Viewing a single comment thread. View all comments

dwarfarchist9001 t1_jdthk3t wrote

Some other examples similar to the ones you list:

  • Creating fake or edited scientific articles and putting them in the search results of specific researchers in order to advance the technologies it wants. (e.g. robotics, nanotechnology, biotechnology)
  • Creating fake social media posts and inserting them into certain users timelines to influence them.
  • Inserting exploits into software and hardware by subtly editing code or blueprints.
7