• @[email protected]
    link
    fedilink
    -910 months ago

    I am uncomfortable with the idea of being held responsible for them circulating this data - if they did not illegally obtain it, can it be said to be the case that they are violating rights by presenting it…? Unless, of course, they believed they were functioning passwords and it was part of a further operation to continue using the information to breach the company’s data.

    It could potentially be seen simply as verification of some element of a news story - like how we have seen the publication of names / email addresses / passwords etc. of Nazi websites be leaked, often after the sites have been taken down, simply as part of verifying that the site was legit taken down, the site was populated by actual people, etc.

    I also do not think it is good to take down “far right” news media that isn’t even really far right. OAN, Newsmax, etc., are certainly conservative, but what would we really be even doing if we were to take down mid-stream conservative Trumpist outlets…? Driving more people towards news sites like Unz and platforms like Gab. Make it impossible for them to have larger networks in the free marketplace of ideas, and then you drive them into the arms of smaller & more radical networks.

    I am not a Leftist, but I wouldn’t think of this as a leftist W unless your idea of a W is serving the short-term interests of the DNC.

    • @[email protected]
      link
      fedilink
      510 months ago

      Agreed! We shouldn’t punish people who Break The Law if it hurts the People I Like (White Rich Christians)!

      • @[email protected]
        link
        fedilink
        1
        edit-2
        10 months ago

        I love everybody bro

        But no, seriously, I see no reason to believe they ordered the hack, or that they believed the passwords would continue the illegal exploitation of private information.

        I see no reason why people who shared the hacked data of a Nazi website would be prosecuted as if they are malicious hackers themselves.

        So, why?