this post was submitted on 29 Jul 2025
355 points (88.8% liked)
memes
16673 readers
2948 users here now
Community rules
1. Be civil
No trolling, bigotry or other insulting / annoying behaviour
2. No politics
This is non-politics community. For political memes please go to !politicalmemes@lemmy.world
3. No recent reposts
Check for reposts when posting a meme, you can only repost after 1 month
4. No bots
No bots without the express approval of the mods or the admins
5. No Spam/Ads/AI Slop
No advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.
A collection of some classic Lemmy memes for your enjoyment
Sister communities
- !tenforward@lemmy.world : Star Trek memes, chat and shitposts
- !lemmyshitpost@lemmy.world : Lemmy Shitposts, anything and everything goes.
- !linuxmemes@lemmy.world : Linux themed memes
- !comicstrips@lemmy.world : for those who love comic stories.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Emphasis on anonymously.
I mean how anonymous you need to be depends entirely on how legal the method you found the data is.
Not really. I've heard stories about people getting sued after finding vulnerabilities. Of course the cases would get thrown out, but that's assuming you can eat the mountains of legal fees it'll take to actually get to a judge.
Yep which is why you involve serious investigative journalists (what few are left). Not as good as going through a lawyer but they do have a tendency to protect their sources.
Burner email. Wikileaks. Whistleblower program. Many such thing.