I agree.Certainly a "good" copy coupled with some sharp scanning can get by me on line -- so I can't authenticate scans. But the inverse is not true -- I can detact a phony. Thus we can "inauthenticate" !