Phil Windley, former CTO of Utah and now CTO of a startup called Kynetx, has an inspiring, brief piece on how technologists can help build a technological world where technology helps us live better lives over which we have more control, and how a failure to do something to build this world will give us a place where we are continuously spied upon and manipulated.
We probably don’t really have a choice about whether a $0.03 wireless sensor platform will exist. Technology marches on.
But we do have a choice about how it will be employed. If we follow the path we’re on now, all those devices will be controlled by some company somewhere that is providing the service behind them. All that data that all those devices are gathering about you will be streamed back to a walled garden via an encrypted channel to end up as fodder for some big data analytics platform that will be used by someone to sell you more stuff. You will be spied on by everything around you with no rational way to understand where all that data is going and how it’s being used. We’ll create government regulations that will do little to rationalize your world or help you understand it because they will only succeed in further Balkanizing it.
There is another path: in this alternate world all the devices that are related to you will push their data into a place that you control. This will seem rational and natural because the model will follow the structure of the world you’re already used to with clear delineations between public and private spaces and easy-to-understand controls over how data is used and shared. I say “natural” in a literal way. This is the way the physical world works and we’re all used to it. In this alternate world you are in control.
Build the World You Want to Live In
(via Hack the Planet)
A new phishing attack hops from one Gmail account to the next by searching through compromised users’ previous emails for messages with attachments, then replies them from the compromised account, replacing the link to the attachment with a lookalike that sends you to a fake Google login page (they use some trickery to hide the […]
An anonymous editor from Crimethinc writes, “As 2017 opens, we face new challenges in an increasingly volatile world. Since last summer, we’ve been hard at work expanding our networks and updating our infrastructure to prepare for the global situation that is now unfolding. Over the next month, we’ll be announcing several ambitious new projects.”
danah boyd writes, “Yesterday, a group of us at Data & Society put out six essays on ‘media, technology, politics.’ Taken together, these pieces address different facets of the current public conversation surrounding propaganda, hate speech, and the US election. Although we only allude to specifics, we have been witnessing mis/disinformation campaigns for quite some […]
Using my iPhone while it’s charging is always a hassle. With tucked-away outlets and the meager length of included lightning cables, comfortable scrolling while plugged in is annoying. These 10-Ft MFi-Certified Lightning Cables are super convenient and probably the best iPhone accessory purchase I’ve made.At over three times the length of normal cables, these reach anywhere you […]
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]