Whenever news comes in about some sort of data breach or hacked service, we’re often treated with pictures of the assumed perpetrators and the way their office (bedroom? garage?) looks. Mentatul managed to get in touch with some of these unique people. They were happy that somebody is interested in their private lives and difficult working conditions.
Before Artificial Intelligence develops free will and would even be in a sufficiently advanced position to decide if humans are necessary on this planet, we seem to be doing a pretty good job of destroying ourselves anyway by giving a dangerous amount of power over to semi-intelligent algorithms. Enter the artificially intelligent hedge fund.
But what’s this talk about “destroying ourselves”? Can these things actually kill? Well, let’s look at this way: these algorithms are designed to make profits for their owners by moving investments from one company to the other. In other words, stock market algorithms are playing with the fate of companies in order to make profits for investors. But unlike a human, an algorithm is not programmed for empathy, mercy or intuition. Such algorithms could potentially annihilate a promising company simply because it made some errors in reporting or short-term financial planning.
I present you with one of the best geopolitical analysis articles I’ve read in the past couple of years. It’s also quite a long read. But if you care about the conflict between the world’s superpowers, this will be an excellent use of your time since it’s also very well written.
The text goes in ample detail regarding cyberwarfare and how Russia has become a force to be reckoned with in the field of social media manipulation. You will also learn why it was possible for Russia to influence the elections in the United States. In turn, this will make it clear that democracy is facing a threat as a result of the intense polarization affecting many societies on Earth.
When we read in the press about “hacking”, it’s mostly about software-based attacks. It may be about exploiting a vulnerability to reveal passwords or attacking an insecure computer.
Tiny hardware back-doors can be baked inside any integrated circuit. It’s not news that this is doable, but what is news is that it’s way too easy to achieve and almost impossible to detect. Even in the case of the highly advanced computer processors that are inside all our devices. Apparently it can be done by a single (well trained) person working inside the factory that manufactures the chip.