Here you go (see comments to blog post) (my emphasis added):
Hey, they updated their blog post since september, great !
Let's start here:
Yes, collection of the first clintonemail.com certificate was performed in 2013. This certificate was issued by Network Solutions.
So they admit they didn't actually scan the server in 2009.
And, as surmised by me earlier, they don't actually have a time machine, and so didn't pull the cert until 2013, when they started this service they are
pimping selling in this blog post
So there "evidence" of what happened in 2009 is already pretty suspect.
Venafi TrustNet maintains a database of digital certificates going back over 10 years, including both self-signed and CA-issued certificates.
Good for them, except they didn't start scanning for themselves until 2013 ... so about this database ...
During this time, open source projects scanned the Internet and collected public data such as certificates. The first certificate for clintonemail.com in the TrustNet database was issued 29 March 2009 from Network Solutions.
OK, now we get to the nitty-gritty. They may be relying on the "
2012 Internet Census", or they may not. Who the **** knows,
because they didn't say !!!
They just say the
first certificate for clintonemail.com in the TrustNet database was issued 29 March
Which tells us
nothing about what was actually running on the server pre march 2009.
So assuming this Venafi employee is correct, this is strong evidence that Clinton's server was not using an X.509 certificate for proving identity nor doing encryption of communications. It's certainly possible that Clinton was sending and receiving encrypted emails, using, say PGP, but that it is rather onerous.
No, it's not evidence at all. Where is the evidence?
To paraphrase, his "evidence" is:
We used open source project scans to build our database, prior to 2013 , and that cert is the first one we have
Where is the actual port scan data ? the methodology ? Nope, nothing.
That's not evidence.
I think at this point it's extremely likely that Clinton had a very unsecure server for a couple of months. Worse, it's possible that when the certificate was finally installed, the private key could have been obtained by somebody who had already compromised the server. Thereafter, access to server communications would have remained open to whomever got a hold of that private key.
Of course you do. Especially since it's so difficult to use a self signed cert that
exchange 2007 does it OOTB for you, right ?
BTW, I wish people would use italics instead of quotes for things we are discussing, since quotes don't appear when replying, and i have to tediously cut and paste so we can see what we are discussing.