Skip to main content

陈刚这次是靠人民的力量赢的

 
发信人: ny19931026 (新生活), 信区: Military
标  题: 陈刚这次是靠人民的力量赢的,我们不应该只看到诬陷
发信站: BBS 未名空间站 (Sat Jan 15 10:38:18 2022, 美东)

你要看到事情的玄机,就是在美国,理论上谁都可以被搞

陈刚的所谓的exculpatory evidence,主要是两个,一个是MIT的工作人员,陈刚让把
国内的机构删掉,检察官认为他们拿到的这个邮件说明陈刚想隐藏,而这个工作人员澄
清说,目的不是要隐藏,而是因为不准确

采访这个人的时候,MIT的校长已经明确表示过对陈刚的支持了,这个人怎么说,都是
在学校律师的指导下说的

这种关于目的的,本来是应该到陪审团上争论的,因为谁也不知道陈刚脑子里到底想的
是什么

但一般这种隐藏一个可能对你不利的证据,是非常好的证明intent的证据,这个这些办
案人员都培训过,查你的通讯就是按这个标准去找

如果是个普通人,肯定没有用,因为会让你去跟陪审团解释去,你到底是什么目的

第二个,是能源部的负责基金申请的官员,被司法部采访,告知陈刚的基金不require
和中国关系的disclose

这个和孟晚舟事件一样,换了政府了,能源部属于拜登政府,这些能源部的人肯定对陈
刚的新闻有所了解,而且这种采访之前,能源部的受访者肯定和能源部的律师咨询过,
怎么说,是设定好的,至少能源部部长是肯定知会过的,并不是你以为的街头即兴采访

而且司法部在麻省的检察官也换队伍了,是拜登的appointee

这两个所谓的对陈刚有利的证据,很有力,但不是那么有力,检察官肯定可以把这个案
子推进到陪审团,之所以选择drop还是因为政治和舆论压力,这就是陈刚脱罪的原因,
不是因为他的innocence,他的innocence也不重要了,回到我开头说的,在美国,没有
谁是绝对的innocent,而是看你遇到了谁,谈论这个没有意义
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...