Emails are self-authenticating. They contain meta data which includes the IP addresses of every email server the email passed through, including the IP addresses of the sender, receiver, and everyone copied. You cannot falsify that data. It's in the routing tables and logs of the email servers. To view this data yourself, save an email to your desktop and change the file extension to TXT, which is a plain text file. The text file shows you all this meta data and the IP addresses. I did this with Hunter Biden's emails to authenticate them. This is why Podesta and Hunter Biden could never claim their emails were fake.
Ask them what DKIM is. If they don't know, you say, "it's how google knows that the emails are legit...its called domain keys....it uses crypto to verify emails. Don't you trust the math, silly faggot?" Then punch them in the face until they explode into coins and exclaim, "mathematical!"
Emails are self-authenticating. They contain meta data which includes the IP addresses of every email server the email passed through, including the IP addresses of the sender, receiver, and everyone copied. You cannot falsify that data. It's in the routing tables and logs of the email servers. To view this data yourself, save an email to your desktop and change the file extension to TXT, which is a plain text file. The text file shows you all this meta data and the IP addresses. I did this with Hunter Biden's emails to authenticate them. This is why Podesta and Hunter Biden could never claim their emails were fake.
literally said this to my 1head friends and they said anything can be faked, no matter what evidence there is they just wont believe it
Ask them what DKIM is. If they don't know, you say, "it's how google knows that the emails are legit...its called domain keys....it uses crypto to verify emails. Don't you trust the math, silly faggot?" Then punch them in the face until they explode into coins and exclaim, "mathematical!"
This.