re: #160 Charles
Actually, you can’t tell that they weren’t using some kind of version control from the stolen files. Those files were assembled deliberately by the thief, to cherry-pick the most damaging stuff.
I agree. Until we have the original data sets and original codes released and verified we are only speculating.
Any conclusions or “smoking gun” from the CRU hack is very premature and unreliable at this point. It will all need to be verified.