Open Menu
AllLocalCommunitiesAbout
lotide
AllLocalCommunitiesAbout
Login

If comey can be investigated by the secret service for an Instagram tweet what is stopping elon from taking hold of politicians/reporters accounts and making posts that will get them investigated?

⁨74⁩ ⁨likes⁩

Submitted ⁨⁨12⁩ ⁨hours⁩ ago⁩ by ⁨Clinicallydepressedpoochie@lemmy.world⁩ to ⁨nostupidquestions@lemmy.world⁩

source

Comments

Sort:hotnewtop
  • nokturne213@sopuli.xyz ⁨12⁩ ⁨hours⁩ ago

    Nothing.

    source
  • bacon_pdp@lemmy.world ⁨11⁩ ⁨hours⁩ ago

    Literally anyone with database access on any social media site can do that to anyone at any time (and potentially even hide it from the person that they did it to) It is why generative AI is being used to create posts on facebook that read like ads for products

    source
  • pntha@lemmy.world ⁨8⁩ ⁨hours⁩ ago

    …the obvious flaw that said investigations would clearly conclude the posts were doctored?

    The metadata of posts include too many data points (IP address, GPS coords, etc.) needing precise alteration in line with the exact movements of a victim that it would just be too complex to achieve a desirable outcome for Musk. Even if the SS’s investigations were subjective in their approach and/or conclusion, independent investigations would provide a trove of reasonable doubt, even if denied access to the data (which, in itself, would be a point of reasonable doubt).

    source
    • phoenixz@lemmy.ca ⁨7⁩ ⁨hours⁩ ago

      You’re quite enthusiastic there with the idea that anyone would actually investigate any of that instead of just saying “yeap, treason!”

      source
      • pntha@lemmy.world ⁨7⁩ ⁨hours⁩ ago

        Let’s run a little scenario: a reporters post is doctored or posted completely outside of their control. Their boss calls them in:
        “Did you post this?”
        “No”
        “Yeap, treason!”

        Please don’t confuse enthusiasm with critical thinking.

        source
        • -> View More Comments
    • Cenotaph@mander.xyz ⁨7⁩ ⁨hours⁩ ago

      I mean, if you’re doing it from the server administration side it would be pretty easy to just copy all that from a previous post

      source
      • pntha@lemmy.world ⁨7⁩ ⁨hours⁩ ago

        How would the server admin know the real-time location of the victim to spoof the GPS coordinates? How would the admin know if the victim was with others who could verify they weren’t engaged in their device? How could the admin counter legitimate logs from other applications or services the victim might be using at the timestamp of the post?

        There are far too many variables to be able to execute this successfully by professionals, let alone a bunch of IT staff.

        source
        • -> View More Comments