Attention Hijacking, AI, Elon Musk and Other Revelations

The Rise Of Surveillance Capitalism. The truth.

Photo Credit: The Matrix, movie screenshot

As the book Funky Business puts it “the internet is neither good or bad- the internet just is.” Noting a few possible scenarios of how we could use the internet to do harm or good, the book goes to show that the simple inventory of all the things that could go wrong with the internet, also means missing the point and a lot of opportunity.

Today, almost 2 decades after the release of Funky Business, several other important business books are heavily criticizing the market capitalism, raising cause for concern on what capitalism is turning into in the internet, digitalized age. These theories bring to the forefront more of the negative scenarios that could potentially turn dark, in the internet age, stating  valid reasons for concern.

Some of the predictions in these books have since come true, on both sides, good and bad, the whole nine yards.

We clearly see today how we are shifting to a new form of capitalism, something called “surveillance capitalism” as Soshana Zuboff predicted, e-business guru and former Harvard professor. This new kind of political and economical system predicted by Zuboff relies on a business model that is looking to hook us all together to this larger than life networks, constantly profiting off one valuable resource: our undivided attention, cashing in on customer data extraction.

Attention, a commodity that can be sold

Photo: Post-Truth Digital Art, Graphic Design, Illustration by Guillo H

But let’s just layoff for a while from books and theories and focus on attention (yeah, you read that right let’s focus on focus itself). You know how people usually say that “the internet offers free access to information” right? Well, think again. What if I told you that the information you are receiving, no matter the medium, is not really free. It comes at the cost of your attention. In other words, information consumes attention. And in the internet age, that means that attention is a commodity that can be sold. Now I know it all sounds straight out of a Morpheus meme, the charismatic Matrix character offering you a choice between the red and the blue pill, but it’s all true ( You hear that Mr. Anderson? That is the sound of inevitability).

There are studies that show the exact dollar figure of your attention down to the hour. For Youtube for example, your attention can be estimated as being worth 4 cents an hour , for the company (You can read more on what is called attention hijacking in “The attention economy is eating our brains” by Dorian Peters here).

Not only does the internet age create products out of your gray matter, but it can also lead to excessive surveillance and the atomization of a police state, proving extremely dangerous in the wrong hands.

For the time being having a VPN in place is a real solution to overturn the effects of excessive surveillance or of any surveillance for that matter. Having your consumer data travel trough an encrypted tunnel from end to end, such a simple yet effective tool as a VPN can prove really helpful for anyone valuing privacy, while bypassing geo-restrictions to access content worldwide.

AI, a game of clones

3D Rendering Credit: Steve Barrett, Embrio III

But the latest word buzz in technology is not surveillance, nor is it attention, it comes in the form of AI. Perhaps many of us know Elon Musk’s technology endeavors, when it comes to electric cars, high speed transportation, reusable cargo rockets or solar panels through Tesla, Hyperloop, Space X and Solar City. However fewer have heard of his neurotechnology company Neuralink. Neuralink is a neuroscience company basically looking to build an interface for the brain.

 

In the HBO series Axios, Elon Musk shares a few revelations about AI technologies and how we could avoid the dangers and employ it instead for the greater good of humanity:

 

“Probably a bigger risk than being hunted down by a drone is that AI would be used to make incredibly effective propaganda that we’re not seeing like propaganda, influence the direction of society, influence elections. Artificial intelligence just hones the message, hones the message, checks, looks at the feedback, makes the message slightly better within milliseconds, it can adapt its message and shift and react to news.” Elon Musk, Axios, HBO serie, season 1, episode 3 – watch an extract of the interview here.

 

When asked about the interface to the brain Neuralink is trying to develop and when could such an interface implant be available, Elon Musks says: “It’s probably on the order of a decade. And by the way, you kindda have this already, in a weird way in that you have a digital tertiary layer in the form of your phone, your computers, you basically have this computing devices that form a tertiary layer on your cognition. Already.”

 

Easy to understand why so many studies show that we are in fact hard wired to like these digital constructs that could one day become a part of our biology.

 

All in all, we don’t know wether Elon is an enthusiast when he predicts one decade until these new technologies could be out on the market or if it’s in fact an accurate estimation of time. They laughed at Jules Verne and boy have they laughed at Elon.  In the end however, he seems to always have the last laugh, even if a little bitter.

 

 

Till then, reminding ourselves that attention is a finite resource, that putting our focus where we need it and leaving it there despite distractions is a job we have the responsibility to achieve on our own.

Just Because You’re Paranoid Doesn’t Mean They’re Not Out To Get You.

Most Coveted Security Apps For ios That Actually Work

Photo Credit: Pink, illustration by Federico Piccirillo

As a rule, general and mundane, Apple devices come with built-in, default, security features, end-to-end encryption in the case of iMessage and generally have their own settings for protection purposes.

 

Nonetheless, one should remain wary about urban myths such as “Apple devices can’t get hacked”, as all devices including Apple’s are vulnerable and can be hacked particularly easier if you follow the above flawed logic.

 

 

As the online privacy issue plot thickens, it is becoming increasingly apparent that we might in fact be talking about internet privacy posthumously, as so many cybersecurity advocated are finding online privacy to be, well, dead.

 

 

Is this an exaggeration or is it the actual state of affairs of 2018’s internet, you be the judge! Looking at the major global security events of this year in retrospect might shed a light.

 

Starting with the inglorious attempt to block online privacy regulations, made by the US Senate and the House decision, in early April and then the Facebook scandal the same month, followed by the repeal of net neutrality in May- Is it far fetched to say that 2018 was ringing alarm bells in online security? Or is this just the new-normal, a dystopian flavored reality that we all live in and maybe the inherent cou

Photo Credit: Pink, illustration by Federico Piccirillo

rse of events, given the nature of the internet and what it means today to people, corporations and governments alike?

Add to the mix that much to the surprise of people supporting ideas like “let’s build a wall”, today’s threats are likely to come from the inside. Madonna was right all along, “the enemy is not out there, the enemy is within”. Take that republicans!

Not slipping into an endless rhetoric around the topic of internet security and how you can only get a migraine from pondering the new philosophical digital paradigm, is probably for the better here (especially since I don’t know any migraine remedies). Lucky enough I do have some security advice and that’s all we should be focusing on, so next time if you skip the whole intro to get to the practical point, I won’t mind.

Here are some of the most coveted security apps for your iOS devices, designed to give you an extra layer of security:

1Password

Keeps all your passwords safe, all in one place.

 

1Password is described by it creators as a tool that “remembers all your passwords for you, and keeps them safe and secure behind the one password that only you know.[..] Just add your passwords and let 1Password do the rest.” You can use the tool to periodically re-new your passwords with new strong ones that lo and behold, you don’t have to remember.

 

 

 

 

 

2. 1Blocker

a native Safari content blocker entirely supported by its users. You’ll be able to block ads, ad networks, scripts designed to track your activity and many more. Just give it a spin!

 

 

 

 

 

 

 

 

3. MyIP.io

a reliable VPN service that keeps your data extra safe, traveling through a tunnel encrypted from end to end, so nobody, not even your ISP will be able to make sense of it, since all your information will go through the VPN server and not your ISP’s. You will also be able to bypass geo-restriction.

 

 

 

 

 

 

4. Signal

encrypted messaging and voice-calling similar with Telegraph or Wire.

 

 

5. Keeply

 

will your store data creating alternate passwords for different levels of access to your device.

 

Online Security in the Post-Truth Era

Photo: Post-Truth Digital Art, Graphic Design, Illustration by Guillo H.

Humanist studies of the XXIst century postulate that beyond the objective and subjective realm of reality, therein lies a 3rd dimension: the intersubjective level.
The intersubjective realm of reality is also a recurrent theme in Yuval Noah Harari’s Homo Deus, part I, where the author carries forward the idea of meaning and how we as homo sapiens designate it.
The notion of post truth seems to be talking about similar ideas or at least to be one effect of the core intersubjective reality we all live in, since the beginning of articulated speech. Post-truth however, is a relatively new term, absorbed by the Oxford Dictionary in 2016 as the international word of the year.
Bear in mind that 2016 was also the year UK voted in favor of Brexit and Trump was elected the leader of the “free world”, so along came the word, organically, to describe the new zeitgeist.  
 

Photo: Truth and Lie Illustration by Ether Gzirishvili

“Post-truth” is used to describe a political culture “in which debate is framed largely by appeals to emotion disconnected from the details of policy, and by the repeated assertion of talking points to which factual rebuttals are ignored”. (source: Wikipedia)
 
According to a serious body of science we may all be living in a post-truth age, an age in which global warming is dicredited and denied even, and where social media is used to manipulate, polarise and divert from objective facts, while exploiting common subjective fears and opinion.
 
In the sharing, internet economy, data is the currency, an informational and economic asset capable of traveling the speed of light in a vacuum, when going through state of the art optical fibers. Able to operate at 99.7% the speed of light according to researchers at the University of Southampton in England. (source: Extreme Tech)
 
The digital world is now creating tangible value from big data so expect internet privacy to take an even more prominent route in the future. 
 
Nowadays, security must come in layers, not only in the corporate environment, but on a personal level also.
 
Here are a few things you might want to consider for an overall improved security of your online privacy and data. 
Get a VPN service for all your devices: 
 
The number one thing you need to get in line with is having a VPN connection. It’s really simple to use and just like that poof! your data travels through an encrypted tunnel, safe from prying eyes and encrypted all the while. You basically need to pay a monthly subscription and rock on. It’s important that you don’t chose a free VPN as free VPN services are sure to get their profits elsewhere and it’s usually on your broadband expense. So avoid using unreliable free services that offer protection, but are in fact jeopardizing it.
 
Taking hold of your own digital footprint requires savvy, educated users, that know their rights and are not willing to compromise when it comes to their own privacy.
It’s easy to understand why more and more people resort to using a VPN service, rather than letting their information “fly” to unknown servers where they can be stored indefinitely.
Password Managers
Another simple step you can take to ensure your passwords are strong and that you have them all in order. Passwords managers are not written in stone, so naturally they can be hacked, but is far less likely to have your password hacked than it is to have one and the same password for multiple platforms and have your data compromised by relying on your memory alone.
2Factor Authentification 

We know it can be annoying to have an extra layer of access when you’re in a hurry, but remember you will not be prompted with a 2fact auth method if you don’t switch devices often.

Back Up

Back up is the most obvious security measure that you can take, but people are often just not doing it. Regardless if you back up locally on a hard drive or in the cloud, you can do the extra mile and encrypt everything before backing up your data and you can be certain that your data is safe or that you can at least do a roll back to the most recent version previously saved. 
 
 
Taking a few measures to securely navigate the valley of post-truth are of the essence in fearing no evil. Keeping our heads clear and taking action to protect the digital environment we expose ourselves to on a daily, without having to go to extreme lengths to do so, is the way to go in 2018.

Having a VPN in place is the smart approach to getting around all this. Think at a VPN as the middleman between you and the internet, where your ISP can only see a bunch of encrypted traffic. And since your VPN knows as much as your ISP would, it’s very important to choose a reliable one with a zero log policy and a strong encryption.

Services like MyIP.io will offer you a self-managed VPN platform, delivering fast, secure and reliable VPN service . This platform caters to a wide demographic through three channeled directions: Personal, Dedicated and Business, so it makes for a wonderful choice for corporate or personal use at the same time. Whatever provider you may chose, remember that the smart approach is to use a VPN service that you feel is the best match for you. Until then, stay smart, use a VPN!