This is a subverse designed to encourage adult discussion spanning the entirety of the political spectrum. All are welcome, from Libertarians to Authoritarians, Democrats to Republicans, An Caps to Anarchists, Socialists to Fascists to Communists, Green, Blue, Black, White, Purple with Yellow Polka dots, whatever color, persuasion, or affiliation, this is a place for you to post your thoughts, articles, and engage in discussion meant to foster understanding.
Politics is best when we try to avoid personal attacks, limits on discussion, censorship, trolling, shilling, racism, homophobia, antisemitism, or any other forms of bigotry and malfeasance.
Election 2020 Politics Sticky
Politics 2017 Christmas Theme sticky
Nov 2016 sticky on new CSS
This subverse belongs to the community of users. Users are invited to post meta-threads about v/politics and I will gladly sticky them. @flyawayhigh
Use the "Report Spam" link to report spam and someone will review the report. J-mods have the ability to remove duplicate noncommercial spam.
v/politics is for all politics.
v/uspolitics is for US politics only.
v/worldpolitics is for international or non-US politics.
v/politicalnews is dedicated to virtually censor-free politics and news
v/news is for news around the world.
v/usnews is for domestic news only.
view the rest of the comments →
[–] LewsTherinTelamon 0 points 2 points 2 points (+2|-0) ago (edited ago)
In my very quick search the technical details I could find about the "evidence" that supposedly links Russia to this is here:
http://www.threatgeek.com/2016/06/dnc_update.html
Archive: https://archive.is/7DeYj
So, for the record the most conclusive evidence they have is what malware was used to exploit Clinton's server. As if malware can never be sold, or otherwise used by someone who did not create it. They say there are command and control IPs embedded in one of the malware payloads that are linked to known Russian hacking groups. But that doesn't prove much of anything. Malware can be sold or given away, or perhaps even used to stage things as if a specific group waged the attack. In all of those cases I could see how a command and control IP might be left in the payload. Whether to collect data for the seller/giver, or to implicate a specific team or person in the attack.
Personally I remain unconvinced. I would say there is still a great deal of room for the hacks to have come from anywhere.
Edit to add archive link.