Skip Navigation
Journalist publishes every damning text from war plans leak
  • This is becoming a theme stretching back multiple administrations. The people at the top either don't understand IT acceptable use policies, cybersecurity controls, classification divisions of systems, records retention policies, etc; or they are intentionally ignoring them. And for bonus points, everyone at this level is an espionage target.

    https://en.wikipedia.org/wiki/Bush_White_House_email_controversy

    https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy

    https://en.wikipedia.org/wiki/United_States_government_group_chat_leak

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)FE
    FE80 @lemmy.world
    Posts 0
    Comments 3