Hypothetical : if you hacked Hunter's emails why WOULDN'T you do deceitful things to a laptop to share the emails.
Suppose you hacked Hunter's emails and you want to share them to the public and you don't want to get into trouble for hacking Hunter's why wouldn't you get a laptop, download the emails onto the laptop and claim the laptop was a laptop that Hunter abandoned.
Suppose you hacked Hunter's emails and you want to share them to the public and you don't want to get into trouble for hacking Hunter's why wouldn't you get a laptop, download the emails onto the laptop and claim the laptop was a laptop that Hunter abandoned.