Posted on 03/29/2022 5:11:22 AM PDT by MtnClimber
The ongoing analysis of the hard drive of Hunter Biden’s laptop has revealed that there are multiple Department of Defense “encryption keys” on it. These keys allow access to DOD email accounts and databases. The exact number of these keys is still unknown. There may be dozens.
The keys are known more formally as “root encryption certificates." Some of them appear to have unusually long expiration dates with many lasting twenty years or more. Such keys should not be present on a personal laptop of any kind, and there is no known reason that Hunter Biden would be in possession of them at all.
The keys were discovered only recently by Jack Maxey’s technical team working in Switzerland. Shortly after the discovery of the keys Maxey contacted the U.S. Embassy in Switzerland and reported that he had information that might compromise American national security and would like to talk to someone in the Regional Security Office to report what he had learned. His contact information was taken by the person with whom he spoke, but no one has ever called back to obtain the information in his possession.
According to information provided to Maxey, DOD is now aware of the presence of the keys on the laptop’s hard drive, has determined that the keys were still active, and has taken steps to cancel them.
(Excerpt) Read more at andmagazine.substack.com ...
At least he kept it in the family ...
Almost?
2/3 or more of our Congress is on the enemies' payroll.
Lasting 3 more years is optimistic.
We may not last until the midterms.
The real question is just how did Hunter Biden obtain secure DOD encryption keys in the first place and why did they have such long expiration dates. It is not normal SOP to have encryption codes with such long lived expiration dates so they would have had to have been intentionally manufactured in very secure and secret process and then somehow provided to Hunter Biden who had no security clearance. Security procedures and likely espionage laws were broken in the process. These keys are literally the keys to the kingdom and they are supposed to be about as tightly controlled as anything in our defense system. What can an enemy do with encryption keys? Well, about a decade ago the Iranians obtained a Lockheed RQ-170thanks to the Obama administration. This was huge loss in US national security in many critical technologies. To accomplish this, the Iranians and whoever helped them needed classified system specifications, precise intelligence giving prior knowledge on the flight path so they would know where and when the hard to track stealth aircraft would be at certain locations as well as the encryption keys to access the data link system. Not saying Biden was responsible, but a similar Obama era inside job type security breach could have been responsible for the loss of the RQ -170
The keys were still active, and has taken steps to cancel them.
That’s like the sign on the fire riser AFTET THE FIRE IS OUT TURN WATER OFF
root certificates are by definition public information, and pretty much everyone has dozens of root certificates stored on their laptop: they’re the starting points that establish chains of trust that ultimately allow websites(e.g., amazon) and email servers (e.g., gmail) to prove that they are who they say they are and are not simply some rogue server spoofing that they are, for example, amazon or gmail, when in fact they are NOT amazon or gmail ...
whenever you see a link start with https instead of http, that means the public digital certificate trust infrastructure is used to verify authenticity and optionally to encrypt the data stream between the server and client program to prevent internet snooping ...
https://en.wikipedia.org/wiki/HTTPS
you can left click on the little lock symbol to the left of the link in the browser and follow the chain of trust certificates all the back to the root certificate ...
https://en.wikipedia.org/wiki/HTTPS
normally, programs like browsers and email clients automatically (and silently) install root certificates as needed, but anyone can manually install the DoD root certificates if they so desire; in fact, the DoD publishes instructions on how to do that:
https://militarycac.com/dodcerts.htm
however, there’s no real point to installing the certificates unless you expect to access some DoD website or email server and automatic installation failed ...
and their presence simply means someone TRIED to access a DoD server, including even just a home page without having necessarily gotten any further, e.g., an actual secure login of some type or other ...
OTOH, their presence could indicate that someone indeed had login access to information on a DoD server ... and THAT could be verified by inspecting saved login ids and passwords that browsers and email clients save ...
and finally, conflating root certificates with “encryption keys” that somehow grant “secret” access is the kind of ignorant garbage that ultra-far-right conspiracy websites thrive on ... notice how they double-quote “encryption keys” when they try to conflate that nonsense with root certificates?
You may be correct, however, we do not know exactly what sort of encryption keys are on the Biden lap top. If the DOD is concerned, I am too.
I saw somewhere a couple of days ago that these were basically just browser certificates. Not nearly the big deal that is being made.
There were also Joe Biden Intel Briefs that Hunter and others in the Biden family were copied on. No mention on classification, but I can’t imagine that they were unclassified.
I don’t know how old Hunter’s laptop is, but a recent government laptop I saw had an approximately two-inch-wide slot in the side and required a small card (with user’s photo on the one I saw) to be inserted to work.
Actually I’m the one who may have conflated the certificates with the keys. I’m not sure the article actually did that
Whatever the hardware key looks like, it’s like checking out a nuclear weapon. ID’s, signatures, countersignatures, a briefing on your responsibilities and the laws involved. If someone checked out that bit of hardware to you, you’d best be able to produce it when your “need” for it was over. Unless something really dastardly was done high up in politics it’s unlikely a non-government employee or direct contractor ever got ahold of such a device.
same reason hilary setup a private email server ,, to circumvent .gov rules and laws ..
“I’m not sure the article actually did that”
it wasn’t you, it was the article:
“The ongoing analysis of the hard drive of Hunter Biden’s laptop has revealed that there are multiple Department of Defense “encryption keys” on it. These keys allow access to DOD email accounts and databases. The exact number of these keys is still unknown. There may be dozens.
The keys are known more formally as “root encryption certificates.””
[AND multiple other garbage uber-right-wing-conspiracy websites promulgated the same deliberate ignorant conflation ... it was one of those echosphere reverberations that bounced around for a while]
“however, there’s no real point to installing the certificates unless you expect to access some DoD website”
I was in the military for 21 years and a DoD contractor for 20 years (now thankfully retired). I always had the DoD Root Certificates installed on my home computers during that time.
The key reason for running installroot on your home computer is to bypass the certificate error screen that most browsers have that shows up when you try to access a website that has an invalid or expired certificate (some of us OT FReepers will remember when the FR certificate expired a few years ago and so know what that screen looks like)
It used to be that DoD websites, even public-facing websites, would have their certificates based upon the DoD Root Certificate, not upon a commercially based Root like verisign.
“conflating root certificates with “encryption keys” that somehow grant “secret” access is the kind of ignorant garbage that ultra-far-right conspiracy websites thrive on”
Exactly so. And that’s the reason I mention this in the first place.
I was in the military for 21 years and a DoD contractor for 20 years (now thankfully retired). I always had the DoD Root Certificates installed on my home computers during that time.
Same here, from the time we got CAC cards in 2003 right up to today. Helps me get in VA, DFAS, DoD, etc.
thanks for the confirmation from an “insider” ... i saw your original post so thought you might appreciate someone else who knows the difference ...
Kind of.
If we had several states fraudulently send INCORRECT slates of electors, that is where the problem is. Yes, electors voted for Biden, but if they were there due to fraud, then what?
A super-secret DoD Encryption key that I happen to have on my phone 🤣🤣
in other words, a root Certificate. Note the 25 year expiration.
There is no Federal constitutional entitlement to be appointed as an Elector.
Appointment is a reserved power of State Legislatures, and only State Legislatures.
Given that there were 63 days between November 3, 2020 and January 6, 2021, and given that no State Legislature objected, or even raised a question, I would say that the persons who presented themselves as appointed Electors and voted had every right to have their votes counted, and for their choice to be sworn in.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.