Yes. This is useful information, and from what appears to be a reliable source. Thank you for posting it!
By 'hack theory', are you referring to Cannon's theory that someone utilized the yFrog exploit to cause the tweet to be sent, or are you referring to a different theory?
Sorry for being unclear, the 'yfrog hack theory.'
My understanding is that technically using the yFrog exploit is not hacking. On the other hand hacking is a term which a lot of us who are not all that tech savvy (such as me) use carelessly as a sort of generic catch-all for anything of this sort.
If you are referring to Cannon's theory, could you explain to me how the tweet coming from someone using TweetDeck rules out the possibility that someone other than Weiner used TweetDeck when utilizing the exploit? I'm not aware of anyone stating the exploit wouldn't work for someone who had been using TweetDeck, so I don't see how this information affects Cannon's theory at all.
But I am not tech savvy. If there is a reason why this affects Cannon's theory, I'd like to understand it. The more things which can be ruled out, the sooner we are likely to get to the truth.
Well, I did leave open that it does not prima facie rule out that his twitter and FB accounts were hacked, as claimed.
The following things undermine (in my opinion) Cannon, while not necessarily conclusively proving the chain of events:
Cannon originally stated:
http://cannonfire.blogspot.com/2011/06/one-last-post-for-this-day-about.html
"From those words, Gooding thinks that he has proof that Weiner changed all of his usual Twitter habits and used an app called Tweetdeck. Unbelievable!"
Well, it does appear that the hockey tweet Weiner admitted to came from tweetdeck. So unbelievable ? I guess not.
Here cannon says:
http://cannonfire.blogspot.com/2011/06/mystery-attacker-exposed-meet-mighty.html
"When Weiner got started on Twitter, the only app for the Blackberry that sent pics is something called Twitterberry -- ye gods, what a puerile name! And that app appends the words "from Twitterberry" to the messages. We can't see those words anywhere in Weiner's twitterings."
Which is untrue. The twitter for blackberry app uses yfrog, and does not require a yfrog account to be created.
Cannon also claims:
"Well, that presupposition is wrong. Weiner had sent images via his Blackberry on previous occasions. He had to have established a Yfrog account at some point, because you can't use Tweetdeck on a Blackberry."
Well, guess what - Weiner has an ipad2. And you
can use tweetdeck on it.
I guess the most damning thing in my mind against Weiners twitter account being hacked is the fact that he sent the picture 5 mintutes
prior to the hockey tweet. Both using tweetdeck. It seems rather prescient of the wolfe et al to use tweetdeck to send the picture and then have Weiner use tweetdeck 5 minutes later to send the hockey tweet , when he had a history of using twitter.com and twitter for blackberry prior to this.
ETA: Sorry if I perhaps missed the main question - the 'hack' involves only yfrog - if the post was sent from tweetdeck (as I linked), the only way it would have been sent is with tweetdeck - that rules out the yfrog exploit, as the twitter api would not have sent the 'tweetdeck' information ... meaning it *had(* to be sent from tweetdeck.
Also, having Wolfe using tweetdeck requires that Wolfe has Weiners twitter password. If he has the twitter password, I would think he could do better than just the picture ... a nice tweet to go along with it would be more damaging. Again ... speculation on my part. Also it requires Wolfe to have the picture to send along. Since we can't verify whether it's Weiner - it's just more speculation based on Weiners non-denial. So both of these points aren't hard evidence of anything, but they do help understand the potential scenarios, I think.
How is the following for a simple and believable scenario that accounts for everything we know from Weiner so far:
How is this for a scenario:
1) Weiner installs tweetdeck on his new ipad 2.
2) He is sitting around in his underwear getting ready or actually watching his tivo'ed hockey game
3) He is playing with his ipad while watching the hockey game, and uses the rear camera ( which btw, tacks 800x600 resolution photos, same res as the photo in question) and aims it downstream and snaps the alleged pic
4) thinking he is tweeting a pic just to the girl, he sends it
5) he then tweets about the tivo eating his hockey game
6) he then looks at his twitter stream and realizes the pic went to his public twitter stream
7) he tweets that his twitter and FB are hacked, his toaster is still loyal - and deletes all his yfrog pictures.
OK - so this above
SPECULATION. But it fits the evidence, and does not add all kinds of weird conspiracy nonsense.
As to wolfe et al - maybe there is something hinky going on there, It certainly seems that he was 'stalking' weiner, and had some interesting insights into what was going to happen.
As to Betty and Veronica ... I have to give more attention to reviewing their statements - but I was struck on my initial reading of the mothers statement that I hope she is an attorney, because it struck me as an overly detailed and well written missive to be coming from some random girls mother.