Tumgik
#internet survailence
master-jarrus · 3 months
Text
They are still trying to pass KOSA
Please reblog so we can get this passed around
Remember they say it's for the kids but it isn't
36 notes · View notes
tiredmaster · 2 years
Text
One of my pet peeves is when Americans contextualise distinctly non-American media as if it were American. (Wow I said America a lot)
On one hand, I understand why, as it is their culture, politics, experience, etc. And the Americanised internet adds to it. But on the other hand, sometime its almost as if they're trying so hard to remove it from its original context and refuse to learn about anything that goes beyond their scope of politics.
One example of this is when DHMIS Wake Wakey trailer came out and certain people* were saying it was a commentary on Donald Trump. Like, ah yes, the British show made by two British creators who have historically made commentary on British media and politics want to talk about Donald Trump specifically and not the UK's issue of becoming increasingly right winged, conservative, and a survailence state. I'm sure the trailer which showed several security cameras, people being locked out of their homes, and keys and locks had nothing to do with London's ever increasing survailence and the most interesting parallel to draw here was that the duck resembled Donald Trump (and not every other right winged politician in general.)
107 notes · View notes
howgoodisatlasvpn · 14 days
Text
does vpn block survaillence
🔒🌍✨ Get 3 Months FREE VPN - Secure & Private Internet Access Worldwide! Click Here ✨🌍🔒
does vpn block survaillence
VPN Encryption
VPN encryption is a crucial aspect of ensuring online privacy and security in today's digital age. VPN, which stands for Virtual Private Network, encrypts data transmitted between a user's device and the internet, making it nearly impossible for unauthorized parties to intercept or decipher the data.
Encryption works by converting data into a complex code that can only be decrypted with the corresponding decryption key. This ensures that even if someone were to intercept the data, they would not be able to make sense of it without the key. VPN encryption uses advanced algorithms to secure data, providing users with a secure tunnel through which their internet traffic can pass.
There are different encryption protocols used by VPN providers, with the most common being OpenVPN, L2TP/IPsec, and IKEv2/IPsec. Each protocol has its strengths and weaknesses, with some prioritizing speed while others focus on security. Users can choose the protocol that best suits their needs based on their preferences for security, speed, and compatibility with their devices.
By encrypting data, VPNs help protect sensitive information such as passwords, credit card details, and personal communications from cybercriminals, hackers, and even government surveillance. Whether you're using a VPN for browsing the web anonymously, accessing geo-restricted content, or securing your connection on public Wi-Fi networks, encryption is a fundamental component that ensures your online activities remain private and secure.
In conclusion, VPN encryption plays a vital role in safeguarding your online privacy and security. By encrypting your data, VPNs provide a secure and private connection that protects your sensitive information from malicious actors. If you value your online privacy and security, using a VPN with robust encryption is a smart and effective solution.
Surveillance Evasion
Surveillance evasion refers to the act of avoiding or thwarting surveillance measures that are put in place to monitor individuals or activities. In today's digitally connected world, where privacy concerns are at an all-time high, the practice of surveillance evasion has gained traction among those seeking to protect their personal information and activities from prying eyes.
There are various reasons why individuals may engage in surveillance evasion. Some may be concerned about government surveillance and the potential infringement on their civil liberties. Others may be wary of data breaches and identity theft, prompting them to take steps to safeguard their online interactions. Additionally, activists and whistleblowers may actively engage in surveillance evasion to protect their identities and the sensitive information they possess.
Surveillance evasion can take many forms, ranging from using encrypted communication channels to employing anonymity tools such as virtual private networks (VPNs) and Tor browsers to mask one's digital footprint. Individuals may also take measures to limit the amount of personal information they share online, such as refraining from using social media platforms or opting for cash transactions to avoid electronic payment trails.
Despite efforts to evade surveillance, it is essential to note that complete anonymity on the internet is nearly impossible to achieve. Adversaries with sophisticated tools and resources may still be able to track and monitor online activities. Therefore, practicing good digital hygiene and being mindful of the information shared online are crucial aspects of surveillance evasion.
In conclusion, surveillance evasion is a means for individuals to protect their privacy and personal information in an increasingly monitored world. By adopting privacy-conscious behaviors and utilizing available tools, individuals can better safeguard their online activities from prying eyes.
Internet Privacy
Protecting Your Online Privacy: A Guide to Safeguarding Your Personal Information
In an era where virtually every aspect of our lives is intertwined with the digital world, safeguarding our online privacy has become paramount. Internet privacy refers to the ability to control what information you disclose about yourself online and how that information is used by others. With the proliferation of social media platforms, online shopping, and digital communication, our personal data has never been more vulnerable. Here's a comprehensive guide to help you protect your internet privacy:
Use Strong Passwords: Ensure that your passwords are unique and complex, combining letters, numbers, and special characters. Avoid using easily guessable information like birthdays or pet names.
Enable Two-Factor Authentication (2FA): Adding an extra layer of security to your accounts by enabling 2FA significantly reduces the risk of unauthorized access, even if your password is compromised.
Beware of Phishing Attempts: Be cautious of unsolicited emails, messages, or calls requesting personal information. Legitimate organizations will never ask for sensitive details such as passwords or financial information via email.
Review Privacy Settings: Regularly review the privacy settings on your social media accounts and adjust them according to your preferences. Limit the amount of personal information visible to the public and only share with trusted contacts.
Use Secure Networks: Avoid accessing sensitive information over public Wi-Fi networks, as they are often insecure and susceptible to hacking. Instead, use a virtual private network (VPN) to encrypt your internet connection and protect your data.
Regularly Update Software: Keep your operating system, antivirus software, and apps up to date to patch any security vulnerabilities that could be exploited by hackers.
By implementing these practices, you can take proactive steps to safeguard your online privacy and protect your personal information from falling into the wrong hands. Remember, being vigilant and informed is key to navigating the digital landscape safely.
Anonymity Protection
Anonymity protection is a critical consideration in today's digital age, where personal data can easily be accessed and misused. Whether you are browsing the internet, communicating online, or conducting financial transactions, safeguarding your anonymity is essential for privacy and security.
There are various tools and strategies available to help protect your anonymity online. Utilizing virtual private networks (VPNs) can cloak your IP address and encrypt your internet connection, ensuring that your online activities remain private and secure. Tor browser is another valuable tool that routes your internet traffic through a series of servers, making it challenging for anyone to track your online behavior.
When it comes to communication, using encrypted messaging apps such as Signal or Telegram can ensure that your conversations remain confidential. Avoiding sharing personal information on social media platforms and using pseudonyms or aliases instead of real names can also enhance your anonymity online.
In addition to digital protection, being mindful of your physical surroundings is also critical for maintaining anonymity. Avoiding public Wi-Fi networks, using secure passwords, and regularly updating your devices and software can help prevent unauthorized access to your personal information.
By taking proactive steps to protect your anonymity both online and offline, you can minimize the risk of identity theft, data breaches, and other privacy violations. Prioritizing anonymity protection is essential for safeguarding your digital identity and preserving your privacy in an increasingly interconnected world.
Online Security Measures
Online security measures are crucial in today's digital age to protect oneself from potential cyber threats and attacks. With the increasing number of online activities such as banking, shopping, and socializing, the need for robust online security measures has become more apparent than ever.
One of the key steps individuals can take to enhance their online security is by using strong and unique passwords for each online account. Weak passwords make it easier for hackers to gain unauthorized access to personal information, leading to potential identity theft and financial loss. It is recommended to use a combination of letters, numbers, and special characters to create a strong password that is hard to crack.
Another essential online security measure is to enable two-factor authentication whenever possible. This additional layer of security requires users to provide a second form of verification, such as a code sent to their mobile device, in addition to their password. Two-factor authentication significantly reduces the risk of unauthorized access even if the password is compromised.
Regularly updating software and operating systems is also crucial for maintaining online security. Software updates often contain security patches that address vulnerabilities that hackers can exploit. By keeping devices up to date, users can better protect themselves from potential cyber threats.
Lastly, being cautious of phishing scams and suspicious links can help prevent falling victim to online attacks. Phishing emails and websites often mimic legitimate sources to trick users into providing sensitive information. It is important to verify the authenticity of emails and links before clicking on them to avoid potential security breaches.
In conclusion, implementing strong passwords, enabling two-factor authentication, updating software regularly, and staying vigilant against phishing scams are essential online security measures to safeguard personal information and protect against cyber threats in today's digital landscape.
0 notes
a-curious-studyblr · 3 years
Text
Tumblr media
27/5/21 - my french language journal for the week is just me rambling about how fun Eurovision was and how much I missed it when it was cancelled cos of the pandemic last year lol. This week I'm still listening to some of that french canadian radio in the background too! (It keeps mentioning an election for a few weeks now... But I can't understand what that's about?! It's puzzling me so badddd pls help me canadians)
7 notes · View notes
preci1tm · 4 years
Text
Surveillance - Week Six Blog
Today my writing will be based around an article, “The Internet’s Original Sin”, and a video presentation, “The Internet With a Human Face”. Both links can be found at the end of this post.
After gaining knowledge from the two sources, about the amount of data that webpages are able to collect from an individual, makes me think about going on the internet much less.  One example to note is dealing with search engines such as Google.  When one searches on Google, Google is able to take that information from the search and generate an advertisement related to it. These advertisements become valuable and are worth the most money when they appear as someone is ready to make a purchase.
When an advertising company demonstrates that they are going to target people more that Facebook, will involve tracking users more closely. Companies will then begin to track what people do and search on their phone and track their physical location.  They will use this information to get the most suitable advertisement for the user in order to get them to make a purchase. Just the thought of this alone makes me think, “should I drop my smart phone and use a classic flip phone?” This will probably not happen for myself, but others may consider making the switch to a flip phone because it will carry much less personal data to be collected by hackers and the government.  Would you consider a flip phone after reading the article and watching the presentation?
Tumblr media
Even is one were to change from a smart phone to a flip phone, are they still safe?  The answer is probably not.  According to Maciej Ceglowski’s presentation video, under the Bush administration phone networks allowed them to tap peoples’ phones.  There were only one phone company that would not allow the NSA to tap peoples’ phones.  All other companies allowed the NSA to tap lines under one condition, that they got immunity against lawsuits.
With all that information from both the article and video presentation, it really makes me more question how much authority the government has, and if they already have too much authority.  But what is more questioning is when the amount of surveillance was released, many internet users came to just accept it, as long as the costs remained free.
The Internet’s Original Sin: https://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/
The Internet With a Human Face: https://vimeo.com/102717446
4 notes · View notes
01sentencereviews · 5 years
Link
Tumblr media Tumblr media
9 notes · View notes
geekghoulsmash · 5 years
Text
9/11 was a death knell. It shattered reality in a way I don't think we ever recovered from. Turn of the century America was very much focused on a cyber Utopia. It was bright, playful. Even our tech came in a rainbow of colors, so it felt more...ours. The internet had started to become a huge part of society. The world felt small, connected.
I spent the three years before 9/11 preparing for a world that did not exist when I graduated. The future didn't hold possibilities. The idea of a global community fell apart. My friends were going to war, not college. Death became a real, tangible, fear. Everything after that day has held the same painful uncertainty.
I watched the world as I knew it end, sitting in study hall, when I was 17. I sat, and felt the hope for the future slip away from a generation of children. Everything was different after that, even our classes. Teachers started giving us the tools to survive an oppressive government. We watched it become acceptable to survail citizens, with the Patriot Act, we watched the president start a preemptive war. Most of us hadn't liked him in 2000, but, we were too young to have a say.
The Drama Club had a trip to NYC planned for the spring, a trip planned before tragedy. And we did go. We went to the Statue Of Liberty. There were security checkpoints, and metal detectors, I got pulled aside, because my glasses set them off. Even then, the statue itself was closed. We were only allowed to walk around it. It wasn't safe to let people inside.
One of our stops was the wreckage of the twin towers. We stood on the sidewalk, looking down into the rubble where so many had died. Some kids cried, others said prayers for the dead, I stared at it, the same way I had watched the TV, in shock.
I couldn't quite believe what I was looking at.
I graduated in a world I didn't think could exist when the school year started.
13 notes · View notes
malangtoday-blog · 4 years
Photo
Tumblr media
Indonesia Infrastructure Week 2019 Pamerkan Produk IOT Nasional
Salah satu stand dalam pameran Indonesia Infrastructure Week 2019 yang digelar selama 6-9 November di JiExpo Kemayoran, Jakarta , Kamis (7/11). Foto: Dokumentasi PT Delameta Bilano – Antara
jpnn.com, JAKARTA – Ajang Indonesia Infrastructure Week 2019 Kementerian PUPR di JIExpo Kemayoran, Jakarta, 6-8 November lalu memamerkan sejumlah teknologi Internet of Things (IOT) produksi nasional.
Salah satunya ialah inovasi teknologi IOT dalam negeri di bidang Transportasi & Fintech, produk Delameta Bilano Group, perusahaan nasional yang bergerak di bidang produsen dan integrator control system.
Direktur Delameta, T Bayu menyatakan, produk yang dipamerkan dalam ajang yang dibuka Presiden Jokowi tersebut seperti Automatic Lane Barrier (Palang Lajur Otomatis) tercepat di dunia dengan kecepatan 0,28 detik.
Kemudian, E-Payment & QR Reader Enco, People Gate untuk MRT, Sistem Pembacaan Plat Nomor Otomatis (ALPR), Wush! Free Flow Transaction, Maritime Survaillance, Intelligent Traffic Command Center, Intelligent Parking System.
“Untuk Intelligent Parking System kami siap ekspor di awal tahun 2020 untuk kawasan Asia Tenggara khususnya Thailand, Malaysia, dan Timor Leste,” ujarnya.
Menurut dia, saat ini pihaknya mengelola transaksi nontunai di 19 ruas tol di Indonesia termasuk mendukung ruas Tol di Ibukota baru Balikpapan-Samarinda, dan juga lintas ekosistem transportasi seperti Pelabuhan Utama Tanjung Priok, Transjakarta, Kargo Bandara Soekarno-Hatta.
Selain itu, Delameta juga tengah membangun kawasan manufaktur teknologi terintegrasi di kawasan Industri Sadang Purwakarta Jawa Barat.
Direktur Bisnis dan Teknologi Delameta Reza RH menambahkan, pihaknya siap bersaing untuk memasuki pasar global dalam bidang produk IOT.
Source : https://malangtoday.net/flash/nasional/indonesia-infrastructure-week-2019-pamerkan-produk-iot-nasional/
MalangTODAY
0 notes
brnxzelle · 5 years
Text
Michel Faucault: Increasing Governmentalities
Hindi katulad ng ibang mga utak ng sosyolohiya, nagbigay ng ibang pamamaraan si Michael Foucault sa pagsuri ng kalagayan ng lipunan noong panahon niya. Ang kanyang pamamaraan ay hindi nalalapit sa mga paraan ng mga modernista katulad ni Karl Marx. Binibigyang diin niya ang mga bagay na hindi gusto o bago sa pandinig ng tao. Isa na rito ay ang pakikipagtalik na matagumpay niya namang naiugnay sa mga isyung panlipunan o kalagayan kung saan hinamon niya ang katotohanan, tiyak at universal.
 Napaliwanag niya ang epektibong pagbabago sa prison system mula sa torture-based tungo sa rule based. Maihahalintulad ito sistema ng pagkakaroon ng hari at reyna noong unang panahon kung saan walang mga umiiral na panuntunan at walang maayos na sistema ng pagdidisiplina at pagpaparusa. Ang lahat ng aksyon ay nakadepende lamang sa magiging desisyon ng nakakataas o ng hari, kung mapaparusahan ba o hindi, kung maaari bang bigyang konsiderasyon ang isang pagkakamali o hindi. Ang pagpaparusa naman sa sistemang ito ay naghahatid lamang ng takot sa tao, o di naman kaya'y galit dahil sa natamasang "pagdidisiplina". Sa unang tingin ay masasabi kong epektubo ito dahil maaaring mabuti ang naidudulot sa tao ng takot sa parusa dahil sa paraang ito ay pipilitin nilang iwasan na gumawa ng kahit ano pang kasamaan o hindi tama sa paningin ng iba ngunit sa kabilang banda ay naisip ko rin na ang galit ay maaaring magdulot ng pagtutol at patuloy na pagsasalungat upang makawala sa sistemang ito. Makikita naman ito sa ating lipunan sa simpleng paglabag sa mga maliliit na batas. Maalala noon sa isang litratong kumalat sa internet kung saan pinapakita ang pagbabato ng mga esudyante ng paint bombs sa muka at pangalan ni Duterte sa gate ng opisina ng CHED. Makikita roon ang iba't ibang reaksyon ng mga netizens sa aksyong ginawa ng mga estudyante at maraming nagsabing naturingan silang estudyante ay hindi makikita sa kanila ang pagiging edukado dahil daw hindi nila alam na hindi tama ang bandalismo. Ang hindi nila alam, alam ng mga estdyante ang kanilang ginagawa at ang maliliit na hakbang sa pag-gawa ng mga bagay na labag sa batas ay simbolo ng pagtutol sa sistemang kinaaayawan nila. Sinasabi nga ng aming guro na kung saan may sobra at maling paggamit ng kapangyarihan, laging mayroong espasyo sa pagtutol at pagbabago. Sa paraang iyon ay nararamdaman ng tao na hindi pa sila ganap na tinatanggalan ng pagkatao.
 Sa kabilang banda naman, ang pumalit na proseso naman ng pagpaparusa at pagdidisiplina ay ang rule based. Masasabi kong mas epektibo ito mula sa nauna dahil sa pagkakataong to, hindi na hari o kung sino mang tao ang naggogovern, kundi ang sarili nila. Inilarawan ito bilang Panopticon kung saan ito ay estraktura kung saan ang sinumang nasa taas o may kapangyarihan ay may kakayahang makita at mabantayan ang galaw ng mga nasa ilalim niya kung saan kinuha ang konsepto ng survailance system. Sa paraang ito ay pakiramdam ng mga tao ay laging mayroong nakatingin sa ginagawa nila at nagkakaroon ng konsensya sa loob nila kaya naman hindi na o nagdadalawang isip sila sa paggawa ng mali. Maihahambing ko naman ito sa estratehiyang ginawa ng aking ama sa negosyo naming Computer Shop noon upang maiwasan. Isang software ang ginagamit kung saan ang screen ng nagbabantay sa shop ay direktang nakikita sa personal computer ng aming bahay. Sa paraang iyon ay naiiwasan ang pagdaragdag ng oras ng bantay sa mga kaibigan niyang customer dahil alam niyang bawal galaw niya sa screen ay makikita namin. Hindi rin maganda ang naidudulot nito dahil nawawala ang kalayaan niya sa paggalaw bilang siya mismo dahil ang estratehiyang pagkakaroon ng surveillance screen ay naglilimita sa kanyang gawin ang mga bagay na normal niyang ginagawa. Sa paraang iyon ay nagkakaroon na ng kamalayan sa paglalahad ng personal na interes ng bantay at pinaghihimasukan na ng nanonood ang kanyang personal na buhay.
0 notes
okbyokaybye · 4 years
Text
DRAFT lmk wut u think i guess...
consuming/posting constructivist sculpture... its rly weird to me...aggressive and on the nose, almost sterile and analytic but still whimsical and to me-emotive...i am drawn to it and repulsed by it. Determined, telling lines, flatnesses and sharp overlaps and roundness without blur or softness. “a style or movement in which assorted mechanical objects are combined into abstract mobile structural forms. The movement originated in Russia in the 1920s and has influenced many aspects of modern architecture and design.” “Literalist”... i am reminded of a song a former partner wrote calling me “so serious”; detailing “serious is sad, serious is bad”. Not having previously thought myself to be so serious and not having assigned negative value judgements to this trait in the past, I felt confronted by this evaluation of my character. This assessment has consumed my image of my self since I heard it, struggling with an internal obsession, spiraling of ideas, a breaking down of a previous self conception, I developed the feeling of an inability to determine what I believe/d to be true about my personality. For a while and at times I took on the truth that i am serious, serious is all I am, and serious is bad, that i am cold and uncaring because of this, that I have a flaw in my sense of pleasure and expression of love, that I need to lighten up and brighten up, although I now have determined this to be false. Serious discussions can make people uncomfortable, i am capable of bringing thought to a negative or harsh place that others may not want to go to, and I am now more aware of this and try to avoid it. These are synonyms to serious according to an internet source: deliberate genuine honest severe sincere thoughtful sober austere bound determined businesslike cold sober contemplative deadpan determined downbeat earnest funereal go for broke grave grim intent long-faced meditative no-nonsense pensive pokerfaced reflective resolute resolved sedate set solemn staid steady stern unhumorous unsmiling weighty big important bad.... I am many of these things and I function in a way that is a result of my accomplishments and my joys and my traumas and my conditioning and my incompatibility with some does not determine my worth. 
I enjoy bleak landscapes, indulge in tragedy, in unfavorable outcomes. I am excited by pain and I am observant of gravity. I am a student of violence. I am direct in my language some times literal, always sincere. (I see things plain, on second look things are seldom plain... expand on this ?)
My appreciation of constructivist artworks comes from the way that it takes the world seriously in its reaction to it as I feel as I often do. A person exercising constructivism may want to build art in an industrial, mechanical, systematic method, or at least represent or relate to modes of production. 
-relate this to my own pre occupations with mechanical an systematc violence, how i see the world as constructed with all these industrial systems and how i make art and what i think about when im depicting cars, mechanical parts etc. relate this to my ‘seriousness’ my serious takes on things whatever...
-research constructavist art more, make some, reflect more on the artworks of by Tatlin, Rodchenko, Gabo, Pevsner, and Vantongerloo. 
-figure out what about them i like and what i dislike
think about gender/violence/system./survailence...
-write artist statement and write about door painting, car, other trash and vehicle and street paintings, absence of green, anthropomorphism...
0 notes
cmyk-discourse-blog · 6 years
Text
Intro #3 Terhi 4.10.18
intro #3
Us fickle humans… Where are the morals?! We need technologies and non-humans to guide us, or actually physically prevent us from doing harm / being reckless or careless. If something isn’t easy enough we won’t do it.
The text by Latour made my really appreciate these every day mechanisms. Again, it’s about the stuff we are so used to we take it for granted. Take the example of a door. Without doors our lives would be miserable. Doors, and most of all, hinges, should be more recognised and cherished in our everyday lives. I will try to keep my eyes open and show my respect for our fellow-non-humans more from now on. I was very inspired and amused of this “love letter” for hinges and doors. Latour is French, I guess, so in my mind I started to compare his way of writing to other French philosophers: how he takes his time to really explain without saving words or his effort, with many long sentences and getting to the bottom of his thoughts, but in a nice way!
Arja explained in the class things about how human and machine have evolved hand-in-hand. Both have aided the other in this development into/of the technoscience era (Haraway). So they are not separable. We shape the tools but then the tools shape us. This was also pointed out in talking about graphic design (for example in the 90’s with desktop computers & MacIntosh’s visual operating system), that even if we don’t think about it, we of course always design inside the rules that are technologically restricting us. New technological advances -> BOOM: new ways of seeing, thinking, making.
Widening the perspective. Post-human, instead of just non-human.
going back to the texts… I’d say what Latour was explaining i.e. about semiotics was actually coding. That’s a code that you could feed to a machine and it would understand (or “understand”. Sorry about all the antropomorphisisms). These AND/OR-commands, basics of mathematical logics I guess. Only now we were talking about the syntagmatic and pragmatic ways the language works. I liked this notion that if in texts we can move by shifting to another world, another space and time -> then in the technical shifting we translate/substitute stuff to ANOTHER MATTER. How cool is that? It’s like magic. So you translate your need to a “command” in your brain (like in the text: hold down the kid in the car) and that (with some exchange of energy and money) turns into a metal bar that does the work for you. Maybe if it didn’t do the trick, you’d need to translate the bar into something else. Anyway, fascinating. (I feel like so many things in these texts are fascinating, even if they feel so basic after reading about them and I myself so stupid.)
Engineering work. You gotta appreciate it. I mean, seat belts. You have to design a thing with a feature and it’s opposite at the same time. You need the seat belt to be loose but also tight when needed. You have to keep in mind all these restrictions, if you only think of the other side, you won’t understand all the complexities. “Like watching only one side of a tennis match.”
In class Arja talked about how people in modern times have tried to differentiate and categorise the world. Nature/Culture, everything should fall into one or the other box. (Of course things don’t. There’s a name for those: hybrid.) We want to organise our world in order to make more sense of it.
Standardisation. It was interesting to actually read the history of that. It also cleared up some things, sort of. I can’t help it but I really like the DIN narrow font, but my friend told me never to use it because it’s a font that the nazis used. But I’m wondering, should we just “give it to them”? I mean, it was designed before the wars and a lot of street signs etc are written with that font. Now that I saw the larger scale of things, maybe it helps me to deal with this. I wouldn’t stop using A4 paper for example (of course I shouldn’t even try stopping because it would make my life SOOOO hard now that we are deep in these standardised size systems).
Okay, again… people knew what was going to happen. “The world brain” is a pretty good name for the internet (or is it the next stage of all our communication networks maybe, who knows…). Reading the text by Vossoughian made me feel like the world was in chaos before, and maybe from today’s perspective (and as a person who has lived in Finland most of their life) it actually was. I find it interesting that all this way we nowadays are organised came from a simple idea, but behind the idea was actually some moral agenda/issue: “Don’t waste energy, make use of it!”. Entropy increases in a closed system, so we have to try to prevent that from happening. Ordnung muss sein! Some times it starts to even sound a bit… too much. “With the right technical adjustments, society can not only be salvaged but liberated.” Little did they know, or wanted to think about, how the advances would at some point turn against the freedom of the people, when nowadays we are facing serious risks of losing our freedom because of survaillance, face recognition systems and so on. In China the government is launching a Social Credit System that ranks the citizens… a rather dystopian scenario. (You can read about it for example here: https://www.wired.co.uk/article/chinese-government-social-credit-score-privacy-invasion)
Have we gone too far with our technologies if they are starting to take over us? How about AI? We need to start thinking of the ethics of AI before we develop them to learn by themselves. And, while talking about non-humans & humans… how about androids and robots, what rights do they have compared to us non-humans, and where do we draw the line? (Watch for example movies like Bladerunner or Ghost in the Shell or Her ). This used to be science fiction, but fiction is a good way to start dealing with many issues, which sooner or later will be actual stuff we have to solve.
https://www.youtube.com/watch?v=MnT1xgZgkpk What happens when our computers get smarter than we are? | Nick Bostrom
This is about 16 minutes long, but if you don’t have that much time, try to watch it from 10:03 onwards. Some interesting thoughts about (computer) super intelligence and (human) ethics.
further watching:
https://www.youtube.com/watch?v=ixIoDYVfKA0 The ethical dilemma of self-driving cars - Patrick Lin (4:15)
0 notes
Text
More filming and future plans for editing
So today we we’re able to complete the filming of the first scene and record some footage for the montage sequence in the second scene. Moving onto Max now editing hopefully we can get some insight into any part or sequences we might have missed when filming. I found it very interesting how different scenes become when compared to it’s original concept in the script (actually, we already made small changes to the script since I last blogged about it). 
This was most obvious when looking at the footage we recorded in the first scene. When filming, we found that our original description of scene, being dominated by me just sitting in the same position and just looking at the screen, wouldn’t really work as an interesting scene. Instead we decided that there needed to be a lot more actually going on in the movement and changing shots of my character. 
As such the scene did change a bit. Not in the sequence of events, but more that we found my descriptions of the shots I detailed in writing didn’t always translate well into live action. It will be interesting to see how this will impact the later scenes. But im looking forward to seeing these changes. 
Until we get a good idea of shots that we missed, ill be trying to find some stock footage on the internet that can be used in scene 2′s sequence. Hopefully I can get appropriate footage establishing the product, bi-products, medication and survailence we want to explore in the film.
0 notes