WikiLeaks Verification and the Current Smear Campaign

Recently, a campaign has started smearing Julian Assange and Wikileaks accusing them of doctoring the Podesta and DNC emails.  This is untrue.  I am here to explain to you why and how they verify their sources as well as the documentation themselves.  Whenever the truth comes out about political parties they resort to trying to discredit sources that exposed their corruption.  This is what the MSM is currently doing to Wikileaks.  Once again, I repeat, there is absolutely no truth to their campaign.170106100659-wikileaks-logo-card-image-large-169.jpg

Wikileaks uses an email verification system called DKIM or Domain Keys Identified Mail, was used to verify emails from Podesta, the DNC, as well as Hillary Clinton. It is a highly regarded, sophisticated technological system.  According to wikileaks verification page:

DKIM was developed and is widely deployed as an email server anti-spam mechanism, including on Gmail.com and HillaryClinton.com. DKIM-enabled mail servers cryptographically sign the emails they relay so that the recipients’ mail servers can authenticate them. DKIM has the beneficial side-effect of causing messages to become “cryptographically non-repudiable”; that is after the email has been sent, the sender cannot credibly repudiate the message and say that it is a forgery. A DKIM mail server creates a cryptographically strong proof attesting to the authenticity of the email, which it adds to each of the headers of each email it sends. This cryptographic proof can then be tested by anyone who obtains a copy of the email.”

In other words, these emails are verified and were not doctored.  The only time WikiLeaks edits a document is for safety purposes such as the possibility of harm to an individual. In fact, WikiLeaks has a security measure to secure its anonymous sources and protect them as well.

Other documents are verified and are tested for their accuracy through technological means as well as the old-fashioned way by having journalists interview victims and go through files such as in the case of the Collateral Murder Video.  According to WikiLeaks About Page :

“We use traditional investigative journalism techniques as well as more modern technology-based methods. Typically we will do a forensic analysis of the document, determine the cost of forgery, means, motive, opportunity, the claims of the apparent authoring organization, and answer a set of other detailed questions about the document. We may also seek external verification of the document.”

Another current smear is that Wikileaks is an intelligence agency and Russian disinformation organization. Again, this is an attempt to discredit information Wikileaks and Julian Assange has released to the public. This has been going on since their very first release and is a blatant falsehood.

The definition of an intelligence agency according to Oxford dictionaries site is as follows:

A government department involved in the gathering of military or political information, especially in the interests of national security.

Wikileaks has no affiliation with any government or it’s agencies.  They are simply a publishing service that specifically releases leaked material.  The documents are never hacked by WikiLeaks employees but are instead sent to them through secure venues such as Tor.  Anything else you read about them should be vetted for accuracy through the WikiLeaks website WikiLeaks.org In fact, you should always vet anything you read online and verify the source of the information you are receiving for truth.

Also keep in mind, that in the 11 years WikiLeaks has existed they have never had to retract a story and have won all court cases that have challenged the authenticity of their documentation. wikileaks_large_by_bmmd-d37mr7a.png

 

If you have any questions, please feel free to ask or contact me at angelfoxmedia@gmail.com and I will get back to you with a response as soon as possible.

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s