与杀手对话
Conversations with a hit man

原始链接: https://magazine.atavist.com/confessions-of-a-hit-man-larry-thompson-jim-leslie-george-dartois-louisiana-shreveport-cold-case/

本网站使用 Cookie 和类似技术来增强您的体验。同意后,您允许我们处理浏览行为和唯一 ID 等数据。有些 Cookie 对于网站正常运行或提供您明确请求的服务至关重要。其他 Cookie 有助于我们记住您的偏好。 我们还使用 Cookie 进行匿名统计分析以改进我们的网站。但是,如果没有您互联网服务提供商或第三方记录的配合,这些数据通常无法识别您的个人身份。 某些 Cookie 用于定向广告、创建用户画像或跟踪您在多个网站上的活动以用于营销目的。您有权选择是否同意这些技术,但拒绝可能会影响网站的某些功能。您关于 Cookie 的选择有助于我们个性化您的体验,同时尊重您的隐私。

A Hacker News thread discusses an article titled "Conversations with a Hit Man," set in the corrupt South of 1960-1980, drawing comparisons to True Detective's first season. Commenters highlight the persistence of corruption, particularly concerning CO2 injection into geological formations that could contaminate well water. Some express skepticism about the article's veracity, questioning the hitman's credibility and the use of aliases. Others find the piece well-written and engaging. A flagged comment criticizing the article's perceived slow pace sparks debate on the merits of shallow dismissals versus thoughtful critique, with some advocating for open access to tangential posts and others prioritizing substantive discussion. The general consensus seems to be a mixed bag of interest, skepticism, and varying opinions on the value of the article and its discussion.
相关文章

原文

To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent may adversely affect certain features and functions.

The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.

The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.

The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.

The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.

联系我们 contact @ memedata.com