this post was submitted on 23 Aug 2025
242 points (100.0% liked)

Technology

3928 readers
983 users here now

Which posts fit here?

Anything that is at least tangentially connected to the technology, social media platforms, informational technologies and tech policy.


Post guidelines

[Opinion] prefixOpinion (op-ed) articles must use [Opinion] prefix before the title.


Rules

1. English onlyTitle and associated content has to be in English.
2. Use original linkPost URL should be the original link to the article (even if paywalled) and archived copies left in the body. It allows avoiding duplicate posts when cross-posting.
3. Respectful communicationAll communication has to be respectful of differing opinions, viewpoints, and experiences.
4. InclusivityEveryone is welcome here regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
5. Ad hominem attacksAny kind of personal attacks are expressly forbidden. If you can't argue your position without attacking a person's character, you already lost the argument.
6. Off-topic tangentsStay on topic. Keep it relevant.
7. Instance rules may applyIf something is not covered by community rules, but are against lemmy.zip instance rules, they will be enforced.


Companion communities

!globalnews@lemmy.zip
!interestingshare@lemmy.zip


Icon attribution | Banner attribution


If someone is interested in moderating this community, message @brikox@lemmy.zip.

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Alph4d0g@discuss.tchncs.de 23 points 20 hours ago (1 children)

Sounds like he could have been a bit more creative in implementing this. Having something immediately traceable back to a username is no bueno.

[–] possiblylinux127@lemmy.zip 3 points 8 hours ago (2 children)

If he was smart he would not of done this in the first place

[–] WoodScientist@lemmy.world 5 points 7 hours ago* (last edited 7 hours ago)

Is it even possible to do this in a way that can't be tracked back to you? Unless you're a Hollywood hacker that will rig something up to literally burn down the building the server the malicious code is contained on, there will always be some fingerprints left behind in the software. And there will almost always be a relatively short list of possible suspects. Even at large companies, there won't ever be more than a handful of people with the skills, motive, and access needed to pull something like this off. Oh, the company's entire database suddenly and mysteriously deleted itself? I wonder who caused that, maybe the disgruntled sysadmin we just fired? There really aren't that many suspects in situations like this. And once you're a suspect, they can get a warrant, seize all your computers, and scour them to dig up even more evidence against you. Hell, even just documentation of ill will against your old employer would be evidence in court. You better hope you really left no trace, otherwise you will be found out very quickly.

And really even in the best case scenario you still end up under heavy investigation, get all your computers seized, probably lose your new job, etc. Even if they can't pin it on you, if you are the only one with the means, motive, and opportunity? They'll tear your life upside down for years trying to prove it. Even if you are so good you can literally do it with no trace, no evidence in the code at all? It still won't prevent your life from being torn apart. It will just keep you out of jail at best.

[–] GreenShimada@lemmy.world 3 points 7 hours ago

He 100% didn't think this would result in criminal charges. A lot of people don't think through the "how will this company with lawyers react to my petty nonsense?" when doing stuff like this.