• TechyDad@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        Some of the data on the laptop was likely Hunter’s. Now, whether it originated on that laptop or whether it was added later to “prove it was his” is a different story.

        Similarly, the laptop could have been his, but the “let’s do illegal stuff” emails could have been added later (and backdated) in an attempt to “prove” that he did illegal things and that Joe Biden did as well.

    • 【J】【u】【s】【t】【Z】@lemmy.world
      link
      fedilink
      arrow-up
      6
      arrow-down
      1
      ·
      edit-2
      1 year ago

      Each side presents allegations and defenses publicly after due notice, as adversaries, before a neutral tribunal, and if the facts are genuinely in dispute after reasonable discovery, you put the evidence before a jury of our peers.

    • TechyDad@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      The truth is likely that the laptop wasn’t real, but some of the data was. It’s easy to grab some personal data from someone (say, via their actual computer after it’s been hacked) and then load it onto another laptop. Then you claim that this laptop was the actual source of the data and that it being abandoned gave you the right to look through it. (It doesn’t.)

      The must insidious part of this is that you could mix fake data alongside the real data. Got Hunter Biden nudes from your hacking? Toss them in an “email” that he was sending and then write up another email which “proves” that Joe Biden sold his position for personal profit. The nudes email can seem legit enough that it raises the believability of your “smoking gun” email.