Category Tree extension
A hypothetical question...
Suppose that someone had left an easy-to-follow and very long trail of information on the Internet, some of which established his real-life identity.
Suppose that person was "a person of interest" for already having been convicted of certain crimes.
Suppose that person later made a statement on another forum which clearly established/admitted his guilt in "conspiring to violate" a law which was closely related to that which the person had earlier been convicted of -- something which could be expected to immediately draw the attention of the authorities, who most certainly were monitoring the site in question.
Suppose that same person purportedly sought to change his identity on a new forum he had joined, in order to avoid that trail following him. And suppose that this (purported) attempt was patently ineffective, as a simple search would establish.
Would such a person be liable to be pressured by the authorities into cooperating with the authorities in undermining activities on other forums which the authorities disapprove of?
Should a person in that a situation be trusted in administrative positions on other forums which the authorities disapprove of?
- I think that if you want to avoid any chance of problems, then you have to trust no one. Every subversive organization, or even potentially subversive organization, will tend to have government informants, who could either have been informants from the beginning, or could have started out as legitimate members and then been "turned," perhaps through blackmail. These agents have nothing better to do with their time and huge budgets than set up surveillance and stings wherever they can. It's certainly an easier way to rack up arrests and successful prosecutions than to go after people who are actually a danger to the public.
- It seems hopeless to try to identify the informants or potential informants. They will do whatever is necessary to blend in and distract attention from themselves, including pointing the finger at others. Lysander (talk) 21:20, 22 March 2015 (UTC)
- Whether it is totally useless or not to try to identify informants or potential informants is debatable - in the past, some organizations have been able to reliably do so.
- Of course, it is impossible to eliminate all risk -- as you say, they have virtually limitless resources to draw upon, and they can "turn" people who otherwise had been trustworthy.
- Part of their "plan" is to plant the seeds of distrust within members, and -- if this is not carefully combated by the organizational leaders -- it can lead (and has led!) to total disruption of a group. Still, the maxim stands: Trust, but Verify.
- I have often wondered why, in the case of pedo-activists, that "verification" has simply consisted in the mutual exchange of illegal "kiddy porn". Cops can legally share porn in the course of their investigations!
- Now, my idea of "verification" would be to subtly arrange a situation where the "suspect" would have to engage in actual sexual contact, preferably with "a boy who the 'suspect' had claimed to really like". If the "suspect" refused to go along, or (when surreptitiously monitored) was shown not to respond sexually, that would be a much stronger "proof". I mean, something like, "You like Timmy? Well, he likes you, too. So why don't you two just toddle off into the bedroom, while I go out and run some errands." You, of course, would film whatever activity did (or did not) take place. If the guy wouldn't blow the kid when he had the chance, well -- that about says it all, doesn't it? User4 (talk) 22:57, 22 March 2015 (UTC)
- I'm sure they could come up with some excuse to postpone fucking him, kinda like how Jay Dobyns used to put off actually killing people after he said he was a hit man. He would tell them he'd do the job, but it had to be done his way. Meanwhile, the client would come to his senses and call off the hit. Anyway, why are all these precautions necessary, if we use proper computer security? Lysander (talk) 23:47, 22 March 2015 (UTC)
- Don't know, don't care. I don't break the law, so I have nothing to worry about, in theory. There are plenty of people who are breaking the law, who know a lot more about this topic because they have a need to learn about it. You can ask them.
- At the end of the day, no security system is perfect, so we need to be willing to go to jail for our beliefs, or else maybe this is the wrong fight to get involved in. I've done it, although I have to admit that the experience left me psychologically scarred. Some would say I was already psychologically fucked up, though, before that ever happened. Lysander (talk) 01:48, 23 March 2015 (UTC)
On this page, http://maps.thefullwiki.org/Greek_mythology.. How do they make the little slide bar for the article text? Is that a java script or an extension, or something else? --Etenne (talk) 12:09, 7 May 2015 (UTC)
- I don't know how that works. I'm not very knowledgeable about front end stuff. But it doesn't appear to me that they're using MediaWiki. It's hard to tell; I do see that the page source mentions http://maps.thefullwiki.org/styles/mediawiki_sites/commonPrint.css . Lysander (talk) 12:23, 8 May 2015 (UTC)
- I don't know. I did get some unwanted federal attention, but there could have been many other causes. My presence here was also pointed out on other Internet forums, but people already have a lot of other reasons to hate me, so I'm not sure how much difference it makes. Lysander (talk) 12:13, 8 May 2015 (UTC)
Some of the categories you are adding are too specific. Plus, you really need to ask yourself if on a small wiki that is topic specific like BoyWiki, "is this a category that is likely to have enough articles to populate it?--Etenne (talk) 19:41, 9 May 2015 (UTC)
I didn't write it
Sexual Offences Prevention Orders
You seem to be interested in issues related to law. Care to write up something about this: http://thestudentlawyer.com/2013/05/08/sexual-offences-prevention-orders/ --Etenne (talk) 13:47, 6 November 2015 (UTC)
- Oh, we use mediawikiwiki:Extension:Widgets. But there are others. The most secure way to do this would be to convert YouTube videos to ogg and use mediawikiwiki:Extension:TimedMediaHandler or something of that nature. But then there might be copyright issues to consider that might not arise with embedded YouTube vids. Lysander (talk) 01:20, 11 November 2015 (UTC)
- Have you ever tried to install Extension:TimedMediaHandler? and is it difficult? --Etenne (talk) 12:33, 12 November 2015 (UTC)
- Oh yeah.. I don't even think I was the user behind that account.. Lysander (talk) 01:55, 22 September 2016 (UTC)