Best way to infiltrate right wing online spaces?
@Graci But if a person really wanted to see what the righties were up to in their area where do they congregate?
@SuburbanVagabond X, Truth Social, etc. I suppose
@SuburbanVagabond Pretend to share their views 100% at first (while being careful not to let their propaganda or even your own words affect your real views, mind you), gain their trust over time as you become a fairly well-known regular in their community, then (after a long enough period... I'd say at least weeks, better months) the payload: start subtly & carefully exploiting the logical inconsistencies in their ideology to seed doubt, discord, & sectarian division w/o raising too much alarm.
@IrelandTorin So places like X, Truth Social, Facebook?
@SuburbanVagabond I suppose it could apply there too - it was tailored more for close-knit far-right extremist spaces though, which should take the highest priority for disruption ops (as they are among the most dangerous).
A vital point: DO NOT under any circumstances leak any links back to your usual profiles or heaven forbid your personal information. That can and will backfire badly - can be very dangerous.
Assume a new (fake) identity entirely. Make it believable.
@SuburbanVagabond That's not just changing your name, your profile picture, etc either... you'll also need fake interests, the obligatory fake ideology, a modified writing style - even vocabulary, if you can manage that - and so on.
And seriously, don't fall for the propaganda. You'll want to limit your engagement to a short time per day, and make sure to take time afterwards to dispel/purge any ideas you may start to pick up. People have ended up lunatic wingnuts after careless infiltration.
@IrelandTorin How does a person make sure they don't like anything back to their usual profiles? Right now I'm using a whole separate browser, email, usernames, generated passswords and the like.
@SuburbanVagabond That's a very good start - I would also recommend using a different IP (proxy, VPN, Tor, I2P, whatever).
Actually, one of the best things you can do: create a completely separate user on your computer for this fictional person. And it's better to use Linux if possible (even better if you don't mention you're doing so) to dodge most malware, as that can actually pose an exposure risk.
May also be a good idea to have a stylesheet / traitlist for this "new person" for reference.
@SuburbanVagabond