(but it is indeed sus)

Wisconcom admits here that he wants to become an administrator of ProleWiki, and not just alongside the current team, but replace them entirely.

I quote:

Forte and Crit should be removed from their roles as administrators and people such as myself put in the administration.

He was always a power-grabbing weirdo with a god complex. For your projects, be careful of such people!

Also I know he’s reading this (he obsessively checks lemmygrad), so please leave some nice messages for him.

  • @Shaggy0291
    link
    31 year ago

    How far down the road should we go with interviewing? It’s bound to be a careful balancing act between having an effective system on the one hand, with avoiding a situation where we’re effectively creating a catalogue of the identities of communists to be scooped up by authorities.

    • @CriticalResist8OPA
      link
      01 year ago

      A bit old but I was revisiting this for some writing I’m doing (the leftypedia saga).

      As far as you need. If people are genuinely interested and motivated they will understand the need for vetting.

      The thing with wreckers is eventually they fuck up. If you fuck up once with your alt and post at the wrong time, that’s all you need to

      This creates a trace that eventually adds up.

      With ProleWiki, we created an internal security group that grew out of infiltration attempts exactly to help us with these tasks. Specifically this group does not have moderating powers, we just trust them enough to help us out with sniffing out infiltrators and wreckers because they were invested in it in the past and are effective.

      You can’t catch them all the time before they fuck shit up, EVE Online (it’s an MMO) is famous for crazy stuff happening on there, like people infiltrating enemy guilds for years before being trusted enough to get perms and emptying their in-game bank accounts and ship fleet.

      Don’t give people perms they don’t need.

      • @Shaggy0291
        link
        -11 year ago

        If nothing else I suppose this gives you lads decent live experience in security practice for rooting out genuine malicious actors.