Kao, Mattu and Mehrotra report, “To verify the emails’ authenticity, we used approaches that included cryptographic verification, metadata analysis and corroboration with external sources, such as public information and interviews with individuals involved. Digital security experts who reviewed our analyses called them solid and thorough.
“We analyzed industry-standard verification methods recorded in the header metadata of each email. Cryptographic checks verify that an email’s contents hadn’t been tampered with, while other checks assess an email’s chain of custody. Because common cryptographic checks hadn’t yet been widely adopted in the years when this account was most active, many older messages could not be reconfirmed cryptographically.
“For emails whose headers report the results of such checks, the ‘fail’ rate — or the portion of the emails that failed to validate for a type of check — was less than 1%. Manual review of those rare failures found no evidence of foul play.
“While it’s possible to modify header data, our analysis found no anachronistic methods of verification were used. In spot checks, provider-specific header formats matched their providers’ practices at the time. It would be difficult to generate such a large body of documents containing such consistent metadata and content spanning two decades.”
Read more here.
Bloomberg is looking for a driven reporter to break news in the structured finance markets,…
Danielle Abril, who covered tech at work for The Washington Post, was among the layoffs…
Sarah Ellison, who has been covering the media business for The Washington Post since 2017,…
Adam Roberts has been named foreign editor at The Economist. He is responsible for its coverage…
The Information has hired Laura Bratton as a reporter covering artificial intelligence applications and enterprise software. She…
David Mildenberg, the editor in chief of Business North Carolina, writes about the stories he…