authenticate its contents in a court of law. ANY expert who has examined the contents has confirmed its authenticity. It could easily be presented as evidence in a court of law. Thats why the FBI has worked so feverishly to suppress it. If the FBI who has the original drives and laptops in its possession believed it was fraudulent, they would proclaim its fabricatrion publicly. They know it authentic, thats why they instead went to Twitter with this BS that there was going to be a repeat of 2016 with another Russian hack and release of info, this time regarding Hunter. When in fact they had the laptop, knew Guiliani had a copy and knew the NY Post was about to release it.
    I give the Democrats the benefit of the doubt that they arent as dumb as a rock here and instead fully support their federal government engaged in purposeful disinformation campaigns to help democrats win elections. Whole heartedly support presidential candidates with a decades long history of government corruption to lead our nation.
     
    Last edited: Dec 10, 2022
  20. dixon76710

    dixon76710 Well-Known Member

    Joined:
    Mar 9, 2010
    Messages:
    59,101
    Likes Received:
    4,600
    Trophy Points:
    113
    More alarming is the FBI's collusion with the DNC to carry out the manipulation. An FBI under the Trump administration. Same FBI that sat on the laptop while Trump was being impeached over asking Ukraine to investigate Burisma and the Bidens. Same laptop that evidenced the corruption that needed to be investigated AND the evidence of Hunter and Joes efforts to kill the investigation.
     
    Bill Carson and ToughTalk like this.
  21. ToughTalk

    ToughTalk Well-Known Member

    Joined:
    Oct 31, 2018
    Messages:
    12,632
    Likes Received:
    9,580
    Trophy Points:
    113
    Gender:
    Male
    Yeah...hopefully we can sort out what the **** that's all about in 2024.
     
  22. Nemesis

    Nemesis Well-Known Member

    Joined:
    May 29, 2012
    Messages:
    17,181
    Likes Received:
    9,496
    Trophy Points:
    113
    And that would be on Twitter. *LOL*

    Only gullible tools don't take that "information" without a couple of salt licks.
     
    Last edited: Dec 10, 2022
  23. pitbull

    pitbull Banned Donor

    Joined:
    Jun 13, 2018
    Messages:
    6,149
    Likes Received:
    2,857
    Trophy Points:
    113
    Gender:
    Male
    Now Elon is also a Hunter fan. Why do so many see Hunter as a superstar? Just because his father is so famous? :(
     
  24. ToughTalk

    ToughTalk Well-Known Member

    Joined:
    Oct 31, 2018
    Messages:
    12,632
    Likes Received:
    9,580
    Trophy Points:
    113
    Gender:
    Male
    It's control of the information that's the problem. There is a reason why the DNC and the fbi colluded with twitter to silence right leaning talking points and headlines.
     
  25. Aleksander Ulyanov

    Aleksander Ulyanov Well-Known Member

    Joined:
    Mar 9, 2013
    Messages:
    41,184
    Likes Received:
    16,184
    Trophy Points:
    113
    Gender:
    Male
    I've never yet heard of UNCORROBORATED computer files being accepted in any court of law. Can you cite some? And since you seem to know how computer files can be authenticated and detected as being fakes (or not) can you tell us how that is done? Finally can you explain how since the FBI supposedly has ironclad evidence showing Hunter committing several serious felonies why they have refrained from arresting him?
     

Share This Page