• pntha@lemmy.world
    link
    fedilink
    arrow-up
    3
    arrow-down
    2
    ·
    6 hours ago

    …the obvious flaw that said investigations would clearly conclude the posts were doctored?

    The metadata of posts include too many data points (IP address, GPS coords, etc.) needing precise alteration in line with the exact movements of a victim that it would just be too complex to achieve a desirable outcome for Musk. Even if the SS’s investigations were subjective in their approach and/or conclusion, independent investigations would provide a trove of reasonable doubt, even if denied access to the data (which, in itself, would be a point of reasonable doubt).

    • Phoenixz@lemmy.ca
      link
      fedilink
      arrow-up
      6
      arrow-down
      1
      ·
      5 hours ago

      You’re quite enthusiastic there with the idea that anyone would actually investigate any of that instead of just saying “yeap, treason!”

      • pntha@lemmy.world
        link
        fedilink
        arrow-up
        2
        arrow-down
        3
        ·
        edit-2
        5 hours ago

        Let’s run a little scenario: a reporter’s post is doctored or posted completely outside of their control. Their boss calls them in:
        “Did you post this?”
        “No”
        “Yeap, treason!”

        Please don’t confuse enthusiasm with critical thinking.

        • ysjet@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          2
          ·
          4 hours ago

          Ah yes, because this administration is SO good about providing people with due process.

          • pntha@lemmy.world
            link
            fedilink
            arrow-up
            2
            arrow-down
            3
            ·
            4 hours ago

            What I’m trying to convey, in the face of your obnoxious sarcasm, is that while the administration would of course interfere in what should be an objective investigation, politicians and reporters have a wealth of powerful advocates in their support networks. The administration can only control the message/investigation of the SS. They cannot control the message or investigations of the victim’s support network, however hard they may try.

            • ysjet@lemmy.world
              link
              fedilink
              English
              arrow-up
              3
              arrow-down
              2
              ·
              4 hours ago

              Amazingly enough, there are more people in the world than the rich, famous, or powerful. Most people do not have that “wealth of powerful advocates.”

              Those people also deserve the rights you’re so callously ignoring.

                • ysjet@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  arrow-down
                  2
                  ·
                  3 hours ago

                  The point is still that most people, even most journalists or politicians, don’t have those protections. Fact is, a lot of top politicians and journalists don’t have those protections which is literally why we have politicians getting arrested for protesting against the El Salvador prisons and then going after comey.

                  And leave personal attacks out of it.

    • Cenotaph@mander.xyz
      link
      fedilink
      English
      arrow-up
      5
      ·
      5 hours ago

      I mean, if you’re doing it from the server administration side it would be pretty easy to just copy all that from a previous post

      • pntha@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        5 hours ago

        How would the server admin know the real-time location of the victim to spoof the GPS coordinates? How would the admin know if the victim was with others who could verify they weren’t engaged in their device? How could the admin counter legitimate logs from other applications or services the victim might be using at the timestamp of the post?

        There are far too many variables to be able to execute this successfully by professionals, let alone a bunch of IT staff.

        • testfactor@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          5 hours ago

          You could just replace the text of a post as it gets submitted. Keep all metadata otherwise unchanged. Lock the account from being able to make edits.

          • pntha@lemmy.world
            link
            fedilink
            arrow-up
            2
            ·
            5 hours ago

            Lock the account from being able to make edits

            So, the victim watches their post publish. Acknowledges it’s been doctored. Attempts to edit. Receives some error. And shrugs it off and puts their phone away…? They’ll turn to the closest person with broader knowledge of IT and then it snowballs from there. And that timeline post-publishing would be sufficient evidence for reasonable doubt.

            • testfactor@lemmy.world
              link
              fedilink
              arrow-up
              3
              ·
              4 hours ago

              Sure, but then it’s a question of narrative not proof, right?

              Because the response from X would just be, “we aren’t sure why Mr so-and-so didn’t/couldn’t immediately delete the post, but we froze it in short order because we believe the fact he would post such a thing is a matter of public interest, and we refuse to let him sweep it under the rug.”

              Yeah, he could say that he posted something completely different and X changed it, but how do you prove it? Everyone would just assume it to be a lie trying to cover their ass after posting something terrible.

              Not saying this is at all likely. Just that it’s possible.

              And this assumes they notice it was doctored immediately anyway. Most people don’t verify that the post is correct after hitting “submit.” A good 90+% of people would probably never notice if the text was changed post upload.

              • pntha@lemmy.world
                link
                fedilink
                arrow-up
                2
                ·
                3 hours ago

                Agree; this could all happen, yes. What my original comment was trying to convey—and your reply adds to—is that the variables and complexities required to be maintained by X/Musk to ensure that the lie they are defending are hugely disproportionate to other operations that can field similar results. It is also an incredibly high-risk operation for X/Musk, in that a collusion operation of this magnitude risks global repercussions. The required amount of time, effort and resources against politicians or reporters wouldn’t be worth X/Musk’s investment when simpler techniques can be executed at lower risk and require far less resources.

                It really just comes down to a cost/benefit/risk analysis. Do we start fake-posting official accounts and risk massive legal and public fallout? Or do we pay Putin $X million to spin up a bunch of bots and push a particular message that could sway public opinion in a similar direction, with very little traceable evidence and virtually no risk to X/Musk?

                • testfactor@lemmy.world
                  link
                  fedilink
                  arrow-up
                  2
                  ·
                  3 hours ago

                  Sure, I agree that it’s a stupid idea from an effort vs reward perspective. It’s at best unnecessary.

                  But your initial position was that it couldn’t be done without being easy to prove that it was a fabrication, and I think you’re wrong about that.

                  I think that they are more than capable of doing it in such a way that it’s wholly word-vs-word, with no forensic evidence pointing to it being doctored. And the idea that they would do that is outlandish enough that most reasonable people would assume the post was legitimate and that the “offender” was lying about it to try and deflect blame.

                  It’s the classic, "No, I didn’t post that list of porn search terms to my Twitter! I was hacked!! Totally somebody hacked me and did that. Wasn’t me at all!!” But in this case it’d be something that was a pretext for the government to arrest them.

  • bacon_pdp@lemmy.world
    link
    fedilink
    arrow-up
    5
    arrow-down
    3
    ·
    9 hours ago

    Literally anyone with database access on any social media site can do that to anyone at any time (and potentially even hide it from the person that they did it to) It is why generative AI is being used to create posts on facebook that read like ads for products