• 5 Posts
  • 1.59K Comments
Joined 2 months ago
cake
Cake day: February 13th, 2026

help-circle



  • If you can build the capability of launching a telephone pole that far, you could cause a lot more damage by launching an equal weight of explosives and/or incendiaries instead. If you’re going to the trouble of making a hidden pneumatic launcher in a box truck, you might as well make the payload as destructive as possible.

    But it might even be easier than that - use augers to target the data lines. I will admit I’m not sure whether such lines are typically underground, but that should be a matter of public record, no?

    Incoming power lines won’t be buried and will be easier targets. Especially the transformers – oil-cooled power transformers (as would be typical for that role) can easily be disabled by a single hit from a decently powerful rifle, which will punch a hole in the casing, allow the oil to leak out, and result in the transformer overheating and failing.



  • OwOarchist@pawb.socialtoLemmy Shitpost@lemmy.world3.9% APR
    link
    fedilink
    English
    arrow-up
    23
    ·
    5 hours ago

    But the Tracker isn’t a terrible choice.

    It’s for when you want a Jeep Wrangler, but a bit more affordable and a bit more daily usable.

    Very compact, decent use of space, relatively good gas mileage for what it is, okay off-road capability, available manual transmission… There’s a lot to like here. Honestly, it’s the compact crossover before compact crossovers were a thing … except that it has more off-road ability than pretty much any modern compact crossover.






  • Otherwise I’ll have to learn all about data center sabotage, and that seems like work.

    Well, data centers usually have fairly tight security, so your first challenge is just getting access to it. There are five main approaches you could try:

    1. Infiltrate: Apply for datacenter jobs and try to get employee-level access to the facility. This is likely your best shot, but depending on your background, it may be difficult or impossible to achieve. It will also be extremely difficult to maintain your anonymity while doing this, so you’re very likely to be caught.

    2. Assault: Datacenter security is designed around keeping out a sneaky, lone, unarmed intruder. A rapid application of brute force and violence could probably break through security and gain access. But alarms will definitely be tripped, so you’ll likely only have a few minutes before police backup arrives.

    3. Long-Range Assault: Using drones, rockets, long-range rifles, artillery, trebuchets, whatever heavy weaponry you can get your hands on, attempt to damage the facility from long range, from well outside of its security perimeter. Unless you can get/build some very impressive weaponry, damage is likely to be limited and localized, but you could conceivably get away with it without getting caught if you ‘shoot and scoot’ and cover your traces well.

    4. Stealth: Try to find holes in its physical security and sneak through without being noticed (including by impersonating staff without actually getting hired). Since this is exactly what their security is designed to prevent, it will likely be the most challenging option, but it’s possible there are still vulnerabilities in their security that could be exploited. If you do manage to make it through, you could potentially cause a lot of damage and still manage to get away without being caught, so it’s a high risk/high reward strategy.

    5. Hacking: Instead of trying to get physical access to the datacenter, you could try to hack into it and gain electronic access. However, this is likely to still be fairly difficult unless you’re extremely skilled in hacking, and the damage you can do is limited because you won’t have much opportunity to cause hardware damage. This will (mostly) be limited to causing temporary outages before they restore from backup. (Though if you could manage to set off the fire suppression systems…)

    How exactly you actually go about damaging the datacenter’s systems will depend heavily on which method you’re using to gain access. Different methods open different possibilities.