Chapter
Debate About Presidential Encouragement of Foreign Hacking
The speaker argues that it is intellectually dishonest to simplify the question of whether presidents should encourage foreign powers to hack their adversaries, referencing a previous president who allegedly did so. He also mentions the admission from the FBI about the authenticity of a laptop and Hunter Biden's files.
Clips
The FBI has confirmed that not only the laptop, but also the controversial Hunter Biden buying files found on it are real, shedding light on the alleged corruption of the Biden family.
40:43 - 42:10 (01:27)
Summary
The FBI has confirmed that not only the laptop, but also the controversial Hunter Biden buying files found on it are real, shedding light on the alleged corruption of the Biden family. This comes in contrast to past denials of Hunter Biden's connections to Ukrainian gas company Burisma by the mainstream media.
ChapterDebate About Presidential Encouragement of Foreign Hacking
EpisodeE107: The Twitter Files Parts 1-2: shadow banning, story suppression, interference & more
PodcastAll-In with Chamath, Jason, Sacks & Friedberg
The guest is attempting to ask a question regarding presidential candidates, but the host accuses them of being unable to let go of the 2016 election and avoids answering the question.
42:10 - 42:22 (00:12)
Summary
The guest is attempting to ask a question regarding presidential candidates, but the host accuses them of being unable to let go of the 2016 election and avoids answering the question.
ChapterDebate About Presidential Encouragement of Foreign Hacking
EpisodeE107: The Twitter Files Parts 1-2: shadow banning, story suppression, interference & more
PodcastAll-In with Chamath, Jason, Sacks & Friedberg
The speaker expresses disappointment over the refusal to answer a simple question on whether presidents should encourage foreign powers to hack their adversaries.
42:22 - 42:53 (00:30)
Summary
The speaker expresses disappointment over the refusal to answer a simple question on whether presidents should encourage foreign powers to hack their adversaries.