Other Shiny Penny Productions ➔

They're counting on you not being able to name it.

Find the Bullshit.

Name it — and you'll know what to do. Paste any email, message, offer, or conversation. We'll identify the tactic, read you the playbook, and show you the move.

5 free analyses remaining 🔑 Already subscribed?
📋 See Sample Reports 📖 Get the Field Guide — $24.99
1 What type of interaction?
2 Paste the content
3 Context (optional but helps accuracy)
--
Analyzing...

🚩 What We Found

📋 Recommendation

Scam
Phishing
Trolling
Extraction
Caution
Positive

Check the Video.

Paste video file metadata to check for signs of AI generation, deepfakes, or manipulation. Right-click any video file → Properties, or use a tool like MediaInfo.

? How to get video metadata
Windows: Right-click the video file → Properties → Details tab. Copy everything you see — codec, frame rate, dimensions, dates, all of it.
Mac: Right-click → Get Info, or open in QuickTime → Window → Show Movie Inspector. Copy all the details.
MediaInfo (free tool): Download from mediaarea.net — gives the most detailed metadata. Drag your video file in, switch to "Text" view, copy everything.
Online videos: Most platforms strip metadata. If a video was downloaded from social media with no metadata at all, that's worth noting — it makes verification harder.
1 What kind of video is this?
2 Paste the metadata
3 What did you notice? (check all that apply)
4 Context (optional but helps)
--
Analyzing...

🚩 What We Found

📋 Assessment

AI Generated
Manipulated
Suspicious
Unverifiable
Authentic Sign

The Bullshit Field Guide

A comprehensive reference of every con, scam, phishing trick, trolling tactic, logical fallacy, and manipulation technique — what they look like, how they work, and how to protect yourself. 72 core patterns, 74 variants, 146 ways people lie.

Want this guide as a formatted PDF you can save, print, or share?

📖 Download the PDF — $24.99 →
🚨 Scams & Fraud
Advance Fee Fraud
aka "419 Scam," "Nigerian Prince"
Promises a large payout (inheritance, lottery, investment return) but requires you to pay fees, taxes, or processing costs upfront. The payout never arrives. Each "fee" is followed by another.
"You've inherited $4.2 million from a distant relative. To release the funds, we need a $500 processing fee."
Legitimate windfalls never require upfront payment. If you didn't enter it, you didn't win it.
Ponzi / Pyramid Scheme
aka "Investment Club," "Multi-Level Marketing"
Early investors are paid returns using money from new investors, creating the illusion of profit. Collapses when recruitment slows. Pyramid schemes add layers of recruitment with commissions.
"I'm getting 15% monthly returns — guaranteed! You just need to bring in two friends to join."
Consistent high returns with "no risk" don't exist. If returns depend on recruiting others, it's a pyramid.
Romance Scam
aka "Sweetheart Scam," "Catfishing for Cash"
Builds a fake romantic relationship over weeks or months. Uses love bombing, emotional intensity, and fabricated crises to extract money. Always has excuses for not meeting in person (military, oil rig, overseas).
"I've never felt this way about anyone. I'm stuck overseas and my wallet was stolen. Can you wire me $2,000?"
If they can't video call, won't meet, and need money — it's a scam regardless of how real the feelings seem.
Tech Support Scam
aka "Remote Access Scam"
Claims your computer is infected or compromised. Creates urgency to get you to call a fake support number or grant remote access. Once in, they steal data, install malware, or charge for fake "repairs."
"SECURITY ALERT: Your computer has been compromised. Call Microsoft Support immediately at 1-800-XXX-XXXX."
Microsoft, Apple, and Google will never pop up alerts asking you to call. Real security software doesn't use phone numbers.
Pressure Sale / Urgency Manufacturing
aka "Limited Time," "Act Now"
Creates artificial time pressure to prevent you from thinking clearly, researching, or consulting others. Legitimate businesses don't need to rush you because their product stands on its own merits.
"This price is only available for the next 30 minutes! Only 2 spots left!"
Any deal that disappears because you took time to think was never a good deal. Walk away and see if it comes back.
Affinity Fraud
aka "Community Scam," "Church Scam"
Targets tight-knit communities (religious, ethnic, professional, military) by exploiting trust networks. Uses a community member (real or fake) to vouch for legitimacy. Particularly devastating because victims are reluctant to report it.
"Brother Johnson from the congregation put his whole family's savings in. It's how our community takes care of each other."
Shared identity doesn't equal shared trustworthiness. Verify independently regardless of who's vouching.
Pig Butchering
aka "Sha Zhu Pan," "Crypto Romance"
Combines romance scam with fake investment platform. "Fattens the pig" with small profitable trades on a fake exchange before encouraging larger deposits that can never be withdrawn. Often run by trafficking victims.
"I made $50,000 last month on this trading platform. Let me teach you — start with just $500."
If a romantic interest introduces you to an investment platform, it's a scam. Always. No exceptions.
🎣 Phishing & Email Fraud
Credential Harvesting
aka "Fake Login," "Account Verification Phishing"
Sends you to a fake website that looks like a real login page (bank, email, social media). When you enter your password, they capture it. URLs often have subtle misspellings or extra characters.
"Your account security needs verification. Log in at paypa1-secure.com to confirm your identity."
Never click login links in emails. Go directly to the site by typing the URL yourself. Check for "l" vs "1" and "0" vs "O" in URLs.
Spear Phishing
aka "Targeted Phishing," "Whaling" (when targeting executives)
Unlike mass phishing, this targets specific individuals using personal details scraped from social media, data breaches, or company websites. Makes emails seem highly credible because they reference real names, projects, or events.
"Hi Sarah, following up on our conversation at the Denver conference. Here's the proposal you asked for." [malicious attachment]
Verify unexpected attachments through a separate communication channel, even from people you know.
Smishing & Vishing
aka "SMS Phishing," "Voice Phishing"
Phishing via text message (smishing) or phone call (vishing). Text messages create urgency about package deliveries, bank alerts, or account issues. Phone calls impersonate banks, IRS, or tech support.
"USPS: Your package could not be delivered. Schedule redelivery: [suspicious link]"
The IRS never calls demanding immediate payment. Banks never text asking for your password. Carriers don't text random tracking links.
Business Email Compromise (BEC)
aka "CEO Fraud," "Invoice Scam"
Impersonates a boss, vendor, or partner via email to redirect payments. Often uses slightly altered email domains. May hack a real account and insert themselves into existing email threads.
"Hi, I need you to wire $42,000 to our new vendor account ASAP. Use this updated routing number. Keep this between us for now."
Always verify payment changes by phone using a number you already have — not one from the email.
QR Code Phishing (Quishing)
aka "QR Jacking"
Places malicious QR codes over legitimate ones (on parking meters, restaurant menus, flyers) that redirect to phishing sites or trigger malware downloads. Exploits the fact that most people scan QR codes without checking where they lead.
Sticker placed over a restaurant's real QR code menu that redirects to a fake "order and pay" page.
Check if a QR code sticker was placed over another one. Preview the URL before opening. Be suspicious of QR codes in unexpected places.
🎩 Con Games & Classic Fraud
The Long Con
aka "Big Con," "The Sting"
Extended fraud that builds trust over weeks or months before the actual theft. The con artist invests time, appears legitimate, may even give you small wins or gifts. The payoff comes when trust is fully established.
A "business partner" who takes you to dinners, introduces you to "investors," and delivers on small promises before asking you to invest $100,000 in a "can't miss" deal.
The most dangerous cons feel like genuine relationships. If someone seems too perfect, too generous, or too aligned with your dreams — slow down and verify everything independently.
Bait and Switch
aka "Switcheroo," "False Advertising"
Advertises one thing (low price, specific product, attractive terms) to get your attention, then switches to something inferior or more expensive once you're committed. Uses your investment of time and energy against you.
"That model is sold out, but I have something even better for just $200 more."
If what you were promised isn't available, walk away. Your time investment isn't a reason to accept less.
The Pigeon Drop
aka "Found Money Scam"
A stranger "finds" money or valuables near you and offers to split them. But first, you need to put up "good faith money" or pay taxes/fees. The found money is fake; yours is real and gone.
"Look what I found! There's $10,000 in this envelope. Let's split it — I just need you to hold $500 as good faith while I get it verified."
Found money from strangers is always a setup. Walk away immediately.
Pretexting
aka "Pretext Call," "Social Pretexting"
Creates a fabricated scenario (pretext) to justify extracting information or money. The con artist poses as a researcher, government official, bank employee, or IT support to make their request seem routine.
"This is the fraud department at your bank. We've detected suspicious activity. Can you verify your account number and the last four of your Social?"
Hang up and call back using the number on your card or statement. Legitimate institutions never ask for full credentials by phone.
Authority Impersonation
aka "Badge Flash," "Fake Official"
Poses as police, IRS agents, utility workers, or other officials. Exploits the human tendency to comply with authority figures. May threaten arrest, fines, or service shutoff to create compliance.
"This is Officer Martinez with the county sheriff. There's a warrant for your arrest for unpaid fines. You can resolve this now with a payment of $1,500."
Real law enforcement doesn't call demanding payment. Real IRS sends letters first. Real utility workers have verifiable ID and scheduled appointments.
Charity Fraud
aka "Disaster Scam," "Fake Charity"
Exploits generosity after disasters, during holidays, or around emotional causes. Uses names similar to real charities, pressure tactics, and emotional manipulation. Very little or none of the money goes to the stated cause.
"We're collecting for the hurricane victims. Any amount helps. We can take your credit card right now over the phone."
Donate directly through charities you know. Check Charity Navigator. Never give credit card info to unsolicited callers.
🎭 Trolling & Bad Faith Tactics
Sealioning / JAQing Off
aka "Just Asking Questions," "Concern JAQing"
Asks an endless series of questions disguised as genuine curiosity. The goal isn't to learn — it's to exhaust you, waste your time, and make you look unreasonable for eventually refusing to engage. Each answer generates five more questions.
"I'm just trying to understand. Can you explain why? But what about this case? Can you prove that? What's your source for that specific claim?"
If someone's questions never end and they never acknowledge your answers, they're not actually curious. State your position once and disengage.
Gaslighting
aka "Reality Denial," "Crazy-Making"
Systematically denies your experience, memory, or perception of events. Makes you question your own reality. Can be interpersonal (a partner) or institutional (an organization denying documented facts). Named after the 1944 film.
"That never happened. You're imagining things. Everyone else remembers it differently. You're being paranoid."
Document everything. Trust your records over someone else's reinterpretation. If someone regularly makes you doubt your own memory, that's the pattern.
Whataboutism
aka "Tu Quoque," "Deflection"
Responds to criticism by pointing to someone else's wrongdoing rather than addressing the point. Designed to deflect accountability and change the subject. Originally a Soviet propaganda technique.
"Sure, but what about when YOUR side did [unrelated thing]?"
Stay on topic. "That may also be worth discussing, but right now we're talking about X."
Strawman Arguments
aka "Misrepresentation"
Restates your position in an exaggerated or distorted way, then attacks the distortion rather than what you actually said. Makes it appear they've defeated your argument when they've actually argued against something you never claimed.
"So what you're REALLY saying is that you hate all veterans." (When you said military spending should be audited.)
"That's not what I said. I said [restate your actual position]. Please respond to what I actually said."
Concern Trolling
aka "I'm Worried About You"
Disguises attacks, undermining, or sabotage as helpful concern. The "concern" always leads to the conclusion that you should stop doing whatever they object to. Often used in professional settings to derail initiatives.
"I'm just worried that this project might hurt your reputation. Are you sure you want to put your name on it?"
Ask yourself: does this person have a history of supporting me? Is their "concern" consistently aligned with their own interests? Genuine concern offers help; concern trolling offers doubt.
Tone Policing
aka "Calm Down," "Be Civil"
Dismisses the content of your argument by criticizing your emotional tone. Puts the burden on you to perform calmness rather than addressing the substance. Particularly used to silence people raising legitimate grievances.
"I can't take you seriously when you're so emotional. Come back when you can discuss this rationally."
Emotions and logic aren't opposites. Someone can be both angry and correct. Don't let tone criticism become a substitute for substance.
Gish Gallop
aka "Argument Flood," "Firehose of Falsehood"
Overwhelms with so many arguments, claims, or accusations that it's impossible to address them all. Each unaddressed point is treated as "won." Quantity is used as a substitute for quality. Common in debates and online arguments.
Posts a wall of text with 15 different claims, half-truths, and misleading statistics in one message, then declares "victory" when you can't respond to all of them.
Pick the strongest or most central claim and address only that. "You've raised many points. Let's focus on the core one: [X]."
DARVO
Deny, Attack, Reverse Victim and Offender
First denies the behavior, then attacks the person who raised the concern, then reverses roles by claiming THEY are the real victim. A specific pattern documented by psychologist Jennifer Freyd. Common in abuse dynamics.
"I never did that. Why are you always attacking me? You're the one who's been abusive in this relationship."
Document the pattern. When someone goes from denial to counterattack to victimhood in rapid succession, that's DARVO — and it tells you more about them than about you.
🕵️ Social Engineering & Information Extraction
Pretexting
Creates a fabricated scenario to justify extracting information. May pose as IT support, a researcher, a new colleague, or a service provider. The pretext makes the request seem routine rather than suspicious.
"Hi, I'm from IT. We're doing a security audit and need to verify your login credentials."
Verify the person's identity through official channels before sharing any information, no matter how routine the request seems.
Elicitation
aka "Casual Extraction," "Conversational Intelligence"
Extracts sensitive information through seemingly casual conversation. Uses flattery, shared interests, deliberate mistakes (so you correct them with the real info), and reciprocity (sharing something about themselves to get you to share).
"I heard your company is working on that new project — the one with the $5 million budget, right?" (It's actually $15 million, and now you've corrected them.)
Be aware of conversations that seem to steer toward specific details about your work, finances, or schedule.
Love Bombing
aka "Idealization Phase"
Overwhelms you with excessive attention, affection, gifts, and promises early in a relationship. Creates emotional dependency before revealing controlling or exploitative behavior. Used in romance scams, cults, and abusive relationships.
Constant messages, grand declarations of love within days, making you feel like the most important person alive — then gradually increasing demands and control.
Genuine affection develops gradually. If it feels overwhelming and too fast, trust that instinct.
Isolation Tactics
aka "Divide and Conquer"
Separates you from your support network — friends, family, advisors — so you're dependent on the manipulator for information and emotional support. May badmouth your friends, create conflicts, or demand secrecy.
"Don't tell anyone about this. Your family wouldn't understand. I'm the only one who really gets you."
Any relationship that requires you to cut off other relationships is not healthy. Secrecy serves the person requesting it, not you.
Tailgating / Piggybacking
Follows an authorized person into a secure area, whether physically (holding the door) or digitally (using someone else's credentials). Exploits politeness and the human tendency to not challenge people who seem to belong.
"Oh, I forgot my badge. Could you hold the door? Thanks!" Then accesses restricted areas, networks, or information.
It's not rude to ask someone to use their own credentials. It's security.
🏛️ Political & Media Manipulation
Language Corruption
aka "Semantic Manipulation," "Doublespeak"
Systematically changing the meaning of words to serve political purposes. When "conservative" no longer means "conserve what works," when "liberal" no longer means "freedom," when "patriot" means unquestioning loyalty — the language itself becomes a tool of control. People end up fighting over words that no longer mean what they think.
Using "freedom" to mean deregulation that benefits corporations. Using "reform" to mean cuts. Using "security" to mean surveillance.
Ask what the word actually means — its root, its history. Then ask if the current usage matches. When words lose their meaning, thinking becomes harder.
Manufactured Outrage
aka "Outrage Machine," "Rage Bait"
Deliberately frames issues to provoke anger rather than understanding. Keeps people emotionally activated so they can't think clearly. Anger drives engagement, clicks, and donations — but it prevents problem-solving.
"THEY want to DESTROY your way of life!" (without specifying who "they" are or what specifically is threatened)
When you feel outrage, pause. Ask: What specifically happened? Who benefits from my anger? Am I being informed or activated?
False Equivalence
aka "Both Sides," "False Balance"
Presents two positions as equally valid when they're not. Gives fringe or debunked positions equal airtime with well-established facts. Creates the appearance of "fairness" while actually distorting reality.
Giving equal time to climate scientists and climate deniers, creating the impression of genuine scientific debate where there isn't one.
Balance isn't about equal time — it's about proportional representation of evidence. Look at the weight of evidence, not the volume of voices.
Firehose of Falsehood
aka "Information Warfare," "Flood the Zone"
Produces so many contradictory claims, lies, and distractions that fact-checkers can't keep up. The goal isn't to convince — it's to exhaust and confuse until people give up trying to know what's true. Nihilism becomes the default.
Making five contradictory claims in one press conference, then denying all of them the next day.
Don't try to debunk everything. Focus on the core claims. Recognize that confusion IS the strategy.
Scapegoating
aka "Othering," "Enemy Construction"
Blames a specific group (immigrants, minorities, elites, foreigners) for complex systemic problems. Simplifies complicated issues into a villain narrative. Redirects anger from the actual causes to a convenient target.
"If it weren't for [group], you'd have better jobs, safer streets, and a better life."
Complex problems have complex causes. When someone offers a simple villain, they're selling you a story, not a solution.
Weaponized Humor
aka "Laughing At vs. Laughing With"
Uses humor to normalize cruelty and create in-groups and out-groups. Laughing WITH people recognizes shared humanity. Laughing AT people creates separation and establishes dominance. When challenged, retreats to "it's just a joke."
Mocking vulnerable groups for laughs, then saying "Can't you take a joke?" when called out.
Genuine humor brings people together. If a "joke" requires someone to be the butt, it's not humor — it's a weapon in a comedy mask.
⚖️ Zero-Sum Transaction Tactics
Information Asymmetry
One party deliberately withholds material facts that would change your decision. Buries important terms in fine print, uses jargon to obscure meaning, or simply lies by omission. In a win-win transaction, both parties have the information they need.
A contract where the auto-renewal clause and cancellation fees are buried on page 47 of 50.
If you can't understand the terms after an honest effort, the complexity may be the point. Ask for a plain-language summary. If they won't provide one, that tells you everything.
Vulnerability Exploitation
Targets people in desperate situations — facing eviction, medical crises, grief, loneliness, or financial emergency. Offers "solutions" that extract maximum value from minimum delivery. The worse your situation, the more they stand to gain.
Payday loans at 400% APR targeting people who can't access traditional banking. "Miracle cures" marketed to the terminally ill.
When you're in crisis, that's when you're most vulnerable to bad deals. If possible, bring a trusted friend or advisor to any major decision made under duress.
Anchoring
aka "High-Ball / Low-Ball"
Sets an extreme starting point so any subsequent offer feels reasonable by comparison. A car listed at $40,000 "discounted" to $32,000 feels like a deal — even if it's worth $25,000. The anchor distorts your perception of fair value.
"This normally sells for $10,000, but I can get you a special price of $4,500."
Research actual value independently BEFORE seeing anyone's price. Your own research is the anchor that protects you.
Sunk Cost Trap
aka "Throwing Good Money After Bad"
Once you've invested time, money, or emotion, the manipulator leverages that investment to get more from you. "You've already paid for the first module, it would be a waste not to complete the course." Your past investment becomes the chain.
"You've already driven an hour to get here, you might as well sign the contract today."
Past investment is gone regardless. The only question is: does this deal make sense RIGHT NOW, starting from zero?
Win-Win vs. Win-Lose: The Test
In a genuine win-win, both parties benefit and the total value grows. In a zero-sum extraction, one party's gain comes from the other's loss. The key test: if the other party knew everything you know, would they still agree? If transparency would kill the deal, it's not a deal — it's a con.
Ask yourself: Would this offer survive full transparency? If either party would walk away with complete information, the arrangement isn't mutual — it's extraction.
🧠 Logical Fallacies
Ad Hominem
aka "Attack the Messenger"
Attacks the person making the argument instead of the argument itself. A flawed messenger can still deliver a valid point. This is one of the most common ways to shut down legitimate criticism.
"You can't trust her opinion on healthcare — she dropped out of college."
Ask: Is this about the argument or the person? A person's character is logically separate from whether their claim is true.
Variants
Abusive Ad HominemDirectly insults the person — their intelligence, appearance, or character — instead of addressing the argument. Circumstantial Ad HominemClaims the person's circumstances or self-interest make their argument invalid. "Of course you'd say that — you work for them." Tu Quoque"You do it too!" Deflects criticism by pointing out the accuser's hypocrisy. Hypocrisy doesn't make the original claim false. Poisoning the WellPreemptively attacking someone's credibility before they even speak, so the audience dismisses everything they say. Guilt by AssociationDiscrediting someone by linking them to a disliked person or group, rather than addressing their actual argument. Tone PolicingDismissing an argument because of how it's expressed (too angry, too emotional) rather than what it says.
Appeal to Authority
aka "Argumentum ad Verecundiam"
Cites an authority figure as proof — but the authority may not be relevant, qualified, or honest. Real authority provides evidence, not just credentials. Credentials in one field don't transfer to another.
"A Nobel Prize-winning physicist says this investment is sound." (Their expertise is physics, not finance.)
Check: Is this person an expert in THIS specific topic? Do other experts agree? Credentials alone aren't evidence.
Variants
Appeal to False AuthorityCiting someone with credentials in an unrelated field as if they're an expert on the topic at hand. Appeal to CelebrityUsing a famous person's endorsement as evidence, even though fame doesn't equal expertise. Ipse Dixit"He himself said it." Treating someone's bare assertion as proof simply because of who they are. Appeal to Ancient WisdomClaiming something is true because ancient or historical figures believed it. Old doesn't mean correct.
Appeal to Emotion
aka "Argumentum ad Passiones"
Substitutes emotional manipulation for evidence. Uses pity, joy, fear, or outrage to bypass your critical thinking. The feelings are real — the logic isn't.
"Think of the children!" (without explaining how the proposal actually helps children)
When you feel a strong emotion during an argument, pause. The emotion may be valid, but it's not evidence.
Variants
Appeal to Pity (Ad Misericordiam)Uses sympathy to win an argument instead of evidence. "You have to give me an A — I'll lose my scholarship!" Appeal to Fear (Ad Metum)Uses threats of terrible consequences to pressure agreement. Creates urgency that bypasses rational evaluation. Appeal to FlatteryUses compliments to lower your guard. "Someone as smart as you can obviously see why this is a great deal." Appeal to SpiteMotivates agreement through resentment or desire for revenge rather than evidence. Appeal to RidiculeMocks an argument to make it seem absurd without actually addressing its logic. Wishful ThinkingBelieving something is true because you want it to be true, not because evidence supports it.
Appeal to Ignorance
aka "Argumentum ad Ignorantiam"
Claims something must be true because it hasn't been proven false, or vice versa. Absence of evidence is not evidence of absence — but it's not proof either.
"Nobody has proven that this supplement doesn't work, so it must work."
The burden of proof belongs to the person making the claim. "We don't know" is a perfectly valid answer.
Variants
Argument from SilenceInterpreting someone's silence or lack of response as agreement or admission of guilt. Absence of EvidenceClaiming that because no evidence has been found against something, it must be true — ignoring that nobody looked.
Appeal to Nature
aka "Naturalistic Fallacy"
Assumes anything natural is inherently good and anything artificial is bad. Arsenic is natural. Vaccines are artificial. Nature doesn't care about your well-being.
"I only use natural remedies — chemicals are bad for you." (Everything is chemicals.)
Natural doesn't mean safe or effective. Evaluate things on evidence, not origin story.
Variants
Moralistic FallacyThe reverse — assuming that because something ought to be a certain way, it is that way. Confusing how things should be with how they are. Appeal to NoveltyThe opposite of Appeal to Nature — assuming something is better simply because it's new or modern.
Appeal to Tradition
aka "Argumentum ad Antiquitatem"
Argues that something is correct or good because it's been done for a long time. Longevity isn't evidence of quality — it might just mean nobody questioned it.
"We've always hired this way. Why change a system that works?" (Does it though?)
Ask: Has anyone actually measured whether this works, or has it just been assumed? Age of a practice says nothing about its value.
Variants
Appeal to NoveltyThe opposite — claiming something is better because it's newer. Both are fallacious; age alone (old or new) doesn't determine quality. Status Quo BiasPreferring the current state of affairs simply because it's familiar, regardless of whether better options exist.
Bandwagon Fallacy
aka "Argumentum ad Populum," "Appeal to Popularity"
Claims something is true or good because many people believe it or do it. Popularity is not proof. Millions of people believed the Earth was flat.
"Five million people have already signed up — you don't want to miss out!"
Popularity measures marketing, not truth. Ask: What's the actual evidence, independent of how many people bought in?
Variants
Snob AppealThe reverse — claiming something is better because few people know about it or can access it. Exclusivity isn't evidence of quality. Appeal to Common Practice"Everyone does it" as justification. Common behavior doesn't make something right or legal.
Begging the Question
aka "Circular Reasoning," "Petitio Principii"
The conclusion is hidden inside the premise. The argument assumes what it's trying to prove. It sounds complete but actually says nothing new.
"This company is the best because no one is better than us."
Restate the argument in simple terms. If the reason IS the conclusion in different words, it's circular.
Variants
Circular ReasoningA uses B as evidence, and B uses A as evidence. Neither is independently supported. Loaded ClaimA statement that sneaks in an unproven assumption. "When will you start being honest?" assumes you've been dishonest. Question-Begging EpithetUsing biased or loaded language in the premise that assumes the conclusion: "This wasteful program should be cut."
False Dilemma
aka "Black or White," "Either/Or," "False Dichotomy"
Presents only two options when more exist. Forces you into a box that benefits the manipulator. Real life almost always has more than two choices.
"You're either with us or you're against us."
When presented with only two options, ask: What are the other possibilities? Who benefits from limiting my choices?
Variants
False TrilemmaSame trick with three options instead of two. Still artificially limits choices to benefit the presenter. Perfectionist Fallacy"If it's not perfect, it's worthless." Eliminates all middle ground between flawless and useless. BifurcationForcing a complex, nuanced situation into two oversimplified categories. Reality usually exists on a spectrum.
False Cause
aka "Post Hoc," "Correlation ≠ Causation"
Assumes that because B followed A, A must have caused B. Ice cream sales and drowning deaths both rise in summer — but ice cream doesn't cause drowning.
"I started wearing this bracelet and my back pain went away. The bracelet cured me!"
Timing doesn't prove causation. Ask: What else changed? Could this be coincidence? Is there a mechanism that explains the connection?
Variants
Post Hoc Ergo Propter Hoc"After this, therefore because of this." Just because B came after A doesn't mean A caused B. Cum Hoc Ergo Propter Hoc"With this, therefore because of this." Two things happening together doesn't mean one causes the other. Regression FallacyAttributing a natural statistical return to average to some intervention. Things that are extreme tend to become less extreme on their own. Single Cause FallacyAssuming a complex outcome has just one cause when it actually has many contributing factors. Reverse CausationGetting the cause and effect backwards. Maybe A didn't cause B — maybe B caused A.
Slippery Slope
aka "The Domino Nightmare," "Thin Edge of the Wedge"
Claims one small step will inevitably lead to an extreme outcome, without evidence for the chain of events. Uses fear of the extreme to prevent the reasonable.
"If we allow flexible work hours, soon nobody will come in at all, and the company will collapse."
Each step in the chain needs its own evidence. Ask: What's the actual probability of each step happening?
Variants
Camel's Nose"If you let the camel put its nose in the tent, soon the whole camel will be inside." Assumes any small concession guarantees total collapse. Parade of HorriblesListing increasingly terrible imagined consequences to argue against a modest proposal. Domino FallacyClaiming a chain of events will inevitably follow from one action, without evidence that any single link in the chain is probable.
Red Herring
aka "Look Over There!," "Ignoratio Elenchi"
Introduces an irrelevant topic to divert attention from the real issue. Drags the conversation off track so the original point gets lost. A classic deflection.
"Why didn't you finish the report?" "Well, I've been under a lot of stress AND nobody appreciates how early I come in every day."
Stay on topic. When someone changes the subject, bring it back: "I hear you, but let's address the original question first."
Variants
Smoke ScreenDeliberately flooding a discussion with irrelevant information to obscure the real issue. Irrelevant ConclusionProviding an argument that may be valid on its own but has nothing to do with what was actually asked. Missing the PointDrawing a conclusion that doesn't follow from the evidence presented, even though the evidence might support a different conclusion.
Straw Man
aka "Misrepresentation"
Distorts someone's argument into an exaggerated or weaker version, then attacks the distortion. Makes it look like they've won when they've actually argued against something nobody said.
"I think we should spend less on the military." → "So you want to leave America defenseless?"
"That's not what I said. I said [restate your actual position]. Please respond to what I actually said."
Variants
Hollow ManInventing an argument that nobody actually made, then defeating it. Attacks a position that exists only in the attacker's imagination. Iron ManThe reverse — strengthening someone's argument beyond what they actually said, then agreeing with the stronger version to avoid addressing the real one. Nut-PickingFinding the weakest or most extreme representative of a position and treating them as if they speak for everyone who holds that view.
Hasty Generalization
aka "One Bad Apple," "Jumping to Conclusions"
Draws a sweeping conclusion from a tiny sample. One bad experience becomes a universal rule. It's how stereotypes are born and how fear overrides data.
"I had a terrible meal at that restaurant once, so all their food must be bad."
Ask: How large is the sample? One experience — or even a few — doesn't represent the whole. Look for patterns across real data.
Variants
Anecdotal FallacyUsing a personal story or isolated example as if it disproves well-established data or trends. Sweeping GeneralizationApplying a general rule to every specific case without considering exceptions or context. Sampling BiasDrawing conclusions from a sample that doesn't represent the whole population. Like surveying only your friends about a national issue. StereotypingApplying assumed group characteristics to an individual without evidence. A hasty generalization made personal.
False Equivalence
aka "Both Sides," "False Balance"
Presents two positions as equally valid when they're not. Gives fringe or debunked positions equal weight with well-established facts. Creates the appearance of fairness while distorting reality.
Giving equal time to climate scientists and climate deniers, creating the impression of genuine scientific debate where there isn't one.
Balance isn't about equal time — it's about proportional representation of evidence. Look at the weight of evidence, not the volume of voices.
Variants
Golden Mean FallacyAssuming the truth must lie between two extremes. Sometimes one side is simply wrong. Moral EquivalenceEquating actions of vastly different moral severity as if they're comparable. Jaywalking isn't the same as armed robbery.
Loaded Question
aka "The Trap Question," "Complex Question"
A question that contains a hidden assumption you accept just by answering. Any response seems to confirm the assumption. Designed to put you on the defensive.
"Have you stopped cheating on your taxes?" (Assumes you were cheating.)
Reject the premise before answering. Say: "That question assumes something that isn't true. Let me reframe it."
Variants
Leading QuestionA question phrased to suggest the desired answer: "Don't you think this is a great idea?" vs "What do you think of this idea?" Plurium InterrogationumPacking multiple questions into one so that any single answer appears to address all of them.
Burden of Proof Shifting
aka "Prove Me Wrong," "Onus Probandi"
Makes a claim and then demands YOU disprove it instead of providing evidence themselves. The person making the assertion has the responsibility to back it up.
"This product cures everything. If you disagree, show me the studies that say it doesn't."
You don't have to disprove claims that were never properly proven. Ask them for their evidence first.
Variants
Russell's TeapotBertrand Russell's illustration: you can't disprove that a tiny teapot orbits the sun, but that doesn't make it true. Unfalsifiable claims aren't evidence of anything. Proving a NegativeDemanding proof that something doesn't exist — which is often logically impossible. You can't prove unicorns DON'T exist somewhere.
Equivocation
aka "The Word Switcharoo," "Ambiguity Fallacy"
Uses the same word with different meanings at different points in the argument, making it seem logical when it isn't. Exploits the natural ambiguity of language.
"The law says you have the right to bear arms. I have arms. Therefore, the law gives me rights." (Two different meanings of "arms.")
When an argument feels slippery, check if key words are being used consistently. Pin down definitions.
Variants
AmphibolyExploiting grammatical ambiguity rather than word meaning. "I saw the man with the telescope" — who had the telescope? Accent FallacyChanging the meaning by shifting emphasis. "We should not speak ILL of our friends" vs "We should not speak ill of OUR friends." Motte and BaileyMakes a bold, controversial claim (the bailey), then when challenged, retreats to a modest, easily defensible claim (the motte) and pretends they're the same thing.
Moving the Goalposts
aka "That Doesn't Count," "Raising the Bar"
Changes the criteria for proof after you've met the original standard. No matter what evidence you provide, it's never enough. The target keeps moving.
"Show me one study." [You show a study.] "Well, that's only one study, show me ten."
Pin down the criteria BEFORE the debate. When goalposts move, name it: "I met your original standard. Why did it change?"
No True Scotsman
aka "Not a Real One," "Appeal to Purity"
Redefines a group to exclude counterexamples. When confronted with evidence that contradicts a generalization, the counterexample is dismissed as "not a real" member of the group.
"No good parent would let their kid eat sugar." "My neighbor does and her kids are great." "Well, she's not a REAL good parent."
Watch for redefinitions that conveniently exclude evidence. If the definition keeps changing to protect the claim, the claim is weak.
Gambler's Fallacy
aka "Due for a Win," "Monte Carlo Fallacy"
Believes past random events affect future ones. A coin that landed heads 10 times is not "due" for tails. Each flip is independent. Casinos love this fallacy.
"I've lost five hands in a row — I'm due for a win, so I should bet big."
Random events don't have memory. Past outcomes don't change future probabilities in truly random situations.
Variants
Hot Hand FallacyThe reverse — believing a streak of wins means you're "on a roll" and can't lose. Success in random events doesn't predict continued success. Inverse Gambler's FallacyObserving an unlikely outcome and assuming it must have been preceded by many attempts. Seeing a double six and concluding the dice must have been rolled many times.
Special Pleading
aka "Rules for Thee, Not for Me"
Applies standards to others but claims an exemption for oneself without adequate justification. The rules are real — they just don't apply to ME because I'm different.
"Everyone should follow the speed limit, but I'm running late so it's fine if I speed."
If someone can't justify WHY they're exempt, the exemption is self-serving. Rules that only apply to others aren't rules — they're weapons.
Variants
Ad Hoc RescueWhen a claim is disproven, inventing a new exception on the spot to save it rather than accepting the evidence. Double StandardApplying different rules to different people or situations based on convenience rather than principle.
Texas Sharpshooter
aka "Cherry-Picking"
Selects data that supports a conclusion while ignoring data that contradicts it. Like painting a target around wherever the bullet hit and calling it a bullseye.
"Our product worked for these 10 customers!" (Ignoring the 90 it didn't work for.)
Ask: What's the full data set? Success stories without context are marketing, not evidence.
Variants
Survivorship BiasFocusing on successes while ignoring failures. Studying only successful companies to find "success factors" ignores that failed companies did the same things. Confirmation BiasSeeking out and remembering information that confirms what you already believe while ignoring contradictory evidence. Incomplete EvidencePresenting only evidence that supports your position while withholding evidence that contradicts it.
Genetic Fallacy
aka "Consider the Source," "Fallacy of Origins"
Judges an idea based on where it came from rather than on its own merits. An idea from a questionable source can still be right. A perfect source can still be wrong.
"That idea came from a competitor, so it can't be good for us."
Evaluate ideas on their own evidence and logic, not their origin. Good ideas don't care who had them first.
Variants
Etymological FallacyClaiming a word must mean what it originally meant. "Decimate must mean 'reduce by 10%' because that's the Latin root." Languages evolve. Appeal to TraditionJudging something positively because of its long history. Age doesn't determine truth.
Nirvana Fallacy
aka "The Perfect Solution Fallacy"
Rejects a real solution because it isn't perfect. Compares realistic options to an impossible ideal. Used to block progress by demanding perfection as the only acceptable outcome.
"Why bother with solar panels? They don't work at night, so they're useless."
Nothing is perfect. The question isn't "Is this perfect?" but "Is this better than what we have now?"
Variants
Perfect is the Enemy of GoodRefusing to implement a good solution because a perfect one might theoretically exist. Prevents any progress. Relative Privation"Children are starving in Africa" — dismissing a problem because a worse problem exists somewhere. Multiple problems can matter simultaneously.
Composition & Division
aka "Part-Whole Error"
Composition: Assuming what's true of parts must be true of the whole. Division: Assuming what's true of the whole must be true of every part. Both are errors in scaling logic up or down.
Composition: "Every player on this team is excellent, so the team must be excellent." Division: "This is a wealthy country, so everyone in it must be wealthy."
Groups and their members don't automatically share properties. Check whether the reasoning actually scales.
Variants
Ecological FallacyDrawing conclusions about individuals based on group-level data. "This county voted 60% blue" doesn't tell you how any individual voted. Exception FallacyDrawing conclusions about a group based on one member. The reverse of the ecological fallacy.
Middle Ground Fallacy
aka "Argument to Moderation," "Argumentum ad Temperantiam"
Assumes the truth must lie between two extreme positions. Sometimes one side is simply right. Splitting the difference between fact and fiction gives you half a lie.
"Scientists say the Earth is 4.5 billion years old, he says 6,000. The truth is probably somewhere in between."
Compromise is a negotiation strategy, not a truth-finding method. Evaluate each position on its evidence, not its distance from the other.
Sunk Cost Fallacy
aka "Throwing Good Money After Bad," "Concorde Fallacy"
Continuing to invest in something because of how much you've already invested, rather than evaluating whether it makes sense going forward. Past investment is gone regardless of future decisions.
"I've already read 300 pages of this terrible book — I have to finish it."
The only question is: does this make sense RIGHT NOW, starting from zero? Past spending doesn't obligate future spending.
Variants
Escalation of CommitmentIncreasing investment specifically because of previous losses — doubling down to "justify" what's already spent. Loss AversionFearing losses more than valuing equivalent gains. Losing $100 feels worse than gaining $100 feels good, distorting rational decision-making.
Appeal to Consequences
aka "Argumentum ad Consequentiam"
Argues that something must be true (or false) based on whether the consequences would be pleasant or unpleasant. The truth of a claim is independent of whether you'd like the results.
"Climate change can't be real — the economic consequences of addressing it would be devastating."
What's true and what's convenient are different questions. Reality doesn't care about our preferences.
Variants
Argument from Incredulity"I can't imagine how this could be true, so it must be false." Your inability to understand something doesn't make it untrue. Appeal to Force (Ad Baculum)Using threats of negative consequences to force agreement. "Agree with me or face consequences" isn't an argument — it's coercion.
The Fallacy Fallacy
aka "Argument from Fallacy"
Assumes that because an argument contains a fallacy, the conclusion must be false. A bad argument for a true conclusion doesn't make the conclusion wrong — it just means the argument didn't prove it.
"Your argument for climate change used an appeal to authority, so climate change must be false."
A conclusion can be correct even when supported by a bad argument. Identify fallacies, but evaluate conclusions on ALL available evidence.

What is BullshitFinder?

BullshitFinder.fyi is a tool for identifying manipulation, fraud, logical fallacies, and bad-faith tactics in everyday life. Paste any email, chat message, social media post, sales pitch, or news article and get an instant analysis of what's really going on.

It doesn't just tell you something's wrong — it tells you exactly WHAT technique is being used against you, by name, with an explanation of how it works.

The Video Checker analyzes video file metadata and visual characteristics to help determine whether a video is authentic, AI-generated, or manipulated. In an era of deepfakes and AI-generated content, knowing what you're looking at matters.

Why does this exist?

We live in an age where the average person encounters dozens of manipulation attempts every day — scam emails, misleading ads, political spin, online trolls, predatory contracts, romance scams. Most people know something feels "off" but can't articulate what.

BullshitFinder gives you the vocabulary and the framework to name what's happening. Because once you can name it, you can stop it.

This tool is built on the principle that authentic exchange — where both parties genuinely benefit — is the only sustainable model. Everything else is extraction. The Bullshit Finder helps you tell the difference.

$25
per year — unlimited use
  • Unlimited content analysis
  • All detection categories
  • Complete Field Guide access
  • New patterns added regularly
  • No ads, no data selling, ever
Subscribe Now →
📖
$24.99
one-time — instant PDF download
The complete Bullshit Field Guide — 72 core patterns, 74 variants, 146 ways people lie. Every con, scam, phishing trick, trolling tactic, logical fallacy, and manipulation technique. Yours to keep.
  • All 146 techniques with examples
  • Plain-language protection tips
  • Formatted, printable PDF
  • One-time purchase, no subscription
Get the Field Guide — $24.99 →

The Philosophy

The Bullshit Finder is part of the TransformativeArts Framework (TAF), developed over fifty years of work in education, psychology, and creative expression. TAF holds that the deepest part of every person is good, and that manipulation tactics exploit our best qualities — trust, compassion, curiosity, generosity — against us.

Understanding how these tactics work isn't about becoming cynical. It's about protecting your ability to trust genuinely by learning to recognize when that trust is being exploited.

Who made this?

BullshitFinder.fyi is a product of Shiny Penny Productions L3C, based in Burlington, Vermont. Built by Scott Thomas Carter, M.M. (Eastman School of Music), drawing on five decades of teaching, creative work, and the lived experience of knowing exactly what it's like when the systems that should protect you are running on bullshit instead.

🔑 Restore Your Subscription

Enter the email you used when you subscribed through Stripe. This activates unlimited access on this device.

Your email is stored locally on your device only — never sent anywhere.

Not subscribed yet?

Subscribe — $25/year for unlimited access →

Share Your Feedback

Help us improve — your voice matters.

🛑 This doesn't look like feedback.

🔒 100% Anonymous unless you add your email. We read every single one.