In the last two parts of this essay, I discussed my thoughts on the veil protecting private inquiry from public scrutiny and I discussed the meaning of stolen e-mails made public. In this last part, I discuss my thoughts on the handling of conflicting data. Quotes extracted from the stolen […]