this post was submitted on 10 May 2025
303 points (96.9% liked)

Showerthoughts

34414 readers
900 users here now

A "Showerthought" is a simple term used to describe the thoughts that pop into your head while you're doing everyday things like taking a shower, driving, or just daydreaming. The most popular seem to be lighthearted clever little truths, hidden in daily life.

Here are some examples to inspire your own showerthoughts:

Rules

  1. All posts must be showerthoughts
  2. The entire showerthought must be in the title
  3. No politics
    • If your topic is in a grey area, please phrase it to emphasize the fascinating aspects, not the dramatic aspects. You can do this by avoiding overly politicized terms such as "capitalism" and "communism". If you must make comparisons, you can say something is different without saying something is better/worse.
    • A good place for politics is c/politicaldiscussion
  4. Posts must be original/unique
  5. Adhere to Lemmy's Code of Conduct and the TOS

If you made it this far, showerthoughts is accepting new mods. This community is generally tame so its not a lot of work, but having a few more mods would help reports get addressed a little sooner.

Whats it like to be a mod? Reports just show up as messages in your Lemmy inbox, and if a different mod has already addressed the report, the message goes away and you never worry about it.

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments

It could be a combination of both, for example heres a basic guide to hacking any government department or agency (which for legal purposes isnt a guide).

  1. You can very easily brute force your way into those unsecured DOGE email servers they have in everywhere in the US Gov rn (alternatively you can spoof a DOGE email very easily, if so skip to step 3)
  2. Once you brute force your way into the US Gov you can either take the route of brute forcing your way into the entire network compromising entire systems or you can send emails from the doge servers hacking individuals.
  3. Once the network is compomised slowly copy classified information and prepare the system to display your mesaage. Then delete the information from the internal system replacing it with your message, leak the information so everyone but them has it.