A Short History of Events That Occurred After Jon Ronson’s 'So You’ve Been Publicly Shamed'

Updated on November 4, 2018
tamarawilhite profile image

Tamara Wilhite is a technical writer, industrial engineer, mother of two, and published sci-fi and horror author.


Jon Ronson’s 2015 book “So You’ve Been Publicly Shamed” interviews a number of prominent victims of online shaming like Christine Sacco. The tragedy is how many other cases have popped up since his book was published, some of them more prominent than the individuals he featured in his book, others punished more systematically than his named victims. Let's look at some of the events that have transpired since Mr Ronson's book came out.

The Cover of "So You've Been Publicly Shamed" by Jon Ronson
The Cover of "So You've Been Publicly Shamed" by Jon Ronson | Source

High Profile Targets and Their Fates

Scott Adams of Dilbert fame, Stefan Molyneux and others have described the act of ganging up on someone to tear them down as an addictive dopamine rush that all in power tend to have and crave more of. For the average person, joining in with a mob makes them more powerful and vicious than they would be alone, while the encouragement of their peers to go farther and do worse; this is a uniquely human flaw that leads to evil (not just taking pleasure in their pain but competing to make it worse).

When Scott Adams spoke publicly in favor of Trump’s persuasion techniques, not only did he get shadow banned from Twitter and see his speaking engagements disappear, Twitter attacked his girlfriend by de-verifying her so that people didn’t know which account was really hers and which was one of many pretenders. This happens through even mainstream news outlets, like when the wife of Vice President Pence’s phone number was published by the Associated Press; this information was irrelevant to public discourse and was known to cause a wave of liberal bullying directed at her, but they did it anyway.

When Twitter can penalize the girlfriend of a celebrity for his politically incorrect statement, when the AP can punish the wife of a politician, of course liberal bullies see it as fair to go after the friends, family and other relationships of anyone else they deem worthy of destruction.

And the Fates of Smaller Targets

I commend Mr. Ronson for going back to talk to the victims of excessively disproportionate online shaming to the point of losing their jobs; he doesn’t spend much time on the deliberate undermining of their relationships by hate mobs that didn’t see the victims or their friends and family as real people, like when Youtuber Sargon of Akkad did a video on Social Justice as a cult and had people try to drive away his girlfriend in addition to being flagged as hate speech in an effort to cost him his stream of income. I read William Shetterley condemning this as the “weaponization of poverty”, not just seeking to shame them but punish them with material suffering, too.

The weaponization of poverty and attempts to silence dissent by putting their very livelihoods at risk is a standard tactic. Shutting down websites through DDoS, flagging all Youtube videos by someone as hate speech to get them demonetized (aside from Youtube’s own liberally biased demonetization policies), organized campaigns to get people fired from their jobs and simultaneously render them unemployable are depressingly common. It isn’t enough to hurt someone emotionally by sending lots of hateful tweets (ironically often in the name of love), let’s hurt them physically and emotionally by costing them their homes, their ability to buy food, make their children and spouses afraid for their safety and upset from the bullying, too.

Let’s take on example of this “digital shaming” taken to the next level. Ashley Rae Goldenberg published a politically incorrect poem, and SJWs responded by threatening to kill her family, trying to get her kicked out of school, and published the family’s phone numbers and credit card numbers. And Ms. Goldenberg is far from the only person to have family members threatened or harassed in this way.

Once the target of the two minute hate is selected, liberal bullies see nothing as off limits and do anything and everything possible to ruin the lives of the target until a new target is offered up for abuse. If the prison chapters are true on a wider scale, liberal bullies risk creating a few dark and hardened souls from among their many innocent victims, people capable of the atrocities they say incorrect word choice are associated with. That their ever changing moral codes and victimhood hierarchies leave everyone afraid and vulnerable to such assaults shuts down true dialogue and emboldens the violent authoritarians.

The Solution

The solution isn’t more shaming, greater consequences, escalating to violence against the assigned guilty party of the moment. It is compassion for the pain the actions likely cause, humility by those who are getting high off the digital lynching, and empathy. Because when the official accepted viewpoints are ever changing per social justice, it really could be any of us at any time.

And if the solution is as Mr. Ronson fears saying nothing, doing nothing, becoming as bland as possible to avoid any reason for assault by the mob, freedom of speech, the honest exchange of ideas that prevent excesses and lead to innovation, all die. And silent terror of the hate mobs does nothing to stop them, either.

Yet Mr. Ronson’s solution per his book remains true – have empathy for the victim of the hate mob of the moment; this is the person being attacked, not the supposedly aggrieved groups that may, might or say they are offended. The solution is recognition that the victims of these digital lynch mobs are people, not some target in a video game to be taken down as aggressively and creatively as possible. The solution is empathy, understanding, and recognition that great evil can be committed under any moral banner, even “love” and “tolerance”.


Dilbert cartoonist says he lost income and jobs after saying Trump would win

Should Twitter and Facebook be Regulated as Utilities?

In this article, Scott Adams discusses the repeated deverification of his girlfriend as a punishment for his political stances as well as his own shadowban on Twitter.

Student (Ashley Ray Goldenberg) threatened with rape, death after Ferguson poem

Fired dispatcher who is Trump supporter given job back

Schoolteachers fired for pro-Trump remarks - off campus!

'You're fired,' Houston TV station tells reporter who made pro-Trump Facebook post

Liberal profs admit they’d discriminate against conservatives in hiring, advancement

Professor who tweeted against PC culture is out at NYU

Twitter Shadowbanning ‘Real and Happening Every Day’ Says Inside Source

The Social Media Hive Mind by Scott Adams
In this, Scott Adams examines the "throttling" of his tweets and shared links.


Submit a Comment
  • tamarawilhite profile imageAUTHOR

    Tamara Wilhite 

    2 years ago from Fort Worth, Texas

    Right now, Margret Atwood, author of "The Handmaid's Tale" and Steven Pinker, the researcher.

  • tamarawilhite profile imageAUTHOR

    Tamara Wilhite 

    2 years ago from Fort Worth, Texas

    Rachael Lefler I've stopped trying to keep the Hub up to date because of the sheer volume of incidents. It is disappointing that liberal bullies have used the internet to attack people they don't actually know or ever deal with, because it was the social ties to the shaming victim that kept the acts under control when the practice was followed in the 1600s.

    For example, the mob had to mediate its insults and actions because they had to live with the neighbors for years afterward and mutual friends would check the mobs' actions.

    Whether bullying people online or tracking down a stranger's phone number to send threatening messages, technology has removed those constraints while multiplying the number of attackers.

  • tamarawilhite profile imageAUTHOR

    Tamara Wilhite 

    3 years ago from Fort Worth, Texas

    The problem with the "fake news" meme is that liberal sources tend to check against liberal sources, and when liberal sources don't report matters like Clinton's health problems, the few outlets that DO report it are flagged as "fake".

    The other problem with "research for yourself" is that the mainstream media picks up the wave of outrage and rarely goes to the heart of the matter and uses the story to fit their narratives ... it gets framed as X privileged person offended Y group, and the truth is lost.

  • RachaelLefler profile image

    Rachael Lefler 

    3 years ago from Illinois

    One solution is don't believe things you hear in the news or on social media without investigating the facts of the matter yourself.

  • tamarawilhite profile imageAUTHOR

    Tamara Wilhite 

    3 years ago from Fort Worth, Texas

    Mr. Ronson's solution is for us to have empathy for the people that are too often sent horrific threats because they don't seem like people when we're sitting in front of a screen. In short, see them as people and recognize that given trends, it easily could be any of us.

    Yes, some of the targets of various incidents have committing suicide.

  • profile image


    3 years ago

    What was the authour's solution to getting them to stop ? Or did the targets end up homeless or commit suicide? Did any authourities step in to help the targets?

  • RachaelLefler profile image

    Rachael Lefler 

    3 years ago from Illinois

    "Once the target of the two minute hate is selected, liberal bullies see nothing as off limits and do anything and everything possible to ruin the lives of the target until a new target is offered up for abuse. " Yep, it's fucking sad. Pewdiepie, Milo, who won't they target?


This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, soapboxie.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://maven.io/company/pages/privacy

Show Details
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)