this post was submitted on 29 Jul 2025
357 points (88.9% liked)

memes

17066 readers
2976 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/Ads/AI SlopNo advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] TheBat@lemmy.world 7 points 1 month ago (2 children)
[–] Delphia@lemmy.world 2 points 1 month ago (1 children)

I mean how anonymous you need to be depends entirely on how legal the method you found the data is.

[–] Ganbat@lemmy.dbzer0.com 4 points 1 month ago (1 children)

Not really. I've heard stories about people getting sued after finding vulnerabilities. Of course the cases would get thrown out, but that's assuming you can eat the mountains of legal fees it'll take to actually get to a judge.

[–] Delphia@lemmy.world 2 points 1 month ago

Yep which is why you involve serious investigative journalists (what few are left). Not as good as going through a lawyer but they do have a tendency to protect their sources.

[–] far_university1990@reddthat.com 1 points 1 month ago

Burner email. Wikileaks. Whistleblower program. Many such thing.