This list has discussed the complicated topic of cryptographic deniability a few times (what does it mean, pros, cons, does it even matter, etc) [1].
One recent data point - DKIM signatures being used to authenticate email leaks: http://dailycaller.com/2016/10/21/heres-cryptographic-proof-that-donna-brazile-is-wrong-wikileaks-emails-are-real/ http://blog.erratasec.com/2016/10/yes-we-can-validate-wikileaks-emails.html http://www.foxnews.com/politics/2016/10/24/tech-blogger-finds-proof-dnc-chiefs-emails-werent-doctored-despite-claims.html Trevor [1] https://moderncrypto.org/mail-archive/messaging/2014/#1173 _______________________________________________ Messaging mailing list Messaging@moderncrypto.org https://moderncrypto.org/mailman/listinfo/messaging