• Ogmios@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    5
    ·
    edit-2
    4 months ago

    And then once you start to understand the ways that ideas are corrupted by hacks, you can start to see the same sort of behaviour even when it has an official stamp of approval from an ostensibly legitimate organization. Take the ‘cybersecurity’ grift, for example, in which technical wizards pretend that they can definitively secure your vital computer systems, even with an always-on Internet connection, if you give them enough money.

      • Ogmios@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        4
        ·
        4 months ago

        The man behind the curtain is the intentional problems that are baked into your hardware, like how phones have a battery that can’t be disconnected from the wireless devices at all.