this post was submitted on 13 Sep 2025
227 points (99.6% liked)

chapotraphouse

14071 readers
1207 users here now

Banned? DM Wmill to appeal.

No anti-nautilism posts. See: Eco-fascism Primer

Slop posts go in c/slop. Don't post low-hanging fruit here.

founded 4 years ago
MODERATORS
 

the website calls it "the largest firing operation in history" and asks people to submit full names, locations, employers, and pictures by email.

https://www.charliesmurderers.com/

from AlcoholEnjoyer: reminder to never ever look yourselves up on sites like these

you are viewing a single comment's thread
view the rest of the comments
[–] Clippy@hexbear.net 7 points 1 day ago* (last edited 1 day ago) (1 children)

tbh i don't know, i heard somebody i have some rapport with say they don't personally visit reactionary sites (such as this due to ip logging) and, am repeating my distrust of visiting such site

in truth my competency with this field of cyber security is low

[–] underisk@hexbear.net 8 points 1 day ago (2 children)

generally your IP address isn't terribly sensitive information. it can be used to verify that something on your network made a request to a server, but not on its own - you need ISP cooperation, or access to a well maintained private database that only major online corps like Google, MS, or Facebook might keep. most random websites arent going to have the means to trace an IP back to a person. if you did something on their website that gave them cause to target your IP, the worst they could reasonably do is DOS you until they get bored or you call your ISP.

just visiting it can be dangerous if there's some kind of driveby malware or something, but no more so than any other link on the internet.

[–] Clippy@hexbear.net 5 points 1 day ago (1 children)

generally your IP address isn't terribly sensitive information. it can be used to verify that something on your network made a request to a server, but not on its own - you need ISP cooperation, or access to a well maintained private database that only major online corps like Google, MS, or Facebook might keep. most random websites arent going to have the means to trace an IP back to a person. if you did something on their website that gave them cause to target your IP, the worst they could reasonably do is DOS you until they get bored or you call your ISP.

just visiting it can be dangerous if there's some kind of driveby malware or something, but no more so than any other link on the internet.

hm okay thank you for clarifying this - i am currently in the middle of becoming more competent in the field of operation security and was wondering (as you seem somewhat knowledgable in this field) what site/collection of text you would reccommend to read to become knowledgable in this field?

thank you for your insight

[–] underisk@hexbear.net 3 points 1 day ago* (last edited 1 day ago)

unfortunately, i don't really have anything to recommend from an opsec perspective. most of what i know was learned from reading documentation when I was working as a web developer, and hosting a few personal servers occasionally. i doubt server/browser documentation is what you had in mind.

i'll say that if you're not really doing anything super spicy you probably don't have to worry too much about opsec. unless you're willing to cut out a lot of really convenient online services from your life you're just going to have to accept that the big tech companies are going to know more about you than you should be comfortable with. aside from them you just need to worry about hackers so: run an adblocker, use a password manager and unique passwords, keep your browser and OS up-to-date, and accept that no matter what you do some dipshit is going to fuck up securing their side of things and you're probably gonna be exposed in a data breach anyway.

[–] Enjoyer_of_Games@hexbear.net 2 points 1 day ago (2 children)

Even though this is generally true it is irresponsible to provide this as advise.

You can't predict what threats the readers will face or what other risks they make take if they unlearn good security culture habits.

For all we know there could.. hang on a sec.. ok my hands are nowhere near the lathe.. for all we know there could be another eternal blue level zero day dropping this minute in which case anyone whose ip has been logged recently is toast.

[–] underisk@hexbear.net 2 points 1 day ago (1 children)

if a security threat of that magnitude were in play I doubt the people chasing down charlie kirk's killer would be employing it toward that end. ultimately you simply cannot trust that anything you put into a computer is private or safe. you have to draw the line somewhere, and I don't think worrying about them nuking every IP that connects to their site with a broadly applicable 0-day is a reasonable place to insist they draw it.

[–] Enjoyer_of_Games@hexbear.net 3 points 1 day ago (1 children)

you have to draw the line somewhere

yes and that line should be simple and consistent inorder for non-techies to follow.

The line I'm recommending is:

if you don't trust a site then don't visit it without additional security measures

This does not require someone to understand any specific attack vectors or keep track of which sites are how dangerous in these circumstances requiring this level of precaution and so on.

It's not bullet proof but I'm trusting people here understand that a fascist website is untrustworthy and it's better they be overcautious than to try to minmax their security.

[–] underisk@hexbear.net 2 points 1 day ago* (last edited 1 day ago)

i don't think you need to take "additional security measures" to visit a website thrown together by a group of facebook poisoned internet busybodies. the likelihood of a random webpage, fascist run or not, having the kind of exploit that could be performed with just an IP address (or do a driveby i guess?), is almost as low as the likelihood of them blindly dumping it on everybody that loaded their webpage. it's overly-cautious security theater. it's throwing spilled salt over your shoulder to ward off bad luck.