... I support the publication of the evidence. The furthest I'm willing to go is to have the evidence given for independent review to randomly selected computer scientists who may be required to sign a NDA. I have absolutely no interest in your "congressional investigation"....
I looked back a bit in the thread to find this, which seems to be fairly representative of the disagreements under current discussion. To respond, I decided to recover some text from my "post overflow" file (60,000 words and counting), which I created for the very many posts I end up deciding against for any one of several possible reasons.
***
Sorry to the RT apologists having fun, but while I cannot say much, I will say I have had (legal, mega-heavy NDA) access to the
full,
detailed technical specs for a typical modern telecom/ISP, including
all voice and data switching infrastructure (HW & SW) that is
required. Let's just say there are many mechanisms for tracking supposedly anonymous traffic: think of the internet as similar to a downtown urban environment, with cameras you can replay at will to see what happened where and when. Whereas encryption may mask content (and not always), the routing is there to be found, making senders almost as identifiable as receivers (with some diligence) by backtracking to the source ISP (nominally requires time requesting data and getting legal approvals for the whole routing chain). Beyond that I am guessing there are more things that can be done, but I cannot vouch for them. However, it would be trivial, say, to identify the hackers as having worked from a certain area of Moscow.
We then have the type of tools used, which may exhibit qualities that either flag them as part of a known toolkit, or as requiring significant resources. Finally, we have human intel that can involve sources within groups using such tools. For all three reasons, it is completely understandable why all of the information cannot be published. For the last two reasons, especially the last, it is clear why giving the information to, say, a group of computer scientists is not possible. Besides, putting together intel from disparate sources and working through the logic does involve a skill set that requires training or experience. It could still be true that there is amateurism involved in the accusations, so it is still wait and see, and/or go with what we've got. I personally don't think the intel is flawed, but rather than for a technical reason I cannot prove, for another: what it took for Comey's
Trump-gazing-in-awe FBI to come around on the topic of Russian hacking must have been
epically, arm-twistingly convincing.
As to the fave GOP meme (for public consumption) of the data release being a public service and no scandal,
the other shoe that has yet to drop is if any compromising information was
also found on GOP servers by the same group(s) and not released, making the entire operation transparently partisan. This, and not "good intentions," may be what has some Republican Senate leaders still pushing for hearings they can
control up front. Let's recall: this is the GOP of Abramoff fame, the Indian Affairs Bureau scandal, and myriad others, including
Reagan's record of 138 administration officials indicted. You know, the same, "honest" good ole boys who just tried to nix all effective oversight of their misdeeds.*
Oh, and Assange is an obvious shill with an agenda.
***
*I guess I wrote this the day after the Reps tried to kill the independent ethics committee. The reason I hesitated to post it in the first place is obvious: given my own forced lack of transparency, trust is the only basis for accepting the first point.