World News
A community for discussing events around the World
Rules:
-
Rule 1: posts have the following requirements:
- Post news articles only
- Video links are NOT articles and will be removed.
- Title must match the article headline
- Not United States Internal News
- Recent (Past 30 Days)
- Screenshots/links to other social media sites (Twitter/X/Facebook/Youtube/reddit, etc.) are explicitly forbidden, as are link shorteners.
-
Rule 2: Do not copy the entire article into your post. The key points in 1-2 paragraphs is allowed (even encouraged!), but large segments of articles posted in the body will result in the post being removed. If you have to stop and think "Is this fair use?", it probably isn't. Archive links, especially the ones created on link submission, are absolutely allowed but those that avoid paywalls are not.
-
Rule 3: Opinions articles, or Articles based on misinformation/propaganda may be removed.
-
Rule 4: Posts or comments that are homophobic, transphobic, racist, sexist, anti-religious, or ableist will be removed. “Ironic” prejudice is just prejudiced.
-
Posts and comments must abide by the lemmy.world terms of service UPDATED AS OF OCTOBER 19 2025
-
Rule 5: Keep it civil. It's OK to say the subject of an article is behaving like a (pejorative, pejorative). It's NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
-
Rule 6: Memes, spam, other low effort posting, reposts, misinformation, advocating violence, off-topic, trolling, offensive, regarding the moderators or meta in content may be removed at any time.
-
Rule 7: We didn't USED to need a rule about how many posts one could make in a day, then someone posted NINETEEN articles in a single day. Not comments, FULL ARTICLES. If you're posting more than say, 10 or so, consider going outside and touching grass. We reserve the right to limit over-posting so a single user does not dominate the front page.
We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.
All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.
Lemmy World Partners
News !news@lemmy.world
Politics !politics@lemmy.world
World Politics !globalpolitics@lemmy.world
Recommendations
For Firefox users, there is media bias / propaganda / fact check plugin.
https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/
- Consider including the article’s mediabiasfactcheck.com/ link
view the rest of the comments
Absolutely not. Cyber attacks are not comparable with real attacks, when it comes to counterattacking.
I mean, how would that even work?
Let's do an example: A hospital has a cyber attack.
Assumption 1: We notice the attack.
This may sound stupid, but maybe we don't even notice, that data is stolen and no one ever notices.
But they want to destroy shit, so they do!
Okay, let's say we notice the attack.
Assumption 2: We notice the attack in time.
What does that mean, they destroyed stuff, right?
Yes, but when? Some attacks delete backups for weeks and then destroy the data. We are talking about a government and not a money hungry hacker group here, they have time.
Maybe all traces of the attack are deleted, before all goes black?
But we're the good ones, the smart ones, we notice it in time. Cool.
Assumption 3: it's possible to trace the origin.
Again, how do we do that? Does the code look russian? Maybe Isreal just knows how to trick us. We maybe have no IP, since it came in via USB or CD?
Okay, we'll ignore that. We have an IP.
Assumption 4: The IP tells us, who it was.
An IP from Israel attacks an american hospital. Clear case, let's attack back. Right? Wrong.
The IP is private, so it could be some random dude and you just attacked a country for one person doing a crime? Great job.
Even worse, maybe the person has a hacked smart fridge and the attack came from Russia. How would you know?
Okay, let's say the IP is from a datacenter. Bad example, they rent their servers...
Okay, the IP is from a government agency. Now we're talking. They don't rent; it's unrealistic, they were hacked. We can attack back!
Assumption 5: We know, what to do next.
(This is not a strong argument, but it stills stands)But what do we attack? One of their hospitals? Do we start a war with them? Call the embassy?
All of this on all the prior assumptions...