this post was submitted on 20 Dec 2024
951 points (95.0% liked)

Lemmy Shitpost

27169 readers
3189 users here now

Welcome to Lemmy Shitpost. Here you can shitpost to your hearts content.

Anything and everything goes. Memes, Jokes, Vents and Banter. Though we still have to comply with lemmy.world instance rules. So behave!


Rules:

1. Be Respectful


Refrain from using harmful language pertaining to a protected characteristic: e.g. race, gender, sexuality, disability or religion.

Refrain from being argumentative when responding or commenting to posts/replies. Personal attacks are not welcome here.

...


2. No Illegal Content


Content that violates the law. Any post/comment found to be in breach of common law will be removed and given to the authorities if required.

That means:

-No promoting violence/threats against any individuals

-No CSA content or Revenge Porn

-No sharing private/personal information (Doxxing)

...


3. No Spam


Posting the same post, no matter the intent is against the rules.

-If you have posted content, please refrain from re-posting said content within this community.

-Do not spam posts with intent to harass, annoy, bully, advertise, scam or harm this community.

-No posting Scams/Advertisements/Phishing Links/IP Grabbers

-No Bots, Bots will be banned from the community.

...


4. No Porn/ExplicitContent


-Do not post explicit content. Lemmy.World is not the instance for NSFW content.

-Do not post Gore or Shock Content.

...


5. No Enciting Harassment,Brigading, Doxxing or Witch Hunts


-Do not Brigade other Communities

-No calls to action against other communities/users within Lemmy or outside of Lemmy.

-No Witch Hunts against users/communities.

-No content that harasses members within or outside of the community.

...


6. NSFW should be behind NSFW tags.


-Content that is NSFW should be behind NSFW tags.

-Content that might be distressing should be kept behind NSFW tags.

...

If you see content that is a breach of the rules, please flag and report the comment and a moderator will take action where they can.


Also check out:

Partnered Communities:

1.Memes

2.Lemmy Review

3.Mildly Infuriating

4.Lemmy Be Wholesome

5.No Stupid Questions

6.You Should Know

7.Comedy Heaven

8.Credible Defense

9.Ten Forward

10.LinuxMemes (Linux themed memes)


Reach out to

All communities included on the sidebar are to be made in compliance with the instance rules. Striker

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] Rooty@lemmy.world 15 points 1 day ago (1 children)

Generic antiestablishmentarism isn't going to put you on a watchlist, this isn't the 1950s. Glowies have better tech nowadays.

[–] starman2112@sh.itjust.works 4 points 21 hours ago (1 children)

If you wanna be on a list, start collecting old army field manuals. It's one thing to say "we should start fire bombing McDonald's," it's another thing to say "we should start fire bombing mcdonald's, and here's instructions on how to do it"

Not that we should be firebombong McDonald's lol I would never recommend that

But I would recommend reading TM 31-201-1, especially pages 78-82

[–] WoodScientist@lemmy.world 4 points 11 hours ago

Want to know how Luigi found what hotel Brian Thompson stayed at? It's right in his "manifesto." He used social engineering.

Social engineering is when you just take advantage of people's natural predilictions to give you info or access that you shouldn't have. For example, if he were to just call up UHC and ask them where the CEO was staying, they would likely just have called the police. Instead, he had to think of some plausible reason that someone might need that info through unofficial channels. I have no idea how he actually did it, but for example, Thompson was a famous womanizer who cheated on his wife. He was your standard sleazy executive scumbag. That can be exploited.

*Hi, CEO's office? I'm John Doe, an underling over at the CFO's office. My boss wants to give Brian a special surprise at this year's company meeting. We're thinking of hiring a few girls to come over and keep him company one evening. I need to know where to have them sent. I would send an email or look up the info in our records system, but, as you can understand, it's best if there's no paper trail. Can you let me know what hotel he's staying at?"

These social engineering methods are the same tools scammers use, but they work just as well for assassins.