Michael Best, @NatSecGeek, posted release 19 of the Clinton/Podesta emails at: https://archive.org/details/PodestaEmailszipped today.
A total of 1518 emails, zero (0) of which broke my script!
Three hundred and sixty-three were DKIM verified! DKIM-verified-podesta-19.txt.gz.
The full set of emails, verified and not: DKIM-complete-podesta-19.txt.gz.
I’m still pondering how to best organize the DKIM verified material for access.
I could segregate “verified” emails for indexing. So any “hits” from those searches are from “verified” emails?
Ditto for indexing only attachments of “verified” emails.
What about a graph constructed solely from “verified” emails?
Or should I make verified a property of the emails as nodes? Reasoning that aside from exploring the email importation in Gephi 8.2, it would not be that much more difficult to build node and adjacency lists from the raw emails.
Thoughts/suggestions?
Serious request for help.
Like Gollum, I know what I keep in my pockets, but I have no idea what other people keep in theirs.
What would make this data useful to you?