And then once you start to understand the ways that ideas are corrupted by hacks, you can start to see the same sort of behaviour even when it has an official stamp of approval from an ostensibly legitimate organization. Take the ‘cybersecurity’ grift, for example, in which technical wizards pretend that they can definitively secure your vital computer systems, even with an always-on Internet connection, if you give them enough money.
The man behind the curtain is the intentional problems that are baked into your hardware, like how phones have a battery that can’t be disconnected from the wireless devices at all.
And then once you start to understand the ways that ideas are corrupted by hacks, you can start to see the same sort of behaviour even when it has an official stamp of approval from an ostensibly legitimate organization. Take the ‘cybersecurity’ grift, for example, in which technical wizards pretend that they can definitively secure your vital computer systems, even with an always-on Internet connection, if you give them enough money.
deleted by creator
The man behind the curtain is the intentional problems that are baked into your hardware, like how phones have a battery that can’t be disconnected from the wireless devices at all.