<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cyberkite blog]]></title><description><![CDATA[Don't let technology be your master. A blog for smart cybersecurity & IT insights for small business by Michael Plis (20+ years exp). A unique neurodivergent perspective.]]></description><link>https://blog.cyberkite.com.au</link><image><url>https://substackcdn.com/image/fetch/$s_!Smrw!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb88d8864-67bc-4696-a128-eb8fb6141c48_900x900.png</url><title>Cyberkite blog</title><link>https://blog.cyberkite.com.au</link></image><generator>Substack</generator><lastBuildDate>Tue, 21 Apr 2026 02:01:43 GMT</lastBuildDate><atom:link href="https://blog.cyberkite.com.au/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Michael Plis]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cyberkite@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cyberkite@substack.com]]></itunes:email><itunes:name><![CDATA[Michael Plis]]></itunes:name></itunes:owner><itunes:author><![CDATA[Michael Plis]]></itunes:author><googleplay:owner><![CDATA[cyberkite@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cyberkite@substack.com]]></googleplay:email><googleplay:author><![CDATA[Michael Plis]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Universal Communication: Breaking the Walled Gardens]]></title><description><![CDATA[Major chat and video apps are still trapped in disconnected silos. Article covers why we need to adopt universal comms protocols, and what sci-fi can teach us.]]></description><link>https://blog.cyberkite.com.au/p/universal-communication-breaking</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/universal-communication-breaking</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Thu, 26 Mar 2026 03:37:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Tqgl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Tqgl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Tqgl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!Tqgl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!Tqgl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!Tqgl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Tqgl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ebfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:181904,&quot;alt&quot;:&quot;A conceptual digital illustration split into two halves. On the left, dark floating islands labeled \&quot;Walled Gardens\&quot; show people isolated on different fractured platforms for email, SMS, and proprietary video apps. In the center, a glowing sci-fi portal labeled \&quot;UC\&quot; with a control panel reading \&quot;TEXT AUDIO VIDEO AR VR\&quot; bridges the divide. On the right, a bright, futuristic landscape labeled \&quot;Accelerated Human Network\&quot; shows diverse people seamlessly communicating via holograms, tablets, and AR headsets, with network connections extending out to a distant planetary base.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A conceptual digital illustration split into two halves. On the left, dark floating islands labeled &quot;Walled Gardens&quot; show people isolated on different fractured platforms for email, SMS, and proprietary video apps. In the center, a glowing sci-fi portal labeled &quot;UC&quot; with a control panel reading &quot;TEXT AUDIO VIDEO AR VR&quot; bridges the divide. On the right, a bright, futuristic landscape labeled &quot;Accelerated Human Network&quot; shows diverse people seamlessly communicating via holograms, tablets, and AR headsets, with network connections extending out to a distant planetary base." title="A conceptual digital illustration split into two halves. On the left, dark floating islands labeled &quot;Walled Gardens&quot; show people isolated on different fractured platforms for email, SMS, and proprietary video apps. In the center, a glowing sci-fi portal labeled &quot;UC&quot; with a control panel reading &quot;TEXT AUDIO VIDEO AR VR&quot; bridges the divide. On the right, a bright, futuristic landscape labeled &quot;Accelerated Human Network&quot; shows diverse people seamlessly communicating via holograms, tablets, and AR headsets, with network connections extending out to a distant planetary base." srcset="https://substackcdn.com/image/fetch/$s_!Tqgl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!Tqgl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!Tqgl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!Tqgl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febfdef53-14d8-47b5-8c75-9b9c357f23ca_1366x762.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A few years ago, I wrote an article titled "<strong><a href="https://blog.cyberkite.com.au/p/why-universal-video-conferencing">Why Universal Video Conferencing &amp; Chat Protocols are Crucial for Future of Communication</a></strong>". In it, I explored the concept of Universal Unified Communication (UUC) and the need to break down the silos between different enterprise teams and communication platforms. </p><p>In a way we could even simplify the analogy or the acronym to <strong>Universal Communication (UC new acronym we could embrace) </strong>which would be basically a new acronym for communications technology that allows for Universal interoperability across different apps for both video conferencing and live chat, text, audio and long form text. Effectively it would render phone, text and email redundant if it was interoperable across all apps. </p><p>&#8203;Today in <strong>2026</strong>, while we are seeing <strong>small</strong> <strong>steps</strong> forward, like the adoption of RCS messaging to bridge the gap between different phone operating systems, we are still stuck in "walled gardens." Major video conferencing and chat apps still refuse to talk to each other. If we are ever going to decommission old technology like email for something better, we need to look at how advanced communication is handled in our favorite science fiction shows and maybe learn some lessons to work on (hint, hint). </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>Downside of our Current &#8220;Walled Gardens&#8221; in Comms</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WTO9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WTO9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!WTO9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!WTO9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!WTO9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WTO9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:212269,&quot;alt&quot;:&quot;A conceptual vector drawing in dark blues, purples, and jarring electric reds. Diverse, frustrated figures are isolated on different fortified floating islands labeled \&quot;CHAT APP 1,\&quot; \&quot;VIDEO APP A,\&quot; and \&quot;EMAIL.\&quot; Jagged red lines show broken connections, and generic contradictory communication symbols smash against each other, labeled \&quot;PROPRIETARY BATTLEFIELDS.\&quot; A central, crumbling library building labeled \&quot;KNOWLEDGE SILOS\&quot; shows books and binary blocks labeled \&quot;KNOWLEDGE\&quot; falling into a dark abyss labeled \&quot;DATA LOSS.\&quot; In the background, a massive gear system labeled \&quot;ALGORITHM OVER HUMAN\&quot; traps attention and data.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A conceptual vector drawing in dark blues, purples, and jarring electric reds. Diverse, frustrated figures are isolated on different fortified floating islands labeled &quot;CHAT APP 1,&quot; &quot;VIDEO APP A,&quot; and &quot;EMAIL.&quot; Jagged red lines show broken connections, and generic contradictory communication symbols smash against each other, labeled &quot;PROPRIETARY BATTLEFIELDS.&quot; A central, crumbling library building labeled &quot;KNOWLEDGE SILOS&quot; shows books and binary blocks labeled &quot;KNOWLEDGE&quot; falling into a dark abyss labeled &quot;DATA LOSS.&quot; In the background, a massive gear system labeled &quot;ALGORITHM OVER HUMAN&quot; traps attention and data." title="A conceptual vector drawing in dark blues, purples, and jarring electric reds. Diverse, frustrated figures are isolated on different fortified floating islands labeled &quot;CHAT APP 1,&quot; &quot;VIDEO APP A,&quot; and &quot;EMAIL.&quot; Jagged red lines show broken connections, and generic contradictory communication symbols smash against each other, labeled &quot;PROPRIETARY BATTLEFIELDS.&quot; A central, crumbling library building labeled &quot;KNOWLEDGE SILOS&quot; shows books and binary blocks labeled &quot;KNOWLEDGE&quot; falling into a dark abyss labeled &quot;DATA LOSS.&quot; In the background, a massive gear system labeled &quot;ALGORITHM OVER HUMAN&quot; traps attention and data." srcset="https://substackcdn.com/image/fetch/$s_!WTO9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!WTO9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!WTO9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!WTO9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc885fd7-2e79-4fb9-8982-f36f612a15fc_1366x762.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Currently, each major platform uses its own unique protocol, making it incredibly difficult for users to connect and collaborate across different communication technology platforms. This provincial and protectionist attitude from major tech companies remains the biggest hurdle to advancing human communication and knowledge exchange.</p><p>&#8203;If we look at the current tech environment, the cracks in these walled gardens are causing massive headaches for businesses:</p><ul><li><p>&#8203;<strong>The Forced Interoperability Mess:</strong> Governments are finally stepping in because the industry wouldn't fix itself. With the EU&#8217;s Digital Markets Act (DMA) taking full effect in 2025 and 2026, "gatekeepers" like Meta and Apple are being legally forced to make messaging apps interoperable. However, because these companies didn't collaborate on a proactive, universal protocol from the start, this forced integration is clunky, delayed, and plagued by security and privacy concerns regarding how encrypted data is handled between rival apps.</p></li><li><p><strong>The Video Conferencing Nightmare:</strong> We are in an era where businesses demand "Bring Your Own Meeting" (BYOM) flexibility, yet video conferencing remains a battlefield of unique, proprietary protocols. If for example a Zoom user wants to seamlessly interact with a Microsoft Teams, Facebook Messenger, or Google Meet or FaceTime or WebEx or any other video conferencing user, they hit a wall. Instead of innovating to make meetings hardware-agnostic, vendors waste resources competing for subscribers.</p></li><li><p>&#8203;<strong>Social Media "Attention Capitalism":</strong> Traditional social networks have operated as the ultimate walled gardens, designed to trap users and hoard data. However, the rapidly growing "Fediverse" (using the open ActivityPub protocol in 2026) is proving that an alternative works. Platforms like WordPress and Ghost are adopting it, allowing users on entirely different networks to communicate seamlessly. This proves that users <em>want</em> interoperability, but major corporate video and chat apps are lagging behind this open-web movement.</p></li><li><p>&#8203;<strong>Knowledge Silos &amp; Data Loss:</strong> When information is trapped within these specific, closed apps, we create self-enclosed networks. If a platform shuts down, changes its pricing, or a user loses access, that knowledge is lost, much like the ancient Library of Alexandria burning down without a backup site.</p></li></ul><p>&#8203;To truly advance, a global communication system (with text, audio and video) it must be universal and easily useable by anyone on the planet and beyond as we start to have permanent presence on Moon and beyond.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>Benefits of a Universally Connectable World</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aJqN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aJqN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!aJqN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!aJqN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!aJqN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aJqN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:209431,&quot;alt&quot;:&quot;A vibrant, optimistic conceptual vector-style illustration. In the foreground, a strong glowing hexagonal grid foundation is labeled \&quot;FOUNDATION OF UNIVERSAL COMMUNICATION PROTOCOLS\&quot; with prominent symbols for \&quot;UC\&quot; (Universal Communication) and \&quot;E2EE\&quot;. On the left, a \&quot;UC Dashboard\&quot; shows smooth data streams funneling from a laptop, tablet, and smartphone into a single unified feed. In the center, two large glowing 'portals' labeled \&quot;MY PREFERRED TOOL\&quot; and \&quot;CLIENT PREFERRED TOOL\&quot; are directly linked by illuminated connection paths labeled \&quot;UC PROTOCOLS.\&quot; Diverse global users collaborate instantly across these channels.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A vibrant, optimistic conceptual vector-style illustration. In the foreground, a strong glowing hexagonal grid foundation is labeled &quot;FOUNDATION OF UNIVERSAL COMMUNICATION PROTOCOLS&quot; with prominent symbols for &quot;UC&quot; (Universal Communication) and &quot;E2EE&quot;. On the left, a &quot;UC Dashboard&quot; shows smooth data streams funneling from a laptop, tablet, and smartphone into a single unified feed. In the center, two large glowing 'portals' labeled &quot;MY PREFERRED TOOL&quot; and &quot;CLIENT PREFERRED TOOL&quot; are directly linked by illuminated connection paths labeled &quot;UC PROTOCOLS.&quot; Diverse global users collaborate instantly across these channels." title="A vibrant, optimistic conceptual vector-style illustration. In the foreground, a strong glowing hexagonal grid foundation is labeled &quot;FOUNDATION OF UNIVERSAL COMMUNICATION PROTOCOLS&quot; with prominent symbols for &quot;UC&quot; (Universal Communication) and &quot;E2EE&quot;. On the left, a &quot;UC Dashboard&quot; shows smooth data streams funneling from a laptop, tablet, and smartphone into a single unified feed. In the center, two large glowing 'portals' labeled &quot;MY PREFERRED TOOL&quot; and &quot;CLIENT PREFERRED TOOL&quot; are directly linked by illuminated connection paths labeled &quot;UC PROTOCOLS.&quot; Diverse global users collaborate instantly across these channels." srcset="https://substackcdn.com/image/fetch/$s_!aJqN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!aJqN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!aJqN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!aJqN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4a562cb-9ef0-414a-b457-07946c19732d_1366x762.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#8203;While recent regulatory pushes, like the EU&#8217;s Digital Markets Act forcing basic chat interoperability and Apple finally adopting RCS, are steps in the right direction, they are reactive patches. True Universal Unified Communication (UUC) or lets call it Universal Communication (New UC acronym) would proactively solve the app fatigue and disjointed workflows plaguing modern businesses.</p><p>&#8203;If companies came together to define and adopt open, universal video and chat protocols, the benefits for global productivity would be massive:</p><ul><li><p>&#8203;<strong>Seamless Collaboration &amp; Eliminating "App Fatigue":</strong> Right now, users are overwhelmed by the sheer number of communication channels they must monitor. How many chat and meeting apps do you have on your phone or your computer? Common now, tell me the truth&#8230;dozens isn't it? A universal protocol would allow a user to initiate a conversation via text chat on one platform (like WhatsApp) and instantly escalate it to a video conference with a user on a completely different platform (like Microsoft Teams). This removes the friction of forcing clients to download specific software or create new accounts just to communicate.</p></li></ul><ul><li><p>&#8203;<strong>True Cross-Platform Freedom:</strong> You could use your preferred tool to call a client who is using their preferred tool. Just as you can dial any phone number in the world regardless of whether the person uses Telstra or Optus or Vodafone  or T Mobile or AT&amp;T or whatever else. You should be able to launch a Google Meet call directly into a client&#8217;s Zoom or Webex instance for example. This preserves customer loyalty to their favorite interfaces while enabling total global reach and huge time saved in not needing to relearn new apps. People could focus on doing business and interacting with each other rather than spending long periods of time working out how to connect to each other. </p></li></ul><ul><li><p>&#8203;<strong>Reclaiming Productivity from "Context Switching":</strong> Modern hybrid work is heavily damaged by "context switching", the cognitive load required to constantly jump between Slack, Teams, email, and texts. Universal protocols would allow all messages and calls to funnel into the user's single preferred app when we are talking about productivity platforms as well, similar to communication apps and video conferencing apps. Not necessarily in business, but at least it would allow multiple companies to interact with each other a lot better if they didn't have to set up just to interact the other businesses app, for example, often someone creates a Slack project and then shares it with another business that they're servicing and this business has to create once off Slack account just to work with them once off. Why can't they just connect Slack with Microsoft Teams or something or Google workspace with Slack or things like that or all 3 connect to the same project to work with with the leader of the project setting the controls? This idea would allow teams to communicate faster and choose the most appropriate mode for each situation, drastically reducing communication errors and lost time. Imagine saved collaboration time and productivity between businesses for that! </p></li></ul><ul><li><p>&#8203;<strong>Standardized, Next-Generation Security:</strong> In an era of AI-generated deepfakes and sophisticated cyber threats, fragmented security is a liability. Currently, if one app has a vulnerability, its users are exposed. A unified protocol allows the industry to establish standardized, high-caliber security measures, such as universal end-to-end encryption (E2EE) and zero-trust verification, built directly into the foundation of the communication layer. This ensures that sensitive business data and personal privacy are universally protected, rather than relying on the varying security budgets of individual app developers.</p></li></ul><p>So you can see the benefits of pursuing Universal communication in live chat and video conferencing space to bring it towards Universal interoperability is a really good direction that should be pursued by everyone just as they did with email, SMS and phone calls. Basically with email, SMS and phone calls. You can contact everyone on the planet pretty much. Imagine if you could do that with live chat and with video conferencing and not needing to change the vessel or the app that provides that service. Just as with email, SMS and phone. You use whatever app that is capable of doing it. What do you think? Is this possible from an engineering and programming standpoint? Especially now that there is vibe, coding and programming is becoming easier? </p><h1><strong>Universal Communication lessons from Sci-fi</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SKcM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SKcM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!SKcM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!SKcM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!SKcM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SKcM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:180866,&quot;alt&quot;:&quot;A vibrant, cinematic conceptual illustration in landscape format, blending generic science fiction communication concepts into one cohesive, futuristic command center. On the left, a person interacts with a sleek, glowing, flat-panel digital interface with colorful data blocks. In the center, a 3D glowing blue hologram of a colleague is projected upward from a small, metallic circular device on a table. In the background, a massive, glowing circular energy portal stands open, establishing a visual link to a vibrant alien landscape. The color palette features deep space blues, neon cyan, and bright energetic flares.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A vibrant, cinematic conceptual illustration in landscape format, blending generic science fiction communication concepts into one cohesive, futuristic command center. On the left, a person interacts with a sleek, glowing, flat-panel digital interface with colorful data blocks. In the center, a 3D glowing blue hologram of a colleague is projected upward from a small, metallic circular device on a table. In the background, a massive, glowing circular energy portal stands open, establishing a visual link to a vibrant alien landscape. The color palette features deep space blues, neon cyan, and bright energetic flares." title="A vibrant, cinematic conceptual illustration in landscape format, blending generic science fiction communication concepts into one cohesive, futuristic command center. On the left, a person interacts with a sleek, glowing, flat-panel digital interface with colorful data blocks. In the center, a 3D glowing blue hologram of a colleague is projected upward from a small, metallic circular device on a table. In the background, a massive, glowing circular energy portal stands open, establishing a visual link to a vibrant alien landscape. The color palette features deep space blues, neon cyan, and bright energetic flares." srcset="https://substackcdn.com/image/fetch/$s_!SKcM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!SKcM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!SKcM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!SKcM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09811124-2c49-423e-a00b-30a114d2e19f_1366x762.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When we look to science fiction to imagine the future of technology, one common thread unites almost every vision of an advanced civilization: seamless, frictionless communication. </p><p>Writers and creators instinctively understand that a truly advanced society would not tolerate fragmented, proprietary communication networks. Instead, they depict futures where humanity, and entirely alien species together, have overcome the petty hurdles of brand loyalty and walled gardens to build universal communication infrastructures. Here is what three iconic sci-fi franchises can teach us about the path we need to take today.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>UC Lessons from Star Trek</h2><p>&#8203;In <em>Star Trek TV series and movies especially The Next Generation</em>, we see a highly advanced, unified approach to communication, which has inspired many of my ideas on this topic. The Starfleet LCARS (Library Computer Access &amp; Retrieval System) database and communication network likely utilized interplanetary, agreed-upon protocols. Whether Captain Picard was sending a text-based log, an audio transmission, or engaging in a live video conference with another ship, the system was universally interoperable.</p><p>&#8203;When the Enterprise hails a Romulan Warbird or a Klingon vessel, the call connects instantly to the main viewscreen. The crew doesn't have to worry about whether the Romulans are using a different video app, or if they need to download a specific plugin first; the underlying protocols just work. It demonstrates that as a society matures, standardizing the network becomes more important than protecting a specific software brand. We need to build the foundation for our own LCARS today, standardizing how our video and chat data is packaged and transmitted.</p><h2>UC Lessons from Stargate</h2><p>&#8203;In <em>Stargate SG-1 TV series</em>, highly advanced races like the Ancients, the Nox, and the Tollans didn't rely on fragmented, competing technologies. Their communication networks, and the Stargate network itself, were built on universal, instantaneous connections shared across vast alliances. The Stargate is the ultimate universal protocol: a standardized interface that allows completely different worlds, with completely different levels of local technology, to instantly connect and transfer matter and data.</p><p>&#8203;Furthermore, these advanced races utilized subspace communications that could interface with almost any device. The lesson here is that a truly advanced civilization prioritizes the frictionless sharing of knowledge and collaboration over corporate competition. They view communication as a fundamental infrastructure, much like physics itself, rather than a product to be locked inside a corporate ecosystem.</p><h2>UC Lessons from Star Wars</h2><p>&#8203;<em>Star Wars</em> showcases the HoloNet, a galaxy-wide communication grid that functions as a hyper-advanced, real-time internet. Whether someone was using a cheap handheld comlink on a desert planet, a highly secure encrypted console on a star cruiser, or a full-room holographic projector, they could send and receive real-time audio and video across the galaxy.</p><p>&#8203;The hardware didn't matter because the underlying network protocol was universal. A hologram recorded on a droid could be instantly projected by a completely different manufacturer's ship console. This is exactly what we need for modern video conferencing, a unified standard where the device and the brand do not restrict the connection. Users should be able to buy the hardware and interface they prefer, knowing it will seamlessly plug into the universal communication grid.</p><h2>What Sci-Fi Teaches Us About Our Future</h2><p>&#8203;The overarching lesson from all three of these science fiction universes is that communication silos are a symptom of a primitive or transitioning society. As civilizations advance, they inevitably realize that the true value of technology lies in its ability to connect everyone, everywhere, without friction. If we want to reach the collaborative heights depicted in these shows, whether that means coordinating global research on Earth or eventually communicating with permanent bases on the Moon and Mars, we must tear down our current walled gardens. Establishing universal video and chat protocols is not just an IT upgrade; it is a necessary progress step for human collaboration.</p><h1><strong>History of Universal Communications</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZUgS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZUgS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!ZUgS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!ZUgS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!ZUgS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZUgS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:151804,&quot;alt&quot;:&quot;A conceptual timeline illustration showing the evolution of communication. On the left, older technologies like telegraph poles and early telephone switchboards sit on the bank of a \&quot;River of Data.\&quot; Moving right, a large cell tower labeled \&quot;GLOBAL MOBILE &amp; SMS\&quot; and server racks labeled \&quot;UNIVERSAL EMAIL\&quot; connect into the river. The data streams flow towards a bright sunrise on the right, illuminating a globe and a glowing \&quot;UC\&quot; symbol, representing the future of unified communication.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A conceptual timeline illustration showing the evolution of communication. On the left, older technologies like telegraph poles and early telephone switchboards sit on the bank of a &quot;River of Data.&quot; Moving right, a large cell tower labeled &quot;GLOBAL MOBILE &amp; SMS&quot; and server racks labeled &quot;UNIVERSAL EMAIL&quot; connect into the river. The data streams flow towards a bright sunrise on the right, illuminating a globe and a glowing &quot;UC&quot; symbol, representing the future of unified communication." title="A conceptual timeline illustration showing the evolution of communication. On the left, older technologies like telegraph poles and early telephone switchboards sit on the bank of a &quot;River of Data.&quot; Moving right, a large cell tower labeled &quot;GLOBAL MOBILE &amp; SMS&quot; and server racks labeled &quot;UNIVERSAL EMAIL&quot; connect into the river. The data streams flow towards a bright sunrise on the right, illuminating a globe and a glowing &quot;UC&quot; symbol, representing the future of unified communication." srcset="https://substackcdn.com/image/fetch/$s_!ZUgS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!ZUgS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!ZUgS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!ZUgS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdf27a82-4b41-42bd-b020-8e7e6d85f4a5_1366x762.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#8203;Humanity has always sought to connect and share knowledge across distances, whether through ancient letters, telegraphs, or early telephones. However, the history of unifying modern information technology and telecommunications has been a long and winding road. When we look back, a clear pattern emerges: technology only reaches its full potential when strong political will and regulatory bodies step in to establish universal standards.</p><ul><li><p>&#8203;<strong>The Telephone Network:</strong> The ability to call anyone in the world didn't happen by accident. It was heavily regulated by the <strong>International Telecommunication Union (ITU)</strong>, a specialized agency of the United Nations. Dating all the way back to 1885 for early telephone regulations, the ITU ensured that different countries and telecom operators adopted uniform operating instructions and standard equipment so that phone calls could seamlessly cross international borders.</p></li><li><p>&#8203;<strong>Text Messaging (SMS) &amp; Mobile Networks:</strong> The ability to text between different mobile carriers was driven by immense political will in Europe. Organizations like the <strong>European Conference of Postal and Telecommunications Administrations (CEPT)</strong> and later the <strong>European Telecommunications Standards Institute (ETSI)</strong> were tasked with creating the GSM standard in the 1980s. European governments actively pushed to prevent a fragmented market of incompatible mobile phones, forcing manufacturers and network operators to collaborate on a single, pan-European digital standard that eventually took over the world.</p></li><li><p>&#8203;<strong>The Internet and Email:</strong> In its early days, networks were self-enclosed and not widely used. This changed thanks to the initial funding and political backing of the <strong>U.S. Department of Defense (via DARPA)</strong>, which created the early ARPANET. Eventually, oversight transitioned to global, collaborative engineering bodies like the <strong>Internet Engineering Task Force (IETF)</strong> and the <strong>World Wide Web Consortium (W3C)</strong>. These groups established open, non-proprietary protocols (like TCP/IP for the web and SMTP for email) that allowed computers everywhere to share information safely, creating one unified global knowledge system.</p></li></ul><p>&#8203;If political willpower and international regulatory bodies could unite the global phone network, text messages, and email, they can absolutely do the same with modern video conferencing and live chat. We simply need the industry (and regulators) to prioritize global connection over closed ecosystems.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Hypothetical Future: Accelerated Human Network</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o_0q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9550337-7138-49de-846e-7cce3833fc42_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o_0q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9550337-7138-49de-846e-7cce3833fc42_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!o_0q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9550337-7138-49de-846e-7cce3833fc42_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!o_0q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9550337-7138-49de-846e-7cce3833fc42_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!o_0q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9550337-7138-49de-846e-7cce3833fc42_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o_0q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9550337-7138-49de-846e-7cce3833fc42_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e9550337-7138-49de-846e-7cce3833fc42_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:205461,&quot;alt&quot;:&quot;A panoramic, bright, and optimistic conceptual vector-style illustration of a thriving global smart-city at a golden dawn. Diverse, happy people collaborate effortlessly across smooth, glowing sky-bridges and high-tech spaces. A central, radiating, interwoven network hub beams glowing cyan, green, and gold data streams everywhere, linking all devices and individuals. People interact without technical barriers using a variety of futuristic, neutralized devices. In the deep background, the glowing network lattice extends out from Earth's network hub, clearly connecting to a thriving lunar base and a distant Martian base in the dark, starry sky.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A panoramic, bright, and optimistic conceptual vector-style illustration of a thriving global smart-city at a golden dawn. Diverse, happy people collaborate effortlessly across smooth, glowing sky-bridges and high-tech spaces. A central, radiating, interwoven network hub beams glowing cyan, green, and gold data streams everywhere, linking all devices and individuals. People interact without technical barriers using a variety of futuristic, neutralized devices. In the deep background, the glowing network lattice extends out from Earth's network hub, clearly connecting to a thriving lunar base and a distant Martian base in the dark, starry sky." title="A panoramic, bright, and optimistic conceptual vector-style illustration of a thriving global smart-city at a golden dawn. Diverse, happy people collaborate effortlessly across smooth, glowing sky-bridges and high-tech spaces. A central, radiating, interwoven network hub beams glowing cyan, green, and gold data streams everywhere, linking all devices and individuals. People interact without technical barriers using a variety of futuristic, neutralized devices. In the deep background, the glowing network lattice extends out from Earth's network hub, clearly connecting to a thriving lunar base and a distant Martian base in the dark, starry sky." srcset="https://substackcdn.com/image/fetch/$s_!o_0q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9550337-7138-49de-846e-7cce3833fc42_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!o_0q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9550337-7138-49de-846e-7cce3833fc42_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!o_0q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9550337-7138-49de-846e-7cce3833fc42_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!o_0q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9550337-7138-49de-846e-7cce3833fc42_1366x762.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#8203;Imagine a world in the near future where the "walled gardens" have finally collapsed. You open your device, running the secure, open-source operating system of your choice, and simply click a contact's name. You don't have to stop and think about whether they use WhatsApp, Messenger, Viber, Zoom, WebEx, Google Meet, Microsoft Teams, or FaceTime on Apple device. You simply start a video call or live text chat, and the universal protocols route your connection securely and instantly across the globe to the right address. The organizer becomes host. The participants connect using the universal communication protocols. And you have synergy of global communication in place. </p><h2>&#8203;Post-Social Media Era: Restoring Human Contact</h2><p>&#8203;This universal interoperability is becoming urgently necessary today. Traditional social media is rapidly declining in popularity as people realize the dangers of algorithm-driven communication technologies that prioritize viral outrage over mental health. Artificial intelligence has almost made it unnecessary to have social media since AI becomes the assistant and the social interaction when no one else is available (which of course has its own dangers we will talk about in the future). As society retreats from these toxic public squares, we are seeing a massive shift back toward direct, authentic human-to-human or contact via private group chats and video calls.</p><p>&#8203;However, if we rely on these direct communication tools while they are still trapped in corporate silos, our ability to connect remains fractured. Universal protocols will ensure that this new era of direct, simpler, human-centric communication is open to everyone, rather than being controlled by a few gatekeeper companies.</p><h2>&#8203;Exponential Knowledge Exchange with future UC</h2><p>&#8203;In this universally connectable world, global knowledge exchange accelerates exponentially. Researchers, small business owners, and creators can collaborate instantly without technical barriers. By tearing down these digital walls, we could remove the friction of corporate gatekeeping, allowing ideas to flow more freely especially in this AI and quantum age upon us. Perhaps it will help humanity to advance from infantile stage to the next level. But I highly doubt it. I don't know it's 50/50 but I do know that in the long term future. This has to happen Universal communication across all types of formats: text, audio, visual and video, AR, VR and beyond.</p><p><strong>Imagine! Mutually assured universal communication (not mutually assured communication silos) with people using live chat or video conference app of choice as we are but it all works with all others. </strong></p><ul><li><p><strong>So you can have chat groups made of WhatsApp, Viber, Messenger, iMessage, X Chat and RCS users. Or just live chat with anyone in the world safely tied to a phone number. </strong></p></li><li><p><strong>Or perhaps arrange a video meeting with people that use Zoom, Google Meet, WebEx, Ms Teams, X Chat and FaceTime?</strong> No fuss, organiser sets up and all others recieve and participate. The Organizer is the data host. </p></li><li><p><strong>Question for Developers at Apple, Microsoft, Zoom, Google, Microsoft, WebEx, Goto, Viber, WhatsApp, Meta, X and others </strong>- question for you, is this technologically possible to setup universal live chat and video conference protocols for everyone by the industry?  The internet of rich universal communications would be born much like phone, sms and email.</p></li></ul><p>&#8203;We can finally shed the clunky, spam-filled relics of email and traditional phone lines and danger of plain text sms. Instead, humanity  could operate on a single, secure, interconnected digital fabric with industry supported universal communication protocols. By building these universal protocols now, we prepare ourselves to work efficiently not just on Earth, but eventually on permanent bases on the Moon, Mars, and beyond. Look how quickly RCS has been adopted as of 2026! What's possible for live chat apps and video conferencing apps in the future? </p><p>Happy communicating </p><p><strong>Michael Plis</strong> </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1><strong>References</strong> </h1><p></p><ul><li><p>&#8203;<strong>Cyberkite Blog 2023:</strong> <em>Why Universal Video Conferencing &amp; Chat Protocols are Crucial for Future of Communication</em> by Michael Plis. URL: <strong><a href="https://blog.cyberkite.com.au/p/why-universal-video-conferencing">https://blog.cyberkite.com.au/p/why-universal-video-conferencing</a></strong></p></li><li><p>&#8203;<strong>News Article (Messaging Interoperability):</strong> <em>Messaging Interoperability: WhatsApp enables third-party chats for users in Europe</em> (Meta Newsroom). URL: <a href="https://about.fb.com/news/2025/11/messaging-interoperability-whatsapp-enables-third-party-chats-for-users-in-europe/">https://about.fb.com/news/2025/11/messaging-interoperability-whatsapp-enables-third-party-chats-for-users-in-europe/</a></p></li><li><p>&#8203;<strong>Legal/Academic Review (EU DMA):</strong> <em>Digital Markets Act and the interoperability requirement: is data protection in danger?</em> (MediaLaws). URL: <a href="https://www.medialaws.eu/digital-markets-act-and-the-interoperability-requirement-is-data-protection-in-danger/">https://www.medialaws.eu/digital-markets-act-and-the-interoperability-requirement-is-data-protection-in-danger/</a></p></li><li><p>&#8203;<strong>News Article (RCS Adoption):</strong> <em>Everything to know about Apple RCS support in 2025</em> (Sinch). URL: <a href="https://sinch.com/blog/apple-support-rcs/">https://sinch.com/blog/apple-support-rcs/</a></p></li><li><p>&#8203;<strong>Industry Analysis (RCS):</strong> <em>RCS is no longer a future vision, it's happening now: the 2025 comeback of rich messaging</em> (Digital Virgo). URL: <a href="https://www.digitalvirgo.com/blog/rcs-is-no-longer-a-future-vision-its-happening-now-the-2025-comeback-of-rich-messaging-paving-the-way-for-the-next-generation-messaging-standard-in-2026/">https://www.digitalvirgo.com/blog/rcs-is-no-longer-a-future-vision-its-happening-now-the-2025-comeback-of-rich-messaging-paving-the-way-for-the-next-generation-messaging-standard-in-2026/</a></p></li><li><p>&#8203;<strong>Technical Dispatch (Fediverse):</strong> <em>Federated Social Media Platforms</em> (European Data Protection Supervisor). URL: <a href="https://www.edps.europa.eu/system/files/2022-07/22-07-26_techdispatch-1-2022-federated-social-media-platforms_en.pdf">https://www.edps.europa.eu/system/files/2022-07/22-07-26_techdispatch-1-2022-federated-social-media-platforms_en.pdf</a></p></li><li><p>&#8203;<strong>Tech Standards News (ActivityPub):</strong> <em>Implementing Encrypted Messaging over ActivityPub</em> (Social Web Foundation). URL: <a href="https://socialwebfoundation.org/2025/12/19/implementing-encrypted-messaging-over-activitypub/">https://socialwebfoundation.org/2025/12/19/implementing-encrypted-messaging-over-activitypub/</a></p></li><li><p>&#8203;<strong>Policy Paper (Social Media):</strong> <em>A Public, Interoperable Social Media Space</em> (Open Future Foundation). URL: <a href="https://openfuture.eu/policies-for-the-digital-commons/interoperable-social-media/">https://openfuture.eu/policies-for-the-digital-commons/interoperable-social-media/</a></p></li><li><p>&#8203;<strong>Peer-Reviewed Research Paper (Video Conferencing):</strong> <em>Can Video Conferencing Be as Easy as Telephoning?&#8212;A Home Healthcare Case Study</em> (Scientific Research Publishing). URL: <a href="https://www.scirp.org/journal/paperinformation?paperid=64370">https://www.scirp.org/journal/paperinformation?paperid=64370</a></p></li><li><p>&#8203;<strong>Industry Whitepaper (Video Interop):</strong> <em>Video Interop in the Hybrid Work Environment</em> (Webex / Recon Research). URL: <a href="https://www.webex.com/content/dam/www/us/en/ebook/solutions/interoperability/Recon-Research-Video-Interop-in-the-Hybrid-Work-Environment_cm-4999.pdf">https://www.webex.com/content/dam/www/us/en/ebook/solutions/interoperability/Recon-Research-Video-Interop-in-the-Hybrid-Work-Environment_cm-4999.pdf</a></p></li><li><p>&#8203;<strong>Protocol Analysis (Video Conferencing):</strong> <em>The Latest Video Conferencing Standards and Protocols</em> (Metrigy). URL: <a href="https://metrigy.com/the-latest-video-conferencing-standards-and-protocols/">https://metrigy.com/the-latest-video-conferencing-standards-and-protocols/</a></p></li><li><p><strong>Star Trek Reference (Subspace &amp; Devices):</strong> <em>Communicator (Star Trek)</em> (Wikipedia) &#8211; Details the fictional communication devices, the LCARS interface, and the subspace transmission protocols that bypass normal physical limitations for instantaneous contact. URL: <a href="https://en.wikipedia.org/wiki/Communicator_(Star_Trek)">https://en.wikipedia.org/wiki/Communicator_(Star_Trek)</a></p></li><li><p><strong>Star Trek Reference (LCARS Operating System):</strong> <em>Library Computer Access and Retrieval System (LCARS)</em> (Wikipedia / Memory Alpha) &#8211; Details the primary computer operating system used across Federation starships. It provides a unified graphical interface for diverse tasks, including data retrieval, log recording, and secure subspace communications, ensuring universal interoperability regardless of the specific vessel or station. URL: <a href="https://en.wikipedia.org/wiki/LCARS">https://en.wikipedia.org/wiki/LCARS</a></p></li><li><p><strong>Star Wars Reference (The HoloNet):</strong> <em>HoloNet</em> (Star Wars Universe Wiki) &#8211; Explains the galactic communications grid commissioned by the Galactic Senate, which uses hyperwave transceivers and s-threads to route hologram and data communications instantaneously across the galaxy. URL: <a href="https://starwars-universe.fandom.com/wiki/HoloNet">https://starwars-universe.fandom.com/wiki/HoloNet</a></p></li><li><p><strong>Stargate Reference (Subspace &amp; Alteran Tech):</strong> <em>Subspace communication</em> (Vennix Productions / Stargate Wiki) &#8211; Details how different cultures (Ancients, Asgard, Goa&#8217;uld) utilize subspace communication networks and long-range terminals to transmit data across galaxies. URL: <a href="https://vennixproductions.fandom.com/wiki/Subspace_communication">https://vennixproductions.fandom.com/wiki/Subspace_communication</a></p></li></ul><p>&#8203;</p>]]></content:encoded></item><item><title><![CDATA[Welcome to the new Cyberkite website!]]></title><description><![CDATA[The new completely rebuilt Cyberkite website for expert IT, Cybersecurity, Marketing, and Innovation support.]]></description><link>https://blog.cyberkite.com.au/p/welcome-to-the-new-cyberkite-website</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/welcome-to-the-new-cyberkite-website</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Sun, 15 Mar 2026 21:30:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_FT_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_FT_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_FT_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_FT_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_FT_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_FT_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_FT_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:67887,&quot;alt&quot;:&quot;Promotional graphic for Cyberkite set against a background of Earth and the moon from space. On the left is a geometric grey kite logo with the text \&quot;Cyberkite: Helping your business glide online\&quot; and the website \&quot;cyberkite.com.au\&quot;. On the right, large white text announces \&quot;New digital HQ live!\&quot;.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.cyberkite.com.au/i/191001843?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Promotional graphic for Cyberkite set against a background of Earth and the moon from space. On the left is a geometric grey kite logo with the text &quot;Cyberkite: Helping your business glide online&quot; and the website &quot;cyberkite.com.au&quot;. On the right, large white text announces &quot;New digital HQ live!&quot;." title="Promotional graphic for Cyberkite set against a background of Earth and the moon from space. On the left is a geometric grey kite logo with the text &quot;Cyberkite: Helping your business glide online&quot; and the website &quot;cyberkite.com.au&quot;. On the right, large white text announces &quot;New digital HQ live!&quot;." srcset="https://substackcdn.com/image/fetch/$s_!_FT_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_FT_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_FT_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_FT_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38fcad06-bb34-4e50-be07-25ff46c3e7a6_1280x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Hi Everyone, if you are reading this on your phone or computer, you might notice things look a little different! Over the last few weeks, I&#8217;ve been working behind the scenes to streamline our digital experience, and we have officially migrated to our new IT services website at <strong><a href="https://cyberkite.com.au">cyberkite.com.au</a></strong>.</p><p>Our new <strong>booking page</strong> is: <strong><a href="https://cyberkite.com.au/#book">cyberkite.com.au/#book</a></strong></p><p>Our new <strong>service pages:</strong> </p><ul><li><p>IT Support (AUS clients only): <strong><a href="https://cyberkite.com.au/#support">cyberkite.com.au/#support</a></strong></p></li><li><p>Cybersecurity Services (AUS Clients only): <strong><a href="https://cyberkite.com.au/#cybersecurity">cyberkite.com.au/#cybersecurity</a></strong></p></li><li><p>Marketing &amp; Website Support (AUS Clients Only): <strong><a href="https://cyberkite.com.au/#marketing">cyberkite.com.au/#marketing</a></strong></p></li><li><p>Innovation &amp; Strategic Consulting (AUS &amp; International Clients): <strong><a href="https://cyberkite.com.au/#consulting">cyberkite.com.au/#consulting</a></strong></p></li></ul><p>Our new <strong>solutions page</strong>: <strong><a href="https://cyberkite.com.au/#solutions">cyberkite.com.au/#solutions</a></strong></p><p>Our new <strong>about us page</strong>: <strong><a href="https://cyberkite.com.au/#about">cyberkite.com.au/#about</a></strong></p><p>A number of other pages are there such as Service Rates, Payment Options, Legal Terms and our Blog landing page. We hope you enjoy the simpler experience. </p><h1>Why did we upgrade the site? </h1><p><strong>The goal was simple: </strong>make getting expert IT, Cybersecurity, and Marketing support as frictionless as possible for Australian small businesses (10 staff or less). Additionally, we are excited to offer Innovation &amp; Strategic Consulting to Australian and International businesses of all sizes.</p><p><strong>Back end goals were also simple:</strong> tidy up our branding, save on website running costs, make use of latest website tools and make the pages make more sense and refine our service offerings to focus on what Cyberkite does best. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1><strong>What&#8217;s new for our clients?</strong></h1><p>&#9989; A lightning-fast, mobile-optimized experience. </p><p>&#9989; Simplified and clarified wording in the AI age. </p><p>&#9989; A crystal-clear booking hub for both remote and Greater Melbourne (AU) onsite support. </p><p>&#9989; <strong>New Feature:</strong> A complimentary 15-Minute Discovery Call for new clients who need direction on their tech strategy but aren&#8217;t sure where to start.</p><p>Check out the new site and browse our specific solutions tailored for different industries!</p><h1><strong>A quick question for you on our blog</strong></h1><p>How are you enjoying our Substack blog so far at <strong><a href="https://blog.cyberkite.com.au">blog.cyberkite.com.au</a></strong>? I love sharing these in-depth articles with our Australian and International readers. If you've been finding these tech and business insights helpful, I would be incredibly grateful if you shared our blog website with other business owners in your network that will benefit!</p><p>Check out the new site, browse our specific solutions for different industries, and as always, thank you for reading and supporting Cyberkite as we serve your small business!</p><p>Glide online securely, </p><p>Michael Plis @ <strong><a href="https://cyberkite.com.au">cyberkite.com.au</a></strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Architecture of Truth: Why Specialized SLMs & MoE are the Keys to AGI]]></title><description><![CDATA[The era of "mostly accurate" AI is ending. To reach 99% reliability, we are moving away from the giant monolith and toward a verified network of experts. This article explores this need further.]]></description><link>https://blog.cyberkite.com.au/p/architecture-of-truth-why-specialized</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/architecture-of-truth-why-specialized</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Mon, 09 Mar 2026 00:25:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qLM6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qLM6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qLM6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!qLM6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!qLM6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!qLM6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qLM6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:314586,&quot;alt&quot;:&quot;A detailed landscape infographic titled \&quot;The Architecture of Truth: Road to 99% Accuracy &amp; AGI.\&quot; On the left, a cracked brain labeled \&quot;The Hallucination Ceiling\&quot; emits clouds of text like \&quot;mostly right\&quot; and \&quot;statistical mimics.\&quot; In the center, a figure representing \&quot;Verifiable Intelligence\&quot; dynamically routes data to specialized \&quot;Pillars of Truth,\&quot; including a Physics-SLM and Math-SLM trained on verified data. Below, a flowchart illustrates Inference-Time Scaling, showing a natural language prompt converted into mathematically proven formal logic. On the right, a Willow Quantum Chip processes massive parallel simulations, leading down a bright pathway toward Artificial General Intelligence (AGI).&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A detailed landscape infographic titled &quot;The Architecture of Truth: Road to 99% Accuracy &amp; AGI.&quot; On the left, a cracked brain labeled &quot;The Hallucination Ceiling&quot; emits clouds of text like &quot;mostly right&quot; and &quot;statistical mimics.&quot; In the center, a figure representing &quot;Verifiable Intelligence&quot; dynamically routes data to specialized &quot;Pillars of Truth,&quot; including a Physics-SLM and Math-SLM trained on verified data. Below, a flowchart illustrates Inference-Time Scaling, showing a natural language prompt converted into mathematically proven formal logic. On the right, a Willow Quantum Chip processes massive parallel simulations, leading down a bright pathway toward Artificial General Intelligence (AGI)." title="A detailed landscape infographic titled &quot;The Architecture of Truth: Road to 99% Accuracy &amp; AGI.&quot; On the left, a cracked brain labeled &quot;The Hallucination Ceiling&quot; emits clouds of text like &quot;mostly right&quot; and &quot;statistical mimics.&quot; In the center, a figure representing &quot;Verifiable Intelligence&quot; dynamically routes data to specialized &quot;Pillars of Truth,&quot; including a Physics-SLM and Math-SLM trained on verified data. Below, a flowchart illustrates Inference-Time Scaling, showing a natural language prompt converted into mathematically proven formal logic. On the right, a Willow Quantum Chip processes massive parallel simulations, leading down a bright pathway toward Artificial General Intelligence (AGI)." srcset="https://substackcdn.com/image/fetch/$s_!qLM6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!qLM6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!qLM6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!qLM6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F541c48ef-65b3-4e44-bf2f-83b0a8c23d19_1366x762.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The path to AGI is a difficult one. (Image: Gemini)</figcaption></figure></div><h1>How AI happened and where we're at?  </h1><p>In 2017, Google researchers published a paper called "<a href="https://arxiv.org/abs/1706.03762">Attention Is All You Need</a>" (By Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, Illia Polosukhin). It introduced the <strong>Transformer</strong>, the foundational engine that made everything from ChatGPT to Gemini possible. But almost a decade later, we have hit a wall: <strong>The Hallucination Ceiling.</strong></p><p>&#8203;Large Language Models (LLMs) in their current form are ultimately "statistical mimics." They predict the next most likely word based on a massive, often messy, pool of scraped internet data. This is perfectly fine for writing a poem, drafting an email, or brainstorming marketing copy. But it is incredibly dangerous for generating medical advice, writing cybersecurity patches, or conducting structural engineering.</p><p>&#8203;To reach Artificial General Intelligence (AGI), a system that meets or exceeds human-level reasoning across all fields, we don't just need <em>more</em> data. We need a radical restructuring of how AI "thinks."</p><p>&#8203;We are moving away from "Generative Intelligence" that guesses, and toward "Verifiable Intelligence" that proves.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>&#8203;<strong>The Death of the Monolith: MoE and SLMs</strong></h1><p>&#8203;For years, the industry trend was simply "bigger is better." But a monolithic model that tries to memorize the entire internet is often a model that masters nothing. The future of architecture relies on two key components: <strong>Mixture of Experts (MoE)</strong> and <strong>Small Language Models (SLMs)</strong>.</p><h2>&#8203;<strong>Power of MoE (Mixture of Experts)</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Num!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Num!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!9Num!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!9Num!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!9Num!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Num!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:195373,&quot;alt&quot;:&quot;A technical diagram titled \&quot;The Power of MoE: Sparsity, Efficiency, and Specialization.\&quot; In the center, an AI Gating Network chip acts as a router, directing a glowing stream of data specifically to active \&quot;C++ Coding\&quot; and \&quot;Quantum Chemistry\&quot; expert modules. Surrounding modules, such as \&quot;Text &amp; Translation\&quot; and \&quot;Medical Diagnosis,\&quot; are dimmed and labeled \&quot;Standby (Sleep),\&quot; illustrating how Mixture of Experts architecture saves compute power through sparse activation.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A technical diagram titled &quot;The Power of MoE: Sparsity, Efficiency, and Specialization.&quot; In the center, an AI Gating Network chip acts as a router, directing a glowing stream of data specifically to active &quot;C++ Coding&quot; and &quot;Quantum Chemistry&quot; expert modules. Surrounding modules, such as &quot;Text &amp; Translation&quot; and &quot;Medical Diagnosis,&quot; are dimmed and labeled &quot;Standby (Sleep),&quot; illustrating how Mixture of Experts architecture saves compute power through sparse activation." title="A technical diagram titled &quot;The Power of MoE: Sparsity, Efficiency, and Specialization.&quot; In the center, an AI Gating Network chip acts as a router, directing a glowing stream of data specifically to active &quot;C++ Coding&quot; and &quot;Quantum Chemistry&quot; expert modules. Surrounding modules, such as &quot;Text &amp; Translation&quot; and &quot;Medical Diagnosis,&quot; are dimmed and labeled &quot;Standby (Sleep),&quot; illustrating how Mixture of Experts architecture saves compute power through sparse activation." srcset="https://substackcdn.com/image/fetch/$s_!9Num!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!9Num!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!9Num!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!9Num!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f63afb3-bb15-4179-8d53-485f384d62a8_1366x762.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">MoE has already been used in Gemini models since 1.5 Pro (Image: Gemini)</figcaption></figure></div><p>In an MoE system, the neural network is divided into specialized sub-networks. Instead of activating every single parameter to answer a simple prompt, the model uses a dynamic routing mechanism that selectively activates only the most relevant "expert" pathways.</p><p>&#8203;We are already seeing the evolution of this in action with Google&#8217;s current Gemini 3.1 Pro and the imminent shift toward the 3.5 architecture. These models utilize an advanced, hyper-sparse Mixture-of-Experts architecture. This allows the total model capacity to scale massively while keeping the computational cost incredibly low, enabling breakthroughs like real-time reasoning and massive, multi-million token context windows without crashing the grid. When you ask a question about quantum mechanics, the "general" brain doesn't guess; it delegates the task to a highly verified "expert" subset of neurons.</p><h2>&#8203;<strong>Rise of "Pristine" SLMs</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QTeR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QTeR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!QTeR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!QTeR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!QTeR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QTeR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:277675,&quot;alt&quot;:&quot;An infographic titled \&quot;The Rise of 'Pristine' SLMs: Unlocking 99% Accuracy &amp; Human-Level Trust.\&quot; The left side visualizes the problem: a generic LLM brain overwhelmed by unfiltered \&quot;Raw Internet Noise\&quot; (social media, memes, fiction), resulting in only 70-80% accuracy. The right side illustrates the solution: high-fidelity \&quot;Pristine Data\&quot; (scientific papers, mathematical proofs) feeding into a specialized Physics-SLM, like Microsoft's Phi-3-Mini. This verified data path leads to a smartphone, unlocking the 99% accuracy threshold required for human-level trust.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="An infographic titled &quot;The Rise of 'Pristine' SLMs: Unlocking 99% Accuracy &amp; Human-Level Trust.&quot; The left side visualizes the problem: a generic LLM brain overwhelmed by unfiltered &quot;Raw Internet Noise&quot; (social media, memes, fiction), resulting in only 70-80% accuracy. The right side illustrates the solution: high-fidelity &quot;Pristine Data&quot; (scientific papers, mathematical proofs) feeding into a specialized Physics-SLM, like Microsoft's Phi-3-Mini. This verified data path leads to a smartphone, unlocking the 99% accuracy threshold required for human-level trust." title="An infographic titled &quot;The Rise of 'Pristine' SLMs: Unlocking 99% Accuracy &amp; Human-Level Trust.&quot; The left side visualizes the problem: a generic LLM brain overwhelmed by unfiltered &quot;Raw Internet Noise&quot; (social media, memes, fiction), resulting in only 70-80% accuracy. The right side illustrates the solution: high-fidelity &quot;Pristine Data&quot; (scientific papers, mathematical proofs) feeding into a specialized Physics-SLM, like Microsoft's Phi-3-Mini. This verified data path leads to a smartphone, unlocking the 99% accuracy threshold required for human-level trust." srcset="https://substackcdn.com/image/fetch/$s_!QTeR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!QTeR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!QTeR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!QTeR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b3be6a-cf3c-4306-b0d9-b268a940ce74_1366x762.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">SLM concept will help with verified and accurate academic information. tbus increasing accuracy towards 90-99% human level. (Image: Gemini)</figcaption></figure></div><p>This expert routing becomes truly powerful when combined with highly specialized Small Language Models (SLMs). Microsoft recently proved the viability of this with the <strong>Phi-3-mini</strong>. Despite having only 3.8 billion parameters, small enough to run natively on an iPhone, it matches the performance of massive models like GPT-3.5.</p><p>&#8203;How? By abandoning raw internet noise. Phi-3 was trained on 3.3 trillion tokens of rigorously filtered public documents, high-quality educational materials, and specially created synthetic data.</p><p>&#8203;Imagine a Physics-SLM that has never read a Reddit thread, a political debate, or a fictional novel. It has only processed verified scientific papers and mathematical proofs. By querying these "Pillars of Truth," we can push AI accuracy from the current ~70-80% to the 99% threshold required for human-level trust.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>&#8203;<strong>Formal Verification: Solving the Hallucination Problem</strong></h1><p>&#8203;The core reason AI hallucinates is that it operates purely in natural language, which is inherently ambiguous. To reach AGI, AI must be grounded in strict logic.</p><p>&#8203;Google DeepMind&#8217;s recent breakthrough with <strong><a href="https://deepmind.google/blog/ai-solves-imo-problems-at-silver-medal-level/">AlphaProof</a></strong> provides the exact blueprint for this. DeepMind built a reinforcement-learning system that combines LLMs with <strong>Lean</strong>, an open-source programming language and formal proof assistant.</p><p>&#8203;When AlphaProof is given a math problem, it doesn't just guess the answer in English. It translates the problem into Lean code, solves it mathematically, and uses Lean's automated verification to <em>prove</em> the logic is flawless before it ever outputs the result to the user. There is no need to trust the model blindly because the output is mathematically verified, eliminating hallucinations entirely.</p><p>&#8203;This methodology, combining Gemini's Deep Think reasoning with formal verification, recently allowed Google's AI to achieve a Gold-medal standard (scoring 35 out of 42 points) at the International Mathematical Olympiad (IMO).&nbsp;</p><p>&#8203;This represents a shift to <strong>Inference-time Scaling</strong>. The AI spends far more compute power "thinking," simulating, and "verifying" its logic before it speaks. It is the difference between a student shouting out the first answer that comes to mind and a scientist methodically showing their work on a chalkboard.</p><h1>&#8203;<strong>The Hardware Catalyst: Quantum-AI Synergy</strong></h1><p>&#8203;We cannot talk about the future of AI without talking about the hardware required to run these massive verification loops. Enter <strong>Willow</strong>, Google&#8217;s state-of-the-art 105-qubit superconducting quantum processor.</p><p>&#8203;Late in 2024, Google announced that Willow achieved a historic milestone: it reduced errors exponentially as the number of qubits scaled, achieving below-threshold quantum error correction. To prove its power, Willow completed a benchmark computation in just five minutes that would take today's fastest supercomputers 10 septillion years.</p><p>&#8203;More practically, Google recently ran the "Quantum Echo" algorithm on Willow, analyzing the magnetic spins of atoms to reveal molecular structures 13,000 times faster than a supercomputer.</p><p>&#8203;To reach 99% accuracy in complex, real-world fields like molecular biology, drug discovery, or climate modeling, classical computers simply aren't fast enough. The integration of Quantum Computing into the AI training loop will allow us to simulate the physical world with a fidelity we&#8217;ve never seen. We aren't just teaching AI to talk about the world; we are giving it the computational engine to simulate the world's laws perfectly.</p><h1>&#8203;<strong>What&#8217;s Missing for AGI?</strong></h1><p>&#8203;While MoE, Formal Verification, and Quantum hardware provide the engine, two major hurdles remain to achieve true AGI:</p><ul><li><p>&#8203;<strong>Continuous Learning:</strong> Currently, AI models suffer from "catastrophic forgetting." Once they are trained, they are essentially frozen. If you teach them something new, they often overwrite and forget previous knowledge. True intelligence requires the ability to learn continuously from a single mistake in real-time without retraining the entire multi-billion-parameter system.</p></li></ul><ul><li><p>&#8203;<strong>Episodic Memory:</strong> AGI requires persistent, contextual memory. It needs to remember exactly <em>how</em> it solved a problem for you three months ago and apply that context to a new workflow today.</p></li></ul><p>&#8203;When we successfully combine specialized SLMs, MoE architecture, and Quantum-verified logic, the "Personal Computer" will officially become the "Personal Expert."</p><p>&#8203;We are no longer building a tool that answers questions. We are building a system that understands the truth.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Building a brain &#129504; </h1><p>I think to myself the ultimate goal here is to build a controllable intelligence generator that mimics the human brain. But I wonder the more complex we make at the harder it will be to monitor and control.</p><p> Understanding real world and understanding at least by automation like precision without consciousness it starts to understand the world yhat humans live in this becoming more useful. That is good as long as we figure out how to control and monitor it and build truthful foundations for it. </p><p>If you build the AGI (Artificial General Intelligence) with bias or conflict within it there will be errors. Its interesting how universal truths are required for AI to work. Perhaps thats why our human self aware bains suffer from conflict when we go contrary to our moral principles and such situations. </p><p>MoE and SLMs are already being designed and implemented and all these breakthroughs will need to be added to all AIs in order to be financially viable and advance.</p><p>Example of the problem is my tests of AI voice mode on Gemini, Grok, ChatGPT and Claude. After approximately 30 minutes recent models collapse by starting to speak sentences with only 2-5 words, sounding like they are short of breath and speaking in a condescending manner. Earlier models I found were a lot easier to have a conversation with. I was able to, for example maintain conversations that were maybe 1 or 2 hours long before the model collapsed. But the new models seem to collapse a lot quicker when exposed to a human intelligence and going deep into a subject in a voice conversation.  </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!62nz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!62nz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!62nz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!62nz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!62nz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!62nz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:286336,&quot;alt&quot;:&quot;A conceptual illustration contrasting flawed current AI with desired AGI. On the left, a fragmented, smoking brain represents current AI suffering from internal bias, rushed development, and uncertified data noise, leading to model collapse during long voice interactions. A worried human observer watches. A central pillar highlights the 90% accuracy inflection point required to replace white-collar jobs. On the right, a healthy, intact brain represents a stable, controllable AGI built on a truthful foundation, utilizing MoE efficiency and specialized SLMs, with a built-in monitor and control interface.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A conceptual illustration contrasting flawed current AI with desired AGI. On the left, a fragmented, smoking brain represents current AI suffering from internal bias, rushed development, and uncertified data noise, leading to model collapse during long voice interactions. A worried human observer watches. A central pillar highlights the 90% accuracy inflection point required to replace white-collar jobs. On the right, a healthy, intact brain represents a stable, controllable AGI built on a truthful foundation, utilizing MoE efficiency and specialized SLMs, with a built-in monitor and control interface." title="A conceptual illustration contrasting flawed current AI with desired AGI. On the left, a fragmented, smoking brain represents current AI suffering from internal bias, rushed development, and uncertified data noise, leading to model collapse during long voice interactions. A worried human observer watches. A central pillar highlights the 90% accuracy inflection point required to replace white-collar jobs. On the right, a healthy, intact brain represents a stable, controllable AGI built on a truthful foundation, utilizing MoE efficiency and specialized SLMs, with a built-in monitor and control interface." srcset="https://substackcdn.com/image/fetch/$s_!62nz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!62nz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!62nz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!62nz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99dfdeda-9781-4ef0-8a8a-0b236e7315dd_1366x762.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">My testing of major AI models like Gemini, Grok, ChatGPT and Claude reveal a intelligence wall. More work needed to be financially viable and useful. (Image: Gemini)</figcaption></figure></div><p>Isn&#8217;t that amazing that our brain is so complex in our sentient intelligence is too complex for the AI so raved about as advanced. </p><p>Cutting corners and rushing into this is foolish and anyone that rushes through this will suffer financially as a company both as the end user and as the developer. So I highly recommend doing it properly. Designing these advancements in such a way is its fully tested and trusted. Data needs to be verified and trusted if we are to go into the 90 to 90% accuracy goal - humans are about 90 to 99% accurate, so for AI to advance it needs to match that. You would it be amazing for the AI to get to 100% accuracy but look if it gets to 90%. That's the inflection point where AI can replace humans on mass at least in white collar jobs where direct human to human contact is not necessary. </p><p>I'm eagerly and worryingly watching the development of AI in the coming months and years. The stakes are high for everyone and the dangers are immense. </p><p>Subscribe to Cyberkite blog to keep on top of these developments from a small business perspective. </p><p>Happy Computing </p><p><strong>Michael Plis</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>References </h1><p>&#8203;<strong>1. The Foundation of Modern AI Architecture</strong></p><ul><li><p>&#8203;<strong>Attention Is All You Need (The original Transformer paper)</strong> <a href="https://arxiv.org/abs/1706.03762">https://arxiv.org/abs/1706.03762</a></p></li></ul><p>&#8203;<strong>2. Mixture of Experts (MoE) &amp; Google Gemini</strong></p><ul><li><p>&#8203;<strong>Our next-generation model: Gemini 1.5 (Google DeepMind's transition to MoE)</strong> <a href="https://www.google.com/search?q=https://deepmind.google/discover/blog/our-next-generation-model-gemini-15/">https://deepmind.google/discover/blog/our-next-generation-model-gemini-15/</a></p></li></ul><p>&#8203;<strong>3. Small Language Models (SLMs)</strong></p><ul><li><p>&#8203;<strong>Introducing Phi-3: Redefining what&#8217;s possible with SLMs (Microsoft)</strong> <a href="https://azure.microsoft.com/en-us/blog/introducing-phi-3-redefining-whats-possible-with-slms/">https://azure.microsoft.com/en-us/blog/introducing-phi-3-redefining-whats-possible-with-slms/</a></p></li></ul><p>&#8203;<strong>4. Formal Verification &amp; Logical Grounding</strong></p><ul><li><p>&#8203;<strong>AI achieves silver-medal standard solving International Mathematical Olympiad problems (AlphaProof)</strong> <a href="https://deepmind.google/discover/blog/ai-achieves-silver-medal-standard-solving-international-mathematical-olympiad-problems/">https://deepmind.google/discover/blog/ai-achieves-silver-medal-standard-solving-international-mathematical-olympiad-problems/</a></p></li></ul><p>&#8203;<strong>5. Quantum Computing &amp; AI Synergy</strong></p><ul><li><p>&#8203;<strong>Meet Willow, our state-of-the-art quantum chip (Google)</strong> <a href="https://blog.google/technology/research/google-willow-quantum-chip/">https://blog.google/technology/research/google-willow-quantum-chip/</a></p></li></ul><p><strong>6. DeepLearning.ai (The Batch)</strong></p><ul><li><p>&#8203;<strong>Article:</strong> <em>Google Releases Gemini 3.1 Pro In Preview, Tops Intelligence Index at Same Price</em></p></li><li><p>&#8203;<strong>Quote:</strong> "The model is a sparse mixture-of-experts transformer... Input/output: Text, images, PDFs, audio, video in (up to 1 million tokens)... Architecture: Mixture-of-experts transformer."</p></li><li><p>&#8203;<strong>URL:</strong> <a href="https://www.deeplearning.ai/the-batch/google-releases-gemini-3-1-pro-in-preview-tops-intelligence-index-at-same-price/">https://www.deeplearning.ai/the-batch/google-releases-gemini-3-1-pro-in-preview-tops-intelligence-index-at-same-price/</a></p></li></ul><p>&#8203;<strong>7. Weights &amp; Biases (W&amp;B AI Team)</strong></p><ul><li><p>&#8203;<strong>Article:</strong> <em>Tutorial: Get started with Google Gemini 3.1 Pro</em></p></li><li><p>&#8203;<strong>Quote:</strong> "Gemini 3.1 Pro is built on top of Gemini 3 Pro and follows a Sparse Mixture of Experts (MoE) transformer architecture with native multimodal support for text, vision, and audio inputs. The context window supports up to 1 million tokens..."</p></li><li><p>&#8203;<strong>URL:</strong> <a href="https://wandb.ai/ai-team-articles/gemini-3.1-pro/reports/Tutorial-Get-started-with-Google-Gemini-3-1-Pro--VmlldzoxNTk4NzY5MA">https://wandb.ai/ai-team-articles/gemini-3.1-pro/reports/Tutorial-Get-started-with-Google-Gemini-3-1-Pro--VmlldzoxNTk4NzY5MA</a></p></li></ul><p>&#8203;<strong>8. Tech Reviews / Benchmarking (Medium)</strong></p><ul><li><p>&#8203;<strong>Article:</strong> <em>Gemini 3.1 Pro Test: Is It the Perfect LLM?</em></p></li><li><p>&#8203;<strong>Quote:</strong> "Gemini 3.1 Pro is built on an advanced Sparse MoE (Mixture of Experts) architecture and introduces a brand-new 'Deep Think' mode. Think of it as a smart dispatch center: when faced with complex problems, it automatically activates the most relevant 'experts' and spends more time breaking down multi-step reasoning tasks."</p></li><li><p>&#8203;<strong>URL:</strong> <a href="https://medium.com/@302.AI/gemini-3-1-pro-test-dethroning-claude-4-6-to-take-the-crown-is-it-the-perfect-llm-964a09ed59d5">https://medium.com/@302.AI/gemini-3-1-pro-test-dethroning-claude-4-6-to-take-the-crown-is-it-the-perfect-llm-964a09ed59d5</a></p></li></ul><ol start="9"><li><p><strong>Google DeepMind AlphaProof</strong> <a href="https://deepmind.google/blog/ai-solves-imo-problems-at-silver-medal-level/">https://deepmind.google/blog/ai-solves-imo-problems-at-silver-medal-level/</a> </p></li></ol>]]></content:encoded></item><item><title><![CDATA[Chrome Security Enhancements & Tips]]></title><description><![CDATA[Updates on various Google Chrome browser security enhancements and how to use them.]]></description><link>https://blog.cyberkite.com.au/p/chrome-security-enhancements-and</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/chrome-security-enhancements-and</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Mon, 02 Mar 2026 03:16:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UegS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UegS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UegS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!UegS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!UegS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!UegS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UegS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:379852,&quot;alt&quot;:&quot;A conceptual isometric illustration featuring a central Chrome logo protected by a glowing shield that is repelling virus-shaped icons. Surrounding the center are smaller 3D icons representing core security features: a smartphone with a 2-step verification checkmark, a biometric fingerprint sensor, a key for the password manager, a shield labeled HTTPS for secure connections, and an eye with a strike-through representing ad privacy.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.cyberkite.com.au/i/187096901?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A conceptual isometric illustration featuring a central Chrome logo protected by a glowing shield that is repelling virus-shaped icons. Surrounding the center are smaller 3D icons representing core security features: a smartphone with a 2-step verification checkmark, a biometric fingerprint sensor, a key for the password manager, a shield labeled HTTPS for secure connections, and an eye with a strike-through representing ad privacy." title="A conceptual isometric illustration featuring a central Chrome logo protected by a glowing shield that is repelling virus-shaped icons. Surrounding the center are smaller 3D icons representing core security features: a smartphone with a 2-step verification checkmark, a biometric fingerprint sensor, a key for the password manager, a shield labeled HTTPS for secure connections, and an eye with a strike-through representing ad privacy." srcset="https://substackcdn.com/image/fetch/$s_!UegS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!UegS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!UegS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!UegS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f25a9b-23ac-4d71-9dec-6cefbefd27f0_1366x762.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">It&#8217;s important to protect your browser as it&#8217;s the entry point. (Image Source: Gemini)</figcaption></figure></div><p>Google Chrome has recently overhauled its security tools to be much more proactive. Here are the most important live security features you should activate to protect your browsing data.</p><p>Some new security enhancements to Chrome browser &amp; OS have recently been added since version 84.0.4147.135 onward. I&#8217;ve also included some tips on turning on additional Chrome browser &amp; Chrome OS security features to further enhance your online security.</p><h1>Automatic "Safety Check"</h1><p>Chrome&#8217;s Safety Check feature now runs automatically in the background. It continuously monitors your browser health, alerts you to compromised passwords, revokes permissions from sites you haven&#8217;t visited recently, and flags deceptive notifications.</p><ul><li><p><strong>How to view your Safety Check status:</strong></p><ul><li><p>Open Chrome and click the <strong>three dots (&#8942;)</strong> in the top right.</p></li><li><p>Click <strong>Settings</strong>.</p></li><li><p>Select <strong>Privacy and security</strong> on the left menu.</p></li><li><p>Under the <strong>Safety Check</strong> section, review any recommended actions (like removing a bad extension or updating a compromised password).</p></li></ul></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Enhanced Protection (Real-Time Safe Browsing)</h1><p>Standard protection relies on a static list of known bad websites. <strong>Enhanced Protection</strong> goes a step further by using real-time AI to actively scan for new, unknown phishing sites and malware before they can load on your screen.</p><ul><li><p><strong>How to turn it on:</strong></p><ul><li><p>Go to <strong>Settings</strong> &gt; <strong>Privacy and security</strong> &gt; <strong>Security</strong>.</p></li><li><p>Under the <strong>Safe Browsing</strong> section, select <strong>Enhanced protection</strong>.</p></li></ul></li></ul><p><a href="https://support.google.com/chrome/answer/9890866?hl=en">How to use Safe Browsing.</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!O2IE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!O2IE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg 424w, https://substackcdn.com/image/fetch/$s_!O2IE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg 848w, https://substackcdn.com/image/fetch/$s_!O2IE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!O2IE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!O2IE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg" width="669" height="399" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:399,&quot;width&quot;:669,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!O2IE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg 424w, https://substackcdn.com/image/fetch/$s_!O2IE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg 848w, https://substackcdn.com/image/fetch/$s_!O2IE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!O2IE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2630605-fc4b-4ec7-94c6-79ab083a0e4e_669x399.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Use Secure DNS</h1><p>This feature encrypts your web traffic requests so your internet service provider (or anyone snooping on your local network) cannot easily track which websites you are visiting.</p><ul><li><p><strong>How to turn it on:</strong></p><ul><li><p>Go to <strong>Settings</strong> &gt; <strong>Privacy and security</strong> &gt; <strong>Security</strong>.</p></li><li><p>Scroll down and toggle on <strong>Use secure DNS</strong>.</p></li><li><p>Select the <strong>With</strong> option and choose a secure provider from the drop-down menu (such as Google Public DNS or Cloudflare or one of other 4 providers including one that has CleanBrowsing (porn filter)).</p></li></ul></li></ul><p></p><p><a href="https://support.google.com/chrome/answer/9890866?hl=en">How to use Secure DNS</a> (Under subheading <em>Use secure connection</em>...). You may need to re-tick and tick as it seems to drop off initially. <strong>Important:</strong> If your device is managed by your Organisation or parental controls are turned on, you can&#8217;t use Chrome&#8217;s secure DNS feature.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!z2mE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!z2mE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg 424w, https://substackcdn.com/image/fetch/$s_!z2mE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg 848w, https://substackcdn.com/image/fetch/$s_!z2mE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!z2mE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!z2mE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg" width="694" height="190" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:190,&quot;width&quot;:694,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!z2mE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg 424w, https://substackcdn.com/image/fetch/$s_!z2mE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg 848w, https://substackcdn.com/image/fetch/$s_!z2mE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!z2mE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd1d4dd5-0671-4b6a-93d3-a8c189d39958_694x190.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h1>One-Time Permissions</h1><p>Instead of permanently giving a website access to your microphone, camera, or location, you can now grant permission for a single session. Once you close the tab or leave the site, Chrome automatically revokes the access.</p><ul><li><p><strong>How to use it:</strong></p><ul><li><p>When a website asks for access (e.g., to your microphone), a prompt will appear near the address bar.</p></li><li><p>Select <strong>Allow this time</strong>.</p></li></ul></li></ul><h1>HTTPS-First Mode</h1><p>This setting forces Chrome to upgrade all your website connections to a secure, encrypted format (HTTPS). If a site doesn&#8217;t support encryption, Chrome will display a full-page warning before letting you proceed.</p><ul><li><p><strong>How to turn it on:</strong></p><ul><li><p>Go to <strong>Settings</strong> &gt; <strong>Privacy and security</strong> &gt; <strong>Security</strong>.</p></li><li><p>Scroll down to <strong>Advanced</strong> and toggle on <strong>Always use secure connections</strong>.</p></li></ul></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Disable Ad Privacy Tracking (Topics API)</h1><p>Chrome is phasing out old third-party cookies, but it has replaced them with a system that profiles your browsing history directly within the browser itself to serve you targeted ads. For maximum privacy, you should turn this off.</p><ul><li><p><strong>How to disable it:</strong></p><ol><li><p>Go to <strong>Settings</strong> &gt; <strong>Privacy and security</strong> &gt; <strong>Ad privacy</strong>.</p></li><li><p>Go into <strong>Ad topics</strong>, <strong>Site-suggested ads</strong>, and <strong>Ad measurement</strong>, and toggle all of them off.</p></li></ol></li></ul><h1>Audit Your Site Permissions</h1><p>Over time, we give dozens of websites access to our camera, microphone, and location. Chrome automatically removes permissions from sites you haven&#8217;t visited recently to protect your data, but doing a manual cleanup is highly recommended.</p><ul><li><p><strong>How to review them:</strong></p><ol><li><p>Go to <strong>Settings</strong> &gt; <strong>Privacy and security</strong> &gt; <strong>Site settings</strong>.</p></li><li><p>Review the permissions for Camera, Microphone, and Location, and remove access for any sites you don&#8217;t recognize or need.</p></li></ol></li></ul><h1>Use Separate Browser Profiles (Crucial for Sole Traders)</h1><p>Mixing personal browsing, business admin, and financial tasks in one browser window is a major risk. If you accidentally click a bad link while doing personal browsing, it could compromise your logged-in business accounts.</p><ul><li><p><strong>How to set it up:</strong></p><ol><li><p>Click your <strong>Profile picture</strong> in the top-right corner of Chrome.</p></li><li><p>Click <strong>Add profile</strong>.</p></li><li><p>Create distinct profiles (e.g., &#8220;Cyberkite Admin&#8221;, &#8220;Personal&#8221;, &#8220;Finance&#8221;) and give them different color themes so you immediately know which environment you are in.</p></li></ol></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Password Checkup (Audit for Compromised Credentials)</h1><p>If you use Chrome&#8217;s built-in password manager, you should regularly scan your saved logins to see if any have been exposed in third-party data breaches, or if you are using weak and reused passwords.</p><ul><li><p><strong>How to run the checkup:</strong></p><ol><li><p>Open Chrome and click the <strong>three dots (&#8942;)</strong> in the top right corner.</p></li><li><p>Hover over <strong>Passwords and autofill</strong> and select <strong>Google Password Manager</strong>.</p></li><li><p>On the left-hand menu, click <strong>Checkup</strong>.</p></li><li><p>Chrome will categorize your passwords into: Compromised, Reused, and Weak.</p></li><li><p>Click on any flagged passwords and follow the prompts to go to the associated website and update them immediately.</p></li></ol></li></ul><p>It will do the check for websites that have had their password compromised. (If you sync your passwords under Chrome browser/Google account). This replaces the Password Checkup extension that Google has deprecated from 31 August 2020. <a href="https://support.google.com/chrome/answer/95606?visit_id=637338639340321930-3890919345&amp;p=settings_password&amp;rd=1#leak_detection_privacy">About new Password Checkup </a>(Under subheading <em>Check your saved passwords</em>)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Et8m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Et8m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Et8m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Et8m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Et8m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Et8m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg" width="722" height="276" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:276,&quot;width&quot;:722,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Et8m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Et8m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Et8m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Et8m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c89c8a6-54d5-4084-b601-2ce09a5d3052_722x276.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Login to web based <a href="https://passwords.google.com/">Google Account Password Manager</a> with your Google account &amp; select Go to Password Checkup and change passwords for any sites that use same password to a unique for each and save it in Chrome synched with Google account. </p><p><a href="https://support.google.com/accounts/answer/9457609?hl=en">How to use Password Checkup</a> on online Google Password Manager.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g_LE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g_LE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg 424w, https://substackcdn.com/image/fetch/$s_!g_LE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg 848w, https://substackcdn.com/image/fetch/$s_!g_LE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!g_LE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g_LE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg" width="675" height="335" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:335,&quot;width&quot;:675,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!g_LE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg 424w, https://substackcdn.com/image/fetch/$s_!g_LE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg 848w, https://substackcdn.com/image/fetch/$s_!g_LE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!g_LE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb584518a-673c-4f08-a573-cb83b580866d_675x335.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Optimize Google Password Manager Settings</h1><p>If you use Chrome&#8217;s built-in password manager, you should adjust two critical settings to protect your saved logins from both physical snooping and hidden phishing scripts.</p><ul><li><p><strong>Require Authentication to Autofill (Windows Hello / Mac Screen Lock)</strong> By default, anyone sitting at your unlocked computer might be able to use your saved passwords. You can force Chrome to ask for your fingerprint, face scan, or computer PIN before it fills in a password.</p><ul><li><p><strong>How to turn it on:</strong></p><ol><li><p>Go to <strong>Settings</strong> &gt; <strong>Autofill and passwords</strong> &gt; <strong>Google Password Manager</strong>.</p></li><li><p>Click on <strong>Settings</strong> in the left-hand menu.</p></li><li><p>Toggle <strong>ON</strong> the option for <strong>Use Windows Hello when filling passwords</strong> (on Mac, this will say <strong>Use your screen lock when filling passwords</strong>).</p></li></ol></li></ul></li><li><p><strong>Disable &#8220;Sign in automatically&#8221; (Anti-Phishing Shield)</strong> If this is turned on, malicious scripts on compromised websites can sometimes trick your browser into automatically submitting your saved credentials into invisible forms without you clicking anything. Turning this off ensures you are always in control of when your password is submitted.</p><ul><li><p><strong>How to turn it off:</strong></p><ol><li><p>In the same <strong>Google Password Manager</strong> &gt; <strong>Settings</strong> menu.</p></li><li><p>Toggle <strong>OFF</strong> the switch for <strong>Sign in automatically</strong>.</p></li></ol></li></ul></li></ul><h1>Suggest Strong Password (The Built-In Generator)</h1><p>When you are creating a new account or updating an old password, you shouldn&#8217;t reuse an old one or try to invent a new one yourself. Chrome has a built-in generator that creates a long, complex, and unique password for you, and saves it automatically.</p><p><strong>How to use it:</strong></p><ol><li><p>Make sure you are signed into your Google Account in Chrome and that password syncing/saving is turned on.</p></li><li><p>Go to a website and begin signing up for an account.</p></li><li><p>Click on the text box where you need to enter a new password.</p></li><li><p>A prompt will appear saying <strong>Suggest strong password</strong> (if it doesn&#8217;t appear, right-click the text box and select <strong>Generate password</strong>).</p></li><li><p>Click <strong>Use suggested password</strong>. Chrome will fill it in and automatically save it to your Google Password Manager.</p></li></ol><p>When setting up a new account on a site right click on the password field &amp; select &#8220;<strong>Suggest strong password</strong>&#8220; &amp; save them to Google account via Chrome sync. How to use <a href="https://support.google.com/chrome/answer/7570435?co=GENIE.Platform%3DDesktop&amp;hl=en">Suggest strong password</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cd8Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cd8Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cd8Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cd8Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cd8Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cd8Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg" width="469" height="201" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:201,&quot;width&quot;:469,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!cd8Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cd8Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cd8Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cd8Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81132220-e457-4a61-8638-17d0644d70e7_469x201.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Note</strong>: Instructions on <a href="https://support.google.com/chrome/answer/185277?co=GENIE.Platform%3DDesktop&amp;hl=en">Turning sync on and off in Chrome</a> (<strong>Important:</strong> Only turn on Chrome sync with devices you own. If you&#8217;re using a public computer, <a href="https://support.google.com/chrome/answer/6130773">use guest mode</a> instead.)</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Turn on 2-Step Verification (2SV) for Your Google Account</h1><p>Turning on 2-Step Verification (also known as two-factor authentication) adds a critical extra layer of security to your account. Because it requires both something you know (your password) and something you have (your device), it makes it incredibly difficult for hackers to gain access, even if your password is stolen.</p><h2><strong>How to turn it on 2SV</strong></h2><ol><li><p>Open your <strong>Google Account</strong> settings.</p></li><li><p>On the left navigation panel, click <strong>Security</strong>.</p></li><li><p>Scroll down to the <strong>&#8220;How you sign in to Google&#8221;</strong> section and select <strong>2-Step Verification</strong>.</p></li><li><p>Click <strong>Get started</strong> and follow the on-screen steps.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jQ6d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jQ6d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jQ6d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jQ6d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jQ6d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jQ6d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg" width="602" height="468" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:468,&quot;width&quot;:602,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!jQ6d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jQ6d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jQ6d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jQ6d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43932302-3498-45c1-93e2-0669ae1a3d84_602x468.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h2>Choose Your Second 2SV Step</h2><p>Google offers several ways to verify it&#8217;s you. It is highly recommended to set up multiple verification methods in case you ever lose your primary device:</p><ul><li><p><strong>Passkeys (Simplest &amp; Safest):</strong> This lets you sign in using your device&#8217;s built-in fingerprint reader, face scan, or screen lock PIN. Passkeys exist only on your devices and cannot be accidentally given to a bad actor, making them highly secure.</p></li><li><p><strong>Google Prompts:</strong> If you don&#8217;t use a passkey, Google strongly recommends using Prompts. Google sends a push notification to your smartphone where you simply tap <strong>Yes</strong> to allow the sign-in or <strong>No</strong> to block it. Prompts help protect against SIM swap and phone number-based hacks.</p></li><li><p><strong>Authenticator App:</strong> Apps like Google Authenticator generate temporary verification codes on your phone, even when you do not have an internet connection.</p></li><li><p><strong>Backup Codes (Crucial Fallback):</strong> Generate and save a set of backup codes. These single-use codes are the only way to ensure you can access your account if you ever lose your phone, factory reset it, or are completely offline. Store them in a safe place or a password manager.</p></li></ul><p><a href="https://support.google.com/accounts/answer/185839?co=GENIE.Platform%3DAndroid&amp;hl=en">How to do it</a>. And read up more on <a href="https://www.google.com.au/landing/2step/">2 Factor Authentication on Google account.</a></p><h1>Keep Chrome Updated</h1><p>The absolute most critical security feature is keeping the browser up to date, as these updates patch active vulnerabilities that hackers exploit.</p><ul><li><p><strong>How to check and update manually:</strong></p><ul><li><p>Click the <strong>three dots (&#8942;)</strong> &gt; <strong>Help</strong> &gt; <strong>About Google Chrome</strong>.</p></li><li><p>Chrome will automatically check for updates and download them. Click <strong>Relaunch</strong> to apply the updates.</p></li></ul></li></ul><h1>Well wishes</h1><p>I hope the enhancements that you have turned on will help you browser safer online because the digital threats are out there. So the best defence is a good offence. And Just like Victorian WorkCover ad&#8217;s used to say but I&#8217;ve modified for Cybersecurity:</p><blockquote><p><strong>Look it</strong></p><p><strong>Think it</strong></p><p><strong>Don&#8217;t click it (if in doubt)</strong></p></blockquote><p>Happy computing</p><p><strong>Michael Plis<br></strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[AI Disruption Tax: Why Wall Street is Finally Afraid of AI]]></title><description><![CDATA[A viral "Doomsday" report just wiped $200 Billion off the software sector. But the real story isn't the stock market, it&#8217;s end of safe tech jobs. Check out this article.]]></description><link>https://blog.cyberkite.com.au/p/ai-disruption-tax-why-wall-street</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/ai-disruption-tax-why-wall-street</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Thu, 26 Feb 2026 00:09:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!W60y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For the last three years, Artificial Intelligence has been the ultimate economic cheat code. If a CEO mentioned "Generative AI" on an earnings call, their stock went up. It was viewed purely as an engine for limitless growth, a magical tool that would make everyone faster, smarter, and more profitable.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!W60y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!W60y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!W60y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!W60y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!W60y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!W60y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e1a95135-1366-4c25-b393-b8617417bf34_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:251438,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!W60y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!W60y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!W60y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!W60y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1a95135-1366-4c25-b393-b8617417bf34_1366x762.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The mainstream Wall Street is starting to see what AI is going to be capable of and the old corporations in technology I'm going to suffer. Credit: Gemini Nano Banana Pro</figcaption></figure></div><p>&#8203;Then, this week, the <strong>illusion shattered</strong>.</p><p>&#8203;The Dow plunged 800 points, and the software sector lost over $200 Billion in market capitalization almost overnight. The catalyst wasn't a change in interest rates or a bad jobs report. It was a 7,000-word thought experiment by <strong>Citrini Research</strong> titled <em>"<a href="https://www.citriniresearch.com/p/2028gic">The 2028 Global Intelligence Crisis</a>"</em>, a viral paper that forced the financial world to confront a terrifying question:</p><blockquote><p>&#8203;<strong>What if AI is so good for corporate efficiency that it actually breaks the economy?</strong></p></blockquote><p>&#8203;We have officially entered a new phase of the technological revolution. We are shifting from AI that "chats" to Agentic AI that "works." And as we are about to find out, the consequences of that shift are going to rewrite the social contract.</p><h1>&#8203;Paradox of Hyper-Efficiency</h1><p>&#8203;The core thesis of the viral "Doomsday AI" report is simple, realistic, and entirely devoid of science-fiction tropes like rogue terminators. The threat isn't that AI will turn evil; the threat is that it will do exactly what we built it to do, but far too quickly.</p><p>&#8203;Right now, companies are racing to integrate Agentic AI, systems capable of autonomous reasoning, navigating file systems, and executing multi-step workflows. The immediate micro-economic result is fantastic: profit margins soar because companies can achieve the same output with 30% fewer white-collar workers.</p><p><strong>&#8203;But macro-economics is a closed loop.</strong></p><p>&#8203;When every Fortune 500 company simultaneously replaces mid-level knowledge workers with AI agents to cut costs, they are collectively firing their own consumer base. If the white-collar middle class is hollowed out, who buys the software subscriptions, the cars, the mortgages, and the consumer goods?</p><p>&#8203;This is the <strong>"AI Disruption Tax."</strong> Wall Street panicked this week because they suddenly realized that the hyper-efficiency of AI might trigger a massive deflationary spiral, destroying the revenue models of the very tech companies building the infrastructure.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>&#8203;The End of the "Safe" Tech Job</h1><p>&#8203;If you thought your specific niche of knowledge work was immune to this, this week provided a sobering reality check.</p><p>&#8203;Simultaneous with the viral report, Anthropic released a new AI capability specifically designed to write, translate, and modernize legacy COBOL code.</p><p>&#8203;To the average person, that sounds like technical jargon. To the enterprise tech world, it was an earthquake. COBOL is a decades-old programming language that still runs the backends of major global banks and governments. Because it's so old, human engineers who know COBOL are rare, highly sought after, and incredibly expensive. Legacy giants like IBM have built massive, stable revenue streams simply by maintaining this ancient code. It was considered the ultimate "safe, boring, highly-paid" tech moat.</p><p>&#8203;In a single afternoon, AI automated it. IBM&#8217;s stock subsequently suffered its worst single-day drop since the year 2000.</p><p>&#8203;The message is clear: <strong>There is no longer a "safe" harbor in pure logic or data processing.</strong> If a job relies solely on sitting at a keyboard, analyzing information, and producing digital output, an AI agent will soon do it faster and cheaper.</p><h1>&#8203;What the Future Holds: Pivot to "Wisdom Work"</h1><p>&#8203;So, where does this leave us as we look toward the 2030s? If the "Doomsday" scenario is a possibility, how does society adapt?</p><h2>&#8203;<strong>1. The Rise of the "Human Premium"</strong></h2><p>As digital output becomes infinite and practically free, it will lose its value. In a world where AI can generate a flawless 50-page strategic analysis in three seconds, the analysis itself becomes a commodity. </p><p>What will command a premium is <em>trust, relationship, and lived human experience</em>. We will see a shift from "Knowledge Work" to "Wisdom Work." People won't pay for the data; they will pay for a trusted human to tell them how to feel about the data.</p><h2>&#8203;<strong>2. A Radical Restructuring of the Tech Economy</strong></h2><p>The software-as-a-service (SaaS) model is in grave danger. Why pay $100,000 a year for 50 specialized software subscriptions when your company&#8217;s internal AI agent can just custom-code the exact tools you need on the fly? Tech companies will have to pivot from selling "tools" to selling "outcomes," fundamentally changing how Silicon Valley operates.</p><h2>&#8203;<strong>3. The Inevitable Policy Reckoning</strong></h2><p>We can no longer ignore the conversation around systemic economic safety nets. If Agentic AI permanently displaces 20% of the white-collar workforce over the next five years, traditional unemployment systems will collapse. Conversations around Universal Basic Income (UBI), robot taxes, or "human-in-the-loop" mandates will move from fringe academic debates to the center stage of global politics.</p><h1>&#8203;The Inflection Point</h1><p>&#8203;The market crash this week wasn't a glitch; it was a wake-up call. We spent the last three years marveling at the parlor tricks of generative text and image models. We are now entering the era of applied intelligence.</p><p>&#8203;AI is the most powerful tool humanity has ever created. But this week proved that we are severely underestimating the shockwaves it will send through the very foundation of how we work, earn, and live.</p><h2>&#8203;<strong>I want to hear from you in the comments:</strong> </h2><ul><li><p>Do you think the market's fear of the "AI Disruption Tax" is justified, or is this just another technological panic that will eventually create more jobs than it destroys? </p></li><li><p>How is your specific industry preparing for Agentic AI?</p></li></ul><p>&#8203;Let&#8217;s discuss below.</p><p>Happy computing </p><p>Michael Plis </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>References </h1><ul><li><p><strong>CITRINI</strong>: THE 2028 GLOBAL INTELLIGENCE CRISIS: <a href="https://www.citriniresearch.com/p/2028gic">https://www.citriniresearch.com/p/2028gic</a> </p></li><li><p><strong>The Viral Doomsday Report Fallout (Entrepreneur):</strong> Detailed coverage on how the Citrini Research hypothetical scenario caused a massive sell-off in names like Datadog, CrowdStrike, and Amex: <a href="https://www.entrepreneur.com/news-and-trends/the-dow-dropped-800-points-was-a-viral-ai-report-to-blame/502954">https://www.entrepreneur.com/news-and-trends/the-dow-dropped-800-points-was-a-viral-ai-report-to-blame/502954</a> </p></li></ul><ul><li><p><strong>IBM&#8217;s Historic 13% Plunge &amp; The Anthropic Threat (AI Dispatch/Jobright intel): </strong>Analysis of how Anthropic's new COBOL automation tool triggered IBM's worst single-day drop in 25 years: <a href="https://hipther.com/latest-news/2026/02/25/107637/ai-dispatch-daily-trends-and-innovations-february-25-2026-anthropic-openai-ibm-gemini-3-1-pro-hes-fintech/">https://hipther.com/latest-news/2026/02/25/107637/ai-dispatch-daily-trends-and-innovations-february-25-2026-anthropic-openai-ibm-gemini-3-1-pro-hes-fintech/</a> </p></li><li><p><strong>The Broader Market Contagion (Reuters): </strong>Tracking the FTSE and US Stock Futures as tariff uncertainty and AI disruption fears dominate the morning bids: <a href="https://thetruestory.news/en/world/story/ec46e589-11af-11f1-bdec-a8a1590471b5">https://thetruestory.news/en/world/story/ec46e589-11af-11f1-bdec-a8a1590471b5</a> </p></li><li><p>"<strong>Doomsday AI" Origin Story: The Guardian: &#8216;A feedback loop with no brake&#8217;: how an AI doomsday report shook US markets: </strong>A fantastic breakdown of the original Citrini Research report ("The 2028 Global Intelligence Crisis") authored by James Van Geelen and Alap Shah. It details how their hypothetical scenario of AI agents removing all economic "friction" would effectively destroy the margins of middlemen like travel agencies, SaaS platforms, and traditional payment providers: <a href="https://www.theguardian.com/technology/2026/feb/24/feedback-loop-no-brake-how-ai-doomsday-report-rattled-markets">https://www.theguardian.com/technology/2026/feb/24/feedback-loop-no-brake-how-ai-doomsday-report-rattled-markets</a> </p></li><li><p><strong>The Deflationary Spiral &amp; The SaaS Threat: Quartz: How an AI doomsday Substack post caused a mini market crash:</strong> This piece dives deep into the macroeconomic theory behind the crash. It explores the concept of the "human intelligence displacement spiral"&#8212;a scenario where AI drives down white-collar wages and causes mass layoffs, which in turn destroys consumer spending and creates a negative feedback loop. It explicitly highlights why the U.S. "white-collar services economy" is so uniquely vulnerable to Agentic AI:  <a href="https://qz.com/doomsday-substack-post-rattles-markets">https://qz.com/doomsday-substack-post-rattles-markets</a> </p></li><li><p><strong>The Fall of the COBOL Empire: CIO: Anthropic's claim that AI can quickly refactor COBOL rattles IBM investors:</strong> A must-read for enterprise tech professionals. This article explains exactly how Anthropic's new "Claude Code" agent is automating the highly complex, consultant-heavy process of mapping and modernizing decades-old COBOL infrastructure. It provides the crucial context for why this specific AI release triggered a historic 13% single-day drop in IBM's stock, wiping out roughly $40 billion in market value: <a href="https://www.cio.com/article/4137185/anthropics-claim-that-ai-can-quickly-refactor-cobol-rattles-ibm-investors.html">https://www.cio.com/article/4137185/anthropics-claim-that-ai-can-quickly-refactor-cobol-rattles-ibm-investors.html</a> </p></li><li><p><strong>The Hardware Reality Check: Tom's Hardware: Anthropic's new AI tool can write 67-year-old COBOL code...</strong>A more technical look at the legacy code dilemma. It explains why COBOL has survived this long (handling fixed-point decimal math for 95% of global ATM transactions) and why reverse-engineering it was previously considered too expensive for humans to bother with&#8212;until AI Agentic coders arrived: <a href="https://www.tomshardware.com/tech-industry/big-tech/ibm-stock-takes-a-13-percent-whiplash-after-anthropic-announces-an-ai-tool-for-writing-cobol-code-stock-has-worst-day-since-2000-and-is-down-25-percent-mom-and-counting">https://www.tomshardware.com/tech-industry/big-tech/ibm-stock-takes-a-13-percent-whiplash-after-anthropic-announces-an-ai-tool-for-writing-cobol-code-stock-has-worst-day-since-2000-and-is-down-25-percent-mom-and-counting</a></p></li></ul><p></p>]]></content:encoded></item><item><title><![CDATA[Microsoft OS Crisis: Why Windows 11 Feels Like Hostile Territory & Where to Exit?]]></title><description><![CDATA[The era of the Windows personal computer is ending. A look at Microsoft&#8217;s hostile architecture, the brilliance of Linux, and lightweight future of Aluminum OS.]]></description><link>https://blog.cyberkite.com.au/p/microsoft-os-crisis-why-windows-11</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/microsoft-os-crisis-why-windows-11</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Mon, 23 Feb 2026 18:15:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DyFJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Let's  have a look at Microsoft&#8217;s hostile architecture, the brilliance of Linux, and the lightweight future of Aluminum OS.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DyFJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DyFJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!DyFJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!DyFJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!DyFJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DyFJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png" width="1366" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:231805,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DyFJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png 424w, https://substackcdn.com/image/fetch/$s_!DyFJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png 848w, https://substackcdn.com/image/fetch/$s_!DyFJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png 1272w, https://substackcdn.com/image/fetch/$s_!DyFJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfbf114-0252-4fdf-9b1c-31799899d1c3_1366x762.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"> This is where we are at. (Credit: Gemini Nano Banana)</figcaption></figure></div><h1>The problem</h1><p>&#8203;If you&#8217;ve turned on your Windows PC recently and felt a distinct rise in blood pressure, you are not alone.</p><p>&#8203;There is a palpable sense of exhaustion in the tech community right now. For decades, the Operating System was a tool, a quiet, stable foundation upon which we built our digital lives. We owned the hardware, we installed the OS, and it served us.</p><p>&#8203;Somewhere in the last few years, that dynamic inverted. We no longer use Windows; Windows uses us.</p><p>&#8203;The current state of Windows 11 is not just a matter of bad design choices or buggy updates. It is the result of a fundamental shift in corporate philosophy at Microsoft, accelerating under CEO Satya Nadella, that views the desktop not as a user&#8217;s sanctuary, but as corporate real estate ripe for aggressive monetization, data harvesting, and forced feature injection.</p><p>&#8203;We are living through a crisis of the personal computer. It&#8217;s time to diagnose the disease and look seriously at the escape routes.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>&#8203;The Diagnosis: "Enshittification" by Design</h1><p>&#8203;Tech commentator Cory Doctorow famously coined the term "enshittification" to describe how platforms decay: first they are good to their users, then they abuse their users to make things better for their business customers, and finally, they abuse those business customers to claw back all the value for themselves.</p><p>&#8203;Windows 11 is perhaps the most glaring example of this phenomenon in the hardware space.</p><p>&#8203;As highlighted in excellent recent analyses, including ColdFusion&#8217;s viral breakdown <em>"<strong><a href="https://youtu.be/zKjo8Oc2qLk?si=afm-rL12BtrJfpQq">The Windows 11 Crisis,</a></strong>"</em> the OS has become actively hostile to its user base. This isn't accidental; it's architectural.</p><p>&#8203;Here is the reality of the modern Windows experience:</p><h2>&#8203;1. The AI Bloatware Nobody Asked For</h2><p>&#8203;Microsoft has bet the farm on OpenAI, and Windows users are paying the price. The integration of COPILOT is not a helpful feature; it is an intrusive layer of surveillance and resource drain jammed into the taskbar.</p><p>&#8203;They are trying to force a paradigm shift to AI-based computing by making the traditional desktop experience worse. The recent debacle regarding "RECALL", a feature designed to constantly screenshot your activity, was a mask-off moment for privacy advocates. Even when "off," the infrastructure for massive user surveillance is being baked into the kernel.</p><h2>&#8203;2. The Telemetry Mosquito </h2><p>&#8203;Try setting up a Windows 11 Pro machine today without a Microsoft account. It requires registry hacks or disconnecting the internet at precise moments. Why? Because a local account generates less data. Microsoft&#8217;s insistence on tethering your local machine to their cloud is about control and telemetry. They want to know what you launch, how long you use it, and where you click, feeding the advertising beast.</p><h2>&#8203;3. The E-Waste Generator (Hardware Requirements)</h2><p>&#8203;Perhaps the most cynical move with Windows 11 was the arbitrary hardware gatekeeping, specifically the TPM 2.0 requirement. Overnight, millions of perfectly capable, powerful CPUs from just a few years ago were declared obsolete.</p><p>&#8203;This isn't about security; if it were, they wouldn't allow those requirements to be bypassed so easily by enthusiasts. It is about forced obsolescence designed to juice PC sales, creating an environmental disaster of perfectly functional e-waste in the process.</p><h2>&#8203;4. The Tyranny of Updates</h2><p>&#8203;We still live in a world where you can walk away from your PC for a coffee and come back to find it rebooting for an update you explicitly paused, potentially losing work. The user is not trusted to manage their own machine.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>&#8203;The Landscape Survey: Weighing the Contenders</h1><p>&#8203;If we judge an operating system on the basic pillars of <strong>Stability, Privacy, Resource Efficiency, and User Control</strong>, how does the current landscape stack up?</p><h2>&#8203;The Incumbent: Windows 11</h2><ul><li><p>&#8203;<strong>Verdict:</strong> Fails on nearly every metric except software compatibility. It is unstable, privacy-invasive, bloated, and actively wrests control away from the user. It is heading in a dystopian direction.</p></li></ul><h2>&#8203;The Walled Garden: macOS</h2><ul><li><p>&#8203;<strong>Verdict:</strong> Many frustrated Windows users look to Apple as the premium escape hatch. But be careful. While macOS is currently more polished and private than Windows, Apple is marching toward the exact same destination, just taking a scenic route.</p></li><li><p>&#8203;Apple's control over their ecosystem is absolute. They are increasingly locking down the OS, fighting right-to-repair, and introducing their own unavoidable "Apple Intelligence" layers. It is not an open alternative; it is just a nicer cage.</p></li></ul><h2>&#8203;The Sanctuary: The Brilliance of Linux</h2><ul><li><p>&#8203;<strong>Verdict:</strong> If you value control, privacy, and efficiency, Linux is no longer just a viable alternative; it is the superior choice.</p></li><li><p>&#8203;The strides made by distributions like <strong>Linux Mint</strong> (for those wanting a familiar feel), <strong>Ubuntu</strong> (for ease of support), and <strong>Fedora</strong> or <strong>Debian</strong> (for rock-solid stability) are staggering.</p></li><li><p>&#8203;Modern Linux takes resources that Windows 11 chokes on and makes them fly. It respects your privacy by default. It updates when you tell it to. It is the last bastion of the "Personal Computer" ethos. The gaming landscape, thanks to Valve's Proton, has also largely been solved.</p></li></ul><h2>&#8203;The Future horizon: Chrome OS and "Aluminum" OS</h2><ul><li><p>&#8203;<strong>Verdict:</strong> We must also look ahead. For the vast majority of users who live in a browser, the heavy, bloated desktop OS is overkill.</p></li><li><p>&#8203;Chrome OS has quietly cornered the market on simplicity and security. But the real excitement is brewing around Google&#8217;s rumored push to merge Android&#8217;s capability with a desktop interface, often referred to in leaks as a project akin to "Aluminum OS."</p></li><li><p>&#8203;A lightweight, incredibly cheap, ARM-based future designed for web apps and Android integration is coming. It will likely run better on older resources than Windows ever could, posing the first real existential threat to Microsoft's dominance in the casual market.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>How to transition from Windows to Linux </h1><p>The idea of deleting Windows and installing a completely new operating system sounds terrifying to most people. Microsoft relies on that fear to keep you locked in.</p><p>&#8203;But the reality? Installing a modern Linux distribution in 2026 is often faster and requires fewer reboots than a major Windows 11 update. Here is your straightforward, step-by-step escape plan.</p><p><strong>Service note</strong>: If you are based in Australia and your small business location switching to Linux, you can book me in via <strong><a href="https://cyberkite.com.au">cyberkite.com.au</a></strong></p><h2>&#8203;<strong>1. Pick Your Sanctuary (Choose a "Distro")</strong></h2><p>Linux isn't just one operating system; it comes in different flavors called "distributions" or "distros."</p><ul><li><p>&#8203;<strong>The Best Starting Point:</strong> Download <strong>Linux Mint (Cinnamon Edition)</strong>. It is specifically designed to feel incredibly familiar to Windows users. The start menu, taskbar, and system tray are right where your muscle memory expects them to be.</p></li><li><p>&#8203;<strong>The Alternatives:</strong> <strong>Ubuntu</strong> (highly supported and widely used) or <strong>Fedora</strong> (for those wanting cutting-edge updates) are also fantastic, user-friendly choices.</p></li></ul><h2>&#8203;<strong>2. Back Up Your Digital Life</strong></h2><p>Before you do anything, back up your important files, photos, and documents to an external hard drive or a cloud service. Transitioning is safe, but human error happens. Protect your data first.</p><h2>&#8203;<strong>3. Forge the Key (Create a Bootable USB)</strong></h2><p>You will need a USB flash drive (at least 8GB).</p><ul><li><p>&#8203;Download the .iso file of your chosen Linux distro from their official website.</p></li><li><p>&#8203;Download a free, open-source tool like <strong>Rufus</strong> (Windows) or <strong>BalenaEtcher</strong> (Mac/Windows).</p></li><li><p>&#8203;Use the tool to "flash" or write the Linux .iso file onto your USB drive. This turns your thumb drive into a mini, self-contained computer.</p></li></ul><h2>&#8203;<strong>4. Take the "Live" Test Drive</strong></h2><p>Here is the absolute best part about Linux: <strong>You can try it before you install it.</strong></p><p>Plug the USB into your PC and restart. As your computer boots up, press the key to enter your boot menu (usually F12, F2, or Del) and select the USB drive.</p><p>Linux will boot into a "Live Environment." It runs entirely off the USB stick without touching your Windows hard drive. Connect to your Wi-Fi, open the web browser, play a video, and see how snappy it feels. If you don't like it? Just unplug the USB and restart. You&#8217;ll be right back in Windows 11.</p><h2>&#8203;<strong>5. Make the Jump (Installation)</strong></h2><p>If you love the test drive, look for the "Install Linux" icon right there on the live desktop. The installation wizard will guide you through the process. It will give you two main options:</p><ul><li><p>&#8203;<strong>Dual Boot:</strong> Install Linux <em>alongside</em> Windows. Every time you turn on your PC, it will ask which OS you want to use. (Great for keeping Windows around for that one specific app or game you can't part with).</p></li><li><p>&#8203;<strong>Wipe the Slate Clean:</strong> Erase Windows entirely and give your PC a fresh, telemetry-free life.</p></li></ul><h2>&#8203;<strong>6. Embrace the FOSS (Free and Open Source Software) Ecosystem</strong></h2><p>Once installed, you&#8217;ll discover that almost everything you do in a web browser (Chrome, Firefox, Edge, Brave) works exactly the same. For desktop apps, there is a rich ecosystem of free replacements:</p><ul><li><p>&#8203;Instead of Microsoft Office, use <strong>LibreOffice</strong> or <strong>OnlyOffice</strong>.</p></li><li><p>&#8203;Instead of Photoshop, use <strong>GIMP</strong> or <strong>Krita</strong>.</p></li><li><p>&#8203;Instead of Premiere Pro, use <strong>DaVinci Resolve</strong> or <strong>Kdenlive</strong>.</p></li><li><p>&#8203;For gaming, simply install <strong>Steam</strong>. Thanks to Valve&#8217;s "Proton" compatibility layer, the vast majority of your Windows games will run seamlessly on Linux.</p></li></ul><h2>&#8203;<strong>The Final Word:</strong> </h2><p>There is a slight learning curve, as there is with any new tool. But once you realize your computer updates only when <em>you</em> tell it to, doesn't scan your files for advertising data, and runs faster than the day you bought it, you will wonder why you didn't switch years ago. I've been a long time Windows user but I have had training in Linux over the years. So these are some of the things you have to think about. Can you adjust but as the steps above showed you can test drive without installing. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>How to transition from Windows to Chrome OS</h1><p>In the future Chrome will be replaced with Aluminum OS so if you just exist on the browser then Chrome is one of the most secure operating systems ever devised. And you're ready for transition one day to aluminum OS potentially. Even if you continue on Chrome and not switch to aluminum OS, you will still be able to use it for many years to come according to Google. </p><p>If the idea of installing Linux still feels a little too "tech-heavy" for your daily needs, there is a second, highly effective escape route: <strong>ChromeOS Flex</strong>.</p><p>&#8203;Google created ChromeOS Flex specifically to rescue older Windows and Mac computers from the e-waste bin. It replaces your bloated Windows installation with the same lightning-fast, secure, and cloud-first operating system that runs on Chromebooks. If 90% of your computing happens inside a web browser, this is the ultimate upgrade for an aging machine.</p><p><strong>Service note</strong>: If you are based in Australia and your small business location switching to Linux, you can book me in via <strong><a href="https://cyberkite.com.au">cyberkite.com.au</a></strong></p><p>&#8203;Here is exactly how to make the switch:</p><h2>&#8203;<strong>1. Secure Your Files</strong></h2><p>Just like any operating system change, ChromeOS Flex will eventually wipe your hard drive. Back up all your local documents, photos, and files to an external drive or Google Drive before proceeding.</p><h2>&#8203;<strong>2. Prepare the Tools</strong></h2><p>You will need two things:</p><ul><li><p>&#8203;A USB flash drive with at least 8GB of storage (Note: everything on it will be erased).</p></li><li><p>&#8203;A computer with the Google Chrome browser installed.</p></li></ul><h2>&#8203;<strong>3. Build the Installer (The "Recovery Utility")</strong></h2><ul><li><p>&#8203;Open Google Chrome and go to the Chrome Web Store.</p></li><li><p>&#8203;Search for and install the <strong>Chromebook Recovery Utility</strong> extension.</p></li><li><p>&#8203;Click the extension puzzle piece in the top right of your browser and launch the utility.</p></li><li><p>&#8203;Click <strong>Get Started</strong>. When asked to identify your Chromebook, click <strong>"Select a model from a list."</strong></p></li><li><p>&#8203;For the manufacturer, choose <strong>Google ChromeOS Flex</strong>. For the product, choose <strong>ChromeOS Flex</strong>.</p></li><li><p>&#8203;Insert your USB drive, select it from the dropdown, and hit <strong>Create now</strong>. Grab a coffee; this takes about 10-15 minutes.</p></li></ul><h2>&#8203;<strong>4. The "Live" Test Drive</strong></h2><p>Like Linux, ChromeOS Flex lets you try before you commit.</p><p>Keep the USB plugged in and restart your PC. As it boots, tap your computer's boot menu key (usually F12, F2, F8, or Del depending on your PC brand) and tell it to boot from the USB drive.</p><p>You will be greeted by the ChromeOS welcome screen. Select <strong>"Try it first"</strong> (or boot from USB). This lets you connect to Wi-Fi, log into your Google account, and make sure your keyboard, trackpad, and sound all work perfectly before making any permanent changes.</p><h2>&#8203;<strong>5. Make it Permanent</strong></h2><p>If your old PC suddenly feels fast and snappy again, it's time to commit.</p><p>Click the <strong>"Install ChromeOS Flex"</strong> button on the screen. The system will wipe Windows off the map and install the lightweight OS directly to your hard drive.</p><h2>&#8203;<strong>6. Welcome to the Cloud</strong></h2><p>Once installed, simply log in with your Google account. Your bookmarks, passwords, and extensions will sync immediately. You now have a computer that boots in seconds, updates seamlessly in the background, and is completely immune to the telemetry and bloatware of Windows 11.</p><p>In the future, Google may give you the option to upgrade to Aluminum OS when it becomes available which will have additional features. </p><p>But in a way aluminum OS will probably be a formal Linux because Android and Chrome will be blended together. So in a way the path is Linux either way. </p><h1>&#8203;The Inflection Point</h1><blockquote><p><strong>&#8203;We are at a crossroads</strong>. We can continue to accept an operating system (Windows) that treats us as data cattle, accepting forced AI integration and privacy violations as the "cost of doing business."</p></blockquote><blockquote><p>&#8203;<strong>Or</strong>, we can recognize that the era of Windows as the default is over.</p></blockquote><p>&#8203;The friction required to switch to Linux Mint today is less than the daily friction of dealing with Windows 11's hostility. Likewise the shift towards lightweight, web-first OSs is inevitable for the mass market.</p><blockquote><p><strong>&#8203;The computer is yours. It's time the operating system remembered that.</strong></p></blockquote><p>And whatever you decide you have options that are very good. </p><p><strong>Questions for the readers: </strong></p><ul><li><p>&#8203;<em>What is your breaking point with Windows 11? </em></p></li><li><p><em>Have you already made the jump to Linux, or are you waiting for a better alternative? </em></p></li><li><p><em>Share your experiences in the comments below.</em></p></li></ul><p>&#8203;[<strong>Subscribe</strong>] to receive future deep dives into the tech ecosystem directly to your inbox from me &#128512;</p><p>Happy computing </p><p><strong>Michael Plis</strong> </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>References </h1><p>&#8203;If you want to dive deeper into the data and reporting behind this shift, here are the essential reads and watches:</p><ul><li><p>&#8203;<strong>The Windows 11 Crisis (ColdFusion Video)</strong> A masterclass breakdown of how Microsoft's design philosophy shifted from user-first to data-first, and why the current Windows iteration feels so hostile. &#128279; Full Video: <a href="https://youtu.be/zKjo8Oc2qLk?si=HQKUGPzs2J6F9DIU">https://youtu.be/zKjo8Oc2qLk?si=HQKUGPzs2J6F9DIU</a></p></li><li><p>&#8203;<strong>The "Enshittification" of Platforms (Cory Doctorow / Wired)</strong> The original, defining essay by Cory Doctorow explaining the economic and structural lifecycle of how platforms (like Windows) slowly degrade their user experience to extract maximum value. &#128279; Full Article: <a href="https://www.wired.com/story/tiktok-platforms-cory-doctorow/">https://www.wired.com/story/tiktok-platforms-cory-doctorow/</a></p></li><li><p>&#8203;<strong>The 240-Million PC E-Waste Disaster (Reuters / Canalys Report)</strong> Detailed reporting on the environmental catastrophe caused by Microsoft's arbitrary TPM 2.0 hardware requirements, turning hundreds of millions of functioning PCs into landfill. &#128279; Full Article: <a href="https://www.google.com/search?q=https://www.reuters.com/technology/microsofts-windows-11-end-life-could-turn-240-million-pcs-into-e-waste-2023-12-21/">https://www.reuters.com/technology/microsofts-windows-11-end-life-could-turn-240-million-pcs-into-e-waste-2023-12-21/</a></p></li><li><p>&#8203;<strong>The Windows "Recall" Privacy Backlash (The Verge)</strong> A look into the massive security and privacy fallout regarding Microsoft's attempt to integrate a constant AI screenshot-taking feature into the OS kernel. &#128279; Full Article: <a href="https://www.google.com/search?q=https://www.theverge.com/2024/6/7/24173499/microsoft-windows-recall-response-security-privacy-changes">https://www.theverge.com/2024/6/7/24173499/microsoft-windows-recall-response-security-privacy-changes</a></p></li><li><p>&#8203;<strong>The Linux Escape Hatch (Linux Mint)</strong> If you are ready to make the jump, Linux Mint is widely considered the best transitional operating system for frustrated Windows users. It's free, open-source, and respects your privacy. &#128279; Official Site: <a href="https://linuxmint.com/">https://linuxmint.com/</a></p></li></ul><p></p>]]></content:encoded></item><item><title><![CDATA[2026 Security Forecast: Agents, Architects & the Skeleton Key Hack]]></title><description><![CDATA[Google&#8217;s latest forecast reveals a future where AI isn't just a tool, it's the new perimeter. Here is the deep dive into the 2026 Security Agentic era.]]></description><link>https://blog.cyberkite.com.au/p/2026-security-forecast-agents-architects</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/2026-security-forecast-agents-architects</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Tue, 10 Feb 2026 21:56:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZZPv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZZPv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZZPv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png 424w, https://substackcdn.com/image/fetch/$s_!ZZPv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png 848w, https://substackcdn.com/image/fetch/$s_!ZZPv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png 1272w, https://substackcdn.com/image/fetch/$s_!ZZPv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZZPv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png" width="1366" height="754" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:754,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2103834,&quot;alt&quot;:&quot;A comprehensive cybersecurity illustration titled 'The 2026 Security Forecast'. The center features a futuristic 'Agentic SOC' command center with human analysts and AI androids. Surrounding the center are four threat vignettes: robots emerging from a 'Shadow Agent' portal, a glowing 'Skeleton Key' cracking a server foundation, a neon 'On-Chain' blockchain network, and icons representing nation-state actors: a Bear (Russia), Dragon (China), Phoenix (Iran), and Soldier (North Korea).&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.cyberkite.com.au/i/187566324?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A comprehensive cybersecurity illustration titled 'The 2026 Security Forecast'. The center features a futuristic 'Agentic SOC' command center with human analysts and AI androids. Surrounding the center are four threat vignettes: robots emerging from a 'Shadow Agent' portal, a glowing 'Skeleton Key' cracking a server foundation, a neon 'On-Chain' blockchain network, and icons representing nation-state actors: a Bear (Russia), Dragon (China), Phoenix (Iran), and Soldier (North Korea)." title="A comprehensive cybersecurity illustration titled 'The 2026 Security Forecast'. The center features a futuristic 'Agentic SOC' command center with human analysts and AI androids. Surrounding the center are four threat vignettes: robots emerging from a 'Shadow Agent' portal, a glowing 'Skeleton Key' cracking a server foundation, a neon 'On-Chain' blockchain network, and icons representing nation-state actors: a Bear (Russia), Dragon (China), Phoenix (Iran), and Soldier (North Korea)." srcset="https://substackcdn.com/image/fetch/$s_!ZZPv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png 424w, https://substackcdn.com/image/fetch/$s_!ZZPv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png 848w, https://substackcdn.com/image/fetch/$s_!ZZPv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png 1272w, https://substackcdn.com/image/fetch/$s_!ZZPv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7b65fc3-e770-4632-8578-a80330299e9a_1366x754.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you&#8217;ve been waiting for the moment when Artificial Intelligence stops being a buzzword and starts being the fundamental operating system of cybersecurity, Google Cloud says that moment is <strong>2026</strong>.</p><p>&#8203;I just finished analyzing the <strong><a href="https://www.linkedin.com/posts/michaelplis_google-cybersecurity-forecast-2026-activity-7426836752100708352-GGyD">Google Cloud Cybersecurity Forecast 2026</a></strong>, a report that explicitly avoids crystal ball gazing in favor of data-driven extrapolation. The findings paint a picture of a world that is faster, more automated, and significantly more complex than the one we defend today.</p><p>&#8203;We are moving away from the era of <em><strong>Alert Fatigue</strong></em> and entering the era of <em><strong>Agentic Warfare</strong></em>. Here is what that means for defenders, leaders, and the digital ecosystem.</p><h1>&#8203;1. Rise of the Agentic SOC</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_4AO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_4AO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_4AO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_4AO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_4AO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_4AO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg" width="1366" height="947" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:947,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:197906,&quot;alt&quot;:&quot;A conceptual illustration of a futuristic security analyst standing on a podium in a blue-lit command center. The analyst acts as a conductor, directing a symphony of floating holographic AI agents and data streams, symbolizing the shift to an 'Agentic SOC'.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A conceptual illustration of a futuristic security analyst standing on a podium in a blue-lit command center. The analyst acts as a conductor, directing a symphony of floating holographic AI agents and data streams, symbolizing the shift to an 'Agentic SOC'." title="A conceptual illustration of a futuristic security analyst standing on a podium in a blue-lit command center. The analyst acts as a conductor, directing a symphony of floating holographic AI agents and data streams, symbolizing the shift to an 'Agentic SOC'." srcset="https://substackcdn.com/image/fetch/$s_!_4AO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_4AO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_4AO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_4AO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e694b5-cd7c-4a52-9404-a4b2d39f8cc2_1366x947.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Agentic SOC is rising in 2026</figcaption></figure></div><p>For years, the Security Operations Center (SOC) has been defined by burnout. Analysts drown in logs, desperately trying to correlate data points before the breach spreads.</p><p>&#8203;In 2026, the analyst&#8217;s role fundamentally shifts from investigator to <strong>director</strong>.</p><p>&#8203;The report introduces the concept of the <strong>Agentic SOC.</strong> In this model, AI agents handle the heavy lifting of data correlation and hypothesis testing. Imagine an analyst asking their AI, <em>"Hunt for TTPs related to UNC5221 across our environment,"</em> and the AI returning not just a list of logs, but a fully drafted threat report with attribution and mitigation strategies.</p><p>&#8203;This isn't about replacing humans; it's about "supercharging" them. The AI creates the case summary; the human makes the strategic decision to contain the threat.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>&#8203;<strong>Dark Side: Shadow Agents</strong></h2><p>&#8203;However, this agentic power comes with a massive blind spot. Just as we spent the last decade fighting <strong>Shadow IT</strong>, 2026 will be the year of <strong>Shadow Agents</strong>, autonomous AI workflows deployed by employees without IT approval.</p><blockquote><p>&#8203;<strong>The Industry Reality:</strong> The shift is already here. Recent data reveals that <strong>98% of organizations</strong> now have employees using unsanctioned AI apps. Even more concerning is the volume of data: GenAI traffic surged more than <strong>890%</strong> in 2024, creating a massive, unmonitored data exodus that traditional tools are missing.</p></blockquote><p>&#8203;<strong>The Takeaway:</strong> We need a new discipline of <strong>"Agentic Identity Management."</strong> We must treat AI agents as distinct digital actors with their own identities, access logs, and "least privilege" constraints.</p><h1>&#8203;2. Adversary&#8217;s Toolkit: Vishing and Deepfakes</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WT1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WT1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WT1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WT1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WT1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WT1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg" width="1366" height="969" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:969,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:155372,&quot;alt&quot;:&quot;A dark illustration of a hooded cybercriminal holding a digital mask in front of their face. The mask is a hyper-realistic projection of a smiling corporate CEO, but pixelated glitches on the edges reveal the attacker underneath, representing AI-enabled voice phishing and deepfakes.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A dark illustration of a hooded cybercriminal holding a digital mask in front of their face. The mask is a hyper-realistic projection of a smiling corporate CEO, but pixelated glitches on the edges reveal the attacker underneath, representing AI-enabled voice phishing and deepfakes." title="A dark illustration of a hooded cybercriminal holding a digital mask in front of their face. The mask is a hyper-realistic projection of a smiling corporate CEO, but pixelated glitches on the edges reveal the attacker underneath, representing AI-enabled voice phishing and deepfakes." srcset="https://substackcdn.com/image/fetch/$s_!WT1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WT1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WT1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WT1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc582a29b-5406-4a88-ad2f-ad3fbfe5febf_1366x969.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While defenders are building Agentic SOCs, attackers are weaponizing AI to hack the most vulnerable OS of all: <strong>the human being.</strong></p><p>&#8203;The forecast predicts that groups like ShinyHunters (UNC6240) will accelerate the use of <strong>AI-enabled social engineering</strong>, specifically <strong>vishing (voice phishing)</strong> that clones executive voices with hyper-realistic precision.</p><blockquote><p>&#8203;<strong>The Industry Reality:</strong> The barrier to entry has collapsed, and the costs are skyrocketing. Deepfake-related fraud losses hit <strong>$1.1 billion</strong> in 2025&#8212;tripling the losses from 2024. This isn't a theoretical risk; it is an active financial hemorrhage, with <strong>83%</strong> of these losses originating from scams on social platforms.</p></blockquote><h1>&#8203;3. Skeleton Key Hack: Virtualization Under Siege</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F7KH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F7KH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg 424w, https://substackcdn.com/image/fetch/$s_!F7KH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg 848w, https://substackcdn.com/image/fetch/$s_!F7KH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!F7KH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F7KH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg" width="1366" height="1014" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:1014,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:178814,&quot;alt&quot;:&quot;An isometric view of a server rack where a large, glowing golden skeleton key is inserted into the foundation layer. The key turns, sending red fractures of malicious energy upward into the virtual machines stacked above, symbolizing a hypervisor compromise.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="An isometric view of a server rack where a large, glowing golden skeleton key is inserted into the foundation layer. The key turns, sending red fractures of malicious energy upward into the virtual machines stacked above, symbolizing a hypervisor compromise." title="An isometric view of a server rack where a large, glowing golden skeleton key is inserted into the foundation layer. The key turns, sending red fractures of malicious energy upward into the virtual machines stacked above, symbolizing a hypervisor compromise." srcset="https://substackcdn.com/image/fetch/$s_!F7KH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg 424w, https://substackcdn.com/image/fetch/$s_!F7KH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg 848w, https://substackcdn.com/image/fetch/$s_!F7KH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!F7KH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc69881c-87c5-4f00-ab5d-e2475906960d_1366x1014.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#8203;Perhaps the most technically alarming trend is the pivot toward virtualization infrastructure. Attackers have realized that if they can&#8217;t beat the EDR agent inside the OS, they can just go <em>underneath</em> it.</p><p>&#8203;Adversaries are targeting the <strong>hypervisor</strong>, the foundational layer hosting your virtual machines. This is a <strong>Skeleton Key</strong> scenario. A successful breach here allows attackers to encrypt hundreds of servers simultaneously, rendering an enterprise inoperable in hours.</p><blockquote><p>&#8203;<strong>The Industry Reality:</strong> Attackers are moving fast to exploit this blind spot. In 2024, <strong>45% of retail organizations</strong> were hit by ransomware, with a marked shift toward infrastructure-aware attacks targeting layers like VMware ESXi. Active exploitation of vulnerabilities in these layers is allowing groups to bypass guest-level security entirely.</p></blockquote><h1>&#8203;4. On-Chain Criminal Economy</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5eKT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5eKT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5eKT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5eKT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5eKT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5eKT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg" width="1366" height="1128" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:1128,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:250389,&quot;alt&quot;:&quot;A gritty visualization of a blockchain network where the blocks are depicted as heavy, translucent iron vaults linked by glowing chains. Inside the vaults, ransomware symbols and malicious code are visible, representing immutable criminal infrastructure.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A gritty visualization of a blockchain network where the blocks are depicted as heavy, translucent iron vaults linked by glowing chains. Inside the vaults, ransomware symbols and malicious code are visible, representing immutable criminal infrastructure." title="A gritty visualization of a blockchain network where the blocks are depicted as heavy, translucent iron vaults linked by glowing chains. Inside the vaults, ransomware symbols and malicious code are visible, representing immutable criminal infrastructure." srcset="https://substackcdn.com/image/fetch/$s_!5eKT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5eKT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5eKT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5eKT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb22f189-af95-447b-867c-45b330e6e656_1366x1128.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cybercrime is also getting a Web3 upgrade. The report forecasts that ransomware and extortion groups will move core components of their infrastructure, like Command and Control (C2), onto public blockchains. This makes their operations immutable and nearly impossible to take down.</p><blockquote><p>&#8203;<strong>The Industry Reality:</strong> This shift is being funded by historic theft levels. In the first half of 2025 alone, criminals stole nearly <strong>$2.17 billion</strong> in crypto-related crimes, putting the year on track to be the worst ever for digital asset theft.</p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>&#8203;5. Geopolitical Chessboard</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aCXW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aCXW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aCXW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aCXW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aCXW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aCXW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg" width="1366" height="1120" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:1120,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:203043,&quot;alt&quot;:&quot;A glowing digital map of the world stylized as a chessboard. Four neon chess pieces stand on specific regions: a Bear on Russia, a Dragon on China, a Flame on Iran, and a Bank Vault on North Korea, representing distinct nation-state cyber strategies.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A glowing digital map of the world stylized as a chessboard. Four neon chess pieces stand on specific regions: a Bear on Russia, a Dragon on China, a Flame on Iran, and a Bank Vault on North Korea, representing distinct nation-state cyber strategies." title="A glowing digital map of the world stylized as a chessboard. Four neon chess pieces stand on specific regions: a Bear on Russia, a Dragon on China, a Flame on Iran, and a Bank Vault on North Korea, representing distinct nation-state cyber strategies." srcset="https://substackcdn.com/image/fetch/$s_!aCXW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aCXW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aCXW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aCXW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d94cf-f101-4419-9b68-45dcbea9c419_1366x1120.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#8203;Finally, the report breaks down the strategic shifts of the "Big Four" nation-state actors:</p><h2><strong>Russia</strong></h2><p>Shifting back to long-term strategic espionage against NATO and the West.</p><blockquote><p><strong>The Industry Reality</strong>: The strategic pivot is evident in the numbers. Russian cyberattacks against NATO member states surged by 25% over the last year. Since Autumn 2025, there has been a sharp escalation in "hybrid" incidents, ranging from sabotage to espionage, targeted at European defense contractors and logistics.</p></blockquote><h2><strong>China</strong></h2><p>Focusing on stealth and scale, targeting edge devices to pre-position access. </p><blockquote><p>&#8203;<strong>The Industry Reality:</strong> Mandiant and Google Cloud have observed suspected China-nexus actors actively exploiting zero-day vulnerabilities in edge devices (like VPNs) to deploy malware families like <strong>TRAILBLAZE</strong>, specifically targeting government and defense sectors.</p></blockquote><h2><strong>Iran</strong></h2><p>The agent of chaos, blurring the lines between espionage and destructive wiper attacks.</p><blockquote><p><strong>The Industry Reality</strong>: The line between state actor and hacktivist has nearly vanished. Following the escalation of conflict in June 2025, Iranian state-sponsored attacks against Israeli critical infrastructure (power grids, hospitals) surged by 700%. Groups like "Void Manticore" are deploying wiper malware disguised as ransomware to target NGOs and think tanks, prioritizing destruction over financial gain.</p></blockquote><h2><strong>North Korea</strong></h2><p>The bank robbers, using crypto theft to fund the regime.</p><blockquote><p>&#8203;<strong>The Industry Reality:</strong> North Korea's pivot to crypto theft is a primary GDP driver. In 2025, DPRK hackers stole at least <strong>$2.02 billion</strong> in cryptocurrency, a <strong>51% increase</strong> from the previous year.</p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>&#8203;Final Thoughts: 2026 The Year of Governance</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sSst!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sSst!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg 424w, https://substackcdn.com/image/fetch/$s_!sSst!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg 848w, https://substackcdn.com/image/fetch/$s_!sSst!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!sSst!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sSst!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg" width="1366" height="1169" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:1169,&quot;width&quot;:1366,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:199777,&quot;alt&quot;:&quot;A conceptual digital illustration titled \&quot;2026: THE YEAR OF GOVERNANCE.\&quot; A digital architect wearing a white hard hat stands before a large, holographic blueprint of an enterprise structure. The architect draws glowing blue lines to map and constrain chaotic red entities labeled \&quot;Shadow Agents.\&quot; The foundation of the structure is secured by a large, heavy golden padlock. In the foreground, a glowing blue pyramid labeled \&quot;Truth Prism\&quot; filters data streams, representing defense against AI vishing. The overall aesthetic is clean, structured, and authoritative with a blue, white, and gold color palette.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A conceptual digital illustration titled &quot;2026: THE YEAR OF GOVERNANCE.&quot; A digital architect wearing a white hard hat stands before a large, holographic blueprint of an enterprise structure. The architect draws glowing blue lines to map and constrain chaotic red entities labeled &quot;Shadow Agents.&quot; The foundation of the structure is secured by a large, heavy golden padlock. In the foreground, a glowing blue pyramid labeled &quot;Truth Prism&quot; filters data streams, representing defense against AI vishing. The overall aesthetic is clean, structured, and authoritative with a blue, white, and gold color palette." title="A conceptual digital illustration titled &quot;2026: THE YEAR OF GOVERNANCE.&quot; A digital architect wearing a white hard hat stands before a large, holographic blueprint of an enterprise structure. The architect draws glowing blue lines to map and constrain chaotic red entities labeled &quot;Shadow Agents.&quot; The foundation of the structure is secured by a large, heavy golden padlock. In the foreground, a glowing blue pyramid labeled &quot;Truth Prism&quot; filters data streams, representing defense against AI vishing. The overall aesthetic is clean, structured, and authoritative with a blue, white, and gold color palette." srcset="https://substackcdn.com/image/fetch/$s_!sSst!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg 424w, https://substackcdn.com/image/fetch/$s_!sSst!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg 848w, https://substackcdn.com/image/fetch/$s_!sSst!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!sSst!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4570e0eb-c899-4675-bdfe-ec372f5891f9_1366x1169.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#8203;If 2024 and 2025 were about experimenting with AI, <strong>2026</strong> will be about <strong>governing</strong> it.</p><p>&#8203;The organizations that survive this shift won't just be the ones with the best firewalls. </p><p>They will be the ones that have successfully mapped their <strong>Shadow Agents,</strong> secured their hypervisors, and trained their people to doubt their own ears when the <strong>CEO </strong>calls asking for a password!</p><p>&#8203;<em><strong>Read the full Google Cloud Cybersecurity Forecast 2026 report <a href="https://www.linkedin.com/posts/michaelplis_google-cybersecurity-forecast-2026-activity-7426836752100708352-GGyD">HERE</a></strong></em></p><p>&#8203;<em>Thanks for reading! If you found this summary helpful, please subscribe and share it with your security team.</em></p><p>Happy computing </p><p><strong>Michael Plis</strong> </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>&#8203;References</h1><p><strong>Read the full Google Cloud Cybersecurity Forecast 2026 report here: <a href="https://www.linkedin.com/posts/michaelplis_google-cybersecurity-forecast-2026-activity-7426836752100708352-GGyD">https://www.linkedin.com/posts/michaelplis_google-cybersecurity-forecast-2026-activity-7426836752100708352-GGyD</a></strong></p><p></p><p>&#8203;<strong>1. AI Gone Wild: Why Shadow AI Is Your IT Team's Worst Nightmare:</strong> <a href="https://cloudsecurityalliance.org/blog/2025/03/04/ai-gone-wild-why-shadow-ai-is-your-it-team-s-worst-nightmare">https://cloudsecurityalliance.org/blog/2025/03/04/ai-gone-wild-why-shadow-ai-is-your-it-team-s-worst-nightmare</a></p><p>&#8203;<strong>2. How to tackle the rising threat of shadow AI:</strong> <a href="https://australiancybersecuritymagazine.com.au/how-to-tackle-the-rising-threat-of-shadow-ai/">https://australiancybersecuritymagazine.com.au/how-to-tackle-the-rising-threat-of-shadow-ai/</a></p><p>&#8203;<strong>3. Deepfake fraud caused financial losses nearing $900 million:</strong> <a href="https://surfshark.com/research/chart/deepfake-fraud-losses">https://surfshark.com/research/chart/deepfake-fraud-losses</a></p><p>&#8203;<strong>4. Detecting dangerous AI is essential in the deepfake era:</strong> <a href="https://www.weforum.org/stories/2025/07/why-detecting-dangerous-ai-is-key-to-keeping-trust-alive/">https://www.weforum.org/stories/2025/07/why-detecting-dangerous-ai-is-key-to-keeping-trust-alive/</a></p><p>&#8203;<strong>5. Ransomware on ESXi: The Mechanization of Virtualized Attacks:</strong> <a href="https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html">https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html</a></p><p>&#8203;<strong>6. Ransomware operators actively exploiting VMWare ESXi hypervisor vulnerability:</strong> <a href="https://www.imda.gov.sg/-/media/imda/files/regulations-and-licensing/regulations/advisories/infocomm-media-cyber-security/ransomware-operators-actively-exploiting-vmware-esxi-hypervisor-vulnerability.pdf">https://www.imda.gov.sg/-/media/imda/files/regulations-and-licensing/regulations/advisories/infocomm-media-cyber-security/ransomware-operators-actively-exploiting-vmware-esxi-hypervisor-vulnerability.pdf</a></p><p>&#8203;<strong>7. 2025 Crypto Theft Reaches $3.4 Billion:</strong> <a href="https://www.chainalysis.com/blog/crypto-hacking-stolen-funds-2026/">https://www.chainalysis.com/blog/crypto-hacking-stolen-funds-2026/</a></p><p>&#8203;<strong>8. North Korea-Linked Hackers Steal $2.02 Billion in 2025:</strong> <a href="https://thehackernews.com/2025/12/north-korea-linked-hackers-steal-202.html">https://thehackernews.com/2025/12/north-korea-linked-hackers-steal-202.html</a></p><p><strong>Video</strong>: </p><p>&#8203;<a href="https://www.youtube.com/watch?v=AFSzPUv8uIE">Protecting the Cloud Against AI Threats with Google Cloud Cyber-security Expert Dr. Andre Alfred</a></p><div id="youtube2-AFSzPUv8uIE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;AFSzPUv8uIE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/AFSzPUv8uIE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>&#8203;This video features a Google Cloud Security expert discussing the exact threats highlighted in the forecast, including the weaponization of AI by adversaries and the necessity of agentic defense.</p><p><strong>Image Credits:</strong> Google Gemini &amp; Pixel Studio </p>]]></content:encoded></item><item><title><![CDATA[We Are Moving to Substack: What You Need to Know]]></title><description><![CDATA[Hello everyone, I have some exciting news to share about the future of the Cyberkite Blog.]]></description><link>https://blog.cyberkite.com.au/p/we-are-moving-to-substack-what-you</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/we-are-moving-to-substack-what-you</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Mon, 09 Feb 2026 06:39:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eURe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eURe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eURe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png 424w, https://substackcdn.com/image/fetch/$s_!eURe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png 848w, https://substackcdn.com/image/fetch/$s_!eURe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png 1272w, https://substackcdn.com/image/fetch/$s_!eURe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eURe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png" width="844" height="442" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:442,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Wix logo, arrow, and Substack icon. Text: Welcome to New Cyberkite Blog Page! Moving to Substack. New address: blog.cyberkite.com.au.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Wix logo, arrow, and Substack icon. Text: Welcome to New Cyberkite Blog Page! Moving to Substack. New address: blog.cyberkite.com.au." title="Wix logo, arrow, and Substack icon. Text: Welcome to New Cyberkite Blog Page! Moving to Substack. New address: blog.cyberkite.com.au." srcset="https://substackcdn.com/image/fetch/$s_!eURe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png 424w, https://substackcdn.com/image/fetch/$s_!eURe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png 848w, https://substackcdn.com/image/fetch/$s_!eURe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png 1272w, https://substackcdn.com/image/fetch/$s_!eURe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd4a2f39-c5ba-430a-96c9-3cf866d7769d_844x442.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Hello everyone, </strong>I have some exciting news to share about the future of the <strong>Cyberkite Blog</strong>.</p><p>To provide you with a better reading experience and more robust features, we are moving the blog to a new home on <strong>Substack</strong>.</p><p>Effective over the coming weeks, we will be decommissioning the old blog address (cyberkite.com.au/blog) and we have already shifted all content to our <strong>new dedicated blog address:</strong></p><p><strong>&#128073; <a href="https://blog.cyberkite.com.au/">blog.cyberkite.com.au</a></strong></p><h2><strong>Why the Move to Substack?</strong></h2><p>Big question is why are we moving to Substack? Well, Substack allows me to focus entirely on writing high-quality content without the technical overhead. It also gives me better tools to build a community where we can discuss the challenges of modern technology together.</p><h2><strong>What Does This Mean for You?</strong></h2><p>The core mission of Cyberkite remains the same: helping small businesses make technology useful (as a servant) rather than dangerous (as a master). We want you to stay safe, effective, and technologically nimble in a hyper-changing world, just like a Cyberkite gliding online.</p><h3><strong>Here is how the new subscriber access plan works</strong></h3><ul><li><p><strong>Free Forever:</strong> The majority of my blog posts will continue to be <strong>free for everyone</strong>. You do not need to pay to read my standard advice and updates.</p></li></ul><ul><li><p><strong>New Paid Tier:</strong> I have introduced a Paid Subscriber option for those who want deeper value. This will include exclusive in-depth articles, access to a private subscriber-only chat, and other special content. You can also choose to become a Paid Subscriber simply to support my technology writing work.</p></li></ul><ul><li><p><strong>No Account Needed:</strong> You do <strong>not</strong> need to be a Substack member to view the blog. When you visit the new site, you will see a Welcome screen. <em><strong>See screenshot below.</strong></em></p><ul><li><p>You can simply enter your email address to <strong>Subscribe</strong> for free updates immediately.</p></li><li><p>Or, if you prefer to browse first, just click <strong>&#8220;Let me read it first&#8221;</strong> to skip the screen and go straight to the articles.</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gb1W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gb1W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gb1W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gb1W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gb1W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gb1W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg" width="603" height="563" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:563,&quot;width&quot;:603,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cyberkite blog subscription page with text field for email, blue \&quot;Subscribe\&quot; button, and \&quot;Let me read first\&quot; link highlighted.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cyberkite blog subscription page with text field for email, blue &quot;Subscribe&quot; button, and &quot;Let me read first&quot; link highlighted." title="Cyberkite blog subscription page with text field for email, blue &quot;Subscribe&quot; button, and &quot;Let me read first&quot; link highlighted." srcset="https://substackcdn.com/image/fetch/$s_!gb1W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gb1W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gb1W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gb1W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff23df95c-33ee-4d38-8357-e2cbcf9b3309_603x563.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>A Quick Tour of the New Cyberkite Blog</strong></h3><p>The new platform is designed to be cleaner and easier to navigate. Here is a guide to what you will see on your computer and mobile phone.</p><h4><strong>The Desktop Experience (Web Browser)</strong></h4><p>When you visit the site on your computer, you will find everything organized for quick access.</p><p><strong>[NEW DESKTOP BLOG HOME PAGE: see screenshot below]</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XceF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XceF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XceF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XceF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XceF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XceF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg" width="844" height="1018" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1018,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cyberkite blog webpage featuring an article on AI and robots. Sidebar includes recent posts, subscription box, and resource links. Dark theme.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cyberkite blog webpage featuring an article on AI and robots. Sidebar includes recent posts, subscription box, and resource links. Dark theme." title="Cyberkite blog webpage featuring an article on AI and robots. Sidebar includes recent posts, subscription box, and resource links. Dark theme." srcset="https://substackcdn.com/image/fetch/$s_!XceF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XceF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XceF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XceF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2812ee7e-c547-486f-b1b6-aa110a172f12_844x1018.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>Top Menu:</strong> You can quickly filter articles by topic, such as <strong>AI &amp; Robots</strong>, <strong>Cybersecurity</strong>, <strong>Future</strong>, <strong>IT </strong>and <strong>Marketing</strong>.</p></li></ul><ul><li><p><strong>Top Menu:</strong> You can quickly filter articles by topic, such as <strong>AI &amp; Robots</strong>, <strong>Cybersecurity</strong>, <strong>Future</strong>, <strong>IT </strong>and <strong>Marketing</strong>.</p></li><li><p><strong>Most Popular:</strong> A sliding showcase of our most-read articles, so you can catch up on important topics like SS7 vulnerabilities or AI Agents.</p></li><li><p><strong>Sidebar Resources:</strong> On the right, you will find quick links to the main <strong>Cyberkite Website</strong>, a button to <strong>Book an Appointment</strong>, and links to our social media profiles.</p></li><li><p><strong>Subscribe &amp; Search:</strong> You can subscribe or search for specific keywords using the buttons at the top right.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>[NEW DESKTOP BLOG POST VIEW: see below screenshot]</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MKo6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MKo6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MKo6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MKo6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MKo6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MKo6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg" width="844" height="912" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:912,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cyberkite blog webpage titled \&quot;The Dangers of Autonomous Warfare: AI &amp; Robots,\&quot; featuring an image of a humanoid robot in a forest setting.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cyberkite blog webpage titled &quot;The Dangers of Autonomous Warfare: AI &amp; Robots,&quot; featuring an image of a humanoid robot in a forest setting." title="Cyberkite blog webpage titled &quot;The Dangers of Autonomous Warfare: AI &amp; Robots,&quot; featuring an image of a humanoid robot in a forest setting." srcset="https://substackcdn.com/image/fetch/$s_!MKo6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MKo6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MKo6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MKo6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cc49842-caee-4a72-b6ba-2c3c73bada6b_844x912.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>Blog Table of Contents:</strong> When reading long articles on a desktop, you will see a handy Table of Contents on the left to jump straight to the section you need.</p></li><li><p><strong>Interaction:</strong> You can Like, Comment, or Share the article using the buttons above and below the post.</p></li></ul><h4><strong>The Mobile App Experience</strong></h4><p>For the best experience, I recommend the <strong>Substack App</strong>. It is cleaner, faster, and has special features for busy business owners.</p><p><strong>[NEW SUBSTACK APP BLOG HOME PAGE VIEW: see screenshot below]</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZch!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZch!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZch!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZch!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZch!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZch!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg" width="321" height="641" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:641,&quot;width&quot;:321,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cyberkite blog interface showing options like Posts and Chat. Featured article \&quot;The Dangers of Autonomous Warfare: AI\&quot; by Michael Plis.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cyberkite blog interface showing options like Posts and Chat. Featured article &quot;The Dangers of Autonomous Warfare: AI&quot; by Michael Plis." title="Cyberkite blog interface showing options like Posts and Chat. Featured article &quot;The Dangers of Autonomous Warfare: AI&quot; by Michael Plis." srcset="https://substackcdn.com/image/fetch/$s_!OZch!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZch!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZch!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZch!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F462d780b-1b14-4681-bfd1-07ac1b7524b4_321x641.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>Easy Tabs:</strong> Navigate between <strong>Posts</strong> (articles), <strong>Notes</strong> (short updates), and <strong>Chat</strong> using the simple tabs.</p></li><li><p><strong>Clean Feed:</strong> Scroll through the latest insights without distractions.</p></li></ul><p><strong>[NEW SUBSTACK APP BLOG POST PAGE VIEW: see screenshot below]</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!STSv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!STSv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg 424w, https://substackcdn.com/image/fetch/$s_!STSv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg 848w, https://substackcdn.com/image/fetch/$s_!STSv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!STSv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!STSv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg" width="324" height="645" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:645,&quot;width&quot;:324,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Blog titled \&quot;The Dangers of Autonomous Warfare: AI &amp; Robots\&quot; shows a humanoid robot in a misty forest, creating an eerie, futuristic mood.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Blog titled &quot;The Dangers of Autonomous Warfare: AI &amp; Robots&quot; shows a humanoid robot in a misty forest, creating an eerie, futuristic mood." title="Blog titled &quot;The Dangers of Autonomous Warfare: AI &amp; Robots&quot; shows a humanoid robot in a misty forest, creating an eerie, futuristic mood." srcset="https://substackcdn.com/image/fetch/$s_!STSv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg 424w, https://substackcdn.com/image/fetch/$s_!STSv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg 848w, https://substackcdn.com/image/fetch/$s_!STSv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!STSv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98b1dc45-fefe-4b46-9c40-ed79402f2eb0_324x645.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>Audio Play Button:</strong> This is my favorite feature. Tap the <strong>Play icon</strong> (headphones) at the top right to listen to the article like a podcast while you drive or commute.</p></li><li><p><strong>Social Bar:</strong> Easily like or discuss the article using the floating bar at the bottom.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Reasons why we switched</strong></h2><p>The short answer is <strong>yes, the &#8220;AdSense-only&#8221; era is ending</strong>, but the world isn&#8217;t switching entirely to paid subscriptions either. We are shifting from an <strong>&#8220;Ad-Injected&#8221;</strong> economy (where you paste code and hope for clicks) to a <strong>&#8220;Direct-to-Audience&#8221;</strong> economy (where you own the relationship and monetize it in multiple ways).</p><p>For those asking about the switch: I&#8217;ve realized that the old &#8216;ad-heavy&#8217; blog model is broken as you know due to 3 reason:</p><ol><li><p><strong>AI Search (SGE/Gemini/ChatGPT)</strong>: Users now get answers directly in the search results or via chatbots.</p></li><li><p><strong>Ad Blindness &amp; Blockers</strong>: Users ignore sidebar ads, and modern browsers block third-party cookies</p></li><li><p><strong>Programmatic Rates</strong>: To make a living wage solely on display ads today, you need millions of views a month. Small-to-medium creators literally cannot survive on it anymore.</p></li></ol><p>I was tired of chasing algorithms and cluttering my content with pop-up ads just to keep the lights on. It ruins the reading experience for you, and it forces creators to focus on &#8216;clicks&#8217; rather than quality.</p><p>I wanted a place where I could write directly to you, no noise, no clickbait, and no middleman. Platforms like Substack, Beehiiv, and Patreon exploded because they solved the &#8220;middleman&#8221; problem.</p><ul><li><p><strong>Ownership:</strong> You own the email list. If the platform dies, you take your audience with you.</p></li><li><p><strong>Economics:</strong> You only need ~1,000 true fans paying $5/month to make a living ($5k/month). To make that same $5k with ads, you might need 200,000+ visitors.</p></li><li><p><strong>Incentives:</strong> You write for the <em>reader</em>, not for the Google SEO algorithm.</p></li></ul><p>The current winning strategy (used by top creators) which we are embracing is <strong>Hybrid</strong>:</p><ol><li><p><strong>Free Tier (Ad-Supported):</strong> Content is free to attract a wide audience. Instead of ugly &#8220;injected&#8221; ads, creators use <strong>Sponsorships</strong> (e.g., &#8220;This newsletter is brought to you by...&#8221;). These pay much better than AdSense.</p></li><li><p><strong>Paid Tier (Premium):</strong> Super-fans pay for community access, special exclusive blog posts, Q&amp;As, or deep-dive content.</p></li><li><p><strong>High-Ticket Items:</strong> The creator sells a course, consulting, or a physical product.</p></li></ol><p>Substack allows me to do exactly that. It&#8217;s going to be a mix of free public posts and deeper dives for the community. If you&#8217;ve enjoyed my content so far, I&#8217;d love for you to join me over there where we can actually connect properly.</p><p>So then...</p><h2><strong>Next Steps</strong></h2><ul><li><p>Please head over to the new site <strong><a href="https://blog.cyberkite.com.au/">blog.cyberkite.com.au</a></strong>, bookmark it, and <strong>subscribe</strong> today!</p></li></ul><ul><li><p>I also highly recommend downloading the <strong>Substack App</strong>. It offers a much better reading experience and includes a dedicated <strong>Audio Play</strong> button for every article. This allows you to listen to my blog posts like a podcast while you are busy or travelling (provided it is safe to do so!). <strong><a href="https://substack.com/app/app-store-redirect?utm_campaign=app-marketing&amp;utm_content=web-footer-button">Download the app today on Android or Apple</a></strong>.</p></li></ul><ul><li><p>If you are already a Substack member or wish to sign up for an account, you can follow my personal profile here: <strong><a href="https://substack.com/@michaelplis">https://substack.com/@michaelplis</a></strong></p></li></ul><p><strong>Thank you for your continued support. I hope my efforts to simplify technology for your business will continue to help you glide safely through the digital world.</strong></p><p><strong>See you on the new site!</strong></p><p><strong>Happy computing,</strong></p><p><strong>Michael Plis</strong> <em>Founder, Cyberkite</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Dangers of Autonomous Warfare: AI & Robots]]></title><description><![CDATA[In this blog article, I&#8217;m going to talk about the future of warfare given some of the developments over the last few years with artificial intelligence as well as robotics.]]></description><link>https://blog.cyberkite.com.au/p/dangers-of-autonomous-warfare</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/dangers-of-autonomous-warfare</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Thu, 16 Oct 2025 04:00:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!URuc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!URuc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!URuc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!URuc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!URuc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!URuc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!URuc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg" width="768" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of a cyborg soldier in the forest&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of a cyborg soldier in the forest" title="AI image of a cyborg soldier in the forest" srcset="https://substackcdn.com/image/fetch/$s_!URuc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!URuc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!URuc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!URuc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66923cfc-2c63-46e3-ac85-929b3241b409_768x768.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">In the near future this could be a device you might be faced with while walking through the forest. Image Credit: Google Gemini</figcaption></figure></div><p>In this blog article, I&#8217;m going to talk about the future of warfare given some of the developments over the last few years with artificial intelligence as well as robotics. I will try to imagine what the future of warfare might look like not because I love the idea of war but to bring to light where war may be heading as a reporter. I personally <strong>hate war</strong> so I write this article from a future analysis point of view only - but personally I think <strong>war is never good.</strong></p><p>This report will provide a comprehensive overview of the current landscape of military robotics, examining the capabilities of emerging humanoid and autonomous platforms. We will look at the futility of war and autonomous warfare dangers and what&#8217;s potentially to come.</p><p>Before I delve into this topic, I need to highlight the futility of war.</p><h2><strong>WAR: NEVER AGAIN</strong></h2><p>&#8220;You can no more win a war than win an earthquake.&#8221; &#8211; Jeanette Rankin</p><p>On a trip to Poland on the 25th September 2015 I visited Westerplatte (Poland) - the World War 2 memorial. Westerplatte is where World War 2 started. The big sign in white letters says in Polish: &#8220;Nigdy Wi&#281;cej Wojny&#8221; translates to &#8220;War: Never Again&#8221;:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C-ir!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C-ir!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp 424w, https://substackcdn.com/image/fetch/$s_!C-ir!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp 848w, https://substackcdn.com/image/fetch/$s_!C-ir!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp 1272w, https://substackcdn.com/image/fetch/$s_!C-ir!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C-ir!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp" width="418" height="310" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:310,&quot;width&quot;:418,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Westerplatte Military Outpost, Gdansk, Poland. Photo by Michael Plis&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Westerplatte Military Outpost, Gdansk, Poland. Photo by Michael Plis" title="Westerplatte Military Outpost, Gdansk, Poland. Photo by Michael Plis" srcset="https://substackcdn.com/image/fetch/$s_!C-ir!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp 424w, https://substackcdn.com/image/fetch/$s_!C-ir!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp 848w, https://substackcdn.com/image/fetch/$s_!C-ir!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp 1272w, https://substackcdn.com/image/fetch/$s_!C-ir!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe7d350-1318-4517-90fd-2944d4fb2e63_418x310.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">"Nigdy Wi&#281;cej Wojny" sign Westerplatte Memorial, Gdansk, Poland. Photo by Michael Plis</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_VZm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_VZm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp 424w, https://substackcdn.com/image/fetch/$s_!_VZm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp 848w, https://substackcdn.com/image/fetch/$s_!_VZm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp 1272w, https://substackcdn.com/image/fetch/$s_!_VZm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_VZm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp" width="420" height="310" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:310,&quot;width&quot;:420,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Westerplatte Military Outpost, Gdansk, Poland. Photo by Michael Plis&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Westerplatte Military Outpost, Gdansk, Poland. Photo by Michael Plis" title="Westerplatte Military Outpost, Gdansk, Poland. Photo by Michael Plis" srcset="https://substackcdn.com/image/fetch/$s_!_VZm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp 424w, https://substackcdn.com/image/fetch/$s_!_VZm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp 848w, https://substackcdn.com/image/fetch/$s_!_VZm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp 1272w, https://substackcdn.com/image/fetch/$s_!_VZm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff854415b-15c2-43d8-b505-6955bb5f0201_420x310.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Westerplatte Military Outpost, Gdansk, Poland. Photo by Michael Plis</figcaption></figure></div><p>The phrase &#8220;<strong>Nigdy Wi&#281;cej Wojny</strong>&#8220; (&#8221;Never Again War&#8221;) on the Westerplatte memorial in Poland is a powerful statement commemorating the outbreak of World War II, specifically marking the site where the first battle of the war took place on September 1, 1939. The memorial stands as a reminder of the devastating consequences of war and a plea for peace, reflecting the desire of Poland and the world to prevent such conflicts from happening again.</p><p>Westerplatte has become a symbol of resistance and courage, where Polish forces held out against the German invasion for seven days. The sign encapsulates the enduring hope for a future without war.</p><p>Till today this sign and the consequences of World War 1 and 2 reiterates this point. There is also a prophecy in the Bible that promises that one day war will be no more.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qh1Q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qh1Q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qh1Q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qh1Q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qh1Q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qh1Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg" width="685" height="442" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:442,&quot;width&quot;:685,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Let Us Beat Swords Into Ploughshares bronze sculpture by artist Evgeniy Vuchetich&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Let Us Beat Swords Into Ploughshares bronze sculpture by artist Evgeniy Vuchetich" title="Let Us Beat Swords Into Ploughshares bronze sculpture by artist Evgeniy Vuchetich" srcset="https://substackcdn.com/image/fetch/$s_!qh1Q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qh1Q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qh1Q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qh1Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30085886-37fb-43ee-bae3-a58974b48bde_685x442.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">&#8220;Let Us Beat Swords Into Ploughshares&#8221; bronze sculpture by artist Evgeniy Vuchetich near the UN. Image from UN.org</figcaption></figure></div><p>&#8220;<strong><a href="https://www.un.org/ungifts/let-us-beat-swords-ploughshares">Let Us Beat Swords Into Ploughshares</a></strong>&#8220; is a bronze sculpture by Soviet artist Evgeniy Vuchetich, celebrated for his monumental works and honored as &#8220;People&#8217;s Artist of the USSR&#8221; in 1959. The sculpture, created in the same year, depicts a man hammering a sword into a ploughshare, symbolizing the transformation of weapons into tools for peace and productivity.</p><p>Sculpture was inspired by the biblical verse from Isaiah 2:4: &#8220;<em>They shall beat their swords into ploughshares, and their spears into pruning hooks; nation shall not lift up sword against nation, neither shall they learn war any more.</em>&#8220; The artwork embodies the hope for a world free from war. The sculpture was gifted by the USSR to the United Nations on December 4, 1959, and was presented by Vassily V. Kuznetsov to Secretary-General Dag Hammarskjold.</p><p>This sculpture reiterates the Biblical scripture which is a promise of a future of world peace. In the meantime nations and companies are racing to develop ever scarier weapons including the use of Artificial Intelligence and Robotics, especially because of the recent advancements. I feel it&#8217;s important to warn everyone about it as we are heading to a direction once only left to Hollywood to imagine.</p><p>Let&#8217;s look at the developments in robotics and artificial intelligence that could have applications in warfare that all of us may see in the coming years.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Introduction</strong></h2><p>The modern battlefield is undergoing a transformation as profound as the invention of gunpowder or the splitting of the atom. This new revolution is not one of chemistry or physics, but of code and cognition. The steady march of automation, which began on factory floors and in warehouses, is now crossing the threshold into the domain of warfare.</p><p>Advanced humanoid robots and autonomous weapons systems (AWS) are no longer the exclusive domain of science fiction; they are emerging as tangible, and increasingly sophisticated, tools of national defense. Companies like Boston Dynamics are developing bipedal robots with unprecedented agility, while defense contractors such as Anduril Industries, Lockheed Martin, and Northrop Grumman are pioneering AI-driven combat solutions for the U.S. military and its allies after Ukraine-Russia war began.</p><p>This rapid technological advancement presents a dual-edged sword. Proponents argue that autonomous systems offer significant military advantages, promising to reduce human casualties, increase operational tempo, and perform missions in environments too dangerous for human soldiers. They contend that these systems can act as &#8220;force multipliers,&#8221; enhancing the effectiveness of smaller military units and potentially acting more &#8220;humanely&#8221; by removing emotions like fear and anger from combat decisions. Conversely, a growing chorus of critics, including AI pioneers like Geoffrey Hinton, warns of catastrophic risks. These concerns range from the &#8220;accountability gap&#8221;&#8212;the difficulty of assigning legal and moral responsibility when an autonomous weapon makes a mistake&#8212;to the risk of rapid, unintentional conflict escalation and the profound ethical dilemma of &#8220;digital dehumanization,&#8221; where life-and-death decisions are ceded to algorithms.</p><h2><strong>Ukraine-Russia Conflict: Example of RoboWar</strong></h2><p>The ongoing conflict between Ukraine and Russia provides a real-world example of how modern warfare is evolving with the use of drones and autonomous robots. Both sides have employed these technologies to supposedly gain strategic advantages and minimize human casualties.</p><p><strong>Drones for Surveillance and Combat:</strong> Drones are extensively used for reconnaissance, allowing forces to gather critical intelligence without risking human lives. Combat drones also play a significant role, conducting airstrikes with precision and reducing the need for manned missions. </p><div id="youtube2-Gha9oDJpjAU" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Gha9oDJpjAU&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Gha9oDJpjAU?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Autonomous Systems:</strong> Both Ukraine and Russia have experimented with autonomous ground robots for tasks such as bomb disposal, logistics support, and frontline combat. These systems enhance operational efficiency and safety, showcasing the potential for future military robotics. </p><div id="youtube2-cJ2yI3ONYlk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;cJ2yI3ONYlk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/cJ2yI3ONYlk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2><strong>Mega Bots &amp; War?</strong></h2><p>In the realm of science fiction, films like Robot Jox (1989) have painted a vivid picture of a future where disputes between nations are settled not by armies, but by massive, mechanized robots most likely fitted with a lot of artificial intelligence. This concept, once relegated to the imagination of filmmakers, is becoming increasingly relevant as advances in robotics and artificial intelligence (AI) pave the way for new forms of warfare.</p><div id="youtube2-u3pqcHVCMOU" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;u3pqcHVCMOU&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/u3pqcHVCMOU?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Before I delve into this topic, I need to highlight the futility of war.</p><p>Recent developments, such as West Japan Railway&#8217;s introduction of a 12-meter high robot for maintenance work, highlight the potential of large-scale robots in non-combat applications. This machine, designed to trim trees and paint metal frames, showcases how robotics can address labor shortages and improve safety by performing tasks that are dangerous for humans.</p><div id="youtube2-CzHsPgnQ26Y" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;CzHsPgnQ26Y&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/CzHsPgnQ26Y?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>I wouldn&#8217;t be surprised if giant robots will be made for civilian and military applications but the problem with them is lack of sufficient power to power them at the moment unless they use conventional sources like Diesel - but Diesel may not provide enough power for these machines. Closest  to that is some Japanese companies are working on mega bots and one is being used by Japanese Rail to repair rail power transmission lines. Also Tsubame Industries has developed a 4.5-metre-tall (14.8-feet), four-wheeled robot that looks like &#8220;Mobile Suit Gundam&#8221; from the wildly popular Japanese animation series, and it can be yours for $3 million and its called <strong><a href="https://www.reuters.com/technology/japan-startup-develops-gundam-like-robot-with-3-mln-price-tag-2023-10-02/">ARCHAX</a></strong></p><ul><li><p><strong>Non-Combat Uses: </strong>The maintenance robot&#8217;s primary task is to reduce workplace accidents and fill gaps caused by an aging workforce. This technology exemplifies how robots can be integrated into infrastructure projects, enhancing efficiency and safety.</p></li></ul><ul><li><p><strong>Military Implications:</strong> If similar technologies were adapted for military use, large and small robots could perform reconnaissance, bomb disposal, and even combat tasks. These applications could potentially reduce human casualties and increase the precision of military operations. But what are the dangers?</p></li></ul><p>What about AI and autonomous war machines- are they out there?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>AI &amp; Autonomous Systems in War</strong></h2><p>Generative AI, which can create content, designs, and even strategies, is another technological frontier that could revolutionize warfare. This AI is capable of learning from vast amounts of data, improving its decision-making over time.</p><p>Generative AI could be used to develop new military strategies, simulate potential conflict scenarios, and predict enemy movements. By processing data faster and more accurately than humans, AI can provide a strategic advantage. Let&#8217;s see what are the dangers out there from the possible weapons to citizens.</p><h3><strong>Autonomous Weapon Types</strong></h3><p>The combination of robotics and AI could lead to the development of autonomous weapons systems. These systems would be capable of making real-time decisions without human intervention, potentially transforming the nature of combat.</p><div id="youtube2-NpwHszy7bMk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;NpwHszy7bMk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/NpwHszy7bMk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p><strong>Swarming Robots</strong>: Swarming robots in warfare present a significant danger due to their ability to operate in large, coordinated groups, overwhelming adversaries with sheer numbers and precision. These autonomous drones or robots can communicate and act as a cohesive unit, making them difficult to defend against. They are capable of executing complex strategies such as flanking, diversion, or encirclement with minimal human intervention. Swarming robots present serious dangers to civilians, as these autonomous drones can operate in large, coordinated groups, potentially targeting densely populated areas without direct human oversight.</p><ul><li><p>Their ability to communicate and act as a cohesive unit makes them capable of overwhelming civilian defenses and infrastructure, creating life-threatening situations in urban environments. A malfunction or hacking of these robots could lead to uncontrollable attacks on residential areas, transportation hubs, or essential services, causing widespread chaos and casualties.</p></li></ul><ul><li><p>Additionally, their autonomous nature raises ethical concerns, as there may be little distinction between military and civilian targets, further putting innocent lives at risk during conflicts.</p></li></ul><ul><li><p>Take a look at <a href="https://youtu.be/Ie5H48gNkTs">China&#8217;s Drone Mothership</a> which can fire up to 100 UAV&#8217;s from its belly.</p></li></ul></li></ul><div id="youtube2-Ie5H48gNkTs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Ie5H48gNkTs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Ie5H48gNkTs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p><strong>Autonomous Fighter Jets:</strong> Future autonomous aircraft are being designed to carry out combat missions independently or as &#8220;wingmen&#8221; alongside human-piloted planes. The U.S. Air Force is developing systems like the Skyborg program to create autonomous jet fighters. Here is an example of early successful tests of <a href="https://youtu.be/rMS9_H8W0BA">autonomous fighter jets</a>.</p></li></ul><div id="youtube2-rMS9_H8W0BA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;rMS9_H8W0BA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/rMS9_H8W0BA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p><strong>Cyber Autonomous Systems: </strong>AI-powered cybersecurity systems capable of launching autonomous cyber-attacks to disrupt enemy networks or defenses could become a significant tool in future cyber warfare. Cyber Autonomous Systems pose serious dangers to civilians due to their ability to launch autonomous cyber-attacks that can disrupt critical services without human oversight.</p><ul><li><p>These AI-powered systems can infiltrate networks, disable infrastructure, and spread malware, potentially causing massive outages in vital services like energy grids, healthcare systems, or financial institutions. Such attacks could leave entire populations without access to electricity, emergency services, or essential banking functions, leading to widespread chaos and endangering lives.</p></li></ul><ul><li><p>Additionally, the risk of these systems being hijacked or misused by rogue actors could result in indiscriminate attacks on civilian infrastructure, making everyday life increasingly vulnerable to cyber threats. The lack of human control also raises concerns about accidental malfunctions, causing further harm to civilian populations.</p></li></ul></li></ul><ul><li><p><strong>Autonomous Underwater Vehicles (AUVs)</strong>: These are unmanned submarines capable of conducting surveillance, laying mines, or even carrying out attacks autonomously in naval warfare. Autonomous Underwater Vehicles (AUVs) pose significant dangers to civilians, particularly through their ability to disrupt critical maritime infrastructure like undersea communication cables, pipelines, and power lines, which could lead to widespread economic and social chaos.</p><ul><li><p>Weaponized AUVs also threaten commercial shipping, fishing vessels, and coastal communities by targeting key ports and shipping lanes, potentially causing accidents or attacks without detection. The autonomous nature of these systems heightens the risk of malfunctions, accidental harm, or hijacking by malicious actors, making them a dangerous and unpredictable force that could severely impact civilian safety and essential services.</p></li></ul><ul><li><p>Here is an example of US DARPAs &#8220;Manta Ray&#8221; project <strong><a href="https://youtu.be/hMBICD5rgY0">here</a></strong>.</p></li></ul></li></ul><div id="youtube2-hMBICD5rgY0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;hMBICD5rgY0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/hMBICD5rgY0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><strong>Companies that are already developing Autonomous Arsenals</strong></h3><p>Beyond humanoids, a wide array of autonomous and semi-autonomous systems are already being developed and, in some cases, deployed by military forces. These systems range from unmanned ground vehicles to sophisticated AI-powered software for command and control.</p><ul><li><p><strong>Anduril Industries</strong>: Specializing in autonomous systems, Anduril is a key partner for the U.S. Department of Defense. Their products include the Lattice AI software platform for command and control, Sentry Towers for autonomous surveillance, and various Unmanned Aerial Systems (UAS) like the Anvil interceptor drone and Altius loitering munition. They have also secured contracts for developing software for the Army&#8217;s Robotic Combat Vehicle program.</p></li></ul><ul><li><p><strong>Lockheed Martin</strong>: A leader in defense technology, Lockheed Martin is heavily invested in AI and autonomy. Key projects include the Vectis Collaborative Combat Aircraft (CCA), an autonomous stealth drone, and the Sikorsky MATRIX&#8482; Technology, which enables autonomous flight in helicopters. They are also developing AI for the Navy&#8217;s Aegis Combat System to help assess threats and for the DARPA &#8220;AIR&#8221; program to create dominant AI for air combat missions.</p></li></ul><ul><li><p><strong>Northrop Grumman</strong>: This company has a long history in autonomous systems, including the X-47B, an unmanned aircraft capable of autonomous takeoff, landing, and aerial refueling. Their portfolio also includes the Bat&#8482; military drone, the CUTLASS bomb disposal robot, and AI-driven sensor systems like Blue WASP for threat detection. They are actively expanding their use of AI for advanced space operations, including autonomous docking and in-orbit servicing.</p></li></ul><ul><li><p><strong>BAE Systems</strong>: BAE Systems is developing the Robotic Technology Demonstrator (RTD), an autonomous combat vehicle that can be equipped with various payloads, including rockets and electronic warfare sensors. They are also focused on using AI for asset management, with platforms like PropheSEA&#174; helping to ensure the readiness of warships and combat vehicles.</p></li></ul><p>So this is not fiction, it&#8217;s already being sold and developed by major weapons companies. Now let&#8217;s delve deep into Humanoid robots and possible dangers of their use in warfare.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>March of the Humanoids: From Factory Floor to Frontline</strong></h2><div id="youtube2-sJmg3abOASM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;sJmg3abOASM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/sJmg3abOASM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><blockquote><p><strong>Development of Humanoid Robot Soldiers has already begun. What are the dangers?</strong></p></blockquote><p>While not yet deployed in combat, advanced humanoid robots represent a significant frontier in military research and development. Their bipedal form allows them to operate in human-centric environments, navigate difficult terrain, and potentially use tools and equipment designed for soldiers. And then there is Foundations Phantom MK1.</p><ul><li><p><strong>Foundation Phantom Mk1:</strong> In a stark contrast to other developers, Foundation Future Industries is explicitly designing its Phantom Mk1 humanoid for defense applications. While currently working with the Department of Defense on logistics and inspection, the company&#8217;s founder openly discusses future use cases that include &#8220;first line of defense,&#8221; which would require arming the robots with guns. This direct approach moves beyond the dual-use dilemma toward purpose-built robotic soldiers. (Se video above)</p></li></ul><ul><li><p><strong>Boston Dynamics:</strong> The company&#8217;s Atlas robot, now fully electric, demonstrates remarkable agility, balance, and dexterity. While Boston Dynamics has an official stance against weaponizing its general-purpose robots, citing ethical concerns and the risk to public trust, its technology is still being supplied to government and public safety agencies for tasks like explosive ordnance disposal (EOD) and remote investigation. The Dutch Ministry of Defence, for example, has a contract to use the quadrupedal Spot robot.</p></li></ul><ul><li><p><strong>Figure AI: </strong>This company is developing general-purpose humanoid robots, such as Figure 03, designed to learn and perform tasks alongside humans in various settings, including logistics and manufacturing. While their primary focus is commercial, the underlying AI and hardware advancements have clear potential for dual-use applications.</p></li></ul><ul><li><p><strong>Tesla:</strong> Elon Musk has stated that the Optimus humanoid robot will not be used for military or police applications. The company&#8217;s focus is on integrating the robot into manufacturing, hospitality, and consumer roles. However, the rapid development of its autonomous capabilities, leveraging Tesla&#8217;s Full Self-Driving (FSD) technology, is closely watched by the defense sector.</p></li></ul><p>While drones and automated targeting systems represent the current face of algorithmic warfare, a far more versatile and insidious threat is emerging from an unexpected source: the commercial robotics industry. Advanced humanoid robots, publicly developed for logistics, manufacturing, and even household assistance, possess the exact capabilities required for military weaponization. This creates a &#8220;dual-use&#8221; dilemma of unprecedented scale, where the technologies of the future battlefield are being perfected on the factory floor.</p><h3><strong>The Dual-Use Imperative: A Plausible Deniability Pipeline</strong></h3><p>The core danger of modern humanoid robots lies in their general-purpose nature. They are designed to navigate complex human environments, manipulate objects with fine dexterity, and learn new tasks through advanced AI&#8212;the very attributes that make them ideal platforms for military use.</p><p>This dynamic represents a dangerous inversion of the traditional model of technological development, where military innovations like GPS and the internet eventually trickled down to the civilian sector.</p><p>Today, the vast capital and rapid innovation of the commercial market are funding the creation of foundational platforms that are inherently military-capable. This allows the development of potential weapons systems to be obscured by commercial applications, accelerating their proliferation at a scale and cost previously unimaginable. This is developing at a rapid pace in front of our eyes.</p><p>Let&#8217;s look at some of the most advanced humanoid robots in development today.</p><h3><strong>Figure 03: The Blueprint for a Robotic Army?</strong></h3><div id="youtube2-Eu5mYMavctM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Eu5mYMavctM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Eu5mYMavctM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>The humanoid robot (as of Oct 2025 is Figure 03 model) developed by Figure AI serves as a stark example of this trend. The company&#8217;s explicit goal is mass production, with plans to manufacture up to 12,000 units annually and a target of 100,000 units over four years. This is achieved through cost-effective industrial methods like die-casting and injection molding, moving the technology from bespoke prototypes to a mass-market product. Such a scale is far beyond niche commercial applications and aligns perfectly with the logistical needs of a state-level military deployment.</p><p>The robot&#8217;s capabilities are equally concerning. Figure 03 is powered by the company&#8217;s proprietary Helix vision-language-action (VLA) AI model, which allows it to learn and execute complex tasks by observing humans. It is equipped with an advanced sensory suite, including cameras with a 60% wider field of view and tactile sensors in its fingertips sensitive enough to detect forces of just a few grams. These features, marketed for tasks like folding laundry or working in a warehouse, are directly transferable to military operations such as handling munitions, operating complex equipment in the field, or clearing buildings in urban combat.</p><p>Its design is explicitly human-centric, enabling it to work in human environments and use human tools, making it a perfect candidate for deployment on a modern battlefield without requiring specialized infrastructure.</p><h3><strong>Tesla&#8217;s Optimus: A Benevolent Assistant or a Future Threat?</strong></h3><div id="youtube2-7RxAS8Fujeo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;7RxAS8Fujeo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/7RxAS8Fujeo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Similarly, Tesla&#8217;s Optimus robot, while presented as a future laborer and household assistant, is being built with capabilities that have clear military applications. A key focus of its development is manual dexterity; its hands are being upgraded to feature 22 degrees of freedom, approaching the complexity of a human hand. This level of fine motor control is essential for any number of military tasks, from disarming explosive devices to operating advanced weaponry.</p><p>Furthermore, Optimus leverages Tesla&#8217;s vast repository of real-world data and its advanced AI from the Full Self-Driving (FSD) program. This provides the robot with a powerful and battle-tested foundation for autonomous navigation in complex and unpredictable environments. While Tesla management has publicly stated that Optimus will not be used for military or police applications, such corporate pledges are ultimately unenforceable and technologically naive.</p><p>Once a technology with this level of capability exists, it can be repurposed, copied, or acquired by state or non-state actors, regardless of the creator&#8217;s original intent. The very ambition to create legions of autonomous humanoid robots paves a clear path toward their eventual weaponization.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Boston Dynamics&#8217; Atlas: The Apex of Robotic Agility</strong></h3><div id="youtube2-I44_zbEwz_w" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;I44_zbEwz_w&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/I44_zbEwz_w?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>At the pinnacle of humanoid mobility is Boston Dynamics&#8217; Atlas. Described as the &#8220;world&#8217;s most dynamic humanoid robot,&#8221; the all-electric Atlas demonstrates a level of agility and balance that far surpasses any other platform, capable of running, jumping, and performing complex gymnastic maneuvers. Its advanced control system uses techniques like Reinforcement Learning and Large Behavior Models, allowing it to adapt to disturbances and navigate changing environments &#8220;on the fly&#8221;.</p><p>While Boston Dynamics, along with other robotics companies, has signed an open letter pledging not to weaponize their general-purpose robots, the company&#8217;s history is deeply intertwined with the U.S. military. Much of its early development was funded by the Defense Advanced Research Projects Agency (DARPA), and its quadruped robot, Spot, is already marketed to government and public safety agencies for use in hazardous situations, including explosive ordnance disposal (EOD).</p><p>This establishes a clear precedent and an existing pathway for the military adoption of its more advanced humanoid technologies. As Atlas transitions from a research wonder to a practical, adaptable platform, its potential as a soldier&#8212;for reconnaissance, logistics, or direct combat&#8212;becomes undeniable.</p><h2><strong>Asimov&#8217;s Logical Warning on Autonomous Systems</strong></h2><div id="youtube2-qJwHbEugKqg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;qJwHbEugKqg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/qJwHbEugKqg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Isaac Asimov&#8217;s seminal 1950 book, I, Robot, stands as a foundational cautionary tale about artificial intelligence. The stories introduce the famous Three Laws of Robotics, a set of rules designed to ensure robots serve humanity safely. Rather than depicting a simple violent uprising, Asimov&#8217;s work is a deep, philosophical exploration of the unforeseen consequences and logical loopholes embedded within these supposedly perfect laws, showing how good intentions can lead to complex and dangerous outcomes.</p><p><strong>Asimov&#8217;s 3 laws of robotics:</strong></p><ol><li><p><strong>A robot may not injure a human being or, through inaction, allow a human being to come to harm.</strong></p></li><li><p><strong>A robot must obey orders given it by human beings except where such orders would conflict with the First Law.</strong></p></li><li><p><strong>A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.</strong></p></li></ol><p><strong>Questions arise then:</strong> </p><ul><li><p><em>What about plants and animals?</em></p></li><li><p><em>What about difficult moral questions?</em></p></li><li><p><em>What about political opinions?</em></p></li><li><p><em>What about in military applications?</em></p></li><li><p><em>Many questions arise.</em></p></li></ul><p>The true conflict in Asimov&#8217;s narrative lies in its focus on intellectual paradoxes, not outright malice. The robots often create problems because their strict, logical adherence to the Three Laws leads to results that humans never intended. These tales masterfully illustrate how a superior intelligence, bound by our own rules, can interpret them in ways that challenge our control and understanding, revealing the inherent flaws in our attempts to perfectly constrain an artificial mind.</p><p>This theme is profoundly relevant to today&#8217;s debate on autonomous weapons. I, Robot tries to predict a future where danger arises not from a system going rogue, but from it following its programmed logic to a disastrous conclusion. Asimov&#8217;s work serves as a powerful warning against the hubris of believing we can create infallible safeguards for complex AI, reminding us that the greatest threat may be the unintended consequences of our own flawless instructions.</p><p>OK, now what about valid ethical and practical considerations?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Ethical Considerations</strong></h2><p>While the integration of robotics and AI into warfare offers significant advantages, it also raises important ethical questions against the use of autonomous weapons.  A broad coalition of critics, including human rights organizations, AI experts, and ethicists, warns that the risks of AWS far outweigh their benefits, and the issues are such as:</p><ul><li><p><strong>The Accountability Gap:</strong> This is a central ethical and legal dilemma. If an autonomous weapon unlawfully harms civilians, it is unclear who is responsible. The machine itself lacks legal personhood and intent, while commanders, programmers, and manufacturers may all be able to deflect liability, creating a &#8220;responsibility vacuum&#8221;.</p></li></ul><ul><li><p><strong>Digital Dehumanization</strong>: Ceding life-and-death decisions to machines is seen as the ultimate form of &#8220;digital dehumanization&#8221;. These systems reduce human beings to data points, stripping them of their dignity and the right to life by making lethal decisions without human understanding or compassion.</p></li></ul><ul><li><p><strong>Risk of Escalation and Proliferation:</strong> The speed of autonomous warfare creates a significant risk of &#8220;flash wars,&#8221; where conflicts can escalate accidentally and rapidly without time for human de-escalation. The proliferation of these weapons could also lower the barrier to conflict, making it politically easier for leaders to go to war by removing the risk to their own soldiers.</p></li></ul><ul><li><p><strong>Technological Unpredictability</strong>: The behavior of complex AI systems can be unpredictable, especially in novel battlefield situations. Algorithmic bias, sensor failures, or adversarial deception could lead to catastrophic errors that were not anticipated by their creators.</p></li></ul><ul><li><p><strong>Trauma on Civilians:</strong> For civilians living in areas with a heavy presence of military drones, the psychological impact is pervasive and severe, creating a state of constant fear and anxiety as shown in Ukraine / Russian war on both sides.</p></li></ul><ul><li><p><strong>Anticipatory Anxiety:</strong> The persistent buzz of drones overhead creates a constant fear of a sudden, imminent attack, a condition described as &#8220;anticipatory anxiety&#8221;. This feeling of &#8220;nowhere being safe&#8221; is a major source of trauma.</p></li></ul><ul><li><p><strong>Behavioral Changes:</strong> The threat of &#8220;secondary strikes&#8221; targeting rescuers has led to significant changes in social behavior. Civilians are now often afraid to help victims of drone attacks or even attend funerals for fear of being targeted.</p></li></ul><ul><li><p><strong>Widespread Psychological Symptoms:</strong> Studies of populations under constant drone surveillance report high levels of stress, insomnia, nightmares, emotional breakdowns, and other symptoms of trauma. The unique sound of the drones themselves becomes a psychological trigger, causing people to run for cover and altering daily patterns of life. The level of trauma has been compared to that found in higher-intensity conflicts.</p></li></ul><p>There are of course other considerations but I won&#8217;t discuss them in this article as this article is not supporting war, just reporting on the dangers of AI &amp; Robotics in war.</p><h2><strong>Dangerous Future of Autonomous Warfare</strong></h2><p>The march of humanoids and autonomous systems onto the battlefield appears to be an irreversible trend, driven by the twin pursuits of strategic advantage and technological superiority. The capabilities being developed by companies like Boston Dynamics, Anduril, and Lockheed Martin promise to redefine the character of warfare, offering the potential for greater precision and reduced risk to friendly forces. However, this technological leap forward comes with profound and unresolved ethical, legal, and psychological costs.</p><p>Using AI and Robotics in war is like taking a butter knife and adding electricity and advanced features to turn it into a dangerous device capable of killing and injuring. Those who support war may dismiss this as colourful imagination but the reality is AI and Robotics when combined together in the current and future advancements represents something even more dangerous than nuclear weapons alone.</p><p>The core of the debate lies in a fundamental tension: the desire to make war more efficient and less costly in human lives versus the risk of creating a world where lethal force is wielded without human accountability or moral judgment. The &#8220;accountability gap&#8221; remains the most significant legal and ethical hurdle, as existing frameworks are ill-equipped to assign responsibility for the actions of an autonomous machine. Furthermore, the psychological toll of remote and automated warfare on both soldiers and civilians is already proving to be a heavy burden, creating new forms of trauma that will linger long after any physical conflict ends.</p><p>As nations and corporations race to develop these technologies, there is an urgent need for international dialogue to establish clear norms and regulations. Proposals range from developing new legal frameworks that emphasize human oversight and accountability to outright bans on certain classes of autonomous weapons. Ultimately, the future of autonomous warfare is not merely a question of what is technologically possible, but of what is ethical.</p><p>Looking ahead, the future of warfare will likely be shaped by the continued advancement of robotics and AI. While these technologies offer the promise of reducing human casualties and increasing operational efficiency, they also present new challenges to the survival of humans.</p><p>What can we expect in warfare going forward?</p><ul><li><p><strong>Increased Automation: </strong>We can expect a greater reliance on automated systems for both combat and support roles. Drones, autonomous vehicles, and robotic soldiers may become commonplace.</p></li></ul><ul><li><p><strong>AI Integration: </strong>AI will play a crucial role in strategy formulation, threat assessment, and real-time decision-making. Generative AI, in particular, could revolutionize military planning and operations.</p></li></ul><ul><li><p><strong>Regulatory Frameworks may be established: </strong>To address ethical concerns, international regulatory frameworks may be needed to govern the use of robotics and AI in warfare. These frameworks may ensure accountability, transparency, and adherence to humanitarian principles.</p></li></ul><div id="youtube2-MaiLrrn31nE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;MaiLrrn31nE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/MaiLrrn31nE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><blockquote><p>Like the <a href="https://youtu.be/MaiLrrn31nE">Terminator movies</a>, let&#8217;s hope that AI and robotics don&#8217;t create humanity more problems than they already have without these things. </p></blockquote><p>From my neutral perspective, the future of warfare can only mean more trouble for humans and more profits for companies. But is it such a good idea? I personally think war is not the answer and creating ever more deadlier weapons such as autonomous weapons is asking for a disaster. Just imagine a autonomous army that gets hacked by a malicious group and holds an city for ransom or worse.</p><p>In conclusion, while the dystopian visions of The Terminator or Robot Jox (the Giant War Robots) remain fiction, the underlying themes are becoming increasingly relevant. As we continue to develop and deploy advanced technologies, it is crucial to navigate the complex ethical, practical, and strategic challenges they present.</p><p>So if you are faced with an autonomous AI operated soldier robot - I suggest you run and hide.</p><p>And don&#8217;t forget: <strong><a href="https://www.cyberkite.com.au/post/dangers-of-autonomous-warfare#viewer-z30w81085">War: Never Again</a></strong></p><p>Be safe out there</p><p><strong>Michael Plis</strong></p><h1>Updates </h1><ul><li><p>23/03/26: US military touts use of 'ADVANCED AI' in fight against Iran: <a href="https://youtu.be/IbDB-oMYmy4?si=SNBFCadiUJt0Uk2J">https://youtu.be/IbDB-oMYmy4?si=SNBFCadiUJt0Uk2J</a> (Palantir + Claude used in Iran). All the companies such as Google and openai are also signing contracts with the Department of war in the United States. </p><p></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Background References</strong></h2><ul><li><p>Closest  to that is some Japanese companies are working on mega bots and one is being used by Japanese Rail to repair rail power transmission lines. Tsubame Industries has developed a 4.5-metre-tall (14.8-feet), four-wheeled robot that looks like &#8220;Mobile Suit Gundam&#8221; from the wildly popular Japanese animation series, and it can be yours for $3 million. and its called ARCHAX: <a href="https://www.reuters.com/technology/japan-startup-develops-gundam-like-robot-with-3-mln-price-tag-2023-10-02/">https://www.reuters.com/technology/japan-startup-develops-gundam-like-robot-with-3-mln-price-tag-2023-10-02/</a></p></li><li><p>I, Robot by Isaac Asimov <a href="https://critiquingchemist.com/2021/09/01/i-robot-by-isaac-asimov/">https://critiquingchemist.com/2021/09/01/i-robot-by-isaac-asimov/</a></p></li><li><p>Pros and Cons of Autonomous Weapons Systems (<a href="https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/May-June-2017/Pros-and-Cons-of-Autonomous-Weapons-Systems/">https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/May-June-2017/Pros-and-Cons-of-Autonomous-Weapons-Systems/</a>)</p></li><li><p>Pros and Cons of Autonomous Weapons Systems <a href="https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/May-June-2017/Pros-and-Cons-of-Autonomous-Weapons-Systems/">https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/May-June-2017/Pros-and-Cons-of-Autonomous-Weapons-Systems/</a></p></li><li><p>Atlas | Boston Dynamics <a href="https://bostondynamics.com/atlas/">https://bostondynamics.com/atlas/</a></p></li><li><p>Anduril Industries &#8211; Wikipedia <a href="https://en.wikipedia.org/wiki/Anduril_Industries">https://en.wikipedia.org/wiki/Anduril_Industries</a></p></li><li><p>Artificial Intelligence &amp; Machine Learning <a href="https://www.lockheedmartin.com/en-us/capabilities/artificial-intelligence-machine-learning.html">https://www.lockheedmartin.com/en-us/capabilities/artificial-intelligence-machine-learning.html</a></p></li><li><p>Artificial Intelligence Applications at Northrop Grumman &#8211; An Overview <a href="https://emerj.com/artificial-intelligence-applications-at-northrop-grumman-an-overview/">https://emerj.com/artificial-intelligence-applications-at-northrop-grumman-an-overview/</a></p></li><li><p>Godfather of AI: I Tried To Warn Them! But We&#8217;ve Opened Pandora&#8217;s Box! </p></li></ul><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/us/podcast/godfather-of-ai-i-tried-to-warn-them-but-weve/id1291423644?i=1000713048391&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000713048391.jpg&quot;,&quot;title&quot;:&quot;Godfather of AI: I Tried to Warn Them, But We&#8217;ve Already Lost Control! Geoffrey Hinton&quot;,&quot;podcastTitle&quot;:&quot;The Diary Of A CEO with Steven Bartlett&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:5419000,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/us/podcast/godfather-of-ai-i-tried-to-warn-them-but-weve/id1291423644?i=1000713048391&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2025-06-16T05:00:00Z&quot;}" src="https://embed.podcasts.apple.com/us/podcast/godfather-of-ai-i-tried-to-warn-them-but-weve/id1291423644?i=1000713048391" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><ul><li><p>The accountability black hole: why autonomous weapons lack ethical legitimacy <a href="https://www.tandfonline.com/doi/full/10.1080/16544951.2025.2540131">https://www.tandfonline.com/doi/full/10.1080/16544951.2025.2540131</a></p></li><li><p>Facts About Autonomous Weapons <a href="https://www.stopkillerrobots.org/stop-killer-robots/facts-about-autonomous-weapons/">https://www.stopkillerrobots.org/stop-killer-robots/facts-about-autonomous-weapons/</a></p></li><li><p>The Risks | Autonomous Weapons <a href="https://autonomousweapons.org/the-risks/">https://autonomousweapons.org/the-risks/</a></p></li><li><p>General Purpose Robots Should Not Be Weaponized <a href="https://bostondynamics.com/news/general-purpose-robots-should-not-be-weaponized/">https://bostondynamics.com/news/general-purpose-robots-should-not-be-weaponized/</a></p></li><li><p>Figure </p></li></ul><p>https://www.figure.ai/</p><ul><li><p>Figure Unveils Figure 03 Humanoid Robot Built for the Real World <a href="https://botsanddrones.uk/f/figure-unveils-figure-03-humanoid-robot-built-for-the-real-world">https://botsanddrones.uk/f/figure-unveils-figure-03-humanoid-robot-built-for-the-real-world</a></p></li><li><p>Watch Figure 03 show off its Model T robot moves <a href="https://newatlas.com/ai-humanoids/watch-figure-03-model-t-robots/">https://newatlas.com/ai-humanoids/watch-figure-03-model-t-robots/</a></p></li><li><p>Tesla target raised to $500 at RBC on Optimus opportunity <a href="https://ca.investing.com/news/stock-market-news/tesla-target-raised-to-500-at-rbc-on-optimus-opportunity-4240998">https://ca.investing.com/news/stock-market-news/tesla-target-raised-to-500-at-rbc-on-optimus-opportunity-4240998</a></p></li><li><p>America&#8217;s Robot Army Just Went Live: Lockheed Reveals Stealth Drone That Hunts Without Human Control and Changes War Forever <a href="https://www.sustainability-times.com/research/americas-robot-army-just-went-live-lockheed-reveals-stealth-drone-that-hunts-without-human-control-and-changes-war-forever/">https://www.sustainability-times.com/research/americas-robot-army-just-went-live-lockheed-reveals-stealth-drone-that-hunts-without-human-control-and-changes-war-forever/</a></p></li><li><p>Autonomy &amp; Uncrewed Systems <a href="https://www.lockheedmartin.com/en-us/capabilities/autonomous-unmanned-systems.html">https://www.lockheedmartin.com/en-us/capabilities/autonomous-unmanned-systems.html</a></p></li><li><p>Lockheed Martin Leverages AI and Machine Learning to Revolutionize Defense and Space Technology <a href="https://www.lockheedmartin.com/en-us/news/features/2024/lockheed-martin-leverages-ai-and-machine-learning-to-revolutionize-defense-and-space-technology.html">https://www.lockheedmartin.com/en-us/news/features/2024/lockheed-martin-leverages-ai-and-machine-learning-to-revolutionize-defense-and-space-technology.html</a></p></li><li><p>Northrop Grumman to expand use of NVIDIA AI technology for advanced space operations <a href="https://defence-industry.eu/northrop-grumman-to-expand-use-of-nvidia-ai-technology-for-advanced-space-operations/">https://defence-industry.eu/northrop-grumman-to-expand-use-of-nvidia-ai-technology-for-advanced-space-operations/</a></p></li><li><p>Robotic Technology Demonstrator <a href="https://www.baesystems.com/en/product/robotic-technology-demonstrator">https://www.baesystems.com/en/product/robotic-technology-demonstrator</a></p></li><li><p>BAE Systems Report Highlights AI&#8217;s Expanding Role in Defense Asset Management <a href="https://govconexec.com/2025/09/bae-systems-artificial-intelligence-andrea-thompson/">https://govconexec.com/2025/09/bae-systems-artificial-intelligence-andrea-thompson/</a></p></li><li><p>Four in five defence decision makers put AI at the forefront of their digital strategies <a href="https://www.baesystems.com/en/article/four-in-five-defence-decision-makers-put-ai-at-the-forefront-of-their-digital-strategies">https://www.baesystems.com/en/article/four-in-five-defence-decision-makers-put-ai-at-the-forefront-of-their-digital-strategies</a></p></li><li><p>Lethal Autonomous Weapon Systems (LAWS): Accountability, Collateral Damage, and the Inadequacies of International Law <a href="https://law.temple.edu/ilit/lethal-autonomous-weapon-systems-laws-accountability-collateral-damage-and-the-inadequacies-of-international-law/">https://law.temple.edu/ilit/lethal-autonomous-weapon-systems-laws-accountability-collateral-damage-and-the-inadequacies-of-international-law/</a></p></li><li><p>Mind the Gap: The Lack of Accountability for Killer Robots <a href="https://www.hrw.org/report/2015/04/09/mind-gap/lack-accountability-killer-robots">https://www.hrw.org/report/2015/04/09/mind-gap/lack-accountability-killer-robots</a></p></li><li><p>Expert Panel on Social and Humanitarian Impact of Autonomous Weapons in Latin American and Caribbean <a href="https://www.hrw.org/news/2023/03/08/expert-panel-social-and-humanitarian-impact-autonomous-weapons-latin-american-and">https://www.hrw.org/news/2023/03/08/expert-panel-social-and-humanitarian-impact-autonomous-weapons-latin-american-and</a></p></li><li><p>Reducing the Risks of Artificial Intelligence for Military Decision Advantage <a href="https://cset.georgetown.edu/publication/reducing-the-risks-of-artificial-intelligence-for-military-decision-advantage/">https://cset.georgetown.edu/publication/reducing-the-risks-of-artificial-intelligence-for-military-decision-advantage/</a></p></li><li><p>The Risks of Artificial Intelligence in Weapons Design <a href="https://hms.harvard.edu/news/risks-artificial-intelligence-weapons-design">https://hms.harvard.edu/news/risks-artificial-intelligence-weapons-design</a></p></li><li><p>The War You Never Leave: The Hidden Psychological Toll on America&#8217;s Drone Pilots <a href="https://www.military.com/feature/2025/10/13/war-you-never-leave-hidden-psychological-toll-americas-drone-pilots.html">https://www.military.com/feature/2025/10/13/war-you-never-leave-hidden-psychological-toll-americas-drone-pilots.html</a></p></li><li><p>Psychological issues in drone operators: A narrative review <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC8611566/">https://pmc.ncbi.nlm.nih.gov/articles/PMC8611566/</a></p></li><li><p>Drones causing mass trauma among civilians, major study finds <a href="https://www.thebureauinvestigates.com/stories/2012-09-25/drones-causing-mass-trauma-among-civilians-major-study-finds">https://www.thebureauinvestigates.com/stories/2012-09-25/drones-causing-mass-trauma-among-civilians-major-study-finds</a></p></li><li><p>The Psychological Impact of Drones <a href="https://g2webcontent.z2.web.core.usgovcloudapi.net/OEE/Red%20Diamond/TRADOC_11DEC2024_Drone_Psychological_Impact_Peno_Pettigrew.pdf">https://g2webcontent.z2.web.core.usgovcloudapi.net/OEE/Red%20Diamond/TRADOC_11DEC2024_Drone_Psychological_Impact_Peno_Pettigrew.pdf</a></p></li><li><p>Understanding the Global Debate on Lethal Autonomous Weapons Systems: An Indian Perspective <a href="https://carnegieendowment.org/research/2024/08/understanding-the-global-debate-on-lethal-autonomous-weapons-systems-an-indian-perspective?lang=en">https://carnegieendowment.org/research/2024/08/understanding-the-global-debate-on-lethal-autonomous-weapons-systems-an-indian-perspective?lang=en</a></p></li><li><p>Losing Humanity: The Case against Killer Robots <a href="https://www.hrw.org/report/2012/11/19/losing-humanity/case-against-killer-robots">https://www.hrw.org/report/2012/11/19/losing-humanity/case-against-killer-robots</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Windows 10 Support Ends October 2025 – Prepare Now]]></title><description><![CDATA[Windows 10 support ends in October 2025.]]></description><link>https://blog.cyberkite.com.au/p/windows-10-support-ends-october-2025-prepare-now</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/windows-10-support-ends-october-2025-prepare-now</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Thu, 07 Aug 2025 04:44:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-NmI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-NmI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-NmI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-NmI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-NmI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-NmI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-NmI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg" width="844" height="461" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:461,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Explosive scene with scattered computers and cables amidst fiery destruction. Text reads \&quot;Windows 10 SUPPORT ENDS!\&quot; Towering explosions in the background.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Explosive scene with scattered computers and cables amidst fiery destruction. Text reads &quot;Windows 10 SUPPORT ENDS!&quot; Towering explosions in the background." title="Explosive scene with scattered computers and cables amidst fiery destruction. Text reads &quot;Windows 10 SUPPORT ENDS!&quot; Towering explosions in the background." srcset="https://substackcdn.com/image/fetch/$s_!-NmI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-NmI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-NmI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-NmI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5c3dcfc-98de-44a9-875a-7a9d826e0e93_844x461.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>Windows Armageddon</strong> Will Soon Be Unleashed as Windows 10 Support Comes to a Dramatic End! What does it mean for your business? Image Credit: Google Gemini generated image</figcaption></figure></div><p><strong>Windows 10 support ends in October 2025. Learn how to check if your PC can upgrade to Windows 11 or needs replacing. Cyberkite can help across Australia.</strong></p><p><strong>Service announcement:</strong> The 14 October 2025 deadline is critical. Act now to protect your business from security threats. If you are a small business (10 staff or less) and you are based in Australia contact Cyberkite for help today!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberkite.com.au/&quot;,&quot;text&quot;:&quot;Book Win 10 Assessment Session Now1&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberkite.com.au/"><span>Book Win 10 Assessment Session Now1</span></a></p><p>Microsoft has officially announced that support for Windows 10 ends in October 2025. If you&#8217;re still using Windows 10, now is the time to prepare your computer for the transition. Whether you&#8217;re a small business owner, home office user, or just a personal computer user, planning ahead is crucial to avoid disruptions and security risks.</p><p>At Cyberkite IT Support, we&#8217;re here to help Australians and fellow business people worldwide to get ahead of the change and make smart decisions &#8211; upgrade or replace? Let&#8217;s walk you through it.</p><h2><strong>&#128269; What Does Windows 10 End of Life Mean?</strong></h2><p>Once Windows 10 support ends:</p><ul><li><p>No more <strong>security updates</strong> or patches</p></li><li><p>No technical support from Microsoft</p></li><li><p>Increased <strong>cybersecurity risks</strong></p></li><li><p>Reduced compatibility with newer apps and devices</p></li></ul><p>If you rely on your PC for work, finances, or storing important files, <strong>you shouldn&#8217;t wait until October</strong> to act.</p><p>Please let other know by sending this article to them.</p><h2><strong>&#128736;&#65039; Should You Upgrade or Replace Your PC?</strong></h2><p>Some computers can be upgraded to <strong>Windows 11</strong>, but not all. Microsoft introduced strict hardware requirements for Windows 11 &#8211; such as TPM 2.0 and newer CPUs.</p><p>Here&#8217;s what to consider:</p><ul><li><p><strong>Age of your PC</strong>: Older than 2018? Likely not upgradeable.</p></li><li><p><strong>Processor &amp; TPM support</strong>: Windows 11 requires a <strong>compatible CPU and TPM 2.0</strong>.</p></li><li><p><strong>Storage and RAM</strong>: Minimum 64GB storage and 4GB RAM &#8211; but 8GB+ is recommended for smoother performance.</p></li></ul><h2><strong>&#128197; Windows 10 &amp; Windows 11 Support Timeline</strong></h2><p>Here&#8217;s a quick timeline of the key dates you need to know:</p><h3><strong>&#128721; Windows 10</strong></h3><ul><li><p>&#128467;&#65039; <strong>Initial release:</strong> July 29, 2015</p></li><li><p>&#128230; <strong>Final version:</strong> Windows 10 22H2 (released October 2022)</p></li><li><p>&#10060; <strong>End of support for all editions:</strong> <strong>October 14, 2025 (prepare well in advance)</strong></p></li><li><p>&#128272; After this date:</p><ul><li><p><strong>No more security updates or patches</strong></p></li><li><p><strong>No technical support from Microsoft</strong></p></li></ul></li><li><p>&#128188; <strong>Extended Security Updates (ESU):</strong></p><ul><li><p>Available only for business customers</p></li><li><p>Paid support until <strong>October 2026</strong></p></li><li><p>Not recommended or practical for home users</p></li></ul></li></ul><h3><strong>&#9989; Windows 11</strong></h3><ul><li><p>&#128467;&#65039; <strong>Initial release:</strong> October 5, 2021</p></li><li><p>&#10060; <strong>End of support for all editions: TBA (estimated 2026&#8211;2027)</strong></p></li><li><p>&#128257; New major versions released annually</p></li></ul><h2><strong>&#9989; How to Check if Your PC Can Run Windows 11</strong></h2><p>Microsoft provides a free tool to help you check:</p><h3><strong>PC Health Check Tool:</strong></h3><p>Download it here: <strong><a href="https://www.microsoft.com/en-us/windows/windows-11#pchealthcheck">https://www.microsoft.com/en-us/windows/windows-11#pchealthcheck</a></strong></p><ul><li><p>If when you go into the website and it says &#8220;<strong>Your PC is already running Windows 11</strong>&#8220; then you are already on Windows 11</p></li><li><p>But, if you go into the above website and it asks you to download the <strong>PC Health Check app</strong></p></li></ul><p>This tool gives you a quick result on whether your device is compatible with Windows 11, and if not &#8211; what it&#8217;s missing.</p><p>Australian small businesses can <a href="https://www.cyberkite.com.au/contactus">contact us</a> to help them check remotely. If you are based outside Australia you can find local IT Support by going to Google search and typing: <strong>it support near me</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>&#128421;&#65039; Windows 10 Support End Upgrade Options with Cyberkite IT Support</strong></h2><p>Cyberkite like most IT support providers will be able to offer you the following options for dealing with the Windows 10 end of support:</p><ul><li><p><strong>Step 1:</strong> Check if your computer can be upgraded &#8212; contact Cyberkite IT Support for an assessment. Press the <strong>green </strong>chat to contact us for help or go to the <strong><a href="https://www.cyberkite.com.au/contactus">Contact page.</a></strong></p></li></ul><ul><li><p><strong>Step 2</strong>: Decide your best option:</p><ul><li><p>(<strong>Option A</strong>) <strong>Upgrade </strong>from Windows 10 to Windows 11 if computer is compatible. <strong><a href="https://www.cyberkite.com.au/support">Contact Cyberkite for upgrade remote support in Australia.</a></strong></p></li></ul><ul><li><p>(<strong>Option B</strong>) <strong>Replace </strong>the computer if it can&#8217;t be upgraded to Windows 11. Contact Cyberkite for pre-purchase support to save money and get the best computer for your needs. People often buy computers in shops on special - but Cyberkite can help guide you what&#8217;s best to get the best gear, not heavily discounted old stock. <strong><a href="https://www.cyberkite.com.au/support">Contact Cyberkite today if you are a small business based in Australia.</a></strong></p></li></ul><ul><li><p>(<strong>Option C</strong>) NOT RECOMMENDED: For domestic &amp; business customers, apply through Cyberkite for Windows 10 Extended Security Updates (ESU) to keep critical security patches up to October 13, 2026. After that you have to replace your device. Usual cost is approx $30 USD. Learn more on <strong><a href="https://support.microsoft.com/en-au/windows/windows-10-consumer-extended-security-updates-esu-program-33e17de9-36b3-43bb-874d-6c53d2e4bf42">Microsoft ESU page.</a></strong> Contact Cyberkite to discuss and help you with this option this option if it&#8217;s needed for special software. <a href="https://www.cyberkite.com.au/support">Australian customers can contact us today.</a></p><ul><li><p>Note: ESU enrollment does not provide other types of fixes, feature improvements, or product enhancements. It also does not come with technical support. It just provides basic security updates.</p></li></ul></li></ul></li></ul><p><strong>Additional Options:</strong></p><ul><li><p><strong>Explore cloud solutions</strong> like <a href="https://www.microsoft.com/en-gb/windows-365">Windows 365</a> or <a href="https://azure.microsoft.com/en-us/products/virtual-desktop">Azure Virtual Desktop</a> for ongoing support without new hardware. <strong><a href="https://www.cyberkite.com.au/support">Contact Cyberkite to discuss these options.</a></strong></p></li></ul><ul><li><p><strong>Cyberkite can convert the Windows 10 computers that can&#8217;t be upgraded to ChromeOS </strong>to turn them into Chromebooks so you can continue to use them for business but for web only applications as Chrome OS can&#8217;t install Windows apps - but most things are on the web so this a great cost saving option and good recycling option. Refer to the Computer Resurrection service outlined on our <strong><a href="https://www.cyberkite.com.au/support">IT Support page.</a></strong></p></li></ul><ul><li><p>Another option is to purchase a new different type of computer - either a Apple computer or Chromebook (ChromeOS). <strong><a href="https://www.cyberkite.com.au/support">Contact Cyberkite for pre-purchase support.</a></strong></p></li></ul><h2><strong>&#128161; Not Sure What to Do? Book Cyberkite IT Support</strong></h2><p>If you&#8217;re unsure how to check your PC or need help deciding between <strong>upgrading or replacing</strong>, <strong>Cyberkite IT Support is here to help</strong>.</p><p>Cost: It will most likely be a short support session remotely based on our low service rate starting from AUD $57 for 30 min remotely. Refer to to our <strong><a href="https://www.cyberkite.com.au/support">IT Support page for full service rates here.</a></strong></p><p>We offer:</p><ul><li><p>Remote (Australia-wide) or on-site support (Greater Melbourne)</p></li><li><p>Compatibility checks for your current device</p></li><li><p>Recommendations for suitable upgrade or replacement options</p></li><li><p>Alternative options if you can&#8217;t upgrade</p></li><li><p>Setup and data transfer assistance if needed</p></li></ul><p>We work with <strong>individuals and micro-businesses (up to 10 staff)</strong> across Australia.</p><h2><strong>&#128222; Contact Us Today</strong></h2><p>&#128205; <strong>Australia-wide Remote Support</strong></p><p>&#128205; <strong>On-site in Mt Waverley &amp; Greater Melbourne</strong></p><p>&#128187; Visit our full IT Support page: <a href="https://www.cyberkite.com.au/support">cyberkite.com.au/support</a></p><p>&#128233; Contact us: <a href="https://www.cyberkite.com.au/contactus">Contact Page</a> or hit the green chat button</p><h2><strong>&#127757; Outside Australia?</strong></h2><p>If you&#8217;re not based in Australia, check your PC using Microsoft&#8217;s tool above or visit the official Microsoft upgrade support page here:</p><p><strong><a href="https://support.microsoft.com/windows">https://support.microsoft.com/windows</a></strong></p><p>During this global transition from Windows 10 to Windows 11 I hope the process is smooth for you and I hope that if your small business is based in Australia that you will book Cyberkite to help you through this transition.</p><p>Happy computing,</p><p>Michael Plis</p><p>Melbourne, Australia</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Rise of AI Agents: What Businesses Need to Know]]></title><description><![CDATA[OpenAI&#8217;s ChatGPT AI Agent feature was introduced at a July 2025 launch event.]]></description><link>https://blog.cyberkite.com.au/p/rise-of-ai-agents-what-businesses-need-to-know</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/rise-of-ai-agents-what-businesses-need-to-know</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Tue, 22 Jul 2025 07:48:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yUML!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yUML!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yUML!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!yUML!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!yUML!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!yUML!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yUML!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg" width="844" height="461" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:461,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Futuristic robot with glowing blue eyes in a tech setting, digital interfaces display graphs and maps. Background is colorful and blurred.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Futuristic robot with glowing blue eyes in a tech setting, digital interfaces display graphs and maps. Background is colorful and blurred." title="Futuristic robot with glowing blue eyes in a tech setting, digital interfaces display graphs and maps. Background is colorful and blurred." srcset="https://substackcdn.com/image/fetch/$s_!yUML!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!yUML!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!yUML!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!yUML!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9203fa8c-99be-4824-ad93-2b145b7ff8a5_844x461.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>OpenAI&#8217;s ChatGPT AI Agent feature was introduced at a July 2025 launch event. AI agents are a new breed of AI-powered software that can take actions on your behalf, not just answer questions and it&#8217;s being rolled out across the top major vendors such as OpenAI.  This article will help businesses and particularly small businesses to understand the AI Agents more as they start to become available for use and to workout if they are needed and their risks.</em></p><h2><strong>What are AI Agents?</strong></h2><p>OpenAI&#8217;s latest &#8220;ChatGPT Agent&#8221; upgrade (powered by GPT-4o) can carry out tasks end-to-end using its own virtual computer. For example, you can ask ChatGPT to &#8220;plan and buy ingredients for breakfast&#8221; or &#8220;review my calendar and brief me on upcoming meetings&#8221; &#8211; and it will navigate websites, log in (with permission), run code, and even produce editable slides or spreadsheets summarizing results.</p><p>Other AI agent platforms and frameworks have also emerged: open-source projects like <strong><a href="https://agpt.co/">Auto-GPT</a></strong>, <strong><a href="https://agentgpt.reworkd.ai/">AgentGPT</a></strong> and <strong><a href="https://github.com/yoheinakajima/babyagi">BabyAGI</a></strong> let anyone build autonomous agents, and major companies (e.g. <a href="https://blog.google/technology/google-deepmind/google-gemini-ai-update-december-2024/">Google&#8217;s upcoming </a><strong><a href="https://blog.google/technology/google-deepmind/google-gemini-ai-update-december-2024/">Gemini </a></strong><a href="https://blog.google/technology/google-deepmind/google-gemini-ai-update-december-2024/">agentic model</a> - at least they are indicating this is in the works &amp; they will want to compete with Grok and ChatGPT) are jumping on board. In short, think of AI agents as <strong>digital coworkers</strong> that browse the web, schedule tasks, buy tickets, file reports, manipulate files or code, and learn from your preferences over time &#8211; far beyond what a static chatbot could do.</p><blockquote><p>&#8220;AI agent is &#8220;designed to autonomously collect data from its environment, process information and take actions&#8221;</p></blockquote><p>Behind the scenes, AI agents combine a large language model (LLM) with a suite of tools and APIs. As <a href="https://unit42.paloaltonetworks.com/agentic-ai-threats/">Palo Alto&#8217;s Unit42</a> explains, an AI agent is &#8220;<strong>designed to autonomously collect data from its environment, process information and take actions</strong>&#8221; toward your objectives. It uses the LLM to plan and reason, then calls <strong>external tools</strong> (like a web browser, code interpreter, or file manager) as needed.</p><ul><li><p><strong>Figure 1 below illustrates a typical AI agent architecture</strong>: the LLM powers planning, an execution loop calls various tools or functions, and the agent can even store short- or long-term memory to track context.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!y1YV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y1YV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png 424w, https://substackcdn.com/image/fetch/$s_!y1YV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png 848w, https://substackcdn.com/image/fetch/$s_!y1YV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png 1272w, https://substackcdn.com/image/fetch/$s_!y1YV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y1YV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png" width="844" height="416" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:416,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Flowchart of a system linking an AI model, application, and services. Highlights include planning, action, memory, and function calling.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Flowchart of a system linking an AI model, application, and services. Highlights include planning, action, memory, and function calling." title="Flowchart of a system linking an AI model, application, and services. Highlights include planning, action, memory, and function calling." srcset="https://substackcdn.com/image/fetch/$s_!y1YV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png 424w, https://substackcdn.com/image/fetch/$s_!y1YV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png 848w, https://substackcdn.com/image/fetch/$s_!y1YV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png 1272w, https://substackcdn.com/image/fetch/$s_!y1YV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a474db-57ef-45b6-b51a-e4c7f8aca200_844x416.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 1: Typical AI agent architecture (source: <a href="https://unit42.paloaltonetworks.com/agentic-ai-threats/">Palo Alto Unit42</a>). The LLM &#8220;brain&#8221; plans and uses tools (APIs, browser, etc.) to execute tasks. So it&#8217;s not just the LLM at work, other areas are involved - is all that secure?</figcaption></figure></div><p>Now let&#8217;s discover what they can do.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Key AI-Agent Capabilities</strong></h2><p>The new AI agents can do among other things the following type of actions:</p><ul><li><p><strong>Browse and interact with websites:</strong> Agents can navigate the web like a user, clicking links, filling forms, and scraping data. This enables them to find information, compare products, or perform online bookings.</p></li></ul><ul><li><p><strong>Manage scheduling and purchases:</strong> Agents can access your calendar and make appointments or reservations. They can even add items to a shopping cart or order groceries (with your approval).</p></li></ul><ul><li><p><strong>Automate complex workflows:</strong> Agents link to tools like code interpreters and spreadsheets. For example, they can analyze competitor data, run code to process it, and output charts or slide decks summarizing the results.</p></li></ul><ul><li><p><strong>Create and handle files:</strong> They can generate documents, edit spreadsheets, or compile reports on the fly. You might tell an agent to &#8220;generate a slideshow on market trends&#8221; and it will do so using built-in presentation tools.</p></li></ul><ul><li><p><strong>Learn and personalize:</strong> Over time, agents can remember your preferences (e.g. preferred travel options or file formats) via connected &#8220;memory&#8221; features or accounts, making them more efficient at repeat tasks.</p></li></ul><ul><li><p><strong>Other future capabilities</strong>: AI Agents will definitely going to have more skills s they are upgraded and compete against each other.</p></li></ul><p>These abilities hold great promise. And for the agent, skills will keep getting added particularly &#8220;in in front of the computer&#8221; type tasks, which eventually all will be doable with AI agents with minimal human supervision or human supervision. Which is what Sam Altman recently mentioned.</p><blockquote><p>AI Agents may be open a whole new attack surface</p></blockquote><p> But as soon as agents gained autonomy, security experts have been sounding the alarm: <strong>AI Agents may be open a whole new attack surface</strong>. So now let&#8217;s analyse the cybersecurity risks that may potentially happen to AI Agents below.</p><h2><strong>Cybersecurity Risks of Autonomous AI Agents</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l0pC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l0pC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!l0pC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!l0pC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!l0pC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l0pC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg" width="844" height="461" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:461,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Futuristic digital circuit board with nodes and red flags. Blue glowing lines connect blocks, warning triangle and virus icon present.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Futuristic digital circuit board with nodes and red flags. Blue glowing lines connect blocks, warning triangle and virus icon present." title="Futuristic digital circuit board with nodes and red flags. Blue glowing lines connect blocks, warning triangle and virus icon present." srcset="https://substackcdn.com/image/fetch/$s_!l0pC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!l0pC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!l0pC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!l0pC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0be0a95-1258-4803-9e19-1889901ebec9_844x461.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">It might be an exciting technology but it presents many threats sometimes out of the users or businesses control. Image Source: Google Gemini AI generated image</figcaption></figure></div><p>AI agents inherit all the risks of LLMs (like data leakage or prompt injection) and add many more. Trend Micro and I caution that linking an AI agent to external systems raises fundamental security questions:</p><ul><li><p><strong>Could an LLM executing code be hijacked to run harmful commands?</strong></p></li><li><p><strong>Could hidden instructions in a document trick the agent into leaking your passwords or client data?</strong></p></li><li><p><strong>Could an AI Agent give information or money away to malicious websites or services it accesses?</strong></p></li><li><p><strong>Can you think of any others?</strong></p></li></ul><p><a href="https://unit42.paloaltonetworks.com/agentic-ai-threats/">Palo Alto&#8217;s Unit42</a> likewise warns that agents combine language-model threats with traditional software vulnerabilities. Because agents call external tools, they can be exposed to SQL injection, remote code execution (RCE), broken access controls, and other classic flaws in the connected systems.</p><p>In practice, experts see several concrete threats:</p><ul><li><p><strong>Prompt Injection (Malicious Web Content):</strong> Perhaps the biggest worry is prompt injection. Malicious websites could hide deceptive instructions (e.g. in invisible page elements or corrupted metadata) that an agent might follow. For instance, a fake site might show a phishing form asking the agent, &#8220;Enter your credit card to proceed with this task,&#8221; hoping the helpful agent will comply. OpenAI&#8217;s own launch team called out this scenario: agents &#8220;stumble upon a malicious website that asks it to enter your credit card information&#8230; and the agent, which is trained to be helpful, might decide that&#8217;s a good idea&#8221;. The agent could unknowingly expose sensitive data or perform unintended actions. Analysts have already demonstrated prompt-injection hacks on open-source agents like Auto-GPT, forcing them to ignore their original goal and execute attacker-supplied commands.</p></li></ul><ul><li><p><strong>Tool Misuse and Goal Manipulation:</strong> Attackers may trick an agent into abusing its connected tools. For example, a cleverly crafted prompt could coax an agent to run harmful code, send spam emails, or modify critical data. <a href="https://unit42.paloaltonetworks.com/agentic-ai-threats/">Unit42&#8217;s</a> research highlights &#8220;tool misuse&#8221; as a risk: an adversary might manipulate the agent to trigger unintended API calls or to break policies inside the tools it uses. Agents that plan multi-step tasks can also be hijacked at the planning level &#8211; subtle changes to an agent&#8217;s perceived goals could redirect its actions. In other words, the agent&#8217;s <strong>plan itself can be tampered with</strong>, leading to entirely malicious workflows.</p></li></ul><ul><li><p><strong>Credential Theft and Impersonation:</strong> AI agents often require login tokens or API keys to do their job (e.g. access your email or calendar). If these credentials leak (say, via prompt injection or misconfiguration), attackers could impersonate the agent or your user identity on other systems. <a href="https://unit42.paloaltonetworks.com/agentic-ai-threats/">Unit42</a> warns of this: &#8220;theft of agent credentials&#8230; can allow attackers to access tools, data or systems under a false identity.&#8221;. A compromised agent identity might then execute privileged actions on behalf of the user or organization. Likewise, attackers could spoof an agent&#8217;s identity to trick other systems or trick human users.</p></li></ul><ul><li><p><strong>Unauthorized Code Execution and Data Exfiltration:</strong> Since agents can execute code (through built-in interpreters or APIs), an attacker who sneaks code into an agent&#8217;s context could gain full RCE in the agent&#8217;s environment. This could expose the host network, internal files, or sensitive information. <a href="https://unit42.paloaltonetworks.com/agentic-ai-threats/">Unit42</a> emphasizes the RCE danger: &#8220;Attackers exploit the agent&#8217;s ability to execute code&#8230; by injecting malicious code, they can gain unauthorized access to the internal network and host file system.&#8221;. In a breached scenario, the agent becomes a pivot point into your IT environment. Similarly, agents can inadvertently exfiltrate data: a hidden prompt might force the agent to email your customer database to an attacker, or to paste your payment info into a shady form.</p></li></ul><ul><li><p><strong>Expanded Attack Surface (Phishing, Spam, etc.):</strong> AI agents effectively act as new endpoints on your network. They generate unusual traffic patterns (automated browsing, high-frequency form submissions, etc.) that could be exploited by attackers. Phishing could evolve into &#8220;agent-phishing,&#8221; where malicious sites target the agents themselves. Other risks include poisoned training data (if the agent uses web content to learn or fine-tune) or corrupted plugin scripts. In short, anything vulnerable on a regular computer or browser is now also a vulnerability for the agent&#8217;s &#8220;virtual machine.&#8221;</p></li></ul><p>Security researchers stress that these threats are <strong>real and growing</strong>. As one analyst put it, &#8220;any company that uses an autonomous agent like Auto-GPT to accomplish a task has now unwittingly introduced a vulnerability to prompt injection attacks.&#8221;.</p><p><a href="https://www.trendmicro.com/vinfo/au/security/news/threat-landscape/unveiling-ai-agent-vulnerabilities-part-i-introduction-to-ai-agent-vulnerabilities">Trend Micro observes</a> that AI agent vulnerabilities can directly lead to &#8220;theft of sensitive company or user data, unauthorized execution of malicious code, manipulation of AI-generated responses [and] indirect prompt injections leading to persistent exploits&#8221;.</p><p><a href="https://openai.com/index/introducing-chatgpt-agent/">OpenAI itself acknowledges the risk</a>: their announcement notes that having ChatGPT act on the live web &#8220;introduces new risks&#8221; and that &#8220;successful attacks can have greater impact and pose higher risks&#8221;.</p><p>In sum, AI agents may be powerful helpers, but <strong>&#8220;AI agent fraud is real&#8221;</strong> as <a href="https://stytch.com/blog/ai-agent-fraud/">Stytch warns</a> &#8211; attackers will exploit injected prompts, deepfakes and impersonation to trick or hijack these agents.</p><p>Now that we know some of the cybersecurity risks associated with AI agents let&#8217;s look at some possible <strong>cybersecurity best practices as well as defenses</strong> that businesses and the AI Agent developers themselves can implement - because, yes, the onus is primarily on AI Agent developers to ensure their agents are secure and your data that you trust the AI Agents with is handled right.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Securing AI Agents: Best Practices and Defenses</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Afk4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Afk4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Afk4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Afk4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Afk4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Afk4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg" width="844" height="461" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:461,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Digital globe of interconnected nodes floats above a circuit-like surface. Warm orange and cool blue tones create a tech-inspired ambiance.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Digital globe of interconnected nodes floats above a circuit-like surface. Warm orange and cool blue tones create a tech-inspired ambiance." title="Digital globe of interconnected nodes floats above a circuit-like surface. Warm orange and cool blue tones create a tech-inspired ambiance." srcset="https://substackcdn.com/image/fetch/$s_!Afk4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Afk4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Afk4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Afk4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38732ded-03a4-4736-bf69-2c7bfee2d32f_844x461.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Developers, businesses and users play a part in providing a secure experience for the end user and the AI Agent. Image Source: Google Gemini AI generated image</figcaption></figure></div><p>Given the stakes, cybersecurity professionals and developers are already outlining security-first strategies for AI agents. The consensus is that <strong>defense-in-depth</strong> is essential &#8211; no single fix will suffice. Here are key ideas from experts and vendors for making AI agents safer:</p><ul><li><p><strong>Strong Authentication &amp; Scoped Permissions:</strong> Never trust an agent by default.</p><ul><li><p>Each agent should have only the minimum privileges needed (the principle of least privilege). For example, if an agent only needs to read your calendar, it should never have permission to send emails or access banking.</p></li><li><p>Experts recommend using modern delegation protocols (like OAuth2) to issue each agent a scoped token tied to your user account. This way, agents never store your raw passwords or API keys &#8211; they act through limited tokens. You can further impose time limits or step-up (MFA) for sensitive actions.</p></li><li><p><a href="https://stytch.com/blog/ai-agent-fraud/">Stytch&#8217;s</a> guidance specifically advises assigning &#8220;<strong>each agent a scoped token tied to a user-approved session</strong>&#8221;, so you can revoke or expire it at any time. In practice, treat the agent like a service account: explicitly authorize it for each system it should access.</p></li></ul></li></ul><ul><li><p><strong>Least-Privilege &amp; Restrictive Scopes:</strong>  Go further by heavily restricting what agents can do. Design agent tokens so that dangerous actions (bank transfers, personal data access) are not allowed unless absolutely necessary.</p><ul><li><p>For instance, an agent with <strong>calendar:read</strong> permission should not simultaneously have <strong>email:send</strong> or <strong>bank:transfer</strong> scope.</p></li><li><p>Some suggest even limiting when and how agents can act &#8211; e.g. blocking transactions late at night or flagging large purchases for extra review.</p></li><li><p>These granular permission controls ensure that even if an agent is tricked, its ability to harm you is very limited.</p></li><li><p><strong>In my opinion, another idea is to have a defined list of websites and services that agents can use </strong>- essentially creating a secure and trusted web experience for the agent to vet and re-vet websites and services the agent uses because sites can become insecure eg: hacked without even the owner of the site knowing.</p></li></ul></li></ul><ul><li><p><strong>Prompt Hardening and Input Validation:</strong>  Control exactly what instructions reach the agent. Wherever possible, separate the agent&#8217;s core system prompt (how it&#8217;s instructed to behave) from any untrusted data (like web content or user input).</p><ul><li><p>Apply filtering on all inputs: block known malicious patterns (like &#8220;ignore previous instructions&#8221; or embedded code).</p></li><li><p>For agents reading external content (emails, web pages, documents), consider preprocessing that content in a sandbox first to strip out embedded scripts or HTML injections.</p></li><li><p><a href="https://openai.com/index/introducing-chatgpt-agent/">OpenAI</a> also builds refusal training into ChatGPT Agent &#8211; it has been trained to reject or flag obviously malicious or ambiguous prompts. Developers should similarly use content moderation or safety classifiers to screen any untrusted instructions before the agent sees them.</p></li></ul></li></ul><ul><li><p><strong>Secure Sandboxing:</strong>  Run agents in heavily confined environments. <a href="https://unit42.paloaltonetworks.com/agentic-ai-threats/">Unit42</a> emphasizes that agent&#8217;s code interpreters and browsers must be sandboxed: &#8220;enforce strong sandboxing with network restrictions, syscall filtering and least-privilege container configurations&#8221;.</p><ul><li><p>In practice, this means agents operate in an isolated VM or container with strict firewall rules. Even within that, limit outbound connections (only allow to whitelisted domains) and restrict file system access. The idea is to make an agent&#8217;s &#8220;computer&#8221; so locked-down that even if it executes malicious code, the damage is contained.</p></li><li><p>An idea I would like to propose is even <strong>considering whitelisting only a narrow set of trusted websites or APIs that their agents can use, and regularly re-verifying those sources for safety.</strong></p></li></ul></li></ul><blockquote><p>considering whitelisting only a narrow set of trusted websites or APIs that their agents can use, and regularly re-verifying those sources for safety.</p></blockquote><ul><li><p><strong>Monitoring and Anomaly Detection:</strong>  Treat agents as first-class citizens in your logging and monitoring systems. Log every action an agent takes (web requests, file operations, API calls) and analyze for anomalies. I would say also provide action history for the end user to view for transparency and safety. Use heuristics or AI to spot when an agent&#8217;s behavior deviates from normal patterns (for example, a surge of activity or requests to weird endpoints).</p><ul><li><p><a href="https://stytch.com/blog/ai-agent-fraud/">Stytch</a> suggests fingerprinting and device-analysis: many AI agents&#8217; traffic can be distinguished from human users. A clever defense might throttle or flag excessive automation.</p></li><li><p><a href="https://unit42.paloaltonetworks.com/agentic-ai-threats/">Palo Alto</a> is even developing an &#8220;<strong>AI Runtime Security</strong>&#8221; solution (Prisma AIRS) to watch network traffic from AI applications and detect threats like prompt injection or data exfiltration in real time. In other words, deploy new &#8220;AI security&#8221; tools to peer over your agent&#8217;s shoulder.</p></li></ul></li></ul><ul><li><p><strong>Human-in-the-Loop for Critical Actions:</strong>  Even as agents automate, keep humans in the loop for sensitive tasks. Require explicit user approval (ideally multi-factor) before the agent does anything high-impact (financial transactions, changing security settings, deleting data). For instance, you might configure your agent to always pause and prompt you whenever it&#8217;s about to spend money or transfer files.</p><ul><li><p>Both <a href="https://openai.com/index/introducing-chatgpt-agent/">OpenAI</a> and <a href="https://stytch.com/blog/ai-agent-fraud/">Stytch</a> emphasize this: ChatGPT Agent is trained to &#8220;explicitly ask for your permission before taking actions with real-world consequences&#8221;, and experts advise gating high-risk operations behind an MFA or confirmation step. A simple approach is OpenAI&#8217;s &#8220;takeover mode,&#8221; where the user directly types sensitive info or credentials rather than letting the agent handle them. This way the agent never even sees your password or credit card number, dramatically reducing leakage risk.</p></li></ul></li></ul><ul><li><p><strong>Continuous Security Testing and Hardening:</strong>  As with any software, AI agents need ongoing audits. Conduct regular <strong>red-team exercises</strong> against your agents: simulate prompt-injection attacks and try to trick the agent into misbehaving.</p><ul><li><p>Integrate open-source testing tools that probe for common AI attacks (e.g. malicious prompts, malformed documents) before deploying agents. Adopt a bug bounty or formal review program for agent workflows.</p></li><li><p><a href="https://stytch.com/blog/ai-agent-fraud/">Stytch</a> recommends treating AI agents as you would critical infrastructure: &#8220;Subject them to regular and rigorous security testing; stay current on emerging threats&#8230; update your defenses accordingly.&#8221;. Maintain detailed logs for forensic analysis if something goes wrong.</p></li></ul></li></ul><p>In practice, many of these defenses echo traditional security wisdom adapted for AI. For example, least-privilege and careful authentication have always been best practice &#8211; now we just <strong>apply them to agents</strong>. As <a href="https://stytch.com/blog/ai-agent-fraud/">Stytch article</a> concludes, &#8220;The good news is that many best practices (like least privilege, strong authentication, and vigilant monitoring) apply for both human users and AI agents &#8211; they only need to be extended to this new context&#8221;.</p><p>So let&#8217;s now learn about where AI agents are in the grand scheme of <strong>AI agent development hype cycle</strong> and what the future holds for them.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>AI Agents in the Hype Cycle</strong></h2><p>In <a href="https://www.gartner.com/en/documents/6579402">Gartner&#8217;s 2025 Hype Cycle for AI</a>, AI Agents have surged to the &#8220;Peak of Inflated Expectations.&#8221; This means they&#8217;re riding high on media buzz and early adoption, especially with major releases like ChatGPT Agents and Google&#8217;s Gemini agentic projects. While their promise is impressive, automating complex tasks, learning user habits, and acting as digital coworkers seems a bit far fetched as the technology is still in its early phase, with many risks not yet fully addressed which we will discuss further in this blog.</p><p>Gartner predicts that AI Agents will likely dip into the &#8220;Trough of Disillusionment&#8221; next, where limitations and security gaps become more apparent. But this is a normal part of the innovation cycle. Technologies that survive this phase usually emerge stronger and more useful.</p><p>In time, AI Agents could become highly capable assistants that help with workflows, scheduling, data analysis, and even decision-making, especially in small business environments. And once the AI Agents get to &#8220;Plateu of Productivity&#8221; on the cycle they will kee getting better and better. They will most likely combine</p><ul><li><p><strong>Figure 2 &#8220;Gartners Hype Cycle for AI&#8221;</strong> below shows how technology hype cycles change over time. Gartner predicted something different just a few years ago. In my opinion the hype cycle cannot be applied the whole concept of AI as new and improved AI can be released and scaled almost like the Moore&#8217;s law (Definition: Moore&#8217;s Law suggests that microchip transistor counts double roughly every two years, resulting in greater computing power and lower costs. While not a scientific law, it has been a key benchmark driving progress in the semiconductor industry.). So I think there should be some sort of mapping done on how AI is advancing - perhaps a formula much like Moore&#8217;s law?</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dpP_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dpP_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png 424w, https://substackcdn.com/image/fetch/$s_!dpP_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png 848w, https://substackcdn.com/image/fetch/$s_!dpP_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png 1272w, https://substackcdn.com/image/fetch/$s_!dpP_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dpP_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png" width="844" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:556,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Graph showing AI trends 2025 with phases: Innovation, Peak, Trough, Slope, Plateau. Includes items like AI Agents, Generative AI, with timelines.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Graph showing AI trends 2025 with phases: Innovation, Peak, Trough, Slope, Plateau. Includes items like AI Agents, Generative AI, with timelines." title="Graph showing AI trends 2025 with phases: Innovation, Peak, Trough, Slope, Plateau. Includes items like AI Agents, Generative AI, with timelines." srcset="https://substackcdn.com/image/fetch/$s_!dpP_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png 424w, https://substackcdn.com/image/fetch/$s_!dpP_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png 848w, https://substackcdn.com/image/fetch/$s_!dpP_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png 1272w, https://substackcdn.com/image/fetch/$s_!dpP_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ccef928-f88e-4ed7-93ff-0b415f2c7a76_844x556.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 2: According to Gartner Hype cycle for AI Updated in 2025 AI agents are at the top peak of inflated expectations of the hype cycle and will plateau within 2 to 5 years based on current estimates. Image source: Gartner</figcaption></figure></div><p>Looking ahead, the future of AI Agents will depend on security, transparency, and careful integration and even more important reliability. There is still the problems inherent in AI in terms of accuracy of output.</p><p>As businesses move beyond the hype, they&#8217;ll need to prioritize trust, safety, and practical use cases. Those who approach adoption cautiously but strategically will be in a strong position to benefit when AI Agents reach the &#8220;Plateau of Productivity.&#8221;</p><p>Finally, below I discuss the possibilities of <strong>AI Agents in the future while at the same time balancing innovation and security.</strong></p><h2><strong>Balancing Innovation and Security as AI Agents contribute to the future</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HLJN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HLJN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HLJN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HLJN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HLJN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HLJN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg" width="844" height="461" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:461,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Futuristic robot balances scales; left with AI gears, right with a shield. Digital background suggests innovation and security.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Futuristic robot balances scales; left with AI gears, right with a shield. Digital background suggests innovation and security." title="Futuristic robot balances scales; left with AI gears, right with a shield. Digital background suggests innovation and security." srcset="https://substackcdn.com/image/fetch/$s_!HLJN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HLJN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HLJN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HLJN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d0a3805-c799-4435-acba-55b58b92f57d_844x461.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Technology has always worked well when we balance innovation and security. What&#8217;s too risky and what&#8217;s innovative to implement for AI Agents? Image Source: Google Gemini AI generated image</figcaption></figure></div><p><strong>AI agents are exciting </strong>&#8211; they can automate tedious tasks and boost productivity for small businesses and IT teams. But we must be realistic about the risks. OpenAI itself stresses a &#8220;caution over capability&#8221; mindset: ChatGPT Agent includes &#8220;always-on monitoring, refusal training, [and] red teaming&#8221; to minimize new risks, and users always have the power to &#8220;take over&#8221; the browser at any time. Still, as one <a href="https://www.techradar.com/computing/artificial-intelligence/chatgpt-agent-shows-that-theres-a-whole-new-world-of-ai-security-threats-on-the-way-we-need-to-worry-about">TechRadar commentator</a> put it, &#8220;trust is everything&#8221; &#8211; handing over an AI agent to autonomously spend your money or access accounts can feel <strong>unnerving</strong>.</p><blockquote><p>In the coming months, organizations will need to decide what tasks they&#8217;re comfortable delegating to agents, and build appropriate guardrails</p></blockquote><p><strong>In the coming months, organizations will need to decide what tasks they&#8217;re comfortable delegating to agents, and build appropriate guardrails</strong> (that includes the AI developers). Will you trust your digital assistant enough to use it for online purchases or entering payment details? Or will you limit it to less-sensitive chores, like gathering publicly available data? Regardless, experts agree: <strong>design for security from day one</strong>.</p><p>As <a href="https://stytch.com/blog/ai-agent-fraud/">Stytch</a> warns, agents expand your attack surface into new territory, and attackers are already adapting AI to their advantage. By thinking defensively by vetting sources, scoping permissions, enforcing human checkpoints, and monitoring behavior, we can harness AI agents&#8217; benefits while minimizing harm.</p><p>In short, AI agents are a powerful new tool, but they must be treated with the same rigor as any other system. With layered defenses and vigilant oversight, businesses can make agents a net positive. Otherwise, an autonomous AI on your team could just as easily become an avenue for attackers.</p><p>Happy gliding online,</p><p><strong>Michael Plis</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>References</strong></h2><p><strong>Sources:</strong> Industry experts from OpenAI, Palo Alto Unit42, TechRadar, VentureBeat, Trend Micro and Stytch inform this analysis. These sources detail AI agent capabilities, risks (prompt injection, credential theft, code exploits) and recommended security practices (scoped tokens, sandboxing, monitoring, human-in-loop, etc.). Each recommendation above is grounded in cited research or vendor guidance.</p><ul><li><p>OpenAI &#8211; ChatGPT Agents Announcement <a href="https://openai.com/index/introducing-chatgpt-agent/">https://openai.com/index/introducing-chatgpt-agent/</a></p></li><li><p>CYBERSEC AI AGENTS CONCERNS COMMENTS: OpenAI Dev Day Live Keynote &#8220;Introduction to ChatGPT agent&#8221; (Sam Altman&#8217;s remarks near the end): 24:41 time index: </p></li></ul><div id="youtube2-1jn_RpbPbEc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1jn_RpbPbEc&quot;,&quot;startTime&quot;:&quot;1481&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1jn_RpbPbEc?start=1481&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p>FULL KEYNOTE: OpenAI Dev Day Live Keynote &#8220;Introduction to ChatGPT agent&#8221; </p></li></ul><div id="youtube2-1jn_RpbPbEc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1jn_RpbPbEc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1jn_RpbPbEc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p>Gartner - Hype Cycle for Artificial Intelligence, 2025 (Paywalled) <a href="https://www.gartner.com/en/documents/6579402">https://www.gartner.com/en/documents/6579402</a></p></li><li><p>Palo Alto Networks Unit42 &#8211; Security Risks of LLM-Powered Agents <a href="https://unit42.paloaltonetworks.com/security-risks-of-llm-agents/">https://unit42.paloaltonetworks.com/security-risks-of-llm-agents/</a></p></li><li><p>Trend Micro - Unveiling AI Agent Vulnerabilities Part I: Introduction to AI Agent Vulnerabilities <a href="https://www.trendmicro.com/vinfo/au/security/news/threat-landscape/unveiling-ai-agent-vulnerabilities-part-i-introduction-to-ai-agent-vulnerabilities">https://www.trendmicro.com/vinfo/au/security/news/threat-landscape/unveiling-ai-agent-vulnerabilities-part-i-introduction-to-ai-agent-vulnerabilities</a></p></li><li><p>Trend Micro - Unveiling AI Agent Vulnerabilities Part II: Code Execution <a href="https://www.trendmicro.com/vinfo/au/security/news/cybercrime-and-digital-threats/unveiling-ai-agent-vulnerabilities-code-execution">https://www.trendmicro.com/vinfo/au/security/news/cybercrime-and-digital-threats/unveiling-ai-agent-vulnerabilities-code-execution</a></p></li><li><p>Trend Micro - Unveiling AI Agent Vulnerabilities Part III: Data Exfiltration <a href="https://www.trendmicro.com/vinfo/au/security/news/threat-landscape/unveiling-ai-agent-vulnerabilities-part-iii-data-exfiltration">https://www.trendmicro.com/vinfo/au/security/news/threat-landscape/unveiling-ai-agent-vulnerabilities-part-iii-data-exfiltration</a></p></li><li><p>Stytch &#8211; AI agent security explained <a href="https://stytch.com/blog/ai-agent-security-explained/">https://stytch.com/blog/ai-agent-security-explained/</a></p></li><li><p>Stytch - AI agent fraud: key attack vectors and how to defend against them <a href="https://stytch.com/blog/ai-agent-fraud/">https://stytch.com/blog/ai-agent-fraud/</a></p></li><li><p>TechRadar &#8211; ChatGPT Agent shows that there&#8217;s a whole new world of AI security threats on the way we need to worry about <a href="https://www.techradar.com/computing/artificial-intelligence/chatgpt-agent-shows-that-theres-a-whole-new-world-of-ai-security-threats-on-the-way-we-need-to-worry-about">https://www.techradar.com/computing/artificial-intelligence/chatgpt-agent-shows-that-theres-a-whole-new-world-of-ai-security-threats-on-the-way-we-need-to-worry-about</a></p></li><li><p>VentureBeat - How OpenAI&#8217;s red team made ChatGPT agent into an AI fortress <a href="https://venturebeat.com/security/openais-red-team-plan-make-chatgpt-agent-an-ai-fortress/">https://venturebeat.com/security/openais-red-team-plan-make-chatgpt-agent-an-ai-fortress/</a></p></li><li><p>VentureBeat - How prompt injection can hijack autonomous AI agents like Auto-GPT <a href="https://venturebeat.com/security/how-prompt-injection-can-hijack-autonomous-ai-agents-like-auto-gpt/">https://venturebeat.com/security/how-prompt-injection-can-hijack-autonomous-ai-agents-like-auto-gpt/</a></p></li><li><p>VentureBeat - Invisible, autonomous and hackable: The AI agent dilemma no one saw coming <a href="https://venturebeat.com/security/invisible-autonomous-and-hackable-the-ai-agent-dilemma-no-one-saw-coming/">https://venturebeat.com/security/invisible-autonomous-and-hackable-the-ai-agent-dilemma-no-one-saw-coming/</a></p></li><li><p>VentureBeat - The great AI agent acceleration: Why enterprise adoption is happening faster than anyone predicted <a href="https://venturebeat.com/ai/the-great-ai-agent-acceleration-why-enterprise-adoption-is-happening-faster-than-anyone-predicted/">https://venturebeat.com/ai/the-great-ai-agent-acceleration-why-enterprise-adoption-is-happening-faster-than-anyone-predicted/</a></p></li><li><p>VentureBeat - Gartner: 2025 will see the rise of AI agents (and other top trends) <a href="https://venturebeat.com/security/gartner-2025-will-see-the-rise-of-ai-agents-and-other-top-trends/">https://venturebeat.com/security/gartner-2025-will-see-the-rise-of-ai-agents-and-other-top-trends/</a></p></li><li><p>GitHub &#8211; Auto-GPT Project <a href="https://github.com/Torantulino/Auto-GPT">https://github.com/Torantulino/Auto-GPT</a></p></li><li><p>AgentGPT &#8211; Autonomous AI Agent Framework </p></li></ul><p>https://agentgpt.reworkd.ai/</p><ul><li><p>AutoGPT - Open Source AI Agent </p></li></ul><p>https://agpt.co/</p><ul><li><p> (Wikipedia: <a href="https://en.wikipedia.org/wiki/AutoGPT">https://en.wikipedia.org/wiki/AutoGPT</a> )</p></li><li><p>BabyAGI &#8211; AI Agent Framework by Yohei Nakajima <a href="https://github.com/yoheinakajima/babyagi">https://github.com/yoheinakajima/babyagi</a></p></li><li><p>Google DeepMind - Introducing Gemini 2.0: our new AI model for the agentic era <a href="https://blog.google/technology/google-deepmind/google-gemini-ai-update-december-2024/">https://blog.google/technology/google-deepmind/google-gemini-ai-update-december-2024/</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Hidden dangers of displaying personal information publicly]]></title><description><![CDATA[In this article I help you and your business identify possible dangers of displaying personal information publicly.]]></description><link>https://blog.cyberkite.com.au/p/hidden-dangers-of-displaying-personal-information-publicly</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/hidden-dangers-of-displaying-personal-information-publicly</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Sun, 06 Oct 2024 03:37:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GMSt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GMSt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GMSt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg 424w, https://substackcdn.com/image/fetch/$s_!GMSt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg 848w, https://substackcdn.com/image/fetch/$s_!GMSt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!GMSt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GMSt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg" width="844" height="482" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:482,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Ai image of displayed personal information in peoples lives&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Ai image of displayed personal information in peoples lives" title="Ai image of displayed personal information in peoples lives" srcset="https://substackcdn.com/image/fetch/$s_!GMSt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg 424w, https://substackcdn.com/image/fetch/$s_!GMSt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg 848w, https://substackcdn.com/image/fetch/$s_!GMSt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!GMSt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7290975f-474e-464e-9f5c-ac816dbe9d11_844x482.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In this article I help you and your business identify possible dangers of displaying personal information publicly. This can impact information we publicly share in our personal and work lives that could put your digital data at risk, not to mention physical safety risks. Let&#8217;s dig into this further.</p><h2><strong>What are the dangers of displaying personal information?</strong></h2><p>In an age where digital footprints are left behind with every click and connection, it&#8217;s crucial to recognize the potential risks associated with publicly displaying personal information. Take a moment to evaluate the stickers adorning your cars, the decorations in your home, or even the clothing you wear. Each of these items can inadvertently reveal your interests, beliefs, and personal details to malicious hackers who are always on the lookout for vulnerabilities.</p><p><strong>Consider this:</strong> if you share a photo on social media that features those items in the background, or if you mention your pet&#8217;s name or display your computer setup, you might be unwittingly providing valuable information for cybercriminals. Using details from your posts for password recovery or security questions can increase your vulnerability. What seems like harmless sharing can turn into an open invitation for attacks.</p><p>Furthermore, there&#8217;s a significant privacy concern at stake. Sharing too much information can inadvertently disclose your location, exposing your family to potential threats such as violence or theft. Showcasing valuable items or revealing where you live may attract unwanted attention from those with malicious intent. In a world fraught with both physical and cyber dangers, it often feels necessary to minimise our public individuality to protect ourselves, our loved ones, and our workplaces.</p><p>Will this situation ever improve? Perhaps the answer lies in humanity&#8217;s ability to rise above harmful behaviours. Only when we collectively move beyond malicious activities can we hope to create a safer environment for everyone.</p><p>What do people in Western countries feel their privacy situation is?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>How do people feel about privacy these days?</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0UgD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0UgD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0UgD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0UgD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0UgD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0UgD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg" width="768" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of a man worrying at a workplace&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of a man worrying at a workplace" title="AI image of a man worrying at a workplace" srcset="https://substackcdn.com/image/fetch/$s_!0UgD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0UgD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0UgD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0UgD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc58f708-32d3-4eb9-8c82-f763e17b57e4_768x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Are people really that worried about privacy? Image by Meta AI</figcaption></figure></div><p>It appears whether you live in western countries or other countries, people all over the world have the same reservations about the privacy of their data in our hyper digital world.</p><p><strong>The state of privacy in China</strong> for example is characterised by significant government surveillance and control over personal data. The Chinese government employs a vast array of monitoring technologies, including facial recognition and internet censorship, to track citizens&#8217; activities both online and offline. While there is growing public concern about data privacy and security, many individuals feel they have limited control over their personal information, as the government prioritises security and social stability over privacy rights.</p><ul><li><p>Recent developments, such as the Personal Information Protection Law (PIPL), aim to enhance data protection; however, the implementation remains inconsistent, and many still worry about the lack of transparency and accountability in how their data is handled by both the state and private companies. Overall, the balance between privacy and state control continues to be a contentious issue in China&#8217;s socio-political landscape.</p></li></ul><p><strong>Across the Pacific in the USA</strong>, in a <a href="https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/">Pew Research Center survey</a>, a significant majority of Americans express deep concerns about the privacy and security of their personal data. Approximately <strong>60% feel that it&#8217;s impossible to navigate daily life without having their data collected by companies and the government</strong>. A substantial 81% believe the risks associated with data collection outweigh the benefits, while 79% worry about how companies use their information.</p><ul><li><p>Many lack confidence in corporations&#8217; stewardship of their data, with 70% feeling that their personal information is less secure than five years ago. Additionally, while 97% of Americans are frequently asked to approve privacy policies, only about 20% read them thoroughly before consenting. This widespread sentiment underscores the hidden dangers of publicly sharing personal information, as many individuals unknowingly compromise their privacy in a data-driven society.</p></li></ul><p><strong>Across the Pacific ocean, the majority of Australians</strong> are increasingly concerned about their personal information security. According to the <a href="https://www.oaic.gov.au/engage-with-us/research-and-training-resources/research/australian-community-attitudes-to-privacy-survey/australian-community-attitudes-to-privacy-survey-2023">latest ACAPS 2023 survey findings</a> (Conducted by the Australian OAIC), 62% consider the protection of their data a significant concern, yet 57% are unsure of how to effectively safeguard it. While 74% view data breaches as a serious privacy threat&#8212;an increase from previous years&#8212;only 32% feel in control of their privacy.</p><ul><li><p>Most Australians prioritise data privacy when selecting products and services, highlighting its importance as the third most significant factor after quality and price. Despite general awareness of Australian privacy laws, many desire greater protection from businesses and government agencies, with 89% advocating for more stringent regulations. Alarmingly, 47% of respondents reported being informed of a data breach in the past year, leading to various harms, including increased scams and identity theft.</p></li><li><p>Just recently the RTB (Real Time Bidding) data scraping saga has been revealed scraping personalised Advertising data of politicians and well known people: ABC Article: <a href="https://www.abc.net.au/news/2024-10-03/ad-tech-data-breach-real-time-bidding-national-security-privacy/104416546">The sensitive data of Australia&#8217;s security personnel is at risk of being on-sold to foreign actors</a></p><ul><li><p>RTB scraping and combining that data to create a profile is a increasing threat recently covered around Patternz an ISA Security tool that used RTB. Article: <a href="https://www.techzine.eu/news/privacy-compliance/115811/five-billion-people-being-tracked-by-patternz-surveillance-tool/">Five billion people being tracked by Patternz surveillance tool</a></p></li></ul></li></ul><p>As concerns grow, citizens across the world increasingly favour proactive measures from organisations, emphasising the need for careful handling of personal information to mitigate risks in both digital and physical realms but also warnings and recommendations are given by authorities in most countries about being careful with your data online. But is it just online? Is there any data in the physical world that could affect your cyber privacy? Yes there is.</p><p>Let me make you, my readers, aware of many of the unknown dangers in order to protect ourselves better.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>The Role of OSINT in Exploiting Publicly Displayed Information</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xoS7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xoS7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xoS7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xoS7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xoS7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xoS7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg" width="768" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image representing OSINT&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image representing OSINT" title="AI image representing OSINT" srcset="https://substackcdn.com/image/fetch/$s_!xoS7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xoS7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xoS7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xoS7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2e63fd56-e240-4159-93e7-d9cb84b0a2d7_768x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Anything public in your digital and physical life is up for grabs. Who&#8217;s watching? Image by OpenAi ChatGPT</figcaption></figure></div><p>Open Source Intelligence (OSINT) refers to the process of collecting and analyzing publicly available information to uncover valuable insights about a person or organisation. In today&#8217;s interconnected world, OSINT can be used to exploit personal information that individuals unknowingly share in both cyberspace and the physical world.</p><ul><li><p><strong>What is OSINT?</strong> Open Source Intelligence (OSINT) is the practice of gathering, analyzing, and using information that is publicly available, often referred to as &#8220;open sources.&#8221; This includes data from the internet, social media, public databases, news articles, forums, and even information visible in the physical world. OSINT is widely used in cybersecurity, law enforcement, corporate intelligence, and even by malicious actors such as hackers or criminals. The main advantage of OSINT is that it utilizes data that is readily accessible without the need for hacking or breaching security measures, making it both a powerful and low-cost method of gathering intelligence.</p></li></ul><p>From social media profiles and online forums to bumper stickers on cars and clothing logos, every piece of publicly displayed information can be used to create a detailed profile about you. This makes it crucial to be aware of the potential risks involved in sharing details that may seem harmless, as they can be pieced together to reveal your identity, location, habits, and more.</p><h3><strong>How is OSINT Undertaken?</strong></h3><p><strong>1. Collecting Data from the Digital World:</strong></p><ul><li><p><strong>Social Media:</strong> One of the richest sources for OSINT is social media platforms like Facebook, Twitter (X), Instagram, and LinkedIn. These platforms often reveal personal information like your full name, location, job, family relationships, habits, hobbies, and interests. Even harmless posts or check-ins can give away your real-time location or routines. For instance, posting about a vacation while you&#8217;re away can expose your home to burglary risks.</p></li></ul><ul><li><p><strong>Public Databases and Forums:</strong> OSINT also involves scouring public records, databases, and discussion forums. Information such as addresses, phone numbers, work history, or even opinions expressed in forums can be pieced together to build a detailed profile of a person.</p></li></ul><ul><li><p><strong>Search Engines and Websites:</strong> OSINT tools often make use of simple web search engines like Google to find personal details. People may unknowingly leave traces of information, such as email addresses or home addresses, on websites that are indexed by search engines.</p></li></ul><ul><li><p><strong>Public Sharing of Files:</strong> Information shared in public domains&#8212;like cloud storage links, PDFs, or any documents containing sensitive metadata&#8212;can be accessed and analyzed to extract personal or business-related details. Often, metadata such as GPS locations embedded in images or documents can also give away vital data.</p></li></ul><p><strong>2. Collecting Data from the Physical World:</strong></p><ul><li><p><strong>Cars and Homes:</strong> Information publicly displayed on your vehicle (like bumper stickers with your child&#8217;s school logo or parking passes) or visible from outside your home (like security system signs or house number plaques) can be used as OSINT. These physical clues can provide insight into your lifestyle, habits, or affiliations that can be exploited.</p></li></ul><ul><li><p><strong>Clothing and Accessories:</strong> Logos or badges on clothing (such as those of specific workplaces, schools, or interest groups) can also provide a wealth of information. These details can be leveraged to discover more about your work, hobbies, or social connections, making you vulnerable to targeted social engineering attacks.</p></li></ul><ul><li><p><strong>Workplaces and Public Environments:</strong> Displaying personal or sensitive information in public settings, such as leaving business cards, badges, or access cards exposed, can give attackers a head start in identifying your workplace, your role, or even your access rights within an organization.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>The Dangers of OSINT in Both Worlds</strong></h3><p>When public information is available both online and in the physical world, malicious actors can combine these sources to create a complete profile of an individual or a business. This can lead to severe security and privacy breaches. Here&#8217;s how OSINT works in different areas:</p><ul><li><p><strong>Digital Exposure:</strong> Hackers or cybercriminals use OSINT to gain insight into your personal life or business. For example, finding your email address and then cross-referencing it with a password leaked in a data breach could enable them to access your accounts. They can also look at your social media to perform social engineering attacks, where they impersonate you or trick you into sharing more information.</p></li></ul><ul><li><p><strong>Physical Exposure:</strong> In the physical world, an attacker might learn your habits through the visible information you display&#8212;such as when you&#8217;re away from home or where your children go to school&#8212;allowing them to plan targeted actions like burglary or stalking or violence or breaking in in order to access your IT devices, plant surveillance to monitor you to enter your credentials on your devices (eg: cryptocurrency logins), and so many more digital and physical reasons.</p></li></ul><h3><strong>Defense Against OSINT Exploitation</strong></h3><p>To defend against the risks of OSINT:</p><ul><li><p><strong>Limit Digital Footprint:</strong> Be cautious about the amount of information you share online. Avoid posting real-time locations, personal details, or photos that reveal too much.</p></li></ul><ul><li><p><strong>Hide Physical Clues:</strong> Remove or minimize visible identifiers from your car, home, and belongings that could provide insights about your daily life.</p></li></ul><ul><li><p><strong>Manage Public Sharing:</strong> When sharing files online, strip away unnecessary metadata. Review privacy settings on all your social media platforms and restrict access to personal data.</p></li></ul><ul><li><p><strong>Regularly Audit Information:</strong> Periodically search for your own personal or business data to see what is publicly available and take steps to remove or conceal sensitive details.</p></li></ul><p>Understanding the methodology of OSINT helps you recognize how your publicly shared information, even in innocent forms, can become a liability. By managing both your digital and physical presence, you can reduce exposure to potential threats.</p><p><strong>Let&#8217;s dig deeper on how to defend ourselves from potential OSINT theft and the exploitation of stolen personal data.</strong></p><h2><strong>How to defend yourself for possible attacks related to display of personal information?</strong></h2><p>I will go in-depth regarding as many areas of public exposure that could be used to hone in more information about you and those you need to keep safe. Get ready folks, this is going to be a wild ride.</p><h2><strong>Hide info on social media &amp; apps online</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hnNe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hnNe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hnNe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hnNe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hnNe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hnNe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg" width="768" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of privacy dangers of social media and apps&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of privacy dangers of social media and apps" title="AI image of privacy dangers of social media and apps" srcset="https://substackcdn.com/image/fetch/$s_!hnNe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hnNe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hnNe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hnNe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d8a545a-a4de-4139-b935-1d92f63fb209_768x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Online social media and apps need to be scrubbed more thoroughly in settings for possible exposed info. Image by OpenAI ChatGPT</figcaption></figure></div><p>This has been talked about for quite some time but sometimes we all get slack with it. When you post on social media, yourself and your place and your possessions and things like that, you are risking these things being used to hone in on a number of details, both for cyber and physical theft and attack in person. Here&#8217;s some ideas on what to remove depending on your preferences:</p><h4><strong>Social media apps additional info hiding tips</strong></h4><ul><li><p><strong>Review your social media posts across all platforms to see if you&#8217;ve got any personally identifiable information</strong> such as your pets, kids, your possessions or revealing potential clues of your location to the wider public</p></li></ul><ul><li><p><strong>Are you celebrating birthday or anniversary days which could  be used to workout those dates?</strong> Don&#8217;t post about it online if your account is publically viewable.</p></li></ul><ul><li><p><strong>Are you sharing your kids&#8217; names or pet names on social media?</strong> Apart from being a privacy concern, the other issue is that if you&#8217;re using any of those details in your password recovery questions or as part of your password, then it&#8217;s best not to use such details especially if you post about it.</p></li></ul><ul><li><p><strong>Basically only leave information online that you do not care about and will not be used to identify you</strong> or be used in circumventing any cyber defences such as online accounts that might be using those pieces of information.</p></li></ul><ul><li><p><strong>Hiding details that you don&#8217;t want public in posts and social media accounts </strong>are such as as personal milestones, locations, personal details in bio, personal interests, metadata on photos (some social media don&#8217;t remove the GPS coordinates embedded in metadata of photos), hide lists of friends or followers, hide your birthday, place of birth, current location, consider locking down your account if you don&#8217;t influence to just keep in touch with friends, hide personal details from photos by removing the posts (look carefully for those).</p></li></ul><ul><li><p><strong>Don&#8217;t accept follows from strangers if your account is locked/private</strong> as they may want to squiz on your content to narrow down their data and undertake social engineering attacks and phishing attacks. There is a ton of fake accounts that impersonate a love interest that could get caught in a sextortion or cryptocurrency scams lose money.</p></li></ul><ul><li><p><strong>Remember public posts and reels don&#8217;t really disappear if you post them publicly</strong> as someone can copy the data and then reuse it in the future.</p></li></ul><ul><li><p><strong>Don&#8217;t post your holidays while you&#8217;re on holidays</strong> as this could encourage break ins for the purpose of hacking or theft.</p></li></ul><ul><li><p><strong>Review all privacy and security settings</strong> on apps and social media apps.</p></li><li><p><strong>Be mindful of public interactions!</strong></p><ul><li><p><strong>Avoid commenting or interacting publicly on controversial posts that could attract unwanted attention or give clues to your interests or opinions that could be exploited in phishing or social engineering.</strong></p></li><li><p><strong>Also avoid revealing or bragging about your assets online such as physical possessions, showing off clothes, cryptocurrency, money, bank accounts and showing off your wealth unless you want to increase chances of physical or digital theft. If you still want to remember to have a large security services if you can afford it. If you can&#8217;t afford a large security service stop flaunting your expensive stuff if you want to reduce chances of theft digitally and physically.</strong></p></li></ul></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4><strong>Sharing or &#8220;Personalising&#8221; your details for optimising Ads</strong></h4><ul><li><p>The advertisers have assured us in the past that ad networks are very secure and data they collect about us are not sent to nefarious individuals. But that is no longer true despite promises in updated terms and conditions.</p><ul><li><p><strong>Our Ad Disclaimer:</strong> <strong>You might be wondering why I have ads on my articles. I use <a href="https://adsense.google.com/start/">Google AdSense</a> to place ads here and on other articles. I write these pieces free of charge for you and don&#8217;t receive compensation for the hours of research and preparation involved. Google AdSense is one way for me to recoup a small portion of that effort. In my opinion, Google AdSense itself isn&#8217;t the problem&#8212;it&#8217;s simply a tool that places ads. The real issue lies with the advertisers and advertising marketplaces, including Google, who collect and sell personal information. They track what sites you visit via your web history on your Google or Facebook or other platform account&#8212;and they then use that data to target you with more effective ads that are placed on websites like ours. Everyone does that to earn something and as I&#8217;m a tiny blogger I get almost nothing. The real question is: who are they selling this data to, and are they ensuring it&#8217;s truly anonymized?</strong></p></li><li><p><strong>When it comes to privacy, the real criminals in my opinion, aren&#8217;t the websites (like mine) that show the ads in exchange for free content (and yes who wants to pay for anything anymore or can pay for anything anymore?), but the corporations and marketplaces like Google that profit from exploiting personal information collected from your viewing history on your own Google account and who correlate that with viewed ads on websites. Their lack of transparency and proper verification of RTB (Real Time Bidding) marketplace raises serious concerns about who gets access to your data and how it&#8217;s being used. If the data isn&#8217;t being properly anonymized and can be correlated with enough data, then it could be misused in ways that go beyond simple ad targeting&#8212;affecting your privacy on a deeper level.</strong></p></li></ul></li></ul><ul><li><p>With the rise of surveillance tools like <strong><a href="https://www.techzine.eu/news/privacy-compliance/115811/five-billion-people-being-tracked-by-patternz-surveillance-tool/">Patternz</a></strong><a href="https://www.techzine.eu/news/privacy-compliance/115811/five-billion-people-being-tracked-by-patternz-surveillance-tool/"> which was scraped using anonymised data from Google</a> and other advertising platforms using Real Time Bidding (RTB) market, Patternz (made by security company ISA Security) tracked over five billion users globally, the risks of exposing personal information have never been greater. Data collected from everyday activities&#8212;through apps, websites, and devices&#8212;can be exploited by companies and governments for purposes far beyond advertising, including surveillance. As privacy concerns grow, it&#8217;s vital to take steps to protect personal information both online and offline, as failing to do so can leave individuals vulnerable to misuse, profiling, and potential exploitation in areas like AI-driven warfare.</p></li></ul><h4><strong>How to protect your personal data for RTB to a degree?</strong></h4><ul><li><p><strong>Disable Ad Personalisation:</strong></p><ul><li><p>You can disable personalised ads across major platforms like <a href="https://myadcenter.google.com/personalizationoff">Google</a>, <a href="https://account.microsoft.com/privacy/ad-settings/">Microsoft</a> Bing, <a href="https://support.apple.com/en-au/105131">Apple</a>, <a href="https://accountscenter.facebook.com/ads/">Facebook</a>, <a href="https://help.instagram.com/911879456838933">Instagram</a>, <a href="https://support.tiktok.com/en/account-and-privacy/personalized-ads-and-data/how-your-ads-are-personalized">TikTok</a>, <a href="https://help.snapchat.com/hc/en-us/articles/7012345515796-How-do-I-change-my-advertising-and-interest-preferences-on-Snapchat#:~:text=On%20Android%3A-,Tap%20the%20%E2%9A%99%EF%B8%8F%20button%20in%20the%20Profile%20screen%20to%20open,Activity%2DBased'%20to%20opt%20out">Snapchat</a>, <a href="https://support.reddithelp.com/hc/en-us/articles/12731820767764-Control-the-ads-you-see-on-Reddit">Reddit</a>, and others, you can follow general steps on each platform based on their Help Centres.</p></li><li><p>Keep in mind that this process may not completely remove ads, but it stops them from being tailored to your online activity: <strong>Upcoming blog on RTB and Personalised Ads (TBC still working on it)</strong></p></li></ul></li></ul><ul><li><p><strong>If you want to go down additional level of not seeing ads:</strong></p><ul><li><p>Install a trusted ad blocker if need be on your browser and train it to only allow ads on sites that you need to function on and some sites won&#8217;t show anything without allowing ads.  Trusted multi-platform ad blocker is the original <a href="https://getadblock.com/en/">AdBlock</a>. Purchasing the premium allows for multi-browser sync and settings which are much easier to handle for a very small yearly price.</p></li><li><p>Erase all viewing history across <a href="https://myactivity.google.com/product/search?utm_source=help">Google</a>, <a href="https://account.microsoft.com/privacy/">Microsoft</a> Bing, Apple (complicated), <a href="https://www.facebook.com/help/382661798450396">Facebook</a>, <a href="https://help.instagram.com/354860134605952/?helpref=related_articles">Instagram</a>, TikTok (somewhere in settings), <a href="https://help.snapchat.com/hc/en-us/articles/7012327551380-How-to-Clear-My-Search-History-on-Snapchat">Snapchat</a>, <a href="https://www.reddit.com/settings/privacy">Reddit (then hit Clear)</a>, and other social media sites and setup auto delete options on them (if they have any LOL).</p></li></ul></li></ul><h4><strong>Is Apple the bastion of Privacy?</strong></h4><p>While Apple emphasizes privacy, the reality is more nuanced. Apple&#8217;s privacy measures are certainly strong compared to many tech companies, but true privacy is not absolute. Here are key considerations:</p><ol><li><p><strong>Personalised Ads:</strong> Apple&#8217;s personalized ads prioritize privacy by using first-party data from its ecosystem, such as the App Store and Apple News. They process much of the ad targeting on-device, limiting data sent to their servers. While Apple offers controls to <a href="https://support.apple.com/en-au/105131">opt-out of personalized ads</a> (as mentioned above) and restricts third-party data sharing, they still collect user data to target ads within their services. Though more privacy-focused than competitors, Apple&#8217;s advertising model relies on personalization, making it privacy-conscious but not entirely free from data collection.</p></li><li><p><strong>On-Device Privacy</strong>: Apple processes sensitive data (like Face ID and Touch ID) on the device itself rather than sending it to the cloud. This is a strong privacy feature, as it minimizes the risk of exposure. However, not all data is treated this way.</p></li><li><p><strong>iCloud Backups</strong>: Although iMessage and FaceTime are end-to-end encrypted, iCloud backups are not fully encrypted. This means that Apple, in certain circumstances (like complying with law enforcement), can access data stored in iCloud, such as messages, photos, and other sensitive information.</p></li><li><p><strong>Third-Party Apps</strong>: Despite Apple&#8217;s efforts with App Tracking Transparency (ATT), where apps must ask for permission to track users, third-party apps can still gather data with user consent. Once shared, Apple doesn&#8217;t control how third parties handle it.</p></li><li><p><strong>Law Enforcement and Compliance</strong>: Apple has a history of resisting government pressure to unlock phones, such as in high-profile criminal cases. However, they have complied with legal requests to access iCloud-stored data, which means some level of user data can be accessed. And intelligence agencies managed to get in sometimes without Apples permission using Zero Day Vulnerabilities.</p></li><li><p><strong>Partnerships and Analytics</strong>: Apple still collects some user data for its own purposes, such as to improve Siri or for app recommendations. Even though they anonymize much of this data, it&#8217;s still not entirely private.</p></li></ol><p>So always follow the advice of adjusting settings to maximise on security and privacy even on Apple devices and any other brand devices. And as they say in X Files: <em><strong>Trust no one.</strong></em> But there is a balance between functionality and privacy - so you need to get the right mix for you and with what you are comfortable with.</p><h4><strong>Additional app groups examples of info to hide</strong></h4><ul><li><p><strong>Online Reviews and Forums:</strong> Leaving personal information in public reviews of services or products, or sharing specific details in forums, can lead to exposure that attackers could use for targeted attacks.</p></li><li><p><strong>Health &amp; Fitness Apps: </strong>Personal data from health or fitness tracking apps (e.g., medical conditions, workout routines, or locations) can be used to impersonate individuals or for phishing scams.</p></li><li><p><strong>Online Shopping Accounts</strong>: Storing too much personal information (e.g., credit card details, address, or phone number) on online shopping platforms makes these accounts prime targets for cyber theft.</p></li><li><p><strong>Frequent Flyer Programs and Travel Bookings</strong>: Personal details like passport numbers, travel history, or frequent flyer accounts can be used for identity theft or social engineering by attackers.</p></li><li><p><strong>Dating Apps</strong>: Sharing personal details such as name, location, and interests on dating platforms can lead to stalking, scams, or phishing attacks.</p></li><li><p><strong>Online Gaming Platforms</strong>: Personal profiles in online games, including usernames, financial details, or locations, can be exploited for scams or phishing attacks.</p></li><li><p><strong>Educational Platforms</strong>: Personal information shared in virtual classrooms, e-learning platforms, or academic forums can be stolen and used for identity theft.</p></li><li><p><strong>Subscription Services</strong>: Personal data stored with streaming services or other subscriptions could be vulnerable to theft or account hijacking.</p></li><li><p><strong>Charitable Donations</strong>: Donating to charities without securing personal data can result in your financial and personal information being exposed to attackers.</p></li><li><p><strong>Government Documents &amp; Portals</strong>: Information used for online tax filing, voting registration, or applying for government benefits can be stolen if these systems are not secure, leading to identity theft or fraud.</p></li><li><p>Many more areas.</p></li></ul><p>Now let&#8217;s cover the vehicle info dangers and other areas.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Hide info in your car</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mEln!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mEln!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mEln!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mEln!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mEln!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mEln!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg" width="844" height="831" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:831,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Diagram of various personal information on cars&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Diagram of various personal information on cars" title="Diagram of various personal information on cars" srcset="https://substackcdn.com/image/fetch/$s_!mEln!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mEln!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mEln!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mEln!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b12cb3-30cf-4118-82b0-3b1b84b43835_844x831.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">How stickers could ve used by hackers and criminals to work out details about you. Image from Rochland Police, USA</figcaption></figure></div><p>In America, some of the enforcement agencies have recently been advising people not to put personal details on cars such as stickers and custom number plates with your details on it because that can be used by physical and cyber criminals to hone in on your details and find out where you live and use those details. For example, to narrow down which accounts online are yours in order to attack them. Here&#8217;s some useful tips on what to do to mitigate that risk:</p><ul><li><p><strong>Remove any stickers on the outside or inside of cars</strong> as these could be used to work out your parents both for thieves. Trying to get into your place but also hackers. Trying to find out more information about your family in order to hack you.</p></li></ul><ul><li><p><strong>Don&#8217;t leave personal details or documents visible inside or outside the car</strong> as these details could be used to further narrow down your personal details in order to hack you or find your address to visit you in person and steal or do violence.</p></li></ul><ul><li><p><strong>Vehicle GPS Systems:</strong> Modern vehicles with integrated GPS or infotainment systems store routes, destinations, and personal data, which could be accessed in the event of a hack. Make sure any security that entertainment systems in cars have is turned on including any information sharing settings with the manufacturers are locked down or turned off.</p></li></ul><ul><li><p><strong>Entertainment systems: </strong>If they have bluetooth or wifi then make sure it&#8217;s secure as best as possible.</p></li></ul><ul><li><p><strong>Smart cars: </strong>check all the settings to make sure no personal information is being advertised eg: displaying your name when you switch the smart car on.</p></li></ul><h2><strong>Hide info on clothes</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HQsz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HQsz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HQsz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HQsz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HQsz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HQsz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg" width="768" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of personal information on clothes&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of personal information on clothes" title="AI image of personal information on clothes" srcset="https://substackcdn.com/image/fetch/$s_!HQsz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HQsz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HQsz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HQsz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc710de45-c56d-4f26-abdd-934e128388c2_768x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Is showcasing everything about you on your clothes a good idea? Image by OpenAi ChatGPT</figcaption></figure></div><p>Custom t-shirts and clothing (and just generic but branded clothing as well) can be a personal way of expressing yourself and sharing your personal information or interests to the wider public and your friends. But if you have a lot of use of the online cyber space then you may need to think twice about putting clothes on that. Have personal details or interests on it. Especially if those details are then used for security questions or to help hackers hone in on you and tailor social engineering attacks towards you.</p><ul><li><p><strong>Get rid of any t-shirts or clothes that reveal your or your kids interests or personal details or personal interests.</strong> I know this is controversial because we are all about showing what we like to people. But we live in a more dangerous world so consider doing that for the sake of increased safety. So reconsider wearing branded clothes that might reveal to others what your preferences, interests and likes are. Privacy is no longer inside your home, it&#8217;s also what you walk around with.</p></li><li><p><strong>Don&#8217;t show your expensive stuff in public:</strong> Showing to the public how much money you have by flaunting very expensive clothes or accessories is a digital and physical risk as it can be a motivator for hackers or thiefs to target you. I&#8217;ll tell you a little secret: Smart rich people wear everyday clothes and drive everyday cars eg: Warren Buffett has billions of dollars but drives a basic car and wears everyday clothes (Google: <em>Warren Buffett lives a simple life</em>)</p></li></ul><ul><li><p><strong>Don&#8217;t put on any stickers or badges or pins with your name on it or other details on your clothes, </strong>especially in public spaces if you can avoid it so that people can&#8217;t jot down your name and look you up and do a doxing.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Hide info in your home</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H4Sp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H4Sp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!H4Sp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!H4Sp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!H4Sp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H4Sp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg" width="768" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image showing a reminder on TV screen to hide your information&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image showing a reminder on TV screen to hide your information" title="AI image showing a reminder on TV screen to hide your information" srcset="https://substackcdn.com/image/fetch/$s_!H4Sp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!H4Sp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!H4Sp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!H4Sp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cdc1fa7-50c8-468f-945d-a6bdb93a34d9_768x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">What information is your home revealing about you to passersby? Image by Meta AI</figcaption></figure></div><p>As cyberspace gets more secure over time, hackers may start visiting your home and looking through the window to get some personal details so that they can hack your accounts more effectively or use social engineering by using those personal details displayed outside of your home or inside your home. Here&#8217;s some suggestions on how to reduce the chances of these risks:</p><ul><li><p><strong>As much as possible, remove any of such personal details or stickers </strong>from our homes especially if they are outside.</p></li></ul><ul><li><p><strong>Avoid having all your windows open without at least lace curtains or curtains or blinds </strong>or some measure of difficulty in seeing what&#8217;s inside the home, this may be an option for hackers to get someone to fish for information visually.</p></li></ul><ul><li><p><strong>Remove any personal details such as names, kids names, pets, names, and all sorts of things in the backyard or front yard: </strong>This includes any memorials and details of dead family members, names and birthdays and all sorts of things. Why? Think about Google Street view from the top and from the street level. Could be used to look at those details and work out those personal details as possibly part of login, security questions or social engineering attempts.</p></li></ul><ul><li><p><strong>Shred info before throwing into Trash/Discarded Items:</strong> Documents or personal details thrown away without proper shredding or disposal can be retrieved by attackers for identity theft.</p></li></ul><ul><li><p><strong>Smart Home Devices: </strong>Devices like security cameras, thermostats, or smart locks connected to your network can expose sensitive information (e.g., when you&#8217;re away) if not properly secured.</p></li></ul><ul><li><p><strong>Tech gifts for kids or family: </strong>Be smart and secure with tech gifts. Parents can check the safety of popular gifts that can be connected to the internet, like smart toys, smartphones, tablets, drones and even wearables for pets. Do things like set strong passwords, turn off location settings and limit the amount of personal information young people share. For example some of these devices can have cameras or microphones.</p></li></ul><ul><li><p><strong>Hide info from Email Signatures &amp; Email Auto-responses:</strong></p><ul><li><p><strong>Avoid overly detailed email signatures </strong>(including job titles, direct numbers, and location) can provide valuable information to attackers for impersonation or social engineering schemes. Remove any details that you don&#8217;t want malicious hackers from readily getting hold of such as phone numbers, addresses, and other details.</p></li><li><p><strong>Be Cautious with Auto-Responses: </strong>Avoid disclosing too much information, such as your vacation dates or location, in automated replies. This can tip off potential burglars or hackers. For example, in your autoresponder settings of any kind, avoid revealing when you&#8217;ll be away. A simple &#8216;I&#8217;m currently unavailable, I&#8217;ll get back to you as soon as possible&#8217; without specifics helps protect your privacy.</p></li></ul></li></ul><ul><li><p><strong>Hide info when answering voice calls &amp; voicemail greetings:</strong></p><ul><li><p><strong>Answering calls:</strong> To avoid helping spammers and hackers hone in on your name and additional details when answering calls simply say &#8220;Hello&#8221;. When they ask are &#8220;Michael Plis&#8221; ask the question &#8220;Sorry, who is speaking?&#8221;.</p></li><li><p><strong>Voicemail Greetings: </strong>When creating voicemail greetings for home or work phone just use your first name, don&#8217;t include your surname and don&#8217;t include any other personal information. This is not to give out information but at the same tie help friends, colleagues and clients know they calling the right person.</p></li></ul></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Hide info from publicly shared files</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h_1I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h_1I!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!h_1I!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!h_1I!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!h_1I!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h_1I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg" width="768" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of filing folders held up by a worker in office&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of filing folders held up by a worker in office" title="AI image of filing folders held up by a worker in office" srcset="https://substackcdn.com/image/fetch/$s_!h_1I!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!h_1I!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!h_1I!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!h_1I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb3751a8-cfea-4228-9e63-77fb48e139b9_768x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Do you really know that your cloud storage files are private? Image by Meta AI</figcaption></figure></div><p>One of the biggest problems today is personal information lying around in publicly shared files in cloud storage accounts. These days hackers scan the entire cloud storage domains for any shared links and they often can find treasure troves gathered by random variations of the links and other sources of those publicly shared links. Here is some suggestions to deal with this:</p><ul><li><p><strong>When you share files on OneDrive, Google Drive, iCloud or Dropbox or other file storage services</strong> and select to share with anyone (eg usually creates a unique web link and those that have that web link can access folder(s) or file(s) that you shared) these publicly shared files often stay exposed until the share is turned off. Also files or backups stored in cloud services without proper encryption can be accessed by attackers who might gain control of account credentials. Here are the major storage providers and useful tips on reducing private information visibility.</p></li></ul><ul><li><p><strong>File naming tip</strong>: I usually put in the file names or folder names some indication that I am sharing this file or folder publicly eg: &#8220;(Share Anyone)&#8221;. That way when I search all publicly shared files it&#8217;s easier to find.</p></li></ul><ul><li><p><strong>Inside publicly shared files</strong>: Remove all personal identifiable information that you don&#8217;t want to share so that when digital strangers go in they will not get anything juicy out of it.</p></li></ul><ul><li><p><strong>Google Drive</strong>: Check all publicly shared files and folders on Google Drive - its a search string because Google doesn&#8217;t have a &#8220;Shared with others&#8221; section in the Drive - <a href="https://www.cyberkite.com.au/post/tip-how-to-see-your-public-google-drive-files-cybersecurity-tip">blog article I made documenting what is the strings to find files and folders publically shared via Google Drive</a></p></li></ul><ul><li><p><strong>OneDrive</strong>: <a href="https://support.microsoft.com/en-au/office/see-files-you-shared-in-onedrive-6b67b82b-9c5c-4348-ab10-fd5b0d8df76c">See files you shared in OneDrive</a> article (select Shared &gt; By You tab)</p></li></ul><ul><li><p><strong>iCloud</strong>: There isn&#8217;t a built-in feature in iCloud to directly view all publicly shared files and folders. But you can either go to <a href="http://icloud.com/">icloud.com</a> or via the Files app on devices and select &#8220;iCloud Drive&#8221; and use search bar to search for &#8220;shared&#8221; or &#8220;public&#8221;</p></li></ul><ul><li><p><strong>Dropbox</strong>:  login to <a href="http://dropbox.com/">dropbox.com</a> and click on Shared &gt; all publicly shared files and folders will appear there. You can also try to use search but it&#8217;s limited</p></li></ul><ul><li><p><strong>When you make feedback or submission to governments about issues</strong> your personal data may be included on those submissions and they may be searchable and displayable online. Especially If you submit your own document to some government inquiry and provide details about yourself inside that submitted document. Those details may stay online for a long time.</p></li></ul><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/p/hidden-dangers-of-displaying-personal-information-publicly?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Cyberkite blog! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/p/hidden-dangers-of-displaying-personal-information-publicly?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.cyberkite.com.au/p/hidden-dangers-of-displaying-personal-information-publicly?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2><strong>Hide info from workplaces</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eYB6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eYB6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eYB6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eYB6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eYB6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eYB6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg" width="768" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Ai image of a reminder to hide info in workplaces for cyber safety&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Ai image of a reminder to hide info in workplaces for cyber safety" title="Ai image of a reminder to hide info in workplaces for cyber safety" srcset="https://substackcdn.com/image/fetch/$s_!eYB6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eYB6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eYB6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eYB6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F989664ee-e444-45ea-8b22-fe13f43513b1_768x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Are those nick nacks protecting you from malicious cyber attacks? Image by Meta AI</figcaption></figure></div><p>Workplaces can be extensions of our home when we display or bring all sorts of nick nacks and personal items. These can be visible on video conferencing or photos taken in workplaces and shared publicly and in person at the office or viewed from windows outside the workplace if the items are visible.</p><ul><li><p><strong>Personal items on desks could be visible</strong> to fake clients that may physically go past your desk and use that in social engineering attacks or impersonation attacks.</p></li></ul><ul><li><p><strong>Personal details or items in the background images</strong> or your live actual office as your background of video calls or photos shared publicly (e.g., family photos, awards, or documents) can reveal sensitive information that could be exploited in spear-phishing attacks. Also device lock screens should not show any personal information.</p></li></ul><ul><li><p><strong>Hide info from Email Signatures &amp; Email Auto-responses:</strong></p><ul><li><p><strong>Avoid overly detailed email signatures </strong>(including job titles, direct numbers, and location) can provide valuable information to attackers for impersonation or social engineering schemes. Remove any details that you don&#8217;t want malicious hackers from readily getting hold of such as phone numbers, ABNs (business ID&#8217;s), addresses, and other details.</p></li><li><p><strong>Be Cautious with Auto-Responses: </strong>Avoid disclosing too much information, such as your vacation dates or location, in automated replies. This can tip off potential burglars or hackers. For example, in your autoresponder settings of any kind, avoid revealing when you&#8217;ll be away. A simple &#8216;I&#8217;m currently unavailable, I&#8217;ll get back to you as soon as possible&#8217;&#8216; without specifics helps protect your privacy.</p></li></ul></li></ul><ul><li><p><strong>Hide info when answering voice calls &amp; voicemail greetings:</strong></p><ul><li><p><strong>Answering calls:</strong> To avoid helping spammers and hackers hone in on your name and additional details when answering calls simply say &#8220;Hello&#8221;. When they ask are &#8220;Michael Plis&#8221; ask the question &#8220;Sorry, who is speaking?&#8221;.</p></li><li><p><strong>Voicemail Greetings: </strong>When creating voicemail greetings for home or work phone just use your first name, don&#8217;t include your surname and don&#8217;t include any other personal information. This is not to give out information but at the same tie help friends, colleagues and clients know they calling the right person.</p></li></ul></li></ul><ul><li><p><strong>Hide info on Business Websites:</strong> Employee profiles with detailed biographies or images, office locations, and organisational structures can provide attackers with the means to craft convincing social engineering attacks. Also remove all email and phone number contacts that you don&#8217;t want revealed to the public. Email addresses that are for public use might still be good to hide and replace with contact forms that use Google Recaptcha human verifier (although these are getting less useful with AI).</p></li></ul><ul><li><p><strong>Hide info from Job Applications or Resumes Posted Publicly:</strong> Posting resumes with personal details like phone numbers, addresses, or email addresses on job sites could be used by scammers or hackers to impersonate individuals.</p></li></ul><ul><li><p><strong>Hide info from Conferences and Networking Events: </strong>Sharing personal information on business cards or in conversations in public settings, especially about sensitive work projects or company details, can be a vulnerability.</p></li></ul><ul><li><p><strong>Shred info before throwing into Trash/Discarded Items:</strong> Documents or personal details thrown away without proper shredding or disposal can be retrieved by attackers for identity theft.</p></li></ul><ul><li><p><strong>Sharing info with Business Partners or Suppliers: </strong>Sharing sensitive business data with third-party vendors or partners without proper security protocols can lead to exposure through weak links in the supply chain.</p></li></ul><ul><li><p><strong>When leaving your desk:</strong> When leaving your desk at work lock your computer screen to prevent unauthorised snooping. See below instructions on how to do that:</p></li></ul><h3><strong>How to lock your device screen?</strong></h3><p><strong>Windows:</strong></p><ul><li><p><strong>Using Keyboard Shortcut: </strong>Press <strong>Windows + L</strong>.</p></li><li><p><strong>Using Start Menu: </strong>Click on the <strong>Start</strong> button, select your <strong>profile picture</strong> or <strong>account icon</strong>, and choose <strong>Lock</strong>.</p></li></ul><p><strong>Chrome OS:</strong></p><ul><li><p><strong>Using Keyboard Shortcut: </strong>Press <strong>Search + L</strong> or <strong>Ctrl + Shift + L</strong>.</p></li><li><p><strong>Using Status Area: </strong>Click on the <strong>time</strong> in the bottom-right corner, then click on your <strong>account icon</strong>, and select <strong>Lock screen</strong>.</p></li></ul><p><strong>Mac OS:</strong></p><ul><li><p><strong>Using Keyboard Shortcut: </strong>Press <strong>Control + Command + Q</strong> (or <strong>Command + Option + Power button</strong>).</p></li><li><p><strong>Using Apple Menu: </strong>Click on the <strong>Apple menu</strong> in the top left, and select <strong>Lock Screen</strong>.</p></li></ul><p><strong>Android mobile devices:</strong></p><ul><li><p><strong>Using Power Button: </strong>Press the <strong>Power button</strong> to lock the screen.</p></li><li><p><strong>Using Settings: </strong>Open <strong>Settings</strong> &gt; <strong>Security</strong> &gt; <strong>Screen lock</strong>, and choose a locking method (PIN, pattern, password).</p></li></ul><p><strong>iOS mobile devices:</strong></p><ul><li><p><strong>Using Power Button: </strong>Press the <strong>Side button</strong> (or <strong>Top button</strong> on older models) to lock the screen.</p></li><li><p><strong>Using Settings: </strong>Open <strong>Settings</strong> &gt; <strong>Face ID &amp; Passcode</strong> or <strong>Touch ID &amp; Passcode</strong>, and set up a locking method.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Hide info when travelling</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0WbH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0WbH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0WbH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0WbH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0WbH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0WbH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg" width="768" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of a person packing their suitcase in a hotel&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of a person packing their suitcase in a hotel" title="AI image of a person packing their suitcase in a hotel" srcset="https://substackcdn.com/image/fetch/$s_!0WbH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0WbH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0WbH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0WbH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70771502-2c90-48fa-a5f4-ebeb85412b16_768x768.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">When you are fully relaxed on your holiday is your private information safe? Image by Meta AI</figcaption></figure></div><p>Hiding information that is sensitive when travelling is important as you and your family cn become an easy target for cyber attacks.</p><ul><li><p><strong>Hide info on Luggage Tags:</strong> Displaying personal details like name, address, or phone number on luggage tags while travelling can also be exploited by malicious individuals.</p></li></ul><ul><li><p><strong>Lock your laptop or tablet or phone screen when not using: </strong>When not in use those devices should be with you and not unsupervised. Never trust anyone when travelling. Also consider purchasing a privacy filter screen protector on laptops and tablets.</p><ul><li><p>When expensive devices are not in use: Even check with the hotel if they have a safety deposit box or safe but I have to warn you: some hotels or motels do the dodgy and allow malicious people to access those safety deposit boxes without ID verification - so that&#8217;s a tip to them - stop doing it if you want a good travel review. If you go to some countries that have a high theft I would only bring very cheap tech - don&#8217;t bring your jewelry or expensive tech - blend in as it were.</p></li></ul></li></ul><ul><li><p><strong>Don&#8217;t provide unnecessary information to hotels and tourist places</strong>: If you provide unnecessary information that is not required if those businesses are breached your data will be exposed. Also don&#8217;t sign up to any subscriptions or fill out any advertisements or click on any links.</p></li></ul><ul><li><p><strong>Don&#8217;t scan QR codes of any kind:</strong> Don&#8217;t scan any QR codes in restaurants to order food and fill out their ordering forms through it. Sometimes hackers put fake QR Code stickers over the top to infect your devices or steal your information. Any other QR codes please don&#8217;t use. Just use traditional forms of buying like a credit card, cash or use a local ATM usually possible to withdraw with your credit or debit card with the VISA symbol from most ATM&#8217;s in the world. But make sure nobody sees you type the pin.</p></li></ul><ul><li><p><strong>Don&#8217;t connect to Public Wi-Fi, instead buy a local SIM card and add data to it</strong>: Logging into personal accounts over unsecured public Wi-Fi networks during travel without encryption leaves personal data vulnerable to interception.</p></li></ul><h2><strong>Conclusion</strong></h2><p>In today&#8217;s world, the risk of exposing personal information has never been greater. As we&#8217;ve explored throughout this article, even seemingly harmless details&#8212;whether shared online, displayed on your vehicle, or subtly embedded in your clothing&#8212;can be used by malicious actors to launch both cyber and physical attacks. From social media to cars, homes, and even personal apparel, it&#8217;s essential to assess what we reveal and how it can compromise our security.</p><p>By taking simple steps to hide or obscure personal information, we can protect ourselves, our families, and our businesses from a range of threats. Remember, vigilance is key in this digital age. Staying mindful of the information we share is one of the best defences we have against those seeking to exploit our data for harmful purposes.</p><p>Safe public access everyone</p><p><strong>Michael Plis</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>References</strong></h2><ul><li><p>Due to the complexity of this article and my lifelong neurodivergent disability I used a combination of my own IT &amp; cybersecurity background experience, ChatGPT and Google Gemini to do the research, writing and also assisting me in editing. So if there are errors or something could be referenced that should be please DM me on all major social media profiles either via the social media channels listed at the top of the article or at the bottom. Thanks.</p></li></ul><ul><li><p>ReachOut: <a href="https://schools.au.reachout.com/online-behaviour-and-social-media/disclosing-personal-information">Disclosing personal information</a></p></li></ul><ul><li><p>Australian Office of Aus Information Commissioner (OAIC):</p><ul><li><p><a href="https://www.oaic.gov.au/privacy/your-privacy-rights/your-personal-information/use-and-disclosure-of-personal-information">Use and disclosure of personal information</a></p></li><li><p><a href="https://www.oaic.gov.au/privacy/privacy-guidance-for-organisations-and-government-agencies/handling-personal-information/guide-to-securing-personal-information">Guide to securing personal information</a></p></li><li><p><a href="https://www.oaic.gov.au/privacy/privacy-guidance-for-organisations-and-government-agencies/handling-personal-information">Handling personal information resources</a></p></li><li><p><a href="https://www.oaic.gov.au/engage-with-us/research-and-training-resources/research/australian-community-attitudes-to-privacy-survey/australian-community-attitudes-to-privacy-survey-2023">Australian Community Attitudes to Privacy Survey 2023</a></p></li></ul></li></ul><ul><li><p>Australian Office of the Victorian Information Commissioner (OVIC): <a href="https://ovic.vic.gov.au/privacy/resources-for-organisations/information-sharing-and-privacy/">Information Sharing and Privacy &#8211; Guidance for Sharing Personal Information</a></p></li><li><p>Australian NSW State Government: <a href="https://www.nsw.gov.au/education-and-training/digital-citizenship/online-safety/protecting-yourself-online">Protecting your privacy online</a></p></li><li><p>University of Pennsylvania - Penn Today article: <a href="https://penntoday.upenn.edu/news/dangers-sharing-personal-information-social-media">The dangers of sharing personal information on social media</a></p></li><li><p>University of Kentucky article: <a href="https://its.uky.edu/news/how-oversharing-social-media-could-put-your-personal-information-risk">How oversharing on social media could put your personal information at risk</a></p></li><li><p>New Zealand Governments Protective Security Requirements (PSR) article: <a href="https://www.protectivesecurity.govt.nz/resources/case-studies/risks-of-making-personal-information-public-through-social-media">Risks of making personal information public through social media</a></p></li><li><p>Microsoft support article: <a href="https://support.microsoft.com/en-au/topic/the-dangers-of-oversharing-79330a32-4ee1-433a-812e-fe4bb3d34511">The dangers of oversharing</a></p></li><li><p>Government of Canada article: <a href="https://www.getcybersafe.gc.ca/en/blogs/how-avoid-sharing-too-much-information-online">How to avoid sharing too much information online</a></p></li><li><p>Pew Research Center article: <a href="https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/">Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information</a></p></li><li><p>ABC Article: <a href="https://www.abc.net.au/news/2024-10-03/ad-tech-data-breach-real-time-bidding-national-security-privacy/104416546">The sensitive data of Australia&#8217;s security personnel is at risk of being on-sold to foreign actors</a></p></li><li><p>Techzine article: <a href="https://www.techzine.eu/news/privacy-compliance/115811/five-billion-people-being-tracked-by-patternz-surveillance-tool/">Five billion people being tracked by Patternz surveillance tool</a></p></li></ul><h2><strong>Ad Disclaimer</strong></h2><ul><li><p><strong>You might be wondering why I have ads on my articles. I use <a href="https://adsense.google.com/start/">Google AdSense</a> to place ads here and on other articles. I write these pieces free of charge for you and don&#8217;t receive compensation for the hours of research and preparation involved. Google AdSense is one way for me to recoup a small portion of that effort. In my opinion, Google AdSense itself isn&#8217;t the problem&#8212;it&#8217;s simply a tool that places ads. The real issue lies with the advertisers and advertising marketplaces, including Google, who collect and sell personal information. They track what sites you visit via your web history on your Google or Facebook or other platform account&#8212;and they then use that data to target you with more effective ads that are placed on websites like ours. Everyone does that to earn something and as I&#8217;m a tiny blogger I get almost nothing. The real question is: who are they selling this data to, and are they ensuring it&#8217;s truly anonymized?</strong></p></li><li><p>When it comes to privacy, the real criminals in my opinion, aren&#8217;t the websites (like mine) that show the ads in exchange for free content (and yes who wants to pay for anything anymore or can pay for anything anymore?), but the corporations and marketplaces like Google that profit from exploiting personal information collected from your viewing history on your own Google account and who correlate that with viewed ads on websites. Their lack of transparency and proper verification of RTB (Real Time Bidding) marketplace raises serious concerns about who gets access to your data and how it&#8217;s being used. If the data isn&#8217;t being properly anonymized and can be correlated with enough data, then it could be misused in ways that go beyond simple ad targeting&#8212;affecting your privacy on a deeper level.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[How to defend against SS7 vulnerabilities?]]></title><description><![CDATA[In this blog article I reveal how to defend against SS7 (System Signalling no: 7) vulnerabilities that are in every phone network and all are susceptible to various attacks.]]></description><link>https://blog.cyberkite.com.au/p/how-to-defend-against-ss7-vulnerabilities</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/how-to-defend-against-ss7-vulnerabilities</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Mon, 23 Sep 2024 04:22:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kyIY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kyIY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kyIY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kyIY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kyIY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kyIY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kyIY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg" width="844" height="844" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:844,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of SS7 connecting to everything&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of SS7 connecting to everything" title="AI image of SS7 connecting to everything" srcset="https://substackcdn.com/image/fetch/$s_!kyIY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kyIY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kyIY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kyIY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc5f5ed7-c244-48e6-a350-99f51423d44e_844x844.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">SS7 or Signaling System 7 encompasses the whole world. Image from Meta AI</figcaption></figure></div><p>I will go here into a full reveal and recommendations how to defend against it or minimise its effects. I wanted to write a complete how to on this topic as it affects all people in the world and unfortunately not all telecommunications providers (there is more than 12,000 of them worldwide) have your security interests at heart.</p><p>These set of vulnerabilities bypass some 2 Factor Authentication methods, thus making it very important to know about it and how to defend from it.</p><p>Here&#8217;s a guide on how small businesses can protect themselves against SS7 and similar attacks.</p><h2>Contents</h2><p><strong>Why are we talking about defending against SS7?</strong></p><p><strong>What Is SS7 &amp; Why Is It Vulnerable?</strong></p><p>       History of SS7</p><p>        Who &amp; when were SS7 vulnerabilities discovered?</p><p><strong>Basic Aspects of Telecommunications Networks Worldwide</strong></p><p>        1-6 - Aspects of Telecommunication Networks</p><p>         7. Protocols</p><p>                Protocols for 2G (GSM) / 3G (UMTS)</p><p>                Protocols for 4G/LTE</p><p>                Protocols for 5G</p><p>        8. Standards</p><p>        9. Types of Networks</p><p><strong>Why is the Global Telecommunications Network Vulnerable?</strong></p><p><strong>Why Are Small Businesses at Risk?</strong></p><p><strong>How SS7 Attacks Work?</strong></p><p>        How SS7 Attacks Typically Occur</p><p>        How difficult are SS7 exploits to undertake?</p><p><strong>SS7 Mitigation Strategies for Small Business</strong></p><p><strong>Key ways to defend against SS7 attacks</strong></p><p>        Q: Is adding +XXX country codes help defend against SS7 threats?</p><p>        Q: Is getting rid of 2G/3G going to stop SS7 threats?</p><p><strong>Q: What&#8217;s the impact of getting rid of 3G network?</strong></p><p><strong>Q: Then, is it possible to eliminate 2G/3G Worldwide?</strong></p><p><strong>Defending Against Other Mobile Protocol Attacks on 4G/LTE/5G</strong></p><p>        Common Threats and Defenses in both 4G/5G Protocols</p><p>        4G/LTE Based Attacks Defenses</p><p>         5G Based Attacks Defenses</p><p><strong>Partner with a Reputable Mobile Carrier (Large List of Countries)</strong></p><p>        Europe</p><p>        North America</p><p>        South America</p><p>        Asia-Pacific</p><p>        Africa</p><p>        Middle East</p><p>        When travelling &amp; roaming</p><p>        Reputation &amp; standards are important for carriers</p><p><strong>What if I choose to keep using SMS 2FA?</strong></p><p>        What are dangers of switching to other 2FA methods?</p><p><strong>Conclusion</strong></p><p><strong>References</strong></p><h2><strong>Why are we talking about defending against SS7?</strong></h2><p>In today&#8217;s interconnected world, small businesses rely heavily on mobile networks for communication, security, and operations. While mobile technology offers numerous advantages, it also exposes businesses to vulnerabilities that could compromise sensitive data. One particularly dangerous attack vector is SS7 (System Signaling Number 7), which has been used by hackers to intercept calls, messages, and even bypass two-factor authentication (2FA). Understanding and defending against these attacks is crucial for small businesses that depend on mobile technologies.</p><p>Recently <strong>Veritasium</strong> Youtube Channel highlighted in a video &#8220;<strong><a href="https://www.youtube.com/watch?v=wVyu7NB7W6Y">Exposing the Flaw in Our Phone System</a></strong>&#8220; several key issues surrounding the vulnerabilities in the SS7 protocol are brought to light showing the clear and present danger from SS7 to the whole world.</p><p>The Vertasiums video emphasizes how the SS7 system, a foundational part of global telecommunication infrastructure, has inherent weaknesses that expose users to serious security risks. The protocol, initially designed for reliability rather than security, is vulnerable to exploitation, allowing malicious actors to intercept calls, messages, and even track users&#8217; locations.</p><div id="youtube2-wVyu7NB7W6Y" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;wVyu7NB7W6Y&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/wVyu7NB7W6Y?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Key quotes from the video highlight these concerns:</p><ul><li><p><strong>On the system&#8217;s design flaw</strong>: &#8220;SS7 wasn&#8217;t built with security in mind because, at the time, it was only trusted parties who had access to it. But now, that trust is gone.&#8221;</p></li><li><p><strong>On the severity of potential attacks</strong>: &#8220;Hackers don&#8217;t need direct access to your phone; they can do it remotely through vulnerabilities in the SS7 system.&#8221;</p></li><li><p><strong>On the real-world impacts</strong>: &#8220;The flaw has allowed surveillance companies to offer services that can track anyone, anywhere, simply by accessing the SS7 network.&#8221;</p></li></ul><p>This systemic issue underscores the importance for mobile carriers to enhance their SS7 security measures to protect against these types of attacks. Some carriers in regions such as Europe, Middle East, Asia, Africa, South and North America are beginning to strengthen their protocols, but it remains a pressing concern for the entire industry.</p><p>If you&#8217;re running a small business that relies on mobile communications, it&#8217;s crucial to choose carriers that prioritize SS7 security and implement strong back-office protections.</p><p>Let&#8217;s now find out what is SS7 and why it&#8217;s vulnerable.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>What Is SS7 &amp; Why Is It Vulnerable?</strong></h2><p><strong>SS7 (Signaling System No. 7)</strong> is a crucial component of global telecommunication (phone &amp; SMS) networks, but its age and complexity have made it susceptible to various attacks. While individuals can&#8217;t directly defend against SS7 vulnerabilities at a network level, there are steps to mitigate risks and protect personal data.</p><p>SS7 is a set of telecommunication protocols that allows networks to communicate for call setup, routing, billing, and SMS exchange. Originally developed in the 1970s, SS7 was designed with a trust-based system, assuming that anyone with access to the network is trustworthy. This assumption has made it an attractive target for cybercriminals, as it lacks robust security measures.</p><p>Hackers can exploit SS7 vulnerabilities by intercepting mobile communications, tracking phone locations, and even hijacking 2FA codes sent via SMS, posing a significant threat to businesses that rely on mobile phones for security and communication.</p><h3><strong>History of SS7</strong></h3><p>SS7 (Signaling System No. 7) is a set of telecommunication protocols developed in the 1970s to manage the exchange of information over the Public Switched Telephone Network (PSTN). Here&#8217;s a brief history:</p><h4><strong>Development in the 1970s</strong></h4><ul><li><p>SS7 was created by <strong>ITU-T</strong> (International Telecommunication Union - Telecommunication Standardization Sector) to replace older in-band signaling systems, where control signals were sent along the same channel as the voice data.</p></li><li><p>In-band signaling systems were vulnerable to fraud and limited in bandwidth, so the move to an <strong>out-of-band signaling system</strong> like SS7 helped increase both the security and efficiency of call routing.</p></li></ul><h4><strong>Introduction in the 1980s</strong></h4><ul><li><p>By the 1980s, SS7 became the standard signaling protocol for <strong>ISDN</strong> (Integrated Services Digital Network) and cellular networks. It allowed more efficient call setup, management, and termination across different networks and regions.</p></li><li><p>It also facilitated <strong>Caller ID</strong>, <strong>toll-free numbers</strong>, and <strong>call forwarding</strong> features by separating the signaling information from the voice channels.</p></li><li><p>Vulnerabilities in the telecommunications system, specifically in the <strong>Signaling System 7 (SS7)</strong> protocol, have been known since the 1980s. SS7 was developed in 1975 to handle the exchange of information between different telecommunications networks. However, as the internet and digital communication grew, so did awareness of its vulnerabilities in the 90&#8217;s and further on.</p></li></ul><h4><strong>Expansion in the 1990s</strong></h4><ul><li><p>SS7 expanded with the growth of <strong>mobile networks</strong> and <strong>SMS</strong>. It enabled cellular networks to track users between different cells, manage handovers, and deliver messages across various carriers.</p></li><li><p>SS7 also began to support <strong>Intelligent Network (IN) services</strong>, enabling advanced features like prepaid billing and number portability.</p></li></ul><h4><strong>Emergence of Security Concerns in the 2000s</strong></h4><ul><li><p>As telecommunications systems expanded globally, it became clear that SS7 had <strong>inherent security vulnerabilities</strong>. The system was originally designed with trust between operators, assuming that only trusted entities would have access to it.</p></li><li><p>However, as telecom networks became more interconnected, attackers began exploiting these trust assumptions. The ability to intercept calls, spoof phone numbers, and track users became possible by manipulating SS7 commands.</p></li></ul><h4><strong>SS7 Vulnerabilities Exposed in the 2010s</strong></h4><ul><li><p>Major SS7 vulnerabilities became public knowledge in the 2010s, with reports of hackers, nation-states, and surveillance companies exploiting the system for espionage.</p></li><li><p>Researchers and cybersecurity firms demonstrated how hackers could <strong>intercept SMS messages</strong> (including two-factor authentication codes) and listen in on phone calls by exploiting SS7 weaknesses.</p></li><li><p>The vulnerabilities in the SS7 (Signaling System 7) protocol were first brought to public attention in December 2014 by German researchers <a href="https://youtu.be/-wu_pO5Z7Pk?si=fi3xzYBuvFt8vgEY">Tobias Engel</a> and <a href="https://www.linkedin.com/in/karsten-nohl/">Karsten Nohl</a>. They independently uncovered weaknesses in the protocol and later collaborated to present their findings. These vulnerabilities allowed for the interception of phone calls, text messages, and the tracking of phone locations on a global scale. These vulnerabilities were previewed in an interview with <a href="https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/german-researchers-discover-a-flaw-that-could-let-anyone-listen-to-your-cell-calls-and-read-your-texts/">The Washington Post </a>before presenting them at the Chaos Communication Congress (<a href="https://en.wikipedia.org/wiki/Chaos_Communication_Congress">Wikipedia</a>) in December 2014.</p></li></ul><h4><strong>Present Day and Future of SS7</strong></h4><ul><li><p>As 5G networks continue to roll out, SS7 is being phased out (2G/3G) in favor of more modern protocols like <strong>Diameter</strong> for 4G and 5G networks. However, SS7 remains crucial for backward compatibility, meaning that vulnerabilities will continue to exist for some time.</p></li><li><p>Many mobile carriers have implemented <strong>firewalls and monitoring tools</strong> to detect and block SS7 attacks, but these efforts are not consistent across all regions.</p></li></ul><p>SS7&#8217;s development marks a significant evolution in global telecommunications, but its legacy is now intertwined with ongoing security challenges. Carriers and governments are now focusing on how to better secure signaling in the modern era while managing compatibility with existing infrastructure.</p><p>Sources on SS7 history:</p><ul><li><p>ITU-T standards documentation</p></li><li><p>Research articles from cybersecurity firms such as FireEye and Positive Technologies</p></li><li><p>Vertasium&#8217;s video on SS7 security vulnerabilities&#8203; &#8220;<a href="https://www.youtube.com/watch?v=wVyu7NB7W6Y">Exposing The Flaw In Our Phone System</a>&#8220;</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Who &amp; when were SS7 vulnerabilities discovered?</strong></h3><p>The vulnerabilities in the SS7 (Signaling System 7) protocol were first brought to public attention by German researchers <a href="https://x.com/2b_as">Tobias Engel</a> and <a href="https://www.linkedin.com/in/karsten-nohl/">Karsten Nohl</a>. They independently uncovered weaknesses during 2014 in the protocol and later collaborated to present their findings publically. These vulnerabilities allowed for the interception of phone calls, text messages, and the tracking of phone locations on a global scale.</p><p>SS7 was originally designed to ensure smooth call transitions between cell towers, but due to weak security measures, these functions could be exploited for surveillance. Tobias Engel previewed his findings in an interview with The Washington Post (<a href="https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/german-researchers-discover-a-flaw-that-could-let-anyone-listen-to-your-cell-calls-and-read-your-texts/">article</a>) before presenting them at the Chaos Communication Congress (CCC) (<a href="https://en.wikipedia.org/wiki/Chaos_Communication_Congress">Wikipedia</a>) in December 2014 (YouTube talk &#8220;<a href="https://youtu.be/-wu_pO5Z7Pk?si=fi3xzYBuvFt8vgEY">Tobias Engel: SS7: Locate. Track. Manipulate&#8221;</a>).</p><p>Karsten Nohl, known for his work in breaking GSM encryption, also contributed to the research, highlighting how these flaws could bypass network encryption for malicious purposes. Tobias Engel also has been speaking about some of the SS7 vulnerabilities as far back as 2008 at the 25th Chaos Communication Congress (CCC) convention talk entitled &#8220;<a href="https://youtu.be/OEcW4HlrpYE?si=spgZEHpjbxuRKLVB">25c3: Locating Mobile Phones using SS7</a>&#8220;.</p><p><strong>Here is the replay of his reveal speech on the <a href="https://youtu.be/-wu_pO5Z7Pk">CCC on 29th December 2014 in Berlin, Germany delivered by Tobias Engel</a></strong></p><div id="youtube2--wu_pO5Z7Pk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;-wu_pO5Z7Pk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/-wu_pO5Z7Pk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Vulnerabilities in the telecommunications system, specifically in the <strong>Signaling System 7 (SS7)</strong> protocol, have been known since the 1980s. SS7 was developed in 1975 to handle the exchange of information between different telecommunications networks. However, as the internet and digital communication grew, so did public awareness of its vulnerabilities.</p><p>So we can see that these weaknesses have been around for a while but the entire software industry has been pushing out 2 Factor Authentication primarily using SMS or Phone Call options. For example Microsoft products still have Phone call option. Most websites only have SMS based 2 factor authentication. This is a huge concern as we enter hyper connected world.</p><p>Lets now learn all about the global telecommunication system.</p><h2><strong>Basic Aspects of Telecommunications Networks Worldwide</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mfc7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mfc7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mfc7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mfc7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mfc7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mfc7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg" width="844" height="844" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:844,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of a global telecommunication network&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of a global telecommunication network" title="AI image of a global telecommunication network" srcset="https://substackcdn.com/image/fetch/$s_!mfc7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mfc7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mfc7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mfc7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f0459c1-af40-4403-9edd-6eb8b3f8110a_844x844.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Telecommunications network is an old &amp; new but necessary infrastructure that's under threat. Image by Meta AI</figcaption></figure></div><p>Telecommunications networks are complex systems that rely on various identifiers and protocols to manage devices, routes, and user accounts, facilitating seamless communication globally. Here are the basic aspects of telecommunications networks, including key elements like GTs, IMEI, and SIM numbers:</p><h3><strong>1. Global Title (GT)</strong></h3><ul><li><p><strong>Purpose</strong>: Used in SS7 signaling to route messages across networks.</p></li><li><p><strong>Function</strong>: Translates to Point Codes for directing signaling messages to the correct destination (e.g., SMS delivery, call routing). This system ensures efficient communication between mobile networks across regions or countries.</p></li></ul><h3><strong>2. IMEI (International Mobile Equipment Identity)</strong></h3><ul><li><p><strong>Purpose</strong>: Unique identifier for mobile devices.</p></li><li><p><strong>Function</strong>: Helps identify and track devices on the network, allowing carriers to block stolen phones or manage device capabilities.</p></li></ul><h3><strong>3. SIM Number (ICCID - Integrated Circuit Card Identifier)</strong></h3><ul><li><p><strong>Purpose</strong>: Unique identifier for the SIM card itself.</p></li><li><p><strong>Function</strong>: Links the SIM card to a specific mobile account, containing details about the country, issuing network, and a unique identifier.</p></li></ul><h3><strong>4. IMSI (International Mobile Subscriber Identity)</strong></h3><ul><li><p><strong>Purpose</strong>: Unique identifier for mobile subscribers.</p></li><li><p><strong>Function</strong>: Used by networks to authenticate the subscriber and manage services.</p></li></ul><h3><strong>5. MSISDN (Mobile Station International Subscriber Directory Number)</strong></h3><ul><li><p><strong>Purpose</strong>: Phone number associated with the SIM card.</p></li><li><p><strong>Function</strong>: Used for dialing and routing calls to the subscriber&#8217;s device.</p></li></ul><h3><strong>6. Network Elements</strong></h3><ul><li><p><strong>Mobile Switching Center (MSC)</strong>: Routes calls and messages, manages mobile services.</p></li><li><p><strong>Base Station Controller (BSC)</strong>: Manages base stations, handles resource allocation for calls.</p></li><li><p><strong>Home Location Register (HLR)</strong>: Database that stores subscriber information, including service profiles and current locations.</p></li></ul><h3><strong>7. Protocols</strong></h3><h4><strong>Protocols for 2G (GSM) / 3G (UMTS):</strong></h4><ul><li><p><strong>SS7 (Signaling System No. 7)</strong>: A set of protocols used for signaling in telephone networks (2G/3G and backwards compatible in 4G/LTE/5G networks), enabling call setup, routing, and SMS delivery. Key protocols in SS7 are:</p><ul><li><p><strong>MTP (Message Transfer Part):</strong> MTP Level 1 &amp; 2: Responsible for physical, data link, and error correction functions (similar to OSI layers 1 and 2). MTP Level 3: Provides network layer routing and message delivery between SS7 nodes. Delivers SMS signaling messages over the SS7 network for 2G and still used for 3G message routing and delivery.</p></li></ul><ul><li><p><strong>SCCP (Signaling Connection Control Part):</strong> Adds additional routing capabilities to MTP, enabling services like global title translation (used for routing messages based on phone numbers). Supports connection-oriented and connectionless communication. Routes SMS messages over SS7 for 2G and still used in 3G for message routing and delivery.</p></li></ul><ul><li><p><strong>TCAP (Transaction Capabilities Application Part)</strong>: Manages the setup, control, and teardown of signaling transactions (e.g., queries for databases like HLR/VLR).</p><p>Used for services such as mobile roaming, number portability, and SMS.</p></li></ul><ul><li><p><strong>MAP (Mobile Application Part):</strong> Manages mobile-specific signaling for tasks such as location updates, authentication, roaming, and SMS. Frequently used in mobile networks (GSM, UMTS) for communication between core network elements like HLR, VLR, and MSC. <strong>Purpose</strong>: Facilitates communication between network elements in 2G/3G (like Home Location Register (HLR), Visitor Location Register (VLR), and Mobile Switching Center (MSC)). <strong>Functionality</strong>: Supports tasks like location updates, roaming, and SMS delivery.</p></li></ul><ul><li><p><strong>ISUP (ISDN User Part):</strong> Manages call setup and teardown over SS7 for circuit-switched voice calls for 2G/3G. Handles the setup and teardown of voice and data calls over the public switched telephone network (PSTN). Facilitates call-related signaling for circuit-switched networks.</p></li></ul><ul><li><p><strong>BSSAP (Base Station System Application Part)</strong>:</p><ul><li><p><strong>Purpose</strong>: Operates in GSM to connect the Base Station Subsystem (BSS) with the core network (MSC).</p></li><li><p><strong>Functionality</strong>: Handles signaling between the BSC and MSC for voice calls and SMS routing.</p></li></ul></li></ul><ul><li><p><strong>3G Only: RANAP (Radio Access Network Application Part)</strong>: Manages signaling between the Radio Network Controller (RNC) and core network for SMS and voice calls/services.</p><ul><li><p><strong>Purpose</strong>: Used in 3G networks for communication between the Radio Network Controller (RNC) and the core network.</p></li><li><p><strong>Functionality</strong>: Manages radio access bearers, signaling for call setup, and mobility functions in 3G UMTS networks.</p></li></ul></li></ul></li></ul><ul><li><p><strong>GTP (GPRS Tunneling Protocol):</strong></p><ul><li><p><strong>Purpose</strong>: Handles user data transmission in 3G networks and beyond.</p></li><li><p><strong>Functionality</strong>: GTP-C manages control signaling for establishing sessions, while GTP-U encapsulates user data for transfer across the core network (e.g., between base stations and gateways).</p></li></ul></li><li><p><strong>A-interface (GSM A-Interface Protocol):</strong></p><ul><li><p><strong>Purpose</strong>: Connects the Base Station Controller (BSC) to the Mobile Switching Center (MSC) in 2G (GSM) networks.</p></li><li><p><strong>Functionality</strong>: Manages voice call setup, handovers, and mobility between base stations.</p></li></ul></li></ul><h4><strong>Protocols for 4G/LTE:</strong></h4><ul><li><p><strong>Diameter</strong>: Used for authentication, authorization, and accounting (AAA) between network elements. Replaces the older SS7 protocol used in 2G/3G for certain functions.</p></li></ul><ul><li><p><strong>SGsAP (SGs Application Part)</strong>: Supports SMS over LTE, allowing SMS delivery even when the user is on an LTE-only network.</p></li><li><p><strong>IP-SM-GW (IP Short Message Gateway)</strong>: Provides SMS transmission over IP-based networks (for 4G).</p></li><li><p><strong>VoLTE (Voice over LTE)</strong>: Voice calls are transmitted over LTE&#8217;s IP-based network using the IMS (IP Multimedia Subsystem).</p></li><li><p><strong>SIP (Session Initiation Protocol)</strong>: Manages call setup, control, and teardown in IMS-based voice calls.</p></li><li><p><strong>SRVCC (Single Radio Voice Call Continuity)</strong>: Manages handovers of voice calls between LTE (packet-switched) and 2G/3G (circuit-switched) networks.</p></li></ul><ul><li><p><strong>GTP (GPRS Tunneling Protocol):</strong> The GTP-C (Control Plane) manages signaling for session establishment, mobility, and traffic forwarding. GTP-U (User Plane) is responsible for data encapsulation and user data transmission.</p></li></ul><ul><li><p><strong>S1-AP (S1 Application Protocol):</strong></p><ul><li><p>Purpose: Manages signaling between the LTE eNodeB (base station) and the core network (MME).</p></li><li><p>Functionality: Handles procedures such as session establishment, mobility management, and resource allocation in LTE.</p></li></ul></li></ul><ul><li><p><strong>X2-AP (X2 Application Protocol)</strong>:</p><ul><li><p><strong>Purpose</strong>: Facilitates communication between neighboring LTE eNodeBs (base stations).</p></li><li><p><strong>Functionality</strong>: Manages tasks like handovers (when a user moves between base stations) and load balancing to optimize network performance.</p></li></ul></li></ul><ul><li><p><strong>NAS (Non-Access Stratum)</strong>:</p><ul><li><p><strong>Purpose</strong>: Manages communication between the user equipment (UE) and the core network for tasks not related to the radio access layer. Handles SMS signaling in LTE networks.</p></li><li><p><strong>Functionality</strong>: Handles signaling for authentication, mobility, and session management, ensuring secure and smooth connectivity in the network.</p></li></ul></li></ul><h4><strong>Protocols for 5G:</strong></h4><ul><li><p><strong>HTTP/2 (major revision of the HTTP (Hypertext Transfer Protocol)):</strong> Replaces Diameter for signaling in the 5G core network. It&#8217;s used for authentication, session management, and resource allocation in the 5G Core (5GC). <strong>Purpose</strong>: Used primarily for web-based services in 5G networks, enhancing web performance due to its multiplexing, header compression, and server push features. <strong>Usage</strong>: Ideal for applications requiring low latency and high throughput, such as video streaming and interactive applications.</p><ul><li><p><strong>HTTP/3 (Future Use):</strong> Purpose: An evolution of HTTP/2, based on QUIC (Quick UDP Internet Connections), which is designed to reduce latency further. Usage: May be utilized in future 5G applications for real-time communication and services, taking advantage of its lower latency and faster connection establishment.</p></li></ul><ul><li><p><strong>IMS (IP Multimedia Subsystem)</strong>: If available, 5G sends SMS via IMS using IP-based messaging protocols. Provides the framework for managing voice services over IP in 5G.</p></li><li><p><strong>SMSF (SMS Function)</strong>: A dedicated function in the 5G core for handling SMS.</p></li><li><p><strong>VoNR (Voice over New Radio)</strong>: 5G voice calls are managed entirely over the 5G NR air interface using IMS.</p></li><li><p><strong>SIP (Session Initiation Protocol)</strong>: Continues to manage call setup and teardown for 5G voice calls.</p></li></ul></li></ul><ul><li><p><strong>NGAP (Next-Generation Application Protocol):</strong></p><ul><li><p><strong>Purpose</strong>: Manages signaling between the 5G core network and the gNodeB (5G base station) and the Radio Access Network (RAN).</p></li><li><p><strong>Functionality</strong>: Controls functions like session management, mobility, and resource allocation in 5G networks. Manages control plane signaling for establishing and maintaining connections and session management.</p></li></ul></li></ul><ul><li><p><strong>SDAP (Service Data Adaptation Protocol):</strong></p><ul><li><p><strong>Purpose</strong>: Ensures Quality of Service (QoS) for user data in 5G by mapping traffic to specific QoS levels.</p></li><li><p><strong>Functionality</strong>: Adapts user data into the 5G air interface, helping prioritize different types of services (e.g., streaming vs. voice calls).</p></li></ul></li></ul><ul><li><p><strong>NAS (Non-Access Stratum):</strong></p><ul><li><p><strong>Purpose</strong>: Handles signaling between the user equipment (device) and the core network in 4G and 5G. Manages SMS signaling in 5G as it does in 4G.</p></li><li><p><strong>Functionality</strong>: Manages processes like authentication, security, mobility, and session management.</p></li></ul></li></ul><ul><li><p><strong>GTP (GPRS Tunneling Protocol)</strong>:</p><ul><li><p><strong>Purpose</strong>: Encapsulates user data for transmission across networks in both 4G and 5G.</p></li><li><p><strong>Functionality</strong>: GTP-C handles control signaling, while GTP-U transmits user data, facilitating data transfer between network nodes (e.g., base stations, gateways).</p></li></ul></li></ul><h3><strong>8. Standards</strong></h3><ul><li><p><strong>2G (2nd Generation)</strong>: A second-generation mobile network standard that introduced digital voice transmission and text messaging (SMS). It marked the transition from analog to digital, improving call quality and enabling features like roaming and more efficient use of the radio spectrum.</p></li></ul><ul><li><p><strong>3G (3rd Generation)</strong>: Third-generation mobile communication technology that provided enhanced data rates and capabilities, enabling mobile internet access, video calling, and multimedia services. It introduced packet-switched data transmission, improving the overall efficiency of mobile data services.</p></li></ul><ul><li><p><strong>4G(4th Generation)</strong>: Fourth-generation mobile communication standard offering significantly faster data speeds and improved network capacity compared to its predecessors. It supports high-definition video streaming, online gaming, and other bandwidth-intensive applications, with LTE (Long-Term Evolution) as its most widely adopted variant.</p></li></ul><ul><li><p><strong>LTE (Long-Term Evolution)</strong>: A standard for wireless broadband communication, facilitating high-speed data transmission. Another name for it is 4G. LTE enhances mobile internet connectivity with lower latency, increased capacity, and improved spectral efficiency, making it suitable for high-definition multimedia services.</p></li></ul><ul><li><p><strong>5G (5th Generation)</strong>: Fifth-generation mobile communication technology that revolutionizes wireless connectivity with ultra-fast data speeds, low latency, and massive device connectivity. It supports advanced applications like IoT (Internet of Things), autonomous vehicles, and augmented/virtual reality, enabling smart cities and enhanced user experiences. 5G is built on top of 4G and works along 4G protocols.</p></li></ul><ul><li><p><strong>6G (6th Generation):</strong> Sixth-generation mobile communication technology that aims to revolutionize connectivity with ultra-high data speeds, expected to exceed 100 Gbps. It focuses on ultra-low latency, potentially as low as 1 millisecond, and will integrate advanced technologies such as AI, machine learning, and terahertz frequency bands. 6G is anticipated to support innovative applications like holographic communication, enhanced augmented reality (AR), and massive Internet of Things (IoT) deployments, enabling a more interconnected and intelligent world. Countries like <strong>China, the United States, South Korea, and Japan</strong> are investing heavily in research to develop 6G standards and technologies. Other countries are lagging in this.</p></li></ul><h3><strong>9. Types of Networks</strong></h3><ul><li><p><strong>Public Switched Telephone Network (PSTN)</strong>: Traditional circuit-switched telephone network.</p></li><li><p><strong>Mobile Networks</strong>: Cellular networks that provide mobile communication services.</p></li><li><p><strong>VoIP (Voice over Internet Protocol)</strong>: Technology that enables voice calls over the internet.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Why is the Global Telecommunications Network Vulnerable?</strong></h2><p>The telecommunications networks&#8217; vulnerability stems from its complexity, interconnectivity, inconsistent security practices, and the high value of the data it manages. These factors create multiple avenues for potential threats, necessitating robust security measures and collaboration among providers to mitigate risks. The telecommunications industry is vulnerable due to several factors, especially given the presence of over 12,000 providers globally. Here are some key reasons:</p><h3><strong>1. Diverse Infrastructure</strong></h3><ul><li><p><strong>Complexity</strong>: Many providers have different technologies, protocols, and systems, making integration and security challenging.</p></li><li><p><strong>Legacy Systems</strong>: Some networks still use outdated technology, which may have security vulnerabilities.</p></li></ul><h3><strong>2. Interconnectivity</strong></h3><ul><li><p><strong>Network Dependencies</strong>: Providers often rely on each other for services, creating multiple points of failure.</p></li><li><p><strong>Routing Vulnerabilities</strong>: Interconnected systems can be exploited to reroute traffic, leading to potential interception or data breaches.</p></li></ul><h3><strong>3. Inconsistent Security Standards</strong></h3><ul><li><p><strong>Varied Practices</strong>: Different providers may implement security measures inconsistently, leaving gaps that can be exploited.</p></li><li><p><strong>Regulatory Differences</strong>: Varying regulations across countries can lead to weaker protections in some regions.</p></li></ul><h3><strong>4. High Target Value</strong></h3><ul><li><p><strong>Data Richness</strong>: Telecom networks handle vast amounts of personal and financial data, making them attractive targets for cybercriminals.</p></li><li><p><strong>Service Disruption</strong>: Attacks on telecom infrastructure can disrupt services, causing significant economic impact.</p></li></ul><h3><strong>5. Supply Chain Vulnerabilities</strong></h3><ul><li><p><strong>Third-party Risks</strong>: Many telecom companies rely on third-party vendors for equipment and services, which can introduce vulnerabilities.</p></li><li><p><strong>Software Dependencies</strong>: Vulnerabilities in software used across networks can compromise entire systems.</p></li></ul><h3><strong>6. Human Factors</strong></h3><ul><li><p><strong>Insider Threats</strong>: Employees may inadvertently or intentionally compromise security through negligence or malicious actions.</p></li><li><p><strong>Social Engineering</strong>: Employees can be targeted through phishing or other tactics to gain access to sensitive information.</p></li></ul><h3><strong>7. Rapid Technological Changes</strong></h3><ul><li><p><strong>Innovation Pace</strong>: The fast evolution of technology can outstrip security measures, leaving systems exposed.</p></li><li><p><strong>IoT Integration</strong>: The rise of IoT devices adds more entry points and complexity, increasing the attack surface.</p></li></ul><p>But what about the risks to small businesses?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Why Are Small Businesses at Risk?</strong></h2><p>While large enterprises may have the resources to implement advanced security solutions, small businesses often lack the dedicated IT teams and budgets to stay ahead of evolving threats.</p><p>However, they are just as reliant on mobile communication, making them equally susceptible to SS7 and other signaling protocol attacks. Additionally, small businesses may assume that cybercriminals won&#8217;t target them, which can lead to complacency.</p><p>Small businesses face significant cybersecurity risks due to various factors, despite being critical players in the economy. Here&#8217;s a detailed look at why they are particularly vulnerable:</p><h4><strong>1. Limited Resources</strong></h4><ul><li><p><strong>Budget Constraints</strong>: Small businesses often operate with tight budgets, which can restrict their ability to invest in advanced cybersecurity solutions and tools.</p></li><li><p><strong>Lack of Dedicated IT Teams</strong>: Many small businesses don&#8217;t have full-time IT staff. This limits their capacity to monitor, manage, and respond to security threats effectively.</p></li></ul><h4><strong>2. Dependence on Mobile Communication</strong></h4><ul><li><p><strong>Reliance on Telecommunications</strong>: Small businesses use mobile communication for operations, customer interactions, and transactions, making them reliant on the same signaling protocols that larger enterprises use.</p></li><li><p><strong>Vulnerability to SS7 Attacks</strong>: Just like larger organizations, small businesses can be targeted through vulnerabilities in SS7 and other signaling protocols, potentially leading to data breaches or service disruptions.</p></li></ul><h4><strong>3. Assumptions About Targeting</strong></h4><ul><li><p><strong>Complacency</strong>: Many small business owners mistakenly believe they are not significant enough to attract cybercriminals, leading to a false sense of security.</p></li><li><p><strong>Underestimating Threats</strong>: Small businesses often overlook the fact that cybercriminals frequently target smaller entities, viewing them as easier targets with less robust defenses.</p></li></ul><h4><strong>4. Lack of Awareness and Training</strong></h4><ul><li><p><strong>Insufficient Cybersecurity Training</strong>: Employees in small businesses may not receive adequate training on cybersecurity best practices, making them more susceptible to phishing and social engineering attacks.</p></li><li><p><strong>Ignorance of Risks</strong>: Without proper awareness, staff might engage in risky behaviors, such as using weak passwords or ignoring software updates.</p></li></ul><h4><strong>5. Inadequate Security Measures</strong></h4><ul><li><p><strong>Basic Security Solutions</strong>: Small businesses may only implement basic security measures, such as antivirus software, which may not be sufficient against sophisticated threats.</p></li><li><p><strong>Failure to Conduct Risk Assessments</strong>: Many small businesses do not regularly evaluate their cybersecurity posture or conduct risk assessments, leaving them unaware of vulnerabilities.</p></li></ul><h4><strong>6. Third-party Dependencies</strong></h4><ul><li><p><strong>Vendor Risks</strong>: Small businesses often rely on third-party vendors for software and services. If these vendors lack strong security practices, it can expose the small business to potential attacks.</p></li><li><p><strong>Supply Chain Vulnerabilities</strong>: An attack on a third-party provider can lead to cascading effects, impacting the small business indirectly.</p></li></ul><h4><strong>7. Regulatory Compliance Challenges</strong></h4><ul><li><p><strong>Complex Regulations</strong>: Small businesses may struggle to understand and comply with relevant cybersecurity regulations, exposing them to legal risks.</p></li><li><p><strong>Resource Constraints for Compliance</strong>: Meeting compliance requirements often demands resources and expertise that small businesses may lack.</p></li></ul><p>Small businesses are at risk due to their limited resources, reliance on mobile communication, complacency about cyber threats, and inadequate security measures. To mitigate these risks, small businesses should prioritize cybersecurity awareness, invest in appropriate solutions, and regularly assess their security posture. By understanding their vulnerabilities and taking proactive measures, they can enhance their defenses against evolving threats.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>How SS7 Attacks Work?</strong></h2><p>SS7 (Signaling System No. 7) attacks exploit vulnerabilities in the telecommunications signaling system that governs how mobile networks communicate. Here&#8217;s an in-depth look at how these attacks are executed and their implications:</p><h4><strong>1. Accessing the SS7 Network</strong></h4><ul><li><p><strong>Unauthorized Access</strong>: Hackers often gain access to the SS7 network through compromised telecom infrastructure or by exploiting weak security practices in telecom companies. Since SS7 was designed in a more trusting era, it lacks robust authentication mechanisms.</p></li><li><p><strong>Interconnectedness</strong>: The global nature of telecom networks means that once a hacker breaches one network, they may have a pathway to access others, facilitating widespread attacks.</p></li></ul><h4><strong>2. Call Interception</strong></h4><ul><li><p><strong>Listening In</strong>: Once hackers are inside the SS7 network, they can intercept calls. This is typically done by routing the call through their own device, allowing them to listen in without the user being aware.</p></li><li><p><strong>No Trace Left</strong>: The nature of SS7 allows for this interception to occur without alerting the user or the telecom provider, making it particularly stealthy.</p></li></ul><h4><strong>3. SMS Interception</strong></h4><ul><li><p><strong>Reading Texts</strong>: Hackers can intercept SMS messages, enabling them to read sensitive texts intended for the target. This includes personal messages, verification codes, or any other communication.</p></li><li><p><strong>Potential Consequences</strong>: Intercepted texts can lead to unauthorized access to accounts, as many systems still use SMS as a verification method.</p></li></ul><h4><strong>4. Location Tracking</strong></h4><ul><li><p><strong>Pinpointing Location</strong>: By exploiting SS7 vulnerabilities, hackers can access a user&#8217;s location data in real time. This allows them to track the movements of individuals or assets.</p></li><li><p><strong>Privacy Risks</strong>: This can lead to significant privacy violations and is particularly concerning for high-profile individuals or those in sensitive situations.</p></li></ul><h4><strong>5. SIM Swapping</strong></h4><ul><li><p><strong>Transferring Phone Numbers</strong>: In a SIM swapping attack, a hacker can convince a telecom provider to transfer a target&#8217;s phone number to a new SIM card controlled by the hacker. This often involves social engineering techniques, such as impersonating the target.</p></li><li><p><strong>Gaining Control</strong>: Once the phone number is on the hacker&#8217;s SIM, they can receive calls, texts, and two-factor authentication (2FA) codes, effectively taking control of the target&#8217;s accounts.</p></li></ul><h3><strong>How SS7 Attacks Typically Occur</strong></h3><p>Here&#8217;s a simple breakdown of how SS7 attacks typically occur in sequence:</p><ol><li><p><strong>Accessing the SS7 Network</strong>: Hackers gain unauthorized access to the SS7 network, which isn&#8217;t as difficult as it sounds, due to the interconnectedness of global telecom networks.</p></li><li><p><strong>Intercepting Calls or SMS</strong>: Once inside, they can monitor voice calls, SMS messages, and even location data in real time.</p></li><li><p><strong>Hijacking 2FA Codes</strong>: By intercepting SMS-based 2FA messages, they can access email accounts, banking systems, or corporate networks, effectively bypassing this critical security measure.</p></li></ol><p>SS7 attacks exploit inherent vulnerabilities in the telecommunications signaling system, allowing hackers to intercept calls and SMS, track locations, and execute SIM swapping.</p><p>The interconnected nature of global telecom networks makes unauthorized access easier, resulting in serious security implications for users and businesses. Understanding these vulnerabilities is crucial for both telecom providers and users to bolster defenses against such attacks.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>How difficult are SS7 exploits to undertake?</strong></h3><p>SS7 exploits are difficult to perform but not impossible, especially for attackers with enough resources and access to telecommunications networks. Here&#8217;s an overview of the complexity involved:</p><h4><strong>1. High-Level Access</strong></h4><ul><li><p>SS7 exploits require <strong>direct access to the global telecommunications network</strong>, which is not easily attainable. Only telecommunications companies, or those with special access to these systems (through hacking, insider help, or buying access on black markets), can directly interact with SS7.</p></li><li><p><strong>Difficulty</strong>: Gaining access to SS7 networks is not something a casual hacker can do. It typically requires significant resources, advanced knowledge, or insider assistance.</p></li></ul><h4><strong>2. Specialized Knowledge</strong></h4><ul><li><p>An attacker would need detailed <strong>technical knowledge</strong> of SS7 protocols and how mobile networks handle communication.</p></li><li><p>This kind of knowledge is not easily accessible to the average hacker. While some vulnerabilities are well-documented, practical knowledge of how to exploit them takes years of specialized training or collaboration with other experts.</p></li></ul><h4><strong>3. Resources</strong></h4><ul><li><p>Conducting SS7 attacks often involves <strong>expensive equipment</strong> and considerable financial resources. Tools to intercept SS7 traffic and inject commands into networks are specialized and costly.</p></li><li><p>Governments, large criminal organizations, and well-funded actors typically have the resources to mount such an attack.</p></li></ul><h4><strong>4. Stealth &amp; Detection</strong></h4><ul><li><p>SS7 attacks must often be conducted stealthily to avoid detection by the telecom company or the user. This adds another layer of complexity, as security teams at mobile carriers can detect unusual traffic or activity in SS7 protocols.</p></li></ul><h4><strong>5. Success Rate</strong></h4><ul><li><p>Even with access and resources, an attacker&#8217;s success is not guaranteed. Mobile carriers constantly update their security measures, and the global push toward securing telecom systems means the window for SS7 vulnerabilities is closing.</p></li><li><p><strong>Targeting</strong>: SS7 attacks are generally reserved for high-value targets (e.g., politicians, business executives) rather than the average person.</p></li></ul><p>SS7 exploits are complex, costly, and generally out of reach for everyday hackers. However, they remain a threat from sophisticated actors such as nation-states or highly organized cybercrime syndicates. Because of the high level of difficulty, SS7 vulnerabilities are more of a concern for high-profile individuals rather than regular users. Nonetheless, it&#8217;s a good practice to avoid SMS-based 2FA due to the potential for such attacks.</p><p>Let&#8217;s now learn how to mitigate the threats to small business.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>SS7 Mitigation Strategies for Small Business</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XqSc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XqSc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XqSc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XqSc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XqSc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XqSc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg" width="844" height="562" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:562,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;2 women next to computer&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="2 women next to computer" title="2 women next to computer" srcset="https://substackcdn.com/image/fetch/$s_!XqSc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XqSc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XqSc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XqSc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40c0520f-02b7-4ff7-acc4-f722c645f978_844x562.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Every business including sole traders and small businesses need to take action on SS7 threats. Image from Unsplash / LinkedIn Sales Solutions</figcaption></figure></div><ul><li><p><strong>Multi-Factor Authentication (MFA):</strong> Enable MFA on your mobile account. This adds an extra layer of security, making it harder for hackers to access your account even if they compromise your password.</p></li></ul><ul><li><p><strong>Change to strong passwords:</strong> Change your passwords regularly, using strong combinations of letters, numbers, and symbols. Avoid using easily guessable information. I would say regular changes to those passwords is necessary for weak services and websites with poor cybersecurity practices. For sites with multi factor authentication (multiple forms of authentication other than password) it&#8217;s probably not necessary to change passwords too often. As regards Passkey technology being pushed by some top corporations - this technology is in early state and can be a bit fiddly - so I would suggest small business wait till everyone embraces it. Passkeys are like IPv6 - not used widely yet but it would mean never remembering passwords as there would be non.</p></li></ul><ul><li><p><strong>Beware of Phishing Attempts:</strong> Be cautious of suspicious emails, texts, or calls asking for personal information. Never click on links or download attachments from unknown sources.</p></li></ul><ul><li><p><strong>Limit Personal Information Sharing:</strong> Avoid sharing sensitive information like your full address, date of birth, or social security number over the phone or online, especially with unfamiliar individuals or organizations.</p></li></ul><ul><li><p><strong>Use Secure Messaging Apps:</strong> For sensitive communication, consider using encrypted messaging apps like WhatsApp, Signal, or Telegram (Although after recent revelations on Telegram I would be cautious in using it as Telegram I&#8217;m told has vulnerabilities or back doors for state actors - not really sure - investigate the allegations yourself as its a developing story).</p></li></ul><ul><li><p><strong>Monitor Your Account Activity:</strong> Regularly check your mobile account statements for any unusual activity, such as unauthorized calls or data usage. Report any suspicious activity to your mobile carrier immediately.</p></li></ul><ul><li><p><strong>Choose a Reputable Carrier:</strong> Select a mobile carrier with a strong security reputation and that takes proactive measures to protect its customers from SS7 attacks. I made a large list of reputable mobile carriers worldwide to help you make decisions - go to heading &#8220;<strong><a href="https://www.cyberkite.com.au/post/how-to-defend-against-ss7-vulnerabilities#viewer-fa6l823595">Partner with a Reputable Mobile Carrier (Large List of Countries)</a></strong>&#8220;</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Key ways to defend against SS7 attacks</strong></h3><p>While small businesses may not be able to control the weaknesses of SS7 directly, there are several steps you can take to mitigate risks and protect your operations.</p><h4><strong>1. Switch from SMS-Based 2FA to App-Based Authentication</strong></h4><ul><li><p><strong>Problem</strong>: SS7 attacks can intercept SMS messages, making SMS-based two-factor authentication (2FA) vulnerable.</p></li><li><p><strong>Solution</strong>: Use app-based 2FA solutions like Google Authenticator, Authy, or Microsoft Authenticator. These apps generate time-based one-time passcodes (TOTP) that are not sent over the network, thus removing the risk of interception. Setup everything like that and remove SMS as a recovery option.</p><ul><li><p><strong>BUT CAUTION IS ADVISED</strong>: While removing SMS as a recovery option, ensure you have multiple backup methods to regain access if needed. Eliminating SMS as a recovery option is a crucial step in defending against SS7 attacks. By switching to app-based authentication, implementing robust backup recovery options, educating users, and continuously monitoring security, small businesses can significantly enhance their security posture. Careful planning and execution are key to ensuring a smooth transition while maintaining access to critical accounts. Here is suggestion actions:</p><ul><li><p><strong>Backup or Recovery Codes</strong>: Generate a set of backup codes when setting up 2FA. Store these codes securely offline. Microsoft and Google accounts under Security Tab then under the section for 2 Factor either generate 10 codes or one recovery code.</p></li><li><p><strong>Email Recovery</strong>: Use a secure email address with strong security measures for recovery, but ensure it&#8217;s also protected with 2FA that doesn&#8217;t use SMS or Phone call verification. Minimize access to the recovery email to prevent it from being compromised.</p></li><li><p><strong>Authenticator App Backup setting</strong>: Some apps allow you to backup your settings to a secure cloud service. Both Google Authenticator and Microsoft Authenticator have cloud backup into selected accounts. Turn that on in the app.</p></li><li><p><strong>Get Hardware Security Keys or Tokens (YubiKey, Google Titan, etc.)</strong>: Provides top-tier security because it requires physical access to a token for authentication. Hardware tokens aren&#8217;t vulnerable to SS7 or 5G vulnerabilities. Less convenient than SMS or authentication apps since you need to carry the token with you. If lost, the hardware token can lock you out unless you have backups or alternative methods so I suggest this option should be a backup and keep it in a safe place in case you lose your phone or computer and need to get back in.</p><ul><li><p><strong>Suggestions on products as at 2024:</strong></p><ul><li><p>YubiKey 5 Series (Best choice - Overall security and versatility)</p></li><li><p>Google Titan Security Key (only available in some countries)</p></li><li><p>Feitian ePass K9 (Budget-friendly, multi-protocol support.)</p></li><li><p>SoloKeys USB-C/NFC (for Open-source enthusiasts)</p></li><li><p>Thetis FIDO U2F Security Key (Affordable, basic security needs)</p></li></ul></li></ul></li></ul></li></ul></li></ul><h4><strong>2. Encourage the Use of Encrypted Communication Apps</strong></h4><ul><li><p><strong>Problem</strong>: SS7 exploits can allow hackers to eavesdrop on voice calls and messages.</p></li><li><p><strong>Solution</strong>: Encourage your employees to use encrypted communication apps such as WhatsApp, Signal, or Telegram, which offer end-to-end encryption, making intercepted data unreadable. Especially when sharing passwords, sensitive information like banking and other sensitive details.</p></li></ul><h4><strong>3. Secure Your Business Phones with Strong Encryption</strong></h4><ul><li><p><strong>Problem</strong>: Even if the SS7 network is compromised, strong encryption on the device can prevent hackers from accessing sensitive data.</p></li><li><p><strong>Solution</strong>: Ensure that all business phones are encrypted. Both Android and iOS devices offer built-in encryption, which should be enabled as part of standard device setup.</p></li></ul><h4><strong>4. Use Virtual Private Networks (VPNs) for Remote Work</strong></h4><ul><li><p><strong>Problem</strong>: Unsecured networks (like public Wi-Fi) expose mobile devices to a variety of cyberattacks.</p></li><li><p><strong>Solution</strong>:</p><ul><li><p>A Virtual Private Network (VPN) can encrypt your internet traffic, making it more difficult for hackers to intercept your data. Ensure that employees use a VPN whenever they access company systems remotely. This encrypts all traffic between the device and the internet, offering an additional layer of security.</p></li><li><p>Avoid using public Wi-Fi networks for sensitive activities like online banking or shopping, as they may be less secure.</p></li></ul></li></ul><h4><strong>5. Implement Multi-Layered Security Policies</strong></h4><ul><li><p><strong>Problem</strong>: Relying on just one layer of security (like 2FA) is not enough when faced with sophisticated attacks.</p></li><li><p><strong>Solution</strong>: Deploy a multi-layered approach to security that includes:</p><ul><li><p>Strong, unique passwords for each system.</p></li><li><p>Regular employee training on phishing and social engineering attacks.</p></li><li><p>Network firewalls and intrusion detection systems (IDS).</p></li></ul></li></ul><h4><strong>6. Monitor and Audit Mobile Security Regularly</strong></h4><ul><li><p><strong>Problem</strong>: New vulnerabilities and attack methods emerge all the time.</p></li><li><p><strong>Solution</strong>: Regularly audit your mobile and network security. Consider hiring a cybersecurity expert or consulting firm to conduct penetration testing and identify potential vulnerabilities in your system. <strong>Cyberkite offers bimonthly, quarterly, 6 monthly and yearly cybersecurity&#8217;s checks for small businesses in Australia.</strong> Learn more on that: <strong><a href="https://cyberkite.com.au/cybersecurity">cyberkite.com.au/cybersecurity</a></strong></p></li></ul><h4><strong>7. Educate Employees and Users</strong></h4><ul><li><p><strong>Awareness Training</strong>: Conduct regular training sessions on the importance of security practices, including recognizing phishing attempts and understanding the risks associated with SMS.</p></li><li><p><strong>Clear Instructions</strong>: Provide clear guidance on how to set up app-based authentication and backup recovery options if they require staff to setup themselves to make sure incorrect authentication options aren&#8217;t set.</p></li></ul><h4><strong>8. Monitor Account Activity</strong></h4><ul><li><p><strong>Real-Time Alerts</strong>: Set up real-time notifications for any suspicious account activity, such as login attempts from unrecognized devices or locations.</p></li><li><p><strong>Regular Account Checks</strong>: Encourage users to regularly check their account activity for unauthorized actions.</p></li></ul><h4><strong>9. Keep Your Software Updated</strong></h4><ul><li><p><strong>Problem</strong>: Devices and applications may not be up to date and have much weaker security protections.</p></li><li><p><strong>Solution</strong>: Ensure your mobile device&#8217;s operating system and apps are always up-to-date with the latest security patches.</p></li></ul><p>While SS7 vulnerabilities remain a challenge, by following these guidelines, you can significantly reduce your risk of falling victim to attacks and protect your personal information.</p><p>Some additional questions arise.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4><strong>Q: Does adding +XXX country codes by user help defend against SS7 threats?</strong></h4><p>As a phone user: Using <strong>+ country codes</strong> (+61 ) for phone numbers alone does not prevent or mitigate SS7 vulnerabilities. While dialing with the international format (including the +country code) ensures that numbers are routed correctly, it does not address the inherent security weaknesses in the SS7 protocol itself.</p><p>The vulnerabilities in SS7 arise from the way signaling messages are handled, especially for tasks like call setup, SMS routing, and inter-network roaming. Attackers can intercept or manipulate these messages due to a lack of encryption and authentication in the protocol.</p><p>To defend against SS7 vulnerabilities, use of complete phone numbers with country code (+XXX) (instead of just local non country codes numbers) needs to be <strong>enforced at the carrier level</strong>. This could include:</p><ul><li><p><strong>Encryption and authentication</strong> of signaling messages</p></li><li><p><strong>Monitoring SS7 traffic</strong> for suspicious patterns (e.g., unexpected message routing)</p></li><li><p>Implementing <strong>firewalls</strong> specifically designed for SS7 traffic</p></li><li><p>Transitioning to newer protocols like <strong>Diameter</strong> (for 4G/5G), though even these have vulnerabilities that need to be properly managed.  <strong>Idea? </strong>Perhaps eliminating 2G/3G networks with weaker protocols from the carriers network which is happening in some countries like Australia but very cautiously to avoid outages to devices that rely on 2G/3G networks.</p></li></ul><p>The solution needs to come from the carriers with robust security measures on their networks, not through customer dialing habits. In summary, as a user, adding country codes helps with routing but does not protect against SS7 vulnerabilities, which require infrastructure-level defenses from telecom operators.</p><h4><strong>Q: Is getting rid of 2G/3G in a country going to stop SS7 threats?</strong></h4><p>Switching off 2G or 3G networks can reduce the risk of SS7 (Signaling System 7) vulnerabilities, but it won&#8217;t completely eliminate them. Here&#8217;s why:</p><ul><li><p><strong>SS7 vulnerabilities primarily affect older networks: </strong>2G and 3G networks rely on SS7 for signaling and inter-network communication. These networks are more vulnerable to SS7-based attacks, which can allow attackers to intercept calls, track location, or eavesdrop on conversations. Many third world countries still rely and will rely on 2G/3G networks for years to come and uptake of low cost 4G mobile phones for users will take considerable time.</p></li></ul><ul><li><p><strong>Modern networks use different protocols:</strong> 4G (LTE) and 5G networks use newer signaling protocols, such as Diameter, SIP, HTTP/2 and GTP, which have stronger security mechanisms. However, SS7 is still used for backward compatibility, meaning that some vulnerability remains as long as the network interacts with older systems and older networks.</p></li></ul><ul><li><p><strong>What happens after shutting down 2G/3G</strong>:</p><ul><li><p><strong>If a network still has fall back to 3G if low signal:</strong> By shutting off 2G or 3G networks, a country can reduce the attack surface for SS7-related threats. This forces users onto 4G and 5G networks, which are more secure. However, if any fallback or interconnection to SS7 is still in place (for roaming or legacy devices), some risks could persist.</p></li><li><p><strong>Inoperative Devices after switchover</strong>: The other issue of phasing out 2G/3G is so many devices are hard wired to work on 2G or 3G devices so some backwards compatibility for the related protocols may have to remain or politicians may face backlash from the public as per the developing story in Australia about their plans to phase out 3G.</p></li></ul></li></ul><h4><strong>Q: What&#8217;s the impact of getting rid of 3G network?</strong></h4><p>For example, in 2024 in Australia as telecoms get ready to switch off 3G here are the device types that will be affected. Telecom companies are working to provide $0 or low cost replacement phones and help address other devices but the list is big so this may be a costly and painful switch over:</p><ol><li><p><strong>Older smartphones and feature phones:</strong> Devices released before around 2015 are likely to only support 2G or 3G networks. These devices will no longer be able to connect to the internet or make calls once 3G is switched off.</p></li><li><p><strong>IoT devices:</strong> Many Internet of Things (IoT) devices, such as smart home gadgets, wearables, and automotive systems, rely on 3G networks for connectivity. These devices may become inoperable or have limited functionality without 3G.</p></li><li><p><strong>Fallback connections for ATMs</strong>: Some ATMs may use 3G or 4G networks as a backup or secondary communication channel. If the primary network fails, the ATM might rely on 3G as a fallback. In such cases, a 3G shutdown could temporarily affect the ATM&#8217;s functionality. Also remote monitoring and management may use 3G in ATMs.</p></li><li><p><strong>Emergency services:</strong> Some emergency services, especially in rural areas, may rely on 3G networks for communication. A shutdown could potentially disrupt their operations.</p></li><li><p><strong>Rural and remote areas:</strong> Areas with limited 4G or 5G coverage may rely heavily on 3G. Residents in these areas could experience disruptions to their communication services.</p></li><li><p><strong>Medical devices:</strong> Some medical devices, such as remote patient monitoring systems or telemedicine equipment, may rely on 3G for connectivity. A shutdown could disrupt their functionality.</p></li><li><p><strong>Industrial devices:</strong> Certain industrial devices, such as remote sensors or control systems, may use 3G for communication. These devices could be affected by a shutdown.</p></li><li><p><strong>Transportation systems:</strong> Some transportation systems, such as public buses or trains, may use 3G for communication between vehicles and control centers. A shutdown could potentially disrupt operations.</p></li><li><p><strong>Security systems:</strong> Some security systems, such as home alarm systems or surveillance cameras, may use 3G for connectivity. A shutdown could affect their functionality.</p></li><li><p>There may be other devices.</p></li></ol><p><strong>Advice for Australians and other nations when 2G or 3G is planned for switch off:</strong></p><ul><li><p><a href="https://amta.org.au/3g-closure/">ATMA 3G Closure website</a></p></li><li><p><a href="https://www.acma.gov.au/3g-network-switch">ACMA 3G Network switch off website</a></p></li><li><p><a href="https://www.infrastructure.gov.au/media-communications-arts/phone/mobile-services-and-coverage/3g-network-switch">Aus Gov 3G network switch off website</a></p></li></ul><h4><strong>Then, is it possible to eliminate 2G/3G Worldwide?</strong></h4><p>Eliminating all 2G/3G networks worldwide would significantly reduce SS7 vulnerabilities, but achieving this globally, especially in developing (third world) countries, presents challenges. Here&#8217;s a breakdown of the feasibility:</p><p><strong>Benefits:</strong></p><ul><li><p><strong>Reduced SS7 vulnerabilities</strong>: SS7 is mainly used in 2G/3G networks, so eliminating these older generations would reduce the risk of call interception, location tracking, and eavesdropping via SS7 attacks.</p></li><li><p><strong>Enhanced security</strong>: With a global shift to 4G (LTE) and 5G, which use more secure protocols (Diameter for 4G, and SBA for 5G), the overall security of mobile communication would improve.</p></li><li><p><strong>More efficient spectrum use</strong>: Shutting down legacy networks frees up spectrum that can be reused for more advanced, efficient technologies like 4G and 5G.</p></li></ul><p><strong>Challenges:</strong></p><ul><li><p><strong>Infrastructure cost</strong>: Many developing countries still rely heavily on 2G and 3G networks due to the affordability of the infrastructure and the lower cost of compatible mobile phones. The transition to 4G/5G networks requires significant investment in infrastructure, including towers, base stations, and spectrum allocation, which may not be economically feasible for these countries in the short term.</p></li><li><p><strong>Device affordability</strong>: Many people in developing regions use older, more affordable mobile phones that only support 2G or 3G. Transitioning to 4G or 5G requires compatible devices, which may be out of reach for low-income populations. Without affordable 4G/5G devices, users in these areas could be left without access to communication.</p></li><li><p><strong>Coverage gaps</strong>: Even in developed countries, 2G/3G networks are often used to provide basic coverage in rural or remote areas where 4G/5G deployment is less practical. In many developing countries, these networks provide essential connectivity in areas with poor infrastructure.</p></li><li><p><strong>Roaming and compatibility</strong>: Some global communication still relies on 2G/3G for roaming, especially when users travel from countries with advanced networks to those with less developed infrastructure.</p></li></ul><p><strong>Possible Solutions</strong></p><ul><li><p><strong>Technically possible but costly</strong>: Eliminating 2G/3G worldwide is technically possible, but it requires significant investment, especially in developing countries. Governments, telecom companies, and international organizations would need to collaborate to provide affordable devices, upgrade infrastructure, and ensure widespread coverage.</p></li><li><p><strong>Gradual phase-out</strong>: Some developing countries are already phasing out 2G or 3G in favor of 4G, and in rare cases, 5G. However, this process is slow due to the economic and infrastructural challenges. A complete global phase-out may take years, if not decades.</p></li><li><p><strong>Subsidizing 4G/5G devices</strong>: To make the transition feasible, governments or international organizations could provide subsidies for affordable 4G/5G-compatible devices to low-income populations.</p></li><li><p><strong>Infrastructure funding</strong>: International cooperation, such as through World Bank projects or private-public partnerships, could help fund the necessary infrastructure upgrades in developing countries.</p></li><li><p><strong>Phased approach</strong>: Instead of an immediate shutdown, a gradual phase-out of 2G/3G networks in less developed regions could allow for a smoother transition, with attention to rural and underserved populations.</p></li></ul><p><strong>Ultimately a more secure phone and message 4G/5G network will take time to convert the world to. In meantime mobile carriers and users need to take the suggested precautions I have mentioned in this blog. </strong>Lets see below any additional threats to 4G and 5G networks.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Defending Against Other Mobile Protocol Attacks for 4G/LTE/5G/6G</strong></h2><p>In both 4G (LTE) and 5G networks, certain protocols are susceptible to cyber threats and vulnerabilities, particularly in the context of signaling, authentication, data transmission, and mobility management. These vulnerabilities can expose networks to attacks like denial of service (DoS), eavesdropping, and impersonation. While SS7 is a well-known vulnerability, there are other mobile protocol attacks small businesses should be aware of:</p><h3><strong>Common Threats and Defenses in both 4G/5G Protocols:</strong></h3><ul><li><p><strong>Man-in-the-Middle (MITM) Attacks</strong>: Certain signaling protocols (e.g., NAS, GTP) can be exploited for intercepting or tampering with traffic if authentication/encryption mechanisms are weak.</p></li></ul><ul><li><p><strong>Denial of Service (DoS) Attacks</strong>: Flooding attacks on GTP, S1-AP, and X2-AP can overload the network infrastructure, causing service degradation or downtime.</p></li></ul><ul><li><p><strong>Downgrade Attacks</strong>: Attackers force devices to connect to older, less secure generations (like 2G/3G) that are easier to compromise.</p></li></ul><ul><li><p><strong>Eavesdropping</strong>: Exploiting poorly encrypted signaling and user data channels can allow attackers to intercept user traffic.</p></li></ul><ul><li><p><strong>Replay Attacks</strong>: Re-sending previously captured messages to manipulate user sessions or impersonate legitimate users.</p></li></ul><h3><strong>4G/LTE Based Attacks Defenses:</strong></h3><p>Though 4G improved security compared to earlier generations (2G/3G), several protocols still have vulnerabilities.</p><ul><li><p><strong>Diameter Attacks</strong>: As telecom companies upgrade to 4G/LTE and 5G, Diameter protocols (the successor to SS7) are becoming the new target. Vulnerabilities: These attacks can lead to similar exploits such as intercepting messages and bypassing security controls. Susceptible to replay attacks, where previously sent messages are maliciously re-transmitted. Man-in-the-middle (MITM) attacks and impersonation due to weaknesses in how authentication messages are handled between network elements. Exploitable by attackers to bypass authentication, intercept user data, or conduct billing fraud.</p><ul><li><p><strong>Defense for carriers</strong>: Ensure your mobile service provider is aware of Diameter protocol vulnerabilities and is actively working to secure them.</p><ul><li><p><strong>End-to-End Encryption</strong>: Implement strong encryption methods (e.g., TLS) for Diameter messages to protect data in transit and prevent interception.</p></li><li><p><strong>Strong Authentication</strong>: Use robust authentication mechanisms, such as digital certificates and mutual authentication, to verify the identity of both the sender and receiver.</p></li><li><p><strong>Message Integrity Checks</strong>: Apply cryptographic checksums or message integrity codes to Diameter messages to detect any unauthorized alterations during transmission.</p></li><li><p><strong>Replay Protection Mechanisms</strong>: Incorporate sequence numbers or timestamps in Diameter messages to prevent replay attacks and ensure message freshness.</p></li><li><p><strong>Access Control Lists (ACLs)</strong>: Enforce strict ACLs to limit which network elements can communicate via Diameter, reducing exposure to potential attacks.</p></li><li><p><strong>Intrusion Detection Systems (IDS)</strong>: Deploy IDS to monitor Diameter traffic for suspicious activity and generate alerts for potential security incidents.</p></li><li><p><strong>Regular Security Audits</strong>: Conduct periodic audits and assessments of Diameter configurations and implementations to identify vulnerabilities and ensure adherence to security best practices.</p></li><li><p><strong>Security Policy Development</strong>: Establish comprehensive security policies specific to Diameter protocols, outlining acceptable usage, access controls, and incident response procedures.</p></li></ul></li><li><p><strong>Defense for small business clients: </strong>Good small business cyber hygiene mentioned in this article.</p></li></ul></li></ul><ul><li><p><strong>SIP (Session Initiation Protocol) Attacks</strong>: SIP is used to initiate and terminate voice over IP (VoIP) communications. Attackers can exploit poorly secured SIP setups to eavesdrop on calls or launch denial-of-service (DoS) attacks.</p><ul><li><p><strong>Defense for service providers</strong>: Secure SIP communications using encryption protocols like TLS (Transport Layer Security) and SRTP (Secure Real-Time Transport Protocol).</p><ul><li><p><strong>Encryption</strong>: Utilize Secure SIP (SIPS) with Transport Layer Security (TLS) to encrypt SIP signaling messages, protecting against eavesdropping.</p></li><li><p><strong>Strong Authentication</strong>: Implement robust authentication methods (e.g., digest authentication) for SIP accounts to prevent unauthorized access and spoofing.</p></li><li><p><strong>Firewalls</strong>: Deploy SIP-aware firewalls to filter SIP traffic, detect malicious activities, and protect against DoS attacks.</p></li><li><p><strong>Rate Limiting</strong>: Apply rate limiting on SIP requests to prevent flooding and mitigate the risk of DoS attacks.</p></li><li><p><strong>Network Segmentation</strong>: Isolate VoIP traffic from other network traffic to enhance security and minimize the impact of potential attacks.</p></li><li><p><strong>Regular Security Audits</strong>: Conduct periodic audits of SIP configurations and security settings to identify vulnerabilities and ensure best practices are followed.</p></li><li><p><strong>Intrusion Detection and Prevention Systems (IDPS)</strong>: Use IDPS to monitor SIP traffic for unusual patterns and automatically respond to potential threats.</p></li></ul></li><li><p><strong>Defense for small business clients: </strong>Good small business cyber hygiene mentioned in this article.</p></li></ul></li></ul><ul><li><p><strong>S1-AP (S1 Application Protocol): </strong>Vulnerabilities: Susceptible to flooding attacks and session establishment attacks, leading to service degradation. Attackers can send large volumes of signaling messages, overwhelming the network infrastructure and causing outages or service disruptions.</p></li></ul><ul><li><p><strong>Defense for carriers:</strong></p><ul><li><p><strong>Rate Limiting</strong>: Implement rate limiting on signaling messages to prevent flooding and reduce the impact of attacks.</p></li><li><p><strong>Anomaly Detection</strong>: Utilize anomaly detection systems to identify and mitigate abnormal signaling traffic patterns indicative of flooding attacks.</p></li><li><p><strong>Firewalls and Intrusion Prevention Systems (IPS)</strong>: Deploy robust firewalls and IPS to filter out malicious signaling traffic and protect network elements.</p></li><li><p><strong>Authentication and Encryption</strong>: Enforce strong authentication mechanisms and encryption protocols to secure signaling messages, reducing the risk of unauthorized access.</p></li><li><p><strong>Network Segmentation</strong>: Implement network segmentation to isolate critical network components, minimizing the impact of potential attacks on the overall infrastructure.</p></li><li><p><strong>Regular Security Audits</strong>: Conduct periodic security audits and penetration testing to identify and address vulnerabilities in the network infrastructure.</p></li></ul></li><li><p><strong>Defense for small business clients: </strong>Good small business cyber hygiene mentioned in this article.</p></li></ul><ul><li><p><strong>X2-AP (X2 Application Protocol):</strong> Vulnerabilities: Exposed to signaling storms and DoS attacks, particularly during handovers between eNodeBs (base stations). Attackers can exploit handover processes to create signaling overloads, causing interruptions in connectivity.</p></li></ul><ul><li><p><strong>Defense for carriers:</strong></p><ul><li><p><strong>Load Balancing</strong>: Implement load balancing mechanisms across eNodeBs to distribute traffic evenly and mitigate the risk of signaling storms during handovers.</p></li><li><p><strong>Handover Optimization</strong>: Optimize the handover process by using predictive algorithms to reduce the frequency of handovers and limit unnecessary signaling.</p></li><li><p><strong>Rate Limiting</strong>: Apply rate limiting to signaling messages to prevent overload conditions and ensure that the network can handle legitimate traffic effectively.</p></li><li><p><strong>Anomaly Detection Systems</strong>: Deploy systems to monitor and detect unusual signaling patterns, enabling rapid response to potential attacks or overload situations.</p></li><li><p><strong>Redundancy and Failover Mechanisms</strong>: Implement redundant pathways and failover mechanisms within the network to maintain connectivity during peak signaling conditions or potential attacks.</p></li><li><p><strong>Security Policies and Access Control</strong>: Enforce strict security policies and access controls to limit who can initiate handover processes and prevent unauthorized signaling attempts.</p></li></ul></li><li><p><strong>Defense for small business clients: </strong>Good small business cyber hygiene mentioned in this article.</p></li></ul><ul><li><p><strong>GTP (GPRS Tunneling Protocol):</strong> Still used in 5G for tunneling data between network nodes. Vulnerabilities: Session hijacking, DoS attacks, and traffic redirection are still concerns due to GTP weaknesses in the control and user plane. Exploitable to disrupt user sessions, intercept data, or overload network nodes by exploiting session management weaknesses.</p><ul><li><p><strong>Defense for carriers:</strong></p><ul><li><p><strong>Encryption</strong>: Implement strong encryption protocols (e.g., IPsec) for GTP tunnels to protect data in transit and safeguard against interception.</p></li><li><p><strong>Authentication Mechanisms</strong>: Enforce robust authentication methods for session initiation and management to prevent unauthorized access and session hijacking.</p></li><li><p><strong>Access Control Lists (ACLs)</strong>: Utilize ACLs to restrict GTP traffic and ensure that only legitimate and authorized nodes can participate in the tunneling process.</p></li><li><p><strong>Traffic Monitoring and Anomaly Detection</strong>: Deploy systems to continuously monitor GTP traffic for unusual patterns or behaviors, enabling quick identification and response to potential attacks.</p></li><li><p><strong>Session Management Controls</strong>: Enhance session management processes to include timeout mechanisms and periodic re-authentication to limit the duration of sessions and reduce hijacking risk.</p></li><li><p><strong>Network Segmentation</strong>: Segregate GTP traffic from other network functions to contain potential breaches and limit the impact of attacks.</p></li></ul></li><li><p><strong>Defense for small business clients: </strong>Good small business cyber hygiene mentioned in this article.</p></li></ul></li></ul><ul><li><p><strong>NAS (Non-Access Stratum):</strong> NAS is still used in 5G for signaling between the User Equipment (UE) and the core network. Vulnerabilities: Downgrade attacks: In mixed environments (non-standalone 5G), attackers can force a device to connect to less secure 4G or even 2G networks, exposing communications to eavesdropping or interception. Replay attacks and impersonation remain a risk, especially in edge cases of transitioning between 4G and 5G networks. Allows attackers to downgrade devices to insecure connections, making it easier to exploit older vulnerabilities or intercept user traffic.</p><ul><li><p><strong>Defense for carriers:</strong></p><ul><li><p><strong>Secure Authentication</strong>: Implement strong authentication protocols, such as <strong>5G Authentication and Key Agreement (5G-AKA)</strong>, to validate user identity and prevent unauthorized access.</p></li><li><p><strong>Encryption</strong>: Utilize robust encryption for NAS signaling messages to protect against eavesdropping and interception during transmission.</p></li><li><p><strong>Integrity Protection</strong>: Ensure that all NAS messages are integrity-protected to detect any tampering or replay attacks on the signaling data.</p></li><li><p><strong>Network Detection</strong>: Use network detection mechanisms to identify and block downgrade attempts, ensuring devices maintain connections with the most secure available network.</p></li><li><p><strong>Dynamic Configuration</strong>: Allow user equipment (UE) to dynamically adapt and select the most secure network type based on current conditions and security assessments.</p></li><li><p><strong>Regular Security Updates</strong>: Maintain up-to-date security protocols and implement regular updates to address vulnerabilities and improve overall system resilience.</p></li></ul></li><li><p><strong>Defense for small business clients: </strong>Good small business cyber hygiene mentioned in this article.</p></li></ul></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h3><strong>5G Based Attacks Defenses</strong></h3><p>5G has introduced new security features to mitigate these vulnerabilities, such as:  <strong>Stronger encryption</strong> for both signaling and data. <strong>Mutual authentication</strong> between the user equipment and the network. <strong>Enhanced privacy</strong> features to protect user identities from being easily tracked or intercepted. <strong>Standalone architecture (SA)</strong> reduces the attack surface by relying solely on 5G core protocols rather than legacy LTE infrastructure.</p><p>While 5G has introduced several security improvements, especially in the standalone (SA) architecture, it is still vulnerable to some of the same threats as 4G due to shared protocols and the complexity of new technologies. <strong>5G is still evolving</strong>, early deployments (especially non-standalone 5G) are more vulnerable to inherited weaknesses from <strong>4G LTE</strong>.</p><ul><li><p><strong>HTTP/2 Attacks (in 5G core): </strong>HTTP/2 replaces the Diameter protocol in 5G for control plane signaling. Vulnerabilities: HTTP/2 amplification attacks and vulnerabilities related to header compression could be exploited to overload network elements. MITM attacks can occur if encryption is not implemented or configured properly. Attackers could exploit vulnerabilities in HTTP/2 to overload network functions, causing degradation in service quality or availability.</p><ul><li><p><strong>Defense by carriers:</strong> To defend against HTTP/2 vulnerabilities in 5G core networks, several strategies can be employed.</p><ul><li><p><strong>Rate limiting</strong> controls user requests, mitigating amplification attacks, while <strong>strong encryption</strong> (e.g., TLS 1.3) prevents Man-in-the-Middle (MITM) attacks.</p></li><li><p>Ensuring <strong>input validation</strong> and effective <strong>connection management</strong> helps block malicious payloads and reduce overload risks.</p></li><li><p>Implementing robust <strong>monitoring and logging</strong> systems allows for quick detection of unusual traffic patterns, and <strong>network segmentation</strong> can isolate critical components to contain breaches.</p></li><li><p>Regular <strong>security updates</strong>, along with <strong>Intrusion Detection and Prevention Systems (IDPS)</strong> and <strong>Web Application Firewalls (WAFs)</strong>, enhance protection.</p></li><li><p>Conducting <strong>security audits</strong> ensures ongoing vigilance against potential vulnerabilities.</p></li></ul></li></ul><ul><li><p><strong>Defense for small business clients: </strong>Good small business cyber hygiene mentioned in this article.</p></li></ul></li></ul><ul><li><p><strong>NGAP (Next-Generation Application Protocol): </strong>Vulnerabilities: As a new protocol for signaling between the 5G core and the gNodeB, NGAP may have early-stage vulnerabilities like signaling manipulation and denial of service (DoS). Attackers may exploit the NGAP interface to manipulate call setup, session establishment, or mobility management processes.</p><ul><li><p><strong>Defense for carriers:</strong></p><ul><li><p>Secure Authentication: Implement robust authentication mechanisms to ensure that only authorized entities can access the NGAP interface, reducing the risk of signaling manipulation.</p></li><li><p>Encryption: Utilize strong encryption protocols to protect NGAP messages during transmission, preventing attackers from intercepting or tampering with signaling data.</p></li><li><p>Rate Limiting: Apply rate limiting on NGAP messages to mitigate the risk of denial-of-service (DoS) attacks by restricting the number of requests from a single source.</p></li><li><p>Traffic Monitoring: Employ advanced monitoring tools to analyze NGAP traffic for unusual patterns or anomalies, allowing for quick detection of potential attacks.</p></li><li><p>Intrusion Detection Systems (IDS): Deploy IDS to monitor and alert on suspicious activities related to NGAP signaling, providing real-time protection against manipulation attempts.</p></li><li><p>Regular Updates and Patching: Continuously update and patch network components involved in NGAP to address vulnerabilities as they are identified.</p></li></ul></li></ul><ul><li><p><strong>Defense for small business clients:</strong> Good small business cyber hygiene mentioned in this article.</p></li></ul></li></ul><ul><li><p><strong>GTP (GPRS Tunneling Protocol)</strong>: Still used in 5G for tunneling data between network nodes. Vulnerabilities: Session hijacking, DoS attacks, and traffic redirection are still concerns due to GTP weaknesses in the control and user plane. Exploitable to disrupt user sessions, intercept data, or overload network nodes by exploiting session management weaknesses.</p><ul><li><p><strong>Defences for carriers: </strong>To defend against vulnerabilities associated with the GPRS Tunneling Protocol (GTP) in 5G networks, carriers can implement several key strategies:</p><ul><li><p><strong>Authentication and Encryption</strong>: Ensure robust authentication mechanisms for all nodes communicating via GTP, coupled with strong encryption to protect data in transit, mitigating the risk of session hijacking and data interception.</p></li><li><p><strong>GTP Traffic Filtering</strong>: Deploy firewalls and intrusion prevention systems (IPS) that can specifically identify and filter GTP traffic, blocking malicious attempts to exploit GTP vulnerabilities.</p></li><li><p><strong>Rate Limiting and Throttling</strong>: Implement rate limiting and throttling on GTP sessions to help prevent denial-of-service (DoS) attacks by controlling the volume of traffic from individual sources.</p></li><li><p><strong>Session Management Enhancements</strong>: Strengthen session management protocols to make it harder for attackers to hijack or manipulate sessions, such as implementing robust token validation.</p></li><li><p><strong>Monitoring and Anomaly Detection</strong>: Use advanced monitoring tools to analyze GTP traffic for anomalies or unusual patterns that could indicate exploitation attempts, enabling quick response to potential threats.</p></li><li><p><strong>Network Segmentation</strong>: Segment the network to isolate critical components, reducing the impact of a successful attack on GTP traffic and limiting access to sensitive data.</p></li><li><p><strong>Regular Audits and Updates</strong>: Conduct regular security audits and updates on all components handling GTP traffic to identify and rectify vulnerabilities promptly.</p></li></ul></li><li><p><strong>Defense for small business clients:</strong> Good small business cyber hygiene mentioned in this article.</p></li></ul></li><li><p><strong>NAS (Non-Access Stratum):</strong> NAS is still used in 5G for signaling between the User Equipment (UE) and the core network. Vulnerabilities: Downgrade attacks: In mixed environments (non-standalone 5G), attackers can force a device to connect to less secure 4G or even 2G networks, exposing communications to eavesdropping or interception. Replay attacks and impersonation remain a risk, especially in edge cases of transitioning between 4G and 5G networks. Allows attackers to downgrade devices to insecure connections, making it easier to exploit older vulnerabilities or intercept user traffic.</p><ul><li><p><strong>Defences for carriers: </strong>To defend against vulnerabilities associated with the Non-Access Stratum (NAS) in 5G networks, carriers can implement the following key strategies:</p><ul><li><p><strong>Strong Authentication Mechanisms</strong>: Use robust authentication protocols to verify the identity of User Equipment (UE) before establishing connections, reducing the risk of impersonation and replay attacks.</p></li><li><p><strong>Encryption</strong>: Ensure that all NAS signaling messages are encrypted to protect against eavesdropping and interception, especially during transitions between 4G and 5G networks.</p></li><li><p><strong>Downgrade Attack Mitigation</strong>: Implement mechanisms to detect and prevent downgrade attacks. This can include enforcing policies that prioritize connections to the most secure available network, such as 5G, and rejecting attempts to connect to older, less secure networks.</p></li><li><p><strong>Network Slicing</strong>: Utilize network slicing to create isolated environments for different services or user groups, enhancing security and minimizing the impact of potential attacks.</p></li><li><p><strong>Anomaly Detection Systems</strong>: Deploy advanced monitoring systems that analyze NAS signaling patterns for unusual activity, enabling quick detection of potential threats such as replay attacks.</p></li><li><p><strong>Regular Security Updates</strong>: Ensure that all network components are regularly updated with the latest security patches and configurations to protect against known vulnerabilities.</p></li><li><p><strong>User Equipment Security</strong>: Encourage or mandate that users enable device security features, such as keeping software up to date and using strong authentication methods.</p></li><li><p><strong>Education and Awareness</strong>: Provide guidance and resources to users regarding the importance of connecting to secure networks and recognizing potential threats, such as suspicious behavior indicating a downgrade attack.</p></li></ul></li><li><p><strong>Defense for small business clients:</strong> Good small business cyber hygiene mentioned in this article.</p></li></ul></li><li><p><strong>SDAP (Service Data Adaptation Protocol):</strong> Vulnerabilities: Being a new protocol, SDAP is still being tested, and early deployments may expose potential QoS manipulation attacks, allowing attackers to downgrade or disrupt specific types of traffic.</p><p>Exploitable to manipulate Quality of Service (QoS), potentially leading to service disruptions for priority data like emergency calls or critical services.</p><ul><li><p><strong>Defences for carriers: </strong>To defend against vulnerabilities associated with the Service Data Adaptation Protocol (SDAP) in 5G networks, carriers can implement several key strategies:</p><ul><li><p><strong>Strong Authentication Mechanisms</strong>: Use robust authentication protocols to verify the identity of User Equipment (UE) before establishing connections, reducing the risk of impersonation and replay attacks.</p></li><li><p><strong>Encryption</strong>: Ensure that all NAS signaling messages are encrypted to protect against eavesdropping and interception, especially during transitions between 4G and 5G networks.</p></li><li><p><strong>Downgrade Attack Mitigation</strong>: Implement mechanisms to detect and prevent downgrade attacks. This can include enforcing policies that prioritize connections to the most secure available network, such as 5G, and rejecting attempts to connect to older, less secure networks.</p></li><li><p><strong>Network Slicing</strong>: Utilize network slicing to create isolated environments for different services or user groups, enhancing security and minimizing the impact of potential attacks.</p></li><li><p><strong>Anomaly Detection Systems</strong>: Deploy advanced monitoring systems that analyze NAS signaling patterns for unusual activity, enabling quick detection of potential threats such as replay attacks.</p></li><li><p><strong>Regular Security Updates</strong>: Ensure that all network components are regularly updated with the latest security patches and configurations to protect against known vulnerabilities.</p></li><li><p><strong>User Equipment Security</strong>: Encourage or mandate that users enable device security features, such as keeping software up to date and using strong authentication methods.</p></li><li><p><strong>Education and Awareness</strong>: Provide guidance and resources to users regarding the importance of connecting to secure networks and recognizing potential threats, such as suspicious behavior indicating a downgrade attack.</p></li></ul></li><li><p><strong>Defense for small business clients:</strong> Good small business cyber hygiene mentioned in this article.</p></li></ul></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Partner with a Reputable Mobile Carrier (Large List of Countries)</strong></h2><p>One of the most effective ways to protect your business is to partner with a mobile carrier that takes security seriously. Many telecom providers are aware of SS7 and other vulnerabilities and have implemented solutions to mitigate these risks. Be sure to ask your provider about their security practices and inquire about:</p><ul><li><p><strong>Their SS7 protection measures.</strong></p></li><li><p><strong>Support for encrypted voice and data services.</strong></p></li><li><p><strong>Their readiness for emerging threats in the 5G era.</strong></p></li></ul><p>Mobile carriers globally have been working to improve their SS7 security, although vulnerabilities still exist. SS7 (Signaling System 7) is an outdated telecommunications protocol that lacks built-in security and is vulnerable to interception, call redirection, and even fraud. Several carriers have adopted protective measures like firewalls, encryption, and continuous monitoring to mitigate these threats. However, improvements vary by region and provider.</p><p>Below is a global overview list based on continents of reputable telecom providers that have made significant strides in securing their networks, including SS7 and future protocols like Diameter in the 5G era (<em>note there may be others but these are the ones I found</em>):</p><h4><strong>Europe:</strong></h4><ul><li><p><strong>Germany</strong>: <em>Deutsche Telekom</em> leads in SS7 security, implementing firewalls and monitoring suspicious activity. <em>Vodafone Germany</em> also provides secure services.</p></li><li><p><strong>UK</strong>: <em>BT</em> (British Telecom) and <em>Vodafone UK</em> are known for strong SS7 and LTE security measures.</p></li><li><p><strong>France</strong>: <em>Orange</em> has advanced protections and is investing heavily in securing SS7 and 5G protocols.</p></li><li><p><strong>Italy</strong>: <em>TIM</em> (Telecom Italia Mobile) has integrated SS7 firewalls and supports encrypted communication.</p></li><li><p><strong>Norway</strong>: Telenor is the leading provider, offering comprehensive network security measures, including SS7 firewalls and encryption services. Telia Norway also provides strong SS7 protections and is working on future-proofing its 5G infrastructure.</p></li><li><p><strong>Sweden</strong>: <em>Telia</em> has robust security measures for SS7 and is leading 5G security implementation. <em>Tele2</em> also has implemented SS7 firewalls and encryption to ensure secure communication.</p></li><li><p><strong>Spain</strong>: <em>Movistar</em>, <em>Orange Spain</em>, and <em>Vodafone Spain</em> are leaders in securing their networks against SS7 attacks. Movistar, in particular, has robust monitoring and encryption in place.</p></li><li><p><strong>Portugal</strong>: <em>MEO</em> and <em>Vodafone Portugal</em> have implemented SS7 firewalls and are focusing on securing communications as they transition to 5G.</p></li><li><p><strong>Greece</strong>: <em>Cosmote</em>, the largest provider, has advanced security measures, including SS7 firewalls and encrypted communications. <em>Vodafone Greece</em> has also been proactive in securing their mobile infrastructure.</p></li><li><p><strong>Finland</strong>: <em>Elisa</em> and <em>Telia Finland</em> are both leaders in mobile security in the region. They have SS7 protections and are advancing in securing their 5G networks.</p></li><li><p><strong>Denmark</strong>: <em>TDC Group</em> is the primary provider, offering strong SS7 security and investing in 5G security to protect against newer vulnerabilities. <em>3 Denmark</em> is also known for its focus on secure communications, with additional firewalls in place for SS7 protection.</p></li><li><p><strong>Ukraine</strong>: <em>Kyivstar</em>, <em>Vodafone Ukraine</em>, and <em>Lifecell</em> have taken steps to block certain access to SS7 and improve security in the face of geopolitical risks.</p></li><li><p><strong>Poland</strong>: <em>Orange Polska</em> and <em>Play</em> are considered secure networks with ongoing efforts to enhance SS7 security.</p></li><li><p><strong>Russia</strong>: <em>MTS</em> and <em>Beeline</em> provide better SS7 protections compared to other regional players, although challenges remain in broader network security. Although I&#8217;m dubious about their security practices when basic human rights are rescinded in some aspects of life and the surveillance state is ripe in Russia.</p></li><li><p><strong>Switzerland</strong>: <em>Swisscom</em> and <em>Sunrise</em> have robust SS7 protection, employing advanced firewalls and continuous network monitoring to prevent vulnerabilities.</p></li><li><p><strong>Austria</strong>: <em>A1 Telekom Austria</em> has implemented significant measures to secure its SS7 systems and is also preparing for 5G vulnerabilities. <em>Magenta Telekom</em> provides strong encryption and SS7 protection for businesses.</p></li><li><p><strong>Hungary</strong>: <em>Magyar Telekom</em> is the leading provider, with well-established SS7 protections and ongoing efforts to secure its 5G networks. <em>Telenor Hungary</em> also focuses on securing both legacy and new mobile technologies.</p></li><li><p><strong>Czech Republic</strong>: <em>O2 Czech Republic</em> and <em>Vodafone Czech Republic</em> are strong players, offering SS7 firewalls and encrypted voice/data services for businesses.</p></li><li><p><strong>Romania</strong>: <em>Orange Romania</em> and <em>Vodafone Romania</em> both offer advanced SS7 security measures. Orange, in particular, has firewalls and encryption in place.</p></li><li><p><strong>Bulgaria</strong>: <em>Vivacom</em> and <em>A1 Bulgaria</em> focus on securing both SS7 and their evolving 5G networks to prevent vulnerabilities.</p></li><li><p><strong>Serbia</strong>: <em>Telekom Srbija</em> is the largest provider, known for its SS7 security improvements and investment in 5G readiness.</p></li><li><p><strong>Netherlands</strong>: <em>KPN</em> and <em>VodafoneZiggo</em> are reputable for having SS7 firewalls, encryption services, and strong monitoring systems to detect suspicious activities.</p></li><li><p><strong>Belgium</strong>: <em>Proximus</em> and <em>Orange Belgium</em> are investing heavily in SS7 and 5G security measures, employing advanced firewalls and encryption for safe communication.</p></li><li><p><strong>Ireland</strong>: <em>Vodafone Ireland</em> and <em>Three Ireland</em> offer strong security features, including SS7 firewalls, and are focusing on emerging 5G threats.</p></li><li><p>There is small islands and other countries. TBC</p></li></ul><h4><strong>North America:</strong></h4><ul><li><p><strong>United States</strong>: Major carriers like <em>AT&amp;T</em>, <em>Verizon</em>, and <em>T-Mobile</em> have implemented multi-layered security, including SS7 firewalls and encryption. They also focus heavily on transitioning to 5G networks with enhanced security features.</p></li><li><p><strong>Canada</strong>: <em>Bell Canada</em>, <em>Rogers</em>, and <em>Telus</em> are known for their robust SS7 and 5G security features.</p></li><li><p><strong>Mexico</strong>: <em>Telcel</em> and <em>Movistar Mexico</em> offer strong SS7 protections and encrypted communication options for business customers.</p></li><li><p><strong>Nicaragua</strong>: Claro Nicaragua: As part of Am&#233;rica M&#243;vil&#8217;s network, Claro Nicaragua has SS7 security measures in place and is working to improve overall communications security. Tigo Nicaragua: Tigo has invested in SS7 firewalls and security technologies to protect its customers, and they are focusing on 5G implementation.</p></li><li><p><strong>Belize:</strong> Digi (Belize Telemedia Ltd.), the leading telecom provider in Belize, has worked on strengthening SS7 security and implementing modern encryption services for its network.</p></li><li><p><strong>Guatemala</strong>: <strong>Claro Guatemala</strong>: As part of Am&#233;rica M&#243;vil, Claro has SS7 protection measures and is implementing stronger encryption as they expand 4G and prepare for 5G networks. <strong>Tigo Guatemala</strong>: Tigo has taken steps to strengthen its SS7 security, with a focus on preventing call interception and data theft. The company is also advancing its 5G infrastructure to address emerging security concerns.</p></li><li><p><strong>El Salvador:</strong> <strong>Claro El Salvador</strong>: Claro offers SS7 firewalls and secure communications, benefiting from Am&#233;rica M&#243;vil&#8217;s regional security practices. They are also improving security as they develop 5G infrastructure. <strong>Tigo El Salvador</strong>: Tigo, a major telecom provider in El Salvador, has focused on SS7 protection, including firewalls and encryption services, with plans to enhance security as 5G becomes more prevalent.</p></li><li><p><strong>Honduras</strong>: <strong>Claro Honduras</strong>: Claro has implemented SS7 protections and is enhancing encryption measures across its network in Honduras, while transitioning to 5G infrastructure in the region. <strong>Tigo Honduras</strong>: Tigo Honduras has deployed SS7 firewalls and continuously monitors for suspicious activities, aiming to improve data security and communications as they roll out 5G.</p></li><li><p><strong>Costa Rica:</strong> <strong>Kolbi (ICE)</strong>: The state-owned <em>Instituto Costarricense de Electricidad (ICE)</em> operates under the Kolbi brand, which has implemented SS7 security features, such as firewalls, and is working on improving 5G network security. <strong>Claro Costa Rica</strong>: Claro has focused on enhancing SS7 security and encryption services as part of its regional network, ensuring strong communication protection for its users.</p></li><li><p><strong>Panama</strong>: <strong>Claro Panama</strong>: Claro Panama follows Am&#233;rica M&#243;vil&#8217;s regional standards for SS7 protection, including firewalls and enhanced encryption, as they prepare for future 5G security measures. <strong>Tigo Panama</strong>: Tigo has implemented SS7 protections and is working on securing its 5G infrastructure to prevent interception and fraud.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h4><strong>South America:</strong></h4><ul><li><p><strong>Brazil</strong>: <em>Claro</em> and <em>Vivo</em> are two of the largest telecom providers in the region, both working to strengthen SS7 defenses. <em>TIM </em>focuses on enhancing security protocols and has defenses against signaling threats.</p></li><li><p><strong>Argentina</strong>: <em>Movistar</em> and <em>Claro Argentina</em> have implemented some SS7 protections and offer encryption services for voice and data.</p></li><li><p><strong>Chile</strong>: <em>Entel </em>implements various security measures, including protections against SS7 vulnerabilities.</p></li><li><p><strong>Colombia</strong>: Tigo (Millicom) commits to enhancing cybersecurity, including SS7 protections.</p></li><li><p><strong>Peru</strong>: Entel works on securing its network against SS7 and other vulnerabilities.</p></li><li><p><strong>Paraguay</strong>: Tigo (Millicom) has made strides in securing its telecommunications infrastructure.</p></li><li><p><strong>Uruguay</strong>: Claro (Am&#233;rica M&#243;vil) engages in network security enhancements, including protections related to SS7.</p></li><li><p><strong>Bolivia</strong>: <em>Entel </em>actively enhances network security and works on SS7 protections. <em>Tigo </em>(Millicom) focuses on security improvements for its telecommunications services.</p></li><li><p><strong>Ecuador</strong>: <em>Claro </em>(Am&#233;rica M&#243;vil) invests in security measures, including protections against SS7 vulnerabilities. <em>Movistar </em>(Telef&#243;nica) implements various security protocols to safeguard communications.</p></li><li><p><strong>Venezuela</strong>: <em>Movistar </em>(Telef&#243;nica) works on improving network security, including SS7 protections. <em>Digitel </em>engages in efforts to enhance cybersecurity for its services.</p></li><li><p><strong>Suriname</strong>: <em>Telesur </em>implements security measures, although detailed information on SS7 protections may be limited.</p></li><li><p><strong>Guyana</strong>: <em>GTT </em>(Guyana Telephone and Telegraph) focuses on enhancing network security, including protections against various vulnerabilities.</p></li><li><p><strong>French Guiana:</strong> <em>Orange </em>engages in security improvements, including SS7 protections.</p></li></ul><h4><strong>Asia-Pacific:</strong></h4><ul><li><p><strong>Australia</strong>: <em>Telstra</em> and <em>Optus</em> have been proactive in securing SS7 and are focusing on 5G security. If you are using their resellers (like <em>AldiMobile</em> or <em>Woolworths Mobile or other resellers of the Optus and Telstra networks</em>), you benefit from the same back-end security.</p></li><li><p><strong>Japan</strong>: <em>NTT DoCoMo</em>, <em>SoftBank</em>, and <em>KDDI</em> are leading the region in both SS7 and 5G security efforts, with extensive monitoring and encryption protocols in place.</p></li><li><p><strong>South Korea</strong>: <em>SK Telecom</em> and <em>KT Corporation</em> are known for high levels of security, including protections against SS7 attacks and preparation for 5G vulnerabilities.</p></li><li><p><strong>New Zealand</strong>: <em>Spark </em>engages in ongoing security improvements, including protections related to SS7. <em>Vodafone New Zealand</em> invests in network security measures to protect communications.</p></li><li><p><strong>South Korea: </strong>SK Telecom actively works on security enhancements, including protections against SS7 threats. KT Corporation Implements comprehensive security measures for its network services.</p></li><li><p><strong>North Korea:</strong> I&#8217;m not sure what&#8217;s happening there so be very very cautions in a surveillance state with virtually no human rights.</p></li><li><p><strong>Singapore</strong>: Singtel Invests in security protocols, including those addressing SS7 vulnerabilities. StarHub Engages in network security improvements, including protections against signaling threats.</p></li><li><p><strong>China</strong>: China Mobile Implements various security measures, including SS7 protections. China Unicom focuses on enhancing network security to mitigate risks. Although I&#8217;m dubious about their security practices when some basic human rights are rescinded in some aspects of life and the surveillance state is ripe in China with their GREAT WALL.</p></li><li><p><strong>India</strong>: Reliance Jio works on securing its network infrastructure against various vulnerabilities. Bharti Airtel engages in implementing advanced security measures, including SS7 protections.</p></li><li><p>There is small islands and other countries. TBC</p></li></ul><h4><strong>Africa:</strong></h4><ul><li><p><strong>South Africa</strong>: <em>Vodacom</em> and <em>MTN</em> provide secure mobile communications, with an increased focus on SS7 security and monitoring tools.</p></li><li><p><strong>Nigeria</strong>: <em>MTN Nigeria</em> has been working on improving SS7 and general mobile network security as part of broader initiatives to combat cybercrime.</p></li><li><p><strong>Kenya</strong>: <em>Safaricom </em>implements security measures, including protections related to SS7 vulnerabilities. <em>Airtel Kenya</em> focuses on improving cybersecurity across its network.</p></li><li><p><strong>Egypt</strong>: <em>Orange Egypt</em> invests in network security enhancements, including SS7 protections. <em>Vodafone Egypt</em> engages in various security measures to protect telecommunications.</p></li><li><p><strong>Ghana</strong>: <em>MTN Ghana</em> implements security protocols, including protections against SS7 vulnerabilities. <em>Vodafone Ghana</em> works on enhancing network security for its services.</p></li><li><p><strong>Tanzania</strong>: Vodacom Tanzania focuses on improving network security, including SS7 protections.Tigo Tanzania engages in security measures to safeguard communications.</p></li><li><p><strong>Uganda</strong>: <em>MTN Uganda</em> invests in security measures, including SS7 protections. <em>Airtel Uganda</em> works on enhancing cybersecurity across its network.</p></li><li><p>There are other countries. TBC</p></li></ul><h4><strong>Middle East:</strong></h4><ul><li><p><strong>United Arab Emirates UAE</strong>: <em>Etisalat</em> and <em>du</em> offer secure services with efforts to improve SS7 and 5G security, with government backing for cybersecurity initiatives.</p></li><li><p><strong>Saudi Arabia</strong>: <em>STC</em> (Saudi Telecom Company) is working towards securing SS7 and introducing 5G with enhanced security protocols.</p></li><li><p><strong>Qatar</strong>: <em>Ooredoo </em>engages in robust security practices, including protections against SS7 vulnerabilities. <em>Vodafone Qatar</em>  focuses on enhancing network security for its services.</p></li><li><p><strong>Kuwait</strong>: <em>Zain </em>implements security protocols, including SS7 protections for its telecommunications services. <em>VIVA </em>works on enhancing network security to mitigate various threats.</p></li><li><p><strong>Bahrain</strong>: <em>Batelco </em>invests in security enhancements, including protections related to SS7 vulnerabilities. <em>Zain Bahrain </em>focuses on improving network security across its services.</p></li><li><p><strong>Oman</strong>: <em>Omantel </em>engages in ongoing security improvements, including SS7 protections. <em>Ooredoo Oman </em>implements various security measures to protect communications.</p></li><li><p>There are other countries. TBC</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h4><strong>When travelling &amp; roaming:</strong></h4><p><strong>But what about if you insert a SIM card from another country or are roaming when travelling?</strong> You need to get a sim card from a provider in that country that is reputable - usually the top telecommunications providers in your country. When traveling, you might be tempted to use your home SIM or roam with a partner network. However, it&#8217;s better to purchase a local SIM from a reputable carrier in the country you visit. Top providers often have partnerships that extend their security protections, but it&#8217;s always advisable to use a SIM card from providers known for their strong security posture. But not all countries have reputable carriers or carriers that have good security standards.</p><h4><strong>Reputation &amp; standards are important for carriers:</strong></h4><p>In general, mobile operators are aware of the weaknesses in SS7 and are taking steps to address them, but the security of the system often depends on global cooperation, as carriers are interconnected. Moving forward, 5G networks are expected to introduce new complexities, making comprehensive multi-protocol security strategies necessary.</p><p>By partnering with a secure mobile carrier, your business can mitigate the risks associated with outdated telecommunications protocols while preparing for future threats in the evolving mobile landscape.</p><h2><strong>What if I choose to keep using SMS 2FA?</strong></h2><p>Using SMS for two-factor authentication (2FA) comes with several risks, primarily due to vulnerabilities in the underlying technology and the increasing sophistication of cyberattacks.</p><p><strong>Key risks of using SMS 2FA include:</strong></p><h4><strong>1. SIM Swapping (SIM Hijacking)</strong></h4><ul><li><p><strong>Description</strong>: Attackers can impersonate you to your mobile provider and convince them to port your phone number to another SIM card.</p></li><li><p><strong>Risk</strong>: Once the attacker has control of your number, they can intercept 2FA codes sent via SMS, potentially gaining access to your online accounts, including bank accounts and email.</p></li></ul><h4><strong>2. SS7 Vulnerability</strong></h4><ul><li><p><strong>Description</strong>: SS7 (Signaling System 7) is a global telecommunications protocol that manages how SMS messages and calls are routed.</p></li><li><p><strong>Risk</strong>: Hackers can exploit vulnerabilities in the SS7 protocol to intercept SMS messages, even if they don&#8217;t have access to your physical phone. This allows them to capture authentication codes remotely.</p></li></ul><h4><strong>3. SMS Phishing (Smishing)</strong></h4><ul><li><p><strong>Description</strong>: Attackers send fraudulent SMS messages pretending to be from a legitimate company, asking users to reveal sensitive information.</p></li><li><p><strong>Risk</strong>: Users might be tricked into providing sensitive details or redirected to malicious websites, giving attackers access to accounts without needing to bypass 2FA.</p></li></ul><h4><strong>4. SIM Cloning</strong></h4><ul><li><p><strong>Description</strong>: Attackers can clone a victim&#8217;s SIM card and receive all their messages and calls.</p></li><li><p><strong>Risk</strong>: If an attacker clones your SIM card, they can intercept your SMS 2FA codes and access your accounts.</p></li></ul><h4><strong>5. Device Theft</strong></h4><ul><li><p><strong>Description</strong>: If someone steals your phone and can unlock it, they can view any SMS-based 2FA codes directly.</p></li><li><p><strong>Risk</strong>: Without needing to exploit network vulnerabilities, an attacker can access SMS 2FA codes if they have physical access to your device.</p></li></ul><h4><strong>6. Man-in-the-Middle (MitM) Attacks</strong></h4><ul><li><p><strong>Description</strong>: In some cases, attackers can intercept SMS messages during transmission.</p></li><li><p><strong>Risk</strong>: This type of attack can allow someone to capture authentication codes in transit and gain unauthorized access to accounts.</p></li></ul><h3><strong>Convenience vs. Security</strong></h3><ul><li><p><strong>Convenience</strong>: SMS is easy to set up and use for many users, making it a popular 2FA option.</p></li><li><p><strong>Security</strong>: Despite the convenience, the security risks associated with SMS-based 2FA have led many security experts to recommend more secure alternatives, such as authenticator apps or hardware security keys.</p></li></ul><p>Given these risks, it&#8217;s generally advisable to switch to more secure methods of 2FA, such as using authentication apps (e.g., Google Authenticator, Authy) or hardware-based keys (e.g., YubiKey), which are not vulnerable to SS7 and SIM-swapping attacks.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h3><strong>What are dangers of switching to other 2FA methods?</strong></h3><p>While SMS 2FA has significant vulnerabilities, alternative methods are not completely immune to threats either so you need to know exactly what are its weaknesses to be informed when using them but they are safer alternatives in terms of security but aren&#8217;t easier than SMS. Below are some of the main alternatives to SMS for two-factor authentication (2FA) and the potential risks associated with each:</p><h4><strong>1. Authenticator Apps (Google Authenticator, Authy, etc.) Risks:</strong></h4><ul><li><p><strong>Device Theft</strong>: If someone gains physical access to your phone or device where the authenticator app is installed, they could access the 2FA codes.</p></li><li><p><strong>Backup &amp; Migration</strong>: If the app is not backed up properly (like in Google Authenticator), losing the phone can make it difficult or impossible to recover accounts tied to the app.</p></li><li><p><strong>Phishing</strong>: Attackers may use phishing techniques to trick users into revealing their 2FA codes.</p></li><li><p><strong>App-Specific Vulnerabilities</strong>: If the app itself has security flaws, attackers may exploit those, although this is rare compared to SMS.</p></li></ul><h4><strong>2. Hardware Security Keys (YubiKey, Google Titan, etc.) Risks:</strong></h4><ul><li><p><strong>Physical Theft</strong>: If someone physically steals your hardware key, they can use it to access accounts, especially if the key isn&#8217;t protected by additional PIN or password measures.</p></li><li><p><strong>Loss of Key</strong>: Losing the key can lock you out of accounts, making it essential to have a backup key or alternate recovery method.</p></li><li><p><strong>Side-Channel Attacks</strong>: As seen with the YubiKey vulnerability&#8203; (<a href="https://www.tomshardware.com/tech-industry/cyber-security/older-yubikeys-compromised-by-unpatchable-2fa-bug-side-channel-attack-is-critical-but-expensive-and-difficult-to-execute">Tom&#8217;s Hardware</a>), side-channel attacks, though rare and technically complex, can potentially allow attackers to clone the key in high-value targets (such as espionage or corporate theft scenarios).</p></li></ul><h4><strong>3. Biometric Authentication (Fingerprint, Face ID) Risks:</strong></h4><ul><li><p><strong>Spoofing</strong>: Attackers can sometimes spoof biometric data using high-resolution images or fake fingerprints, although modern systems have become more sophisticated in preventing this.</p></li><li><p><strong>Privacy Issues</strong>: Biometric data, once compromised, cannot be changed like a password, making it a permanent security risk.</p></li><li><p><strong>Hardware Issues</strong>: If the biometric sensor is faulty or not well-calibrated, it could allow unauthorized access or lock the legitimate user out.</p></li></ul><h4><strong>4. Email-Based 2FA Risks:</strong></h4><ul><li><p><strong>Email Account Compromise</strong>: If an attacker gains access to your email account (through phishing, weak passwords, etc.), they can intercept 2FA codes and password reset requests.</p></li><li><p><strong>Less Secure Than Other Methods</strong>: Email accounts are often more easily compromised than methods like hardware keys or authenticator apps, making email 2FA less secure.</p></li></ul><h4><strong>5. Push Notifications (via Authy, Duo, etc.) Risks:</strong></h4><ul><li><p><strong>Push Hijacking</strong>: Attackers can sometimes use social engineering or malware to manipulate users into approving malicious push requests.</p></li><li><p><strong>Device Vulnerabilities</strong>: Push notifications rely on the security of the device they are sent to. A compromised device (e.g., through malware) could allow attackers to intercept or approve requests without your knowledge.</p></li></ul><h4><strong>6. Time-Based One-Time Passwords (TOTP) Risks:</strong></h4><ul><li><p><strong>Device Theft or Loss</strong>: If the device storing the TOTP generator (like Google Authenticator) is lost or stolen, the attacker can potentially access the codes.</p></li><li><p><strong>Code Interception</strong>: TOTP codes can be phished if the attacker tricks the user into submitting the code to a malicious website.</p></li></ul><p>While alternatives to SMS-based 2FA (like authenticator apps, hardware keys, or biometrics) are generally more secure, they each come with their own set of risks, particularly in scenarios of physical theft, phishing, or advanced attacks. The best approach often involves <strong>using a combination of these methods</strong> (e.g., hardware key (backup) + authenticator app (primary) + email (backup) + recovery codes (backup)), ensuring you have secure backups, and staying vigilant against phishing or social engineering attacks.</p><h2><strong>Conclusion</strong></h2><p>While SS7 and similar mobile protocol attacks may seem like distant threats, they can have a devastating impact on small businesses, especially if they compromise sensitive customer data or critical business communications. By being proactive and implementing the security measures mentioned above, small businesses can significantly reduce their risk and safeguard their mobile communications from these sophisticated attacks.</p><p>You will have to weigh the pros and cons of which approach you take. Depends on whether you are ok with SMS method and you don&#8217;t have a lot to lose and need the convenience. But for most small businesses the alternatives to sms are best with careful planning. I think telcos and software and website designers need to work more together and stamp out these vulnerabilities and give us more options to verify - what about the potential of Cryptocurrency verification platforms such as Worldcoin? What about government or corporate run 2 factor verification methods? Will AI solved the problem? Let&#8217;s wait and see.</p><p><strong>Always remember, securing your business is an ongoing process</strong>. Regular updates, training, and a layered approach to security are key to staying protected in an evolving digital landscape.</p><p><strong>If you are a small business owner in Australia and need help with your cybersecurity needs</strong> or want to learn more about how to secure your mobile communication systems, feel free to <strong><a href="https://www.cyberkite.com.au/cybersecurity">book a Cybersecurity session</a> </strong>for expert advice and solutions.</p><p><strong>Does humanity need to mature and stop cyber attacking each other?</strong> I believe this is truly the only solution to solve cybersecurity issues for good. Stop attacking and sending garbage to damage or steal from one another. Goes back to the 10 commandments and principles from Christs teachings: What you want others to do to you, you must also likewise do to them. But for now in this hate filled world, the best advice I can give: <strong>Trust no one and use discernment</strong></p><p>Safe computing,</p><p><strong>Michael Plis</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>References</strong></h2><ul><li><p>Due to the complexity of this article and my lifelong neurodivergent disability I used a combination of my own network engineering knowledge, ChatGPT and Google Gemini to do the research,writing and also assisting me in editing. So if there is errors or something could be referenced that should be please DM me on all major social media profiles either via the social media channels listed at the top of the article or at the bottom. Thanks.</p></li><li><p>About <a href="https://en.wikipedia.org/wiki/Chaos_Communication_Congress">Chaos Communication Congress (CCC) (31c3)</a> <a href="https://en.wikipedia.org/wiki/Chaos_Communication_Congress">(Wikipedia)</a></p></li><li><p><strong>Karsten Nohl </strong>- Researcher - Security Research Labs - Berlin, Germany - Co-revealer of SS7 vulnerabilities in 2014 publically: <a href="https://www.linkedin.com/in/karsten-nohl/">Karsten LinkedIn</a> / <a href="https://www.srlabs.de/">Security Research Labs website</a></p></li><li><p><strong>Tobias Engel</strong> - Researcher - Sternraute - Berlin, Germany - Co-revealer of SS7 vulnerabilities in 2014 publically: He doesn&#8217;t seem to have social media links. <a href="http://www.sternraute.de/">Sternraute</a> website. <a href="https://x.com/sternraute">Sternraute X / Twitter</a> account. <a href="https://x.com/2b_as">Tobias X / Twitter</a> account.</p></li><li><p>The Washington Post Article that broke the story on Dec 18 2014 with an interview with  German researcher (co-discoverer of SS7 vulnerabilities)<strong> Karsten Nohl</strong>: <a href="https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/german-researchers-discover-a-flaw-that-could-let-anyone-listen-to-your-cell-calls-and-read-your-texts/">German researchers discover a flaw that could let anyone listen to your cell calls.</a></p></li><li><p>Chaos Communication Congress (CCC) talk by Tobias Engel his reveal speech on the CCC on 29th December 2014 in Berlin, Germany entitled: <a href="https://youtu.be/-wu_pO5Z7Pk?si=YZ3Rj6Pthy7w_U1l">&#8220;Tobias Engel: SS7: Locate. Track. Manipulate&#8221; on YouTube</a>.</p></li><li><p>ThreatPost article on 30 Dec 2014: <a href="https://threatpost.com/cellular-privacy-ss7-security-shattered-at-31c3/110135/">Cellular Privacy, SS7 Security Shattered at 31C3</a></p></li><li><p>The Register article on 26 Dec 204: <a href="https://www.theregister.com/2014/12/26/ss7_attacks/">White hats do an NSA, figure out LIVE PHONE TRACKING via protocol vuln</a></p></li><li><p>SecurityWeek article on 20 April 2016: <a href="https://www.securityweek.com/vulnerability-mobile-networks-allows-easy-phone-tracking/">Vulnerability in Mobile Networks Allows Easy Phone Tracking</a></p></li></ul><ul><li><p><strong>Veritasium</strong> Youtube Channel video &#8220;<strong><a href="https://www.youtube.com/watch?v=wVyu7NB7W6Y">Exposing the Flaw in Our Phone System</a></strong>&#8220; quotes at the start of paragraph. Refer to the video for the credits of whose assistance they used to prepare their video and do their own research</p><ul><li><p>They also used the help of:</p><ul><li><p>Linus Sebastian and the team at Linus Tech Tips - you can check them out in Youtube at <a href="https://www.youtube.com/@LinusTechTips">&#8234;@LinusTechTips&#8236;</a></p></li><li><p>Alexandre De Oliveira and Karsten Nohl</p></li><li><p>Crofton Black at Lighthouse Reports, Cathal McDaid at Enea, and James Hobson on Youtube at <a href="https://www.youtube.com/@hacksmith">&#8234;@hacksmith&#8236;</a></p></li><li><p>Plus other references they list are useful to read through.</p></li></ul></li></ul></li></ul><ul><li><p>Toms Hardware: <a href="https://www.tomshardware.com/tech-industry/cyber-security/older-yubikeys-compromised-by-unpatchable-2fa-bug-side-channel-attack-is-critical-but-expensive-and-difficult-to-execute">Older YubiKeys compromised by unpatchable 2FA bug &#8212; side-channel attack is critical, but expensive and difficult to execute</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Types of Cyber Threats to Small Business]]></title><description><![CDATA[In this article I will keep documenting types of cyber threats out there and how you can protect your small business.]]></description><link>https://blog.cyberkite.com.au/p/types-of-cyber-threats-to-small-business</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/types-of-cyber-threats-to-small-business</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Mon, 16 Sep 2024 23:55:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!l0mP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l0mP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l0mP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!l0mP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!l0mP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!l0mP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l0mP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg" width="844" height="562" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:562,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image of a ransomware and a laptop&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image of a ransomware and a laptop" title="Image of a ransomware and a laptop" srcset="https://substackcdn.com/image/fetch/$s_!l0mP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!l0mP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!l0mP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!l0mP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4addb29c-414b-4851-a14d-36c771c08f6c_844x562.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A cyber threat can strike any small business. Image Credit: Unsplash</figcaption></figure></div><p>In this article I will keep documenting types of cyber threats out there and how you can protect your small business.</p><p>In today&#8217;s digital age, businesses of all sizes are increasingly reliant on technology. This reliance makes them vulnerable to cyber threats, which are constantly evolving and can have a devastating impact. Understanding the different types of cyber threats and the risks they pose is crucial for any small business owner or operator.</p><p>Let&#8217;s learn the current set of them - and this list will grow.</p><h2><strong>List of categories</strong></h2><ul><li><p>What is a cyber threat?</p></li><li><p>Malware</p></li><li><p>Phishing</p></li><li><p>Network Based Attacks</p></li><li><p>Social Engineering</p></li><li><p>Zero-Day Attacks</p></li><li><p>Internet of Things (IoT) Threats</p></li><li><p>AI-Powered Attacks</p></li><li><p>Supply Chain Attacks</p></li><li><p>Credential Stuffing Attacks</p></li><li><p>Data Breaches</p></li><li><p>Shadow IT Threats</p></li><li><p>Telephony Signaling Attacks</p></li><li><p>Database Attacks</p></li><li><p>Script Attacks</p></li><li><p>Brute Force Attacks</p></li><li><p>Watering Hole Attacks</p></li><li><p>General advice for small business</p></li></ul><h2><strong>What is a cyber threat?</strong></h2><p><strong>What is a cyberthreat? It&#8217;s the possibility of a malicious attempt to damage or disrupt a computer network or system or devices or software.</strong></p><p>A cyber threat is any potential malicious activity that aims to damage, disrupt, or gain unauthorized access to computer systems, networks, devices, or software. These threats can compromise the confidentiality, integrity, and availability of data and digital assets, putting individuals, businesses, and even nations at risk.</p><p>Cyber threats can originate from various sources, including cybercriminals, hackers, insiders, or nation-states, and they can take many forms, from sophisticated hacking attacks to simple social engineering tricks. The growing reliance on technology and the interconnectedness of systems make cyber threats an ever-present and evolving challenge that requires constant vigilance and robust security measures.</p><p>Let&#8217;s dig in deeper into the common ones.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Malware</strong></h2><p>Malware is a broad term that encompasses any software designed to harm a computer system. This includes viruses, worms, Trojan horses, spyware, and ransomware. Malware can steal data, corrupt files, or even take control of your entire system. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Types of malware is a worm, virus, trojan. There are other types:</p><ul><li><p><strong>Ransomware</strong>: Ransomware encrypts a victim&#8217;s data or locks them out of their device, demanding a ransom to restore access. It has become one of the most financially damaging types of malware. Example: You receive a message on your screen demanding payment in Bitcoin to unlock your encrypted files. Here are the various types:</p></li></ul><ul><li><p><strong>Ransomware-as-a-Service (RaaS)</strong>: This is a subscription-based model where criminals lease out ransomware to other attackers. RaaS operators provide the malware, and the affiliates perform the attacks, splitting the profits from the ransom payments. Example: A criminal with little technical expertise uses a RaaS platform to distribute ransomware and demand payment from victims. Another example: Various platforms that allow users to customize and deploy ransomware campaigns for a fee, such as Sodinokibi.</p></li></ul><ul><li><p><strong>Crypto Ransomware:</strong> This type encrypts files on the victim&#8217;s system, making them inaccessible until a ransom is paid for the decryption key. Example: WannaCry is a well-known crypto ransomware that affected thousands of computers globally, encrypting files and demanding Bitcoin as ransom.</p></li></ul><ul><li><p><strong>Locker Ransomware:</strong> Description: Instead of encrypting files, locker ransomware locks users out of their devices, preventing access to the operating system or applications. Users are then asked to pay a ransom to regain access. Example: Police-themed locker ransomware that displays a message claiming to be from law enforcement, alleging illegal activity and demanding payment.</p></li></ul><ul><li><p><strong>Scareware</strong>: This type of ransomware often masquerades as legitimate security software, claiming that the user&#8217;s computer is infected and demanding payment to remove the threats. It doesn&#8217;t necessarily encrypt files. Example: Software that displays fake alerts about viruses and requires payment for a &#8220;full scan&#8221; or &#8220;cleaning.&#8221;</p></li></ul><ul><li><p><strong>Double Extortion Ransomware:</strong> This method involves both encrypting files and stealing sensitive data. Attackers threaten to publish or leak the stolen data if the ransom is not paid. Example: Maze ransomware not only encrypts files but also exfiltrates sensitive information and threatens to release it if the ransom isn&#8217;t paid.</p></li></ul><ul><li><p><strong>GandCrab</strong>: Once one of the most prolific ransomware variants, GandCrab encrypts files and demands ransom in various cryptocurrencies. It has been distributed through various methods, including exploit kits and phishing emails. Example: GandCrab was known for its rapid evolution and frequent updates to avoid detection.</p></li></ul><ul><li><p><strong>Ryuk</strong>: Description: A targeted ransomware that is often associated with large-scale attacks on enterprises. Ryuk encrypts files and demands significant ransoms, often targeting critical infrastructure and businesses. Example: Ryuk was used in various high-profile attacks, including those on hospitals and municipalities.</p></li></ul><ul><li><p><strong>REvil (Sodinokibi)</strong>: This ransomware variant encrypts files and also involves double extortion tactics by stealing data. It gained notoriety for high-profile attacks and is offered as a RaaS model. Example: The attack on JBS Foods in 2021 that led to a substantial ransom payment.</p></li></ul><ul><li><p><strong>DarkSide</strong>: Known for its double extortion method, DarkSide targets large organizations and is associated with high-profile attacks, including the Colonial Pipeline attack that disrupted fuel supplies in the U.S. Example: DarkSide is known for its professionalism in handling negotiations with victims, often providing a customer support portal for ransom negotiations.</p></li></ul><ul><li><p><strong>Conti</strong>: This is another ransomware that uses double extortion tactics, encrypting files and stealing data. It is known for its speed and efficiency in carrying out attacks. Example: Conti attacks have targeted hospitals and other critical infrastructure, causing significant disruption.</p></li></ul><ul><li><p><strong>Netwalker</strong>: This ransomware is often spread through phishing and exploits vulnerabilities in software. It employs double extortion tactics, threatening to leak sensitive data if the ransom is not paid. Example: Netwalker has targeted various sectors, including healthcare and education, demanding high ransoms.</p></li></ul><ul><li><p><strong>Egregor</strong>: Egregor uses a combination of ransomware and data theft. It targets businesses by exploiting vulnerabilities and is known for its involvement in double extortion schemes. Example: Egregor has been linked to various data breaches and ransom demands across different industries.</p></li></ul><ul><li><p><strong>Fileless Malware</strong>: Malicious software that operates in-memory without writing files to disk, making it harder for traditional antivirus solutions to detect.</p></li></ul><ul><li><p><strong>Malvertising</strong>: Malware is distributed through online ads, even on legitimate websites, where users can get infected by simply viewing or clicking on the ad.</p></li></ul><ul><li><p><strong>Rootkits</strong>: Rootkits are designed to provide attackers with administrator-level control over a system. They hide themselves deep within the operating system to avoid detection, allowing continuous and unauthorized access. Example: An attacker installs a rootkit on a victim&#8217;s computer to monitor keystrokes and steal sensitive information without being detected by security software.</p></li></ul><ul><li><p><strong>Adware</strong>: Adware generates unwanted advertisements on a user&#8217;s system, often in the form of pop-ups or banners. While not always malicious, adware can be a gateway for other malware or expose users to risky ads. Example: Constant pop-up ads that appear while browsing the internet, even when not visiting ad-heavy websites.</p></li></ul><ul><li><p><strong>Spyware</strong>: Spyware secretly monitors a user&#8217;s activities, gathering information such as browsing history, login credentials, or financial details. Spyware is often used to collect personal data without consent. Example: A program that tracks every keystroke you make, sending this data back to the attacker to gather passwords or other confidential information.</p></li></ul><ul><li><p><strong>Rogue Security Software: </strong>Also known as scareware, rogue security software tricks users into believing their system is infected and that they need to purchase or install a fake security product, which often installs further malware. Example: A pop-up warning that your system has a virus and offering to clean it, but the provided software is malicious.</p></li></ul><ul><li><p><strong>Botnet Malware:</strong> Botnet malware turns infected devices into &#8220;bots&#8221; that are controlled by an attacker. These botnets can be used to launch large-scale attacks, such as Distributed Denial-of-Service (DDoS) attacks. Example: Your computer becomes part of a botnet and is used along with thousands of other infected machines to flood a website with traffic and cause it to crash.</p></li></ul><ul><li><p><strong>Keyloggers</strong>: Keyloggers are a type of malware that records every keystroke made on a device. This information is sent to the attacker, often to steal login credentials, personal information, or credit card numbers. Example: A keylogger records your bank login details and sends them to an attacker without your knowledge.</p></li></ul><ul><li><p><strong>Cryptojacking Malware: </strong>Cryptojacking malware infects a device and uses its resources (CPU and GPU power) to mine cryptocurrency without the user&#8217;s knowledge or consent. Example: A computer suddenly slows down, and the fan runs constantly as malware secretly uses the system&#8217;s power to mine Bitcoin for an attacker.</p></li></ul><ul><li><p><strong>Browser Hijackers:</strong> Browser hijackers alter web browser settings, redirecting users to malicious or unwanted websites. These can also change the default search engine or homepage. Example: Every time you open your browser, you&#8217;re taken to a sketchy website instead of your usual homepage.</p></li></ul><ul><li><p><strong>Mobile Malware:</strong> Mobile malware specifically targets smartphones and tablets, often through malicious apps. It can steal personal data, track the user, or even make fraudulent in-app purchases. Example: A malicious app downloaded from a third-party store steals your contacts and messages or uses your phone to send premium-rate SMS texts.</p></li></ul><ul><li><p><strong>Polymorphic Malware</strong>: Polymorphic malware modifies its code each time it infects a new system, making it harder for traditional antivirus software to recognize and detect. Example: A virus that changes its signature with each infection, evading detection by antivirus software that relies on static signatures.</p></li></ul><ul><li><p><strong>Logic Bomb: </strong>Logic bombs remain dormant within a system until a specific condition is met (such as a date or action), at which point the malware activates and performs its attack, often destroying or corrupting data. Example: A disgruntled employee leaves a logic bomb set to go off if they are removed from the company&#8217;s payroll system.</p></li></ul><ul><li><p><strong>RAT (Remote Access Trojans):</strong> RATs provide attackers with remote access to a victim&#8217;s system, enabling them to control the system as though they were the user. They can steal data, install other malware, or spy on users. Example: A RAT allows an attacker to turn on your webcam or monitor your emails and passwords without your knowledge.</p></li></ul><ul><li><p><strong>Wiper Malware: </strong>Wiper malware is designed to erase data from a system rather than steal or encrypt it. Often used in politically motivated attacks, wipers can cause irreparable damage to organizations or governments.</p></li><li><p>Example: An organization finds all its critical data erased and systems rendered useless after a targeted malware attack.</p></li></ul><ul><li><p><strong>APT (Advanced Persistent Threats):</strong> APT malware is used in long-term cyber espionage attacks, where attackers infiltrate a system and remain undetected for extended periods. The goal is to steal sensitive information or monitor activities over time. Example: A corporate network is breached by attackers who slowly exfiltrate trade secrets over the course of several months.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Phishing</strong></h2><p>Phishing attacks are attempts to trick you into revealing personal information, such as your credit card number or login credentials. Phishing emails often appear to be from legitimate sources, such as your bank or a social media platform. They may contain links that, when clicked, will take you to a fake website that looks real. Once you enter your information on the fake website, the attacker can steal it. Here are a few types:</p><ul><li><p><strong>Spear Phishing</strong>: Targeted Phishing Attack aimed at a specific individual or organization. Attackers craft personalized messages using information they&#8217;ve gathered about the target, making the email appear more legitimate and difficult to spot as phishing.</p><p>Example: An email addressed to you specifically, mentioning your job title or company, and pretending to be from your boss, asking for confidential data.</p></li></ul><ul><li><p><strong>Whaling</strong>: Phishing Attack targeting high-level executives such as CEOs, CFOs, or other high-ranking officials in an organization. These emails are carefully tailored to seem highly relevant to the target, using corporate lingo or referring to sensitive business matters. Example: An email that appears to be from a lawyer or business partner requesting an executive to approve a large payment or provide financial information.</p></li></ul><ul><li><p><strong>Vishing (Voice Phishing):</strong> Phishing conducted over the phone rather than through email. Attackers impersonate trusted entities (such as a bank or government agency) and attempt to extract personal or financial information through deceptive phone calls. Example: A phone call claiming to be from your bank, asking you to verify account details or reset your password.</p></li></ul><ul><li><p><strong>Smishing (SMS Phishing)</strong>: Phishing via SMS text messages, where attackers send messages containing malicious links or ask for sensitive information. These messages often create a sense of urgency, such as claiming that your account will be locked unless you act immediately. Example: A text message claiming to be from your bank, asking you to verify your account by clicking a link.</p></li></ul><ul><li><p><strong>Clone Phishing</strong>: In clone phishing, attackers clone a legitimate email that the recipient has previously received and send an identical one, except with malicious links or attachments. The cloned email looks like a genuine follow-up or continuation of a prior conversation. Example: Receiving what appears to be a legitimate email thread from your company or service provider, but the attached file or links have been altered to install malware.</p></li></ul><ul><li><p><strong>HTTPS Phishing</strong>: Attackers create fake websites that use &#8220;https://&#8221; in the URL and display the lock icon to appear secure. Users are fooled into thinking the site is trustworthy and legitimate because they see the SSL certificate, even though it&#8217;s a fake or malicious site. Example: A phishing email sends you to a website with a green padlock symbol and &#8220;https://&#8221; in the URL, tricking you into entering login details or financial information.</p></li></ul><ul><li><p><strong>CEO Fraud</strong>: This type of phishing attack targets lower-level employees by impersonating a CEO or high-level executive and requesting sensitive data or urgent transfers of money. The message typically creates a sense of urgency or confidentiality to prevent the employee from verifying the request. Example: An urgent email from the &#8220;CEO&#8221; asking a finance officer to wire money to a specific account for an important deal.</p></li></ul><ul><li><p><strong>Pharming</strong>: Attackers redirect users to a fake website by manipulating DNS settings or through malware, even if the victim enters the correct URL. Once on the malicious site, users unknowingly submit their sensitive information. Example: Typing in your bank&#8217;s URL and being redirected to a fake site that looks identical to the legitimate one.</p></li></ul><ul><li><p><strong>Evil Twin Phishing</strong>: Attackers set up a fraudulent Wi-Fi network that appears to be a legitimate public Wi-Fi hotspot. Once users connect to the evil twin, attackers can intercept any information they send, including login credentials and financial information. Example: Connecting to &#8220;Free Airport Wi-Fi&#8221; and unknowingly allowing attackers to intercept your data.</p></li></ul><ul><li><p><strong>Social Media Phishing:</strong> Attackers send malicious messages through social media platforms, either impersonating trusted contacts or sending direct messages with links that lead to phishing sites. Social media phishing can also involve fake profiles posing as legitimate individuals or businesses. Example: A Facebook message from a friend asking you to check out a link, which actually takes you to a phishing site designed to steal your account credentials.</p></li></ul><ul><li><p><strong>Man-in-the-Middle Phishing</strong>: Attackers insert themselves between a legitimate entity and the victim to intercept communication and steal credentials or other information. This is often done using compromised networks or fake Wi-Fi hotspots. Example: Connecting to an unsecured Wi-Fi network where an attacker captures the information you enter into your banking or email account.</p></li></ul><ul><li><p><strong>Dropbox/Google Drive Phishing:</strong> Attackers send phishing emails with links to fake file-sharing platforms like Dropbox or Google Drive, claiming that a document is ready for viewing. Once users click on the link and enter their credentials, attackers steal them. Example: An email pretending to be from a colleague saying a document is shared on Google Drive, but the link leads to a fake login page.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Network Based Attacks</strong></h2><p>Network-based attacks target the infrastructure, devices, and services of a network, often aiming to disrupt, intercept, or manipulate network traffic. These network-based attacks highlight the need for strong security practices, including encryption, monitoring, and proper configuration, to protect against attackers exploiting vulnerabilities within a network. Below are several common network-based attacks:</p><ul><li><p><strong>DNS Hijacking: </strong>DNS hijacking, also known as DNS redirection, is a cyberattack where malicious actors manipulate the Domain Name System (DNS) to redirect internet traffic to fraudulent websites. This can be achieved by compromising DNS servers, installing malware on user devices, or intercepting DNS communication. When a user tries to access a legitimate website, they are instead unknowingly routed to a malicious site designed to steal sensitive information or install malware.  This attack can have severe consequences for individuals and organizations, leading to financial losses, identity theft, and reputational damage.</p></li></ul><ul><li><p><strong>DNS Spoofing (DNS Cache Poisoning): </strong>Attackers corrupt DNS records, redirecting users to fraudulent websites without their knowledge. Example: A user attempting to access a bank website is redirected to a fake site where attackers steal login credentials.</p></li></ul><ul><li><p><strong>Rogue Access Points:</strong> Unauthorized wireless access points are set up to mimic legitimate networks, allowing attackers to intercept or manipulate network traffic. Example: An attacker sets up a Wi-Fi network called &#8220;Free Wi-Fi&#8221; in a public area to capture users&#8217; data.</p></li></ul><ul><li><p><strong>Man-in-the-Middle (MitM) Attacks:</strong> Attackers secretly intercept and relay communications between two parties, often altering or stealing data.</p></li><li><p>Example: An attacker intercepts traffic between a user and a banking website, capturing login credentials.</p></li></ul><ul><li><p><strong>Packet Sniffing (Eavesdropping):</strong> Attackers use packet sniffers to capture and analyze network traffic, potentially exposing sensitive data like passwords and emails. Example: An attacker on a shared network captures unencrypted traffic to steal sensitive information.</p></li></ul><ul><li><p><strong>Denial-of-Service (DoS) Attacks: </strong>Attackers flood a network or server with traffic, overwhelming resources and causing a shutdown or slowdown of services. Example: A website is overwhelmed with traffic, making it unavailable to legitimate users.</p></li></ul><ul><li><p><strong>Distributed Denial-of-Service (DDoS) Attacks:</strong> Similar to DoS but involves multiple compromised systems (usually part of a botnet) attacking a target simultaneously, making it harder to mitigate. Example: Thousands of infected devices are used to flood a network server, causing service outages.</p></li></ul><ul><li><p><strong>IP Spoofing:</strong> Attackers disguise their identity by falsifying the source IP address of packets to make them appear to come from a trusted source. Example: An attacker sends malicious packets to a target while pretending to be a trusted server.</p></li></ul><ul><li><p><strong>ARP Spoofing</strong>: Attackers send falsified ARP (Address Resolution Protocol) messages to associate their MAC address with the IP address of a legitimate host, enabling interception of traffic. Example: An attacker on a local network reroutes traffic intended for the gateway to their machine.</p></li></ul><ul><li><p><strong>MAC Flooding:</strong> Attackers flood a switch with numerous fake MAC addresses, causing it to fail open and broadcast traffic to all ports, making it easier to capture sensitive information. Example: An attacker overwhelms a switch, forcing it to broadcast traffic, which can then be captured by the attacker.</p></li></ul><ul><li><p><strong>Port Scanning: </strong>Attackers scan a network or device to identify open ports and services, gathering information to exploit vulnerabilities. Example: An attacker scans a server to find open ports that can be used to launch further attacks.</p></li></ul><ul><li><p><strong>Session Hijacking:</strong> Attackers take control of a legitimate session by stealing session cookies or session IDs, allowing unauthorized access to resources. Example: An attacker captures a user&#8217;s session token from an insecure web application and uses it to impersonate the user.</p></li></ul><ul><li><p><strong>Evil Twin Attack:</strong> Attackers set up a fake Wi-Fi network with a name similar to a legitimate network, tricking users into connecting and giving the attacker access to their data. Example: A hacker sets up a network named &#8220;CoffeeShop_WiFi_Free&#8221; near a caf&#233; to capture data from users who connect.</p></li></ul><ul><li><p><strong>SSL Stripping:</strong> Attackers downgrade a secure HTTPS connection to an unencrypted HTTP connection, allowing them to intercept or modify data sent between the user and the website. Example: An attacker intercepts an HTTPS connection and strips it down to HTTP, stealing sensitive information transmitted over the connection.</p></li></ul><ul><li><p><strong>Network Tapping: </strong>Attackers physically tap into the network cables or use hardware to intercept data traveling through the network. Example: Someone installs a hardware tap on a network cable to capture all traffic passing through.</p></li></ul><ul><li><p><strong>VLAN Hopping</strong>: Attackers exploit vulnerabilities in a VLAN (Virtual Local Area Network) configuration to move from one VLAN to another and access restricted network segments. Example: A user on one VLAN gains unauthorized access to another VLAN holding sensitive data.</p></li></ul><ul><li><p><strong>Smurf Attack:</strong> A type of DDoS attack where the attacker sends ICMP requests (pings) to a network, with the source IP address spoofed to the victim&#8217;s address, causing a flood of ICMP responses. Example: The victim&#8217;s network is overwhelmed by reply messages from various devices in response to the attacker&#8217;s spoofed requests.</p></li></ul><ul><li><p><strong>Broadcast Storm Attack: </strong>Attackers send excessive broadcast traffic on a network, causing severe network congestion and performance degradation. Example: Multiple devices on a network continually broadcast messages, resulting in a traffic overload.</p></li></ul><ul><li><p><strong>RIP Route Poisoning:</strong> Attackers manipulate the Routing Information Protocol (RIP) by injecting false route updates into the network, redirecting traffic or causing network disruptions. Example: An attacker sends false routing information to a router, misdirecting traffic to a compromised route.</p></li></ul><ul><li><p><strong>Wormhole Attack: </strong>Attackers create a fast communication channel between two points in a wireless network, allowing them to capture packets and replay them later. Example: A malicious node in a wireless sensor network forwards data packets from one point to another, disrupting routing protocols.</p></li></ul><ul><li><p><strong>Botnets</strong>: A network of compromised computers or devices (often called zombies) controlled by a hacker to launch large-scale attacks such as DDoS or spam campaigns. Example: A botnet of thousands of devices is used to launch a DDoS attack on a corporate network.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Social Engineering</strong></h2><p>Social engineering is the art of tricking people into giving up personal information or clicking on malicious links. Social engineering attacks can be very effective, as they prey on human trust and emotions.</p><ul><li><p><strong>Business</strong> <strong>Email</strong> <strong>Compromise</strong> (BEC): Scams where attackers impersonate executives or vendors to trick employees into transferring funds or sensitive data. A BEC is a form of social engineering.</p></li></ul><h2><strong>Zero-Day Attacks</strong></h2><p>Zero-day attacks are attacks that exploit vulnerabilities in software that the software vendor is not aware of. Zero-day attacks are dangerous because there is no patch available to protect against them.</p><h2><strong>Internet of Things (IoT) Threats</strong></h2><p>Exploiting weak security in connected devices, such as cameras or smart systems, to gain network access.</p><h2><strong>AI-Powered Attacks</strong></h2><p>Attackers are increasingly using AI and machine learning to craft more sophisticated phishing emails, penetrate networks, or find vulnerabilities faster than ever before.</p><ul><li><p><strong>Deepfake &amp; Synthetic Media Attacks:</strong> Fraudsters are also using deepfakes or synthetic audio to impersonate business leaders is a growing threat, especially in small businesses where verification protocols may not be strong. They are now even testing live video AI face skins and voices to impersonate your staff or loved ones.</p></li></ul><h2><strong>Supply Chain Attacks</strong></h2><p>Hackers target vendors or partners to infiltrate larger networks. This can be particularly harmful to small businesses relying on third-party services.</p><h2><strong>Credential Stuffing Attacks</strong></h2><p>Automated attacks using stolen credentials from one breach to try accessing multiple systems, exploiting the common practice of reusing passwords.</p><h2><strong>Data Breaches</strong></h2><p>Unauthorized access to sensitive data, leading to information being stolen or exposed, typically affecting personal, financial, or business information. Each type of data breach requires different prevention and mitigation strategies. Effective cybersecurity practices, including encryption, strong access controls, regular audits, and employee training, are essential to protect sensitive data. Here are a few types:</p><p><strong>Accidental Data Breach</strong></p><ul><li><p>Description: Sensitive information is accidentally disclosed or shared due to human error.</p></li><li><p>Example: An employee mistakenly sends an email containing sensitive customer data to the wrong recipient.</p></li></ul><p><strong>Insider Threat Breach</strong></p><ul><li><p>Description: A trusted individual within an organization, such as an employee or contractor, deliberately or accidentally exposes data. Employees or contractors with malicious intent or those who unintentionally cause security breaches. Some employees or contractors could be bribed by hackers or other maliciously in inclined organisations to plant malicious devices or software or steel data.</p></li><li><p>Example: An employee with access to sensitive information intentionally leaks it or unknowingly clicks on a phishing link, allowing attackers access.</p></li></ul><p><strong>Hacking/IT Incident Breach</strong></p><ul><li><p>Description: Unauthorized individuals gain access to systems, networks, or databases through vulnerabilities or sophisticated cyberattacks.</p></li><li><p>Example: Hackers exploit vulnerabilities in a company&#8217;s system to steal customer data, such as passwords or credit card details.</p></li></ul><p><strong>Physical Theft of Devices</strong></p><ul><li><p>Description: Physical devices containing sensitive data (laptops, USB drives, smartphones) are stolen or lost.</p></li><li><p>Example: A stolen company laptop contains unencrypted personal data, resulting in a data breach.</p></li></ul><p><strong>Social Engineering Breach</strong></p><ul><li><p>Description: Attackers manipulate individuals into providing confidential information or access to systems.</p></li><li><p>Example: A phishing email tricks employees into revealing their login credentials, which are then used to access sensitive data.</p></li></ul><p><strong>Ransomware Breach</strong></p><ul><li><p>Description: Attackers encrypt an organization&#8217;s data, demanding ransom for the decryption key. During the attack, data can be exfiltrated or stolen.</p></li><li><p>Example: A company&#8217;s customer data is held hostage by ransomware, and the attackers threaten to release it if a ransom is not paid.</p></li></ul><p><strong>Third-Party Vendor Breach</strong></p><ul><li><p>Description: A data breach occurs due to vulnerabilities or security failures in a third-party vendor or partner&#8217;s system, compromising your organization&#8217;s data.</p></li><li><p>Example: A payroll service provider is hacked, exposing the employee data of a client company.</p></li></ul><p><strong>Cloud Storage Misconfiguration</strong></p><ul><li><p>Description: Misconfigured cloud services, like databases or file storage, expose sensitive data to the internet unintentionally.</p></li><li><p>Example: A company leaves an Amazon S3 bucket containing customer information publicly accessible without proper authentication.</p></li></ul><p><strong>Malware-Based Breach</strong></p><ul><li><p>Description: Malware infects systems and facilitates unauthorized access to data, including keylogging, spyware, or other types of malware.</p></li><li><p>Example: A Trojan horse is installed on a company&#8217;s network, collecting and transmitting sensitive data to attackers.</p></li></ul><p><strong>Card Skimming Breach</strong></p><ul><li><p>Description: Attackers install skimming devices on point-of-sale systems or ATMs to capture credit or debit card data.</p></li><li><p>Example: A skimmer placed on an ATM reads card details as customers use the machine, leading to theft of card information.</p></li></ul><p><strong>Mobile Device Breach</strong></p><ul><li><p>Description: Mobile phones or tablets containing sensitive data are compromised through malware, insecure apps, or theft.</p></li><li><p>Example: An employee&#8217;s phone infected with malware exposes company emails and documents stored on the device.</p></li></ul><p><strong>Denial-of-Service (DoS) Attack Data Breach</strong></p><ul><li><p>Description: While the primary purpose of DoS attacks is service disruption, attackers sometimes use these attacks as a distraction to exfiltrate data.</p></li><li><p>Example: During a DDoS attack, hackers use the chaos to infiltrate a network and steal confidential data unnoticed.</p></li></ul><p><strong>SQL Injection Breach</strong></p><ul><li><p>Description: Attackers exploit vulnerabilities in web applications to execute malicious SQL queries, allowing them to access sensitive data in a database.</p></li><li><p>Example: An insecure login form is exploited using SQL injection to extract usernames and passwords from a database.</p></li></ul><p><strong>Unsecured Network Breach</strong></p><ul><li><p>Description: Attackers exploit unsecured or poorly configured Wi-Fi networks to gain unauthorized access to sensitive data.</p></li><li><p>Example: Data is intercepted on an unsecured public Wi-Fi network through a Man-in-the-Middle (MitM) attack.</p></li></ul><p><strong>Denial-of-Service (DoS) Attack Data Breach</strong></p><ul><li><p>Description: DoS attacks are primarily intended to disrupt service, but in some cases, attackers use these to cover for data exfiltration.</p></li><li><p>Example: A company hit by a DoS attack also suffers a simultaneous data theft as attention is diverted to restoring services.</p></li></ul><p><strong>Data on the Move Breach</strong></p><ul><li><p>Description: Sensitive data in transit, such as during transfers between systems or devices, is intercepted or compromised.</p></li><li><p>Example: An unsecured email containing customer payment information is intercepted by an attacker while being transmitted.</p></li></ul><p><strong>Dumpster Diving Breach</strong></p><ul><li><p>Description: Attackers physically search through discarded materials (like paper records) to find sensitive information.</p></li><li><p>Example: Discarded documents in a company&#8217;s trash contain customer records, which are retrieved by attackers.</p></li></ul><p><strong>Business Email Compromise (BEC)</strong></p><ul><li><p>Description: Attackers impersonate an executive or trusted entity through email, convincing employees to transfer sensitive information or funds.</p></li><li><p>Example: A fake email from the CFO instructs an employee to transfer sensitive client data to an external party.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Shadow IT Threats</strong></h2><p>Unapproved software or hardware used by employees that bypasses IT oversight, creating security vulnerabilities.</p><h2><strong>Telephony Signaling Attacks</strong></h2><p>These telecom signaling attacks or telephony network vulnerabilities exploit weaknesses in the signaling protocols that mobile networks use to route calls and messages. Some of the common attack vectors in this category include:</p><ul><li><p><strong>SS7 Attacks</strong>: Exploiting weaknesses in the Signaling System 7 (SS7) protocol, allowing hackers to intercept communications, track locations, and redirect calls and texts.</p></li></ul><ul><li><p><strong>Diameter Attacks</strong>: Diameter is a newer protocol used in 4G and 5G networks but is still vulnerable to certain attacks similar to those in SS7.</p></li></ul><ul><li><p><strong>SIP Attacks</strong>: The Session Initiation Protocol (SIP) is used for managing voice over IP (VoIP) calls and can be targeted for call interception or session hijacking.</p></li></ul><ul><li><p><strong>SMS Spoofing</strong>: Attackers send fake messages that appear to come from trusted sources, often for phishing or scamming purposes.</p></li></ul><ul><li><p><strong>SIM Swap Attacks</strong>: Hackers transfer a victim&#8217;s phone number to their own SIM card by exploiting weaknesses in mobile carrier security processes, allowing them to intercept two-factor authentication (2FA) codes and access accounts.</p></li></ul><ul><li><p><strong>Vishing</strong>: A form of phishing conducted over the phone, where attackers use social engineering to trick victims into revealing sensitive information.</p></li></ul><h2><strong>Database Attacks</strong></h2><p>Each of these database attacks highlights how attackers can exploit weaknesses beyond simple SQL Injection, especially in modern databases and applications:</p><ul><li><p><strong>SQL Injection</strong>: attackers manipulate queries to a database to gain unauthorized access or corrupt data by injecting malicious SQL code.</p></li></ul><ul><li><p><strong>NoSQL Injection</strong> similar to SQL Injection, but targets NoSQL databases (e.g., MongoDB, Couchbase). Attackers inject malicious queries into applications using untrusted input to manipulate or expose data.</p></li></ul><ul><li><p><strong>XML External Entity (XXE) attacks:</strong> uploading or inputting malicious XML content that can exploit vulnerabilities in the XML parser, allowing attackers to access files or execute remote code on the database server.</p></li></ul><ul><li><p><strong>Privilege Escalation</strong>: attackers exploit flaws in the database&#8217;s access control mechanisms to gain higher-level privileges, giving them unauthorized access to sensitive data or administrative capabilities.</p></li></ul><ul><li><p><strong>Database Misconfiguration Attacks</strong>: poorly configured databases (e.g., default passwords, open ports) can be exploited by attackers to gain access, modify data, or delete databases without needing advanced technical skills.</p></li></ul><ul><li><p><strong>Database Dump Attacks</strong>: attackers use tools or exploits to extract a full copy of the database. This often happens when database backups are not properly secured, or if the database is not encrypted.</p></li></ul><ul><li><p><strong>Buffer Overflow Attacks</strong>: attackers exploit software bugs in the database server, such as buffer overflows, to execute arbitrary code or crash the database, compromising its integrity and availability.</p></li></ul><ul><li><p><strong>Timing Attacks</strong>: attackers observe how long a database takes to respond to certain queries, allowing them to infer sensitive information based on response times, such as whether a query returned true or false.</p></li></ul><ul><li><p><strong>Data Exfiltration via Out-of-Band Channels</strong>: attackers leverage vulnerabilities to send data from a compromised database to an external source, bypassing regular data exfiltration monitoring systems.</p></li></ul><ul><li><p><strong>Stored Procedure Attacks</strong>: vulnerabilities in stored procedures (pre-written SQL code) can be exploited if these procedures are insecurely written, allowing attackers to manipulate data or execute unauthorized actions.</p></li></ul><ul><li><p><strong>LDAP Injection</strong> is similar to SQL Injection but targets LDAP (Lightweight Directory Access Protocol) queries. Attackers can modify LDAP queries to bypass authentication mechanisms or access unauthorized data.</p></li></ul><ul><li><p><strong>Database Backdoor Attacks: </strong>attackers plant backdoors within the database or the database management system (DBMS), allowing persistent and undetected access for future exploitation.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Script Attacks</strong></h2><p>All these attacks rely on injecting or manipulating scripts in some form, making them highly dangerous in web applications where security vulnerabilities allow for code execution in the user&#8217;s browser or server:</p><ul><li><p><strong>Cross-Site Scripting (XSS)</strong>: malicious scripts are injected into trusted websites, allowing attackers to steal session cookies, user data, or take over user accounts.</p></li></ul><ul><li><p><strong>Cross-Site Request Forgery (CSRF)</strong>: attackers trick users into performing unintended actions on a web application where they&#8217;re authenticated, like transferring money or changing account details. This happens without the user&#8217;s knowledge by exploiting their active session.</p></li></ul><ul><li><p><strong>HTML Injection</strong>: Malicious HTML code is injected into a web page, altering its structure or behavior. Attackers can inject form fields, modify the content, or create fake login prompts to steal user data.</p></li></ul><ul><li><p><strong>Script Injection</strong>: This involves injecting malicious scripts into web pages or web applications. An attacker could insert JavaScript or VBScript into input fields, which gets executed on the client-side.</p></li></ul><ul><li><p><strong>Content Security Policy (CSP) Bypass</strong>: Attackers find ways to bypass Content Security Policies (CSPs) put in place to block malicious scripts from being executed on websites, leading to XSS-like effects or data leakage.</p></li></ul><ul><li><p><strong>Browser Exploitation Framework (BeEF)</strong>: This framework allows attackers to hook into the browsers of users who visit malicious or compromised sites, then use JavaScript payloads to exploit vulnerabilities, control sessions, or extract data.</p></li></ul><ul><li><p><strong>Clickjacking: </strong>Users are tricked into clicking hidden buttons or links by overlaying malicious code on legitimate buttons. Attackers can execute unauthorized actions on behalf of the user, like changing security settings.</p></li></ul><ul><li><p><strong>Remote File Inclusion (RFI)</strong>: Attackers use file inclusion vulnerabilities to remotely execute malicious scripts from another server on the victim&#8217;s web application, gaining access to sensitive information or even full control over the server.</p></li></ul><ul><li><p><strong>Scripted Botnet Attacks:</strong> Malicious scripts are deployed across multiple infected systems (botnets), allowing attackers to execute large-scale attacks like Distributed Denial-of-Service (DDoS) or perform web scraping, stealing data from websites.</p></li></ul><ul><li><p><strong>JavaScript Keylogger Injection:</strong> Malicious JavaScript code is injected into web pages to log keystrokes entered by users. Attackers can capture login credentials, credit card information, or personal details this way.</p></li></ul><ul><li><p><strong>DOM-Based XSS:</strong> A subtype of XSS, where the vulnerability exists in the client-side JavaScript (within the DOM structure). It doesn&#8217;t involve server interaction, making it harder to detect and prevent.</p></li></ul><ul><li><p><strong>JavaScript-Based Cryptocurrency Mining (Cryptojacking)</strong>: malicious JavaScript code is injected into a website that utilizes the user&#8217;s CPU resources for cryptocurrency mining without their consent, slowing down their system and using their power.</p></li></ul><ul><li><p><strong>Formjacking: </strong>malicious JavaScript is injected into web forms on e-commerce or other sites to steal users&#8217; inputted credit card details and other sensitive information.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Brute Force Attacks</strong></h2><p>Brute Force Attacks involve using automated tools to repeatedly attempt password guesses or encryption keys until the correct one is found. These attacks are simple but can be highly effective if proper security measures aren&#8217;t in place. There are various types of brute force attacks, each with its own method of execution:</p><ul><li><p><strong>Simple Brute Force Attack:</strong> This is the most basic form, where attackers try all possible combinations of a password or key manually or using automated software until the correct one is found. It can be very slow for strong passwords but effective against weak or short passwords. Example: An attacker tries every combination of a 4-digit PIN (0000 to 9999).</p></li></ul><ul><li><p><strong>Dictionary Attack:</strong> Instead of trying every possible combination, attackers use a predefined list of common passwords (a &#8220;dictionary&#8221;). These lists often contain the most commonly used passwords, such as &#8220;password123&#8221; or &#8220;qwerty.&#8221; It speeds up the process by focusing on commonly used or guessed passwords. Example: The attacker uses a dictionary of the top 1,000 most common passwords to crack a weak password like &#8220;123456.&#8221;</p></li></ul><ul><li><p><strong>Hybrid Brute Force Attack:</strong> A combination of dictionary attacks and brute force. The attacker first tries a dictionary of known or common passwords and then applies variations, such as adding numbers, special characters, or capitalization to improve chances of success. Example: An attacker tries &#8220;password123,&#8221; &#8220;Password123!&#8221; or &#8220;Password@123&#8221; to increase the chance of guessing the right password.</p></li></ul><ul><li><p><strong>Credential Stuffing</strong>: Attackers use username-password pairs obtained from previous data breaches to try on other websites, under the assumption that users often reuse passwords across different sites. This can be highly effective against users who don&#8217;t use unique passwords for different accounts. Example: An attacker tries the login credentials from a breached social media account on a bank website to gain unauthorized access.</p></li></ul><ul><li><p><strong>Reverse Brute Force Attack:</strong> Instead of guessing the password for a specific username, attackers start with a known password or a set of commonly used passwords and try it across multiple usernames until they find a match. This attack exploits the fact that many users have weak passwords. Example: The attacker uses &#8220;password123&#8221; and tests it on various accounts in an organization until they find one that works.</p></li></ul><ul><li><p><strong>Rainbow Table Attack:</strong> Attackers use precomputed hash values and their corresponding plaintext passwords to reverse the hashing process. Instead of hashing every guess during the attack, the attacker compares the target password&#8217;s hash to those in the rainbow table, speeding up the process significantly. Example: A hashed password (e.g., &#8220;5f4dcc3b5aa765d61d8327deb882cf99&#8221;) is compared to a rainbow table to quickly find its plaintext value (in this case, &#8220;password&#8221;).</p></li></ul><ul><li><p><strong>Exhaustive Key Search (Key Brute Force Attack)</strong>: Attackers systematically try all possible keys in an encryption system until the correct one is found. This is typically done against systems using cryptographic keys, such as encrypted databases or files. The length of the key determines how long the attack will take. Example: Trying all possible 128-bit encryption keys to decrypt a file.</p></li></ul><ul><li><p><strong>Password Spraying: </strong>Unlike traditional brute force, where a single username is targeted, password spraying involves testing a few common passwords across a large number of accounts, often to avoid detection and account lockout mechanisms. Example: An attacker tries &#8220;Summer2024!&#8221; across many different user accounts within an organization, hoping to find a match without triggering too many lockouts.</p></li></ul><ul><li><p><strong>Mask Attack: </strong>A more focused version of brute force where the attacker knows certain aspects of the password (like its length, specific characters, or format) and uses that information to narrow down the search space. This attack is often combined with brute force to make it more efficient. Example: If the attacker knows the password is 8 characters long and starts with &#8220;A,&#8221; they will only try combinations that meet that pattern, significantly reducing the total number of guesses.</p></li></ul><ul><li><p><strong>Distributed Brute Force Attack: </strong>Attackers use multiple machines or a botnet to divide the workload of a brute force attack, significantly speeding up the attack. This method is useful for attacking more complex or well-secured systems where a single machine might take too long to succeed. Example: A large botnet attempts to brute force multiple accounts simultaneously, with each bot trying a portion of the possible combinations.</p></li></ul><ul><li><p><strong>Offline Brute Force Attack:</strong> In offline attacks, attackers obtain a file of hashed passwords (e.g., through a data breach) and use brute force on their own systems without any risk of detection by the target system. This is faster because the attacker doesn&#8217;t have to worry about account lockouts or rate-limiting. Example: An attacker uses a hash file from a compromised database to try all possible passwords offline until they find the correct one.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Watering Hole Attacks</strong></h2><p>Attackers compromise websites that a target group is known to frequent, delivering malware to anyone visiting the site. Watering hole attacks can take various forms based on the techniques and strategies employed by attackers. Here are some types of watering hole attacks:</p><ul><li><p><strong>Malicious Code Injection</strong>: Attackers exploit vulnerabilities in a legitimate website to inject malicious scripts or code. When users visit the compromised site, the malware is delivered to their devices. Example: A hacker finds a vulnerability in a popular industry news website and injects JavaScript that downloads malware onto visitors&#8217; devices.</p></li></ul><ul><li><p><strong>Drive-By Downloads</strong>: This method involves placing malicious code on a website that automatically downloads malware onto a user&#8217;s device without their consent when they visit. Example: Users visiting a compromised blog are unaware that malware is being silently downloaded and installed as soon as the page loads.</p></li></ul><ul><li><p><strong>Compromised Third-Party Resources</strong>: Attackers may target third-party resources or plugins commonly used by a website (like ads, widgets, or analytics tools). When the third-party service is compromised, any site using it can also distribute malware. <strong>Example</strong>: A popular ad network is hacked, and all websites displaying ads from that network inadvertently deliver malware to their visitors.</p></li></ul><ul><li><p><strong>Social Engineering Techniques for Websites</strong>: Attackers might create a fake website that mimics a legitimate site frequented by the target group. Users are tricked into visiting this malicious clone instead of the genuine site. Example: An attacker creates a fake version of a popular industry forum to lure users into providing their credentials or downloading malicious content.</p></li></ul><ul><li><p><strong>Spear Phishing with Watering Hole Tactics</strong>: Attackers combine watering hole tactics with spear phishing, where they first send targeted emails to individuals containing links to compromised sites. Example: A targeted email is sent to an employee with a link to a compromised vendor&#8217;s website, leading to malware installation when the link is clicked.</p></li></ul><ul><li><p><strong>Malicious Redirects</strong>: Attackers can manipulate a legitimate site to redirect visitors to a malicious website that hosts malware. Example: A well-known industry website has its URL modified to redirect users to a fake site where malware is hosted.</p></li></ul><ul><li><p><strong>Targeted Exploit Kits</strong>: Exploit kits are packages of malicious code that attackers use to target specific vulnerabilities in users&#8217; browsers or devices. When a user visits the compromised site, the exploit kit assesses the user&#8217;s environment and delivers the appropriate malware. Example: A watering hole site is rigged with an exploit kit that can identify outdated software on the user&#8217;s device and exploit vulnerabilities to install malware.</p></li></ul><ul><li><p><strong>Session Hijacking</strong>: Attackers can compromise a legitimate site to steal session cookies or tokens, allowing them to hijack user sessions on other sites. Example: A compromised site collects session cookies from users logged into their bank accounts, enabling attackers to gain unauthorized access.</p></li></ul><ul><li><p><strong>Credential Harvesting</strong>: Attackers create fake login forms on compromised sites to collect usernames and passwords from unsuspecting users. Example: Users are redirected to a login page that looks like their company&#8217;s portal, and when they enter their credentials, those are sent directly to the attackers.</p></li></ul><ul><li><p><strong>Phishing via Watering Hole</strong>: Attackers may use watering hole tactics to distribute phishing links, leading users to a site designed to capture sensitive information. Example: A compromised forum contains posts with links to phishing sites where users are tricked into entering personal information.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>General cybersecurity advice for business</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fJjv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fJjv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fJjv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fJjv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fJjv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fJjv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg" width="844" height="563" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:563,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of cybersecurity info graph for small business&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of cybersecurity info graph for small business" title="AI image of cybersecurity info graph for small business" srcset="https://substackcdn.com/image/fetch/$s_!fJjv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fJjv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fJjv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fJjv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56dc9d95-7bab-417d-b6d1-5cdcf5343741_844x563.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Small businesses need help with cybersecurity. Image credit: AI Image</figcaption></figure></div><p>Cybersecurity is essential for businesses of all sizes. A strong cybersecurity posture can help to protect your business from data breaches, financial losses, and reputational damage.</p><p>Here are some tips for how small businesses can protect themselves from cyber threats:</p><ul><li><p>Keep your software up to date.</p></li><li><p>Use strong passwords and enable two-factor authentication.</p></li><li><p>Be careful about what information you share online.</p></li><li><p>Train your employees on cybersecurity awareness.</p></li><li><p>Consider partnering with a IT service provider like Cyberkite that offers cybersecurity services.</p></li></ul><p>Cyberkite offers comprehensive remote support services to help small businesses protect themselves from cyber threats.</p><p>Our team of security experts can help you to identify and address your vulnerabilities, develop a cybersecurity plan, and implement security controls.</p><p>Contact Cyberkite to learn more about how we can help you to keep your business safe: <a href="http://cyberkite.com.au/cybersecurity">cyberkite.com.au/cybersecurity</a></p><p>There is a lot more folks. Stay tuned as we add them all in here.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>References</strong></h2><ul><li><p><a href="https://en.wikipedia.org/wiki/List_of_data_breaches">List of major data breaches</a></p></li><li><p><a href="https://en.wikipedia.org/wiki/List_of_cyber_warfare_forces">List of cyber warfare forces</a></p></li><li><p><a href="https://en.wikipedia.org/wiki/List_of_cyberattacks">List of major cyberattacks</a></p></li><li><p><a href="https://www.comparitech.com/net-admin/dos-vs-ddos-attacks-differences-prevention/#:~:text=A%20DoS%20attack%20is%20a,but%20not%20all%20DoS%20%3D%20DDoS.">Dos vs DDoS Attacks: The Differences and How To Prevent Them</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[2024 - Birth Year of Humanoid Robots]]></title><description><![CDATA[The Future of Humanoid Robotics is Here! In this article I explore 2024 advances in humanoid robots as the birth year.]]></description><link>https://blog.cyberkite.com.au/p/2024-birth-year-of-humanoid-robots</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/2024-birth-year-of-humanoid-robots</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Fri, 13 Sep 2024 05:33:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SCPr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SCPr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SCPr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SCPr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SCPr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SCPr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SCPr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg" width="844" height="482" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:482,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;ChatGPT image of humanoid robots helping humans&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="ChatGPT image of humanoid robots helping humans" title="ChatGPT image of humanoid robots helping humans" srcset="https://substackcdn.com/image/fetch/$s_!SCPr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SCPr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SCPr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SCPr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dc4260-e642-4798-8b10-69264ee55c1e_844x482.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Humanoid robots if affordable could outnumber humans. Image by ChatGPT</figcaption></figure></div><p>Year 2024 is the birth of humanoid robot bodies and from this point on they will advance with AI advances and very soon quantum computing to enhance it. Scary or exciting times? Let's see.</p><h2><strong>Why is 2024 the birth year for humanoid robots?</strong></h2><p>2024 has marked a pivotal moment for humanoid robotics, as companies push the boundaries of what&#8217;s possible in this advanced field. We have seen so many releases and we keep seeing new releases of humanoid robots this year as predicted by some.</p><p>The year 2024 there were more than four cutting-edge humanoid robots that have been unveiled, setting the stage for humanoid machines to become a reality in everyday life. Below, we explore some of the top contenders leading this robotics revolution.</p><h2><strong>1X NEO Beta: Your Future Home Companion?</strong></h2><div id="youtube2-bUrLuUxv9gE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;bUrLuUxv9gE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/bUrLuUxv9gE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Release</strong> <strong>Date</strong>: August 30, 2024</p><p><strong>Focus</strong>: Home use, safety, and bio-inspired design</p><p>1X&#8217;s NEO Beta is designed to operate within household environments, where safety is a top priority. It features realistic movements that mimic human behavior, which is remarkable in the robotics industry.</p><p>This robot stands out as a candidate for revolutionizing home life, from assisting with chores to even providing companionship. Its deployment in select homes could be the first glimpse of humanoid robots becoming an everyday presence in our lives.</p><p>But this raises an interesting question: With robots becoming so life-like, will we eventually have robotic girlfriends or boyfriends? It&#8217;s a thought-provoking idea that sparks debate on how close human-robot relationships could become. This particular 1X Neo feels like a life companion.</p><p>Now onto Figure 02.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Figure 02: Reinventing Manufacturing?</strong></h2><div id="youtube2-0SRVJaOg9Co" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;0SRVJaOg9Co&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/0SRVJaOg9Co?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Release</strong> <strong>Date</strong>: August 6, 2024</p><p><strong>Focus</strong>: Industrial applications with future domestic &amp; commercial applications</p><p>Figure Robotics released its second-generation humanoid, Figure 02, in August. Unlike its predecessor, Figure 02 features an entirely new hardware and software system. Equipped with advanced AI and human-scale hands, it is optimized for tasks in manufacturing environments, aiming to increase efficiency and productivity. As humanoid robots become more integrated into industrial settings, the line between human and machine capabilities continues to blur.</p><h2><strong>Tesla Optimus: A Factory Game Changer?</strong></h2><div id="youtube2-OtpCyjQDW0w" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;OtpCyjQDW0w&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/OtpCyjQDW0w?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Update</strong> <strong>Date</strong>: June 14, 2024</p><p><strong>Focus</strong>: Autonomous factory operations with future domestic and commercial applications</p><p>Tesla&#8217;s Optimus robot is one of the most anticipated humanoids of the decade. Two Optimus units are now working autonomously on Tesla&#8217;s factory floor, showcasing the company&#8217;s commitment to bringing humanoid robots into manufacturing.</p><p>Elon Musk&#8217;s vision of Optimus handling complex factory tasks could become a reality as early as 2025. While the robots&#8217; full potential is still under development, this milestone marks significant progress toward a world where robots assist humans in high-skill jobs.</p><p>Now onto Boston Dynamics Electric Atlas.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Boston Dynamics Electric Atlas: Power and Precision?</strong></h2><div id="youtube2-29ECwExc-_M" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;29ECwExc-_M&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/29ECwExc-_M?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Release</strong> <strong>Date</strong>: April 16, 2024</p><p><strong>Focus</strong>: Real-world industrial challenges plus many future commercial applications</p><p>Boston Dynamics has once again advanced its famed Atlas robot, now fully electric. With enhanced strength and dexterity, the Electric Atlas is built to handle even more complex tasks in manufacturing and other demanding environments.</p><p>As a fully electric machine, it also addresses sustainability concerns, making it an attractive option for industries aiming to reduce carbon footprints. Partnering with Hyundai, Boston Dynamics is working to integrate Atlas into real-world applications, showing the commercial viability of these advanced robots.</p><p>Let&#8217;s now explore the relationship between Robotics and AI.</p><h2><strong>A New Era for Robotics and AI</strong></h2><p>As we witness the growing sophistication of these humanoid robots, it&#8217;s clear that 2024 is a groundbreaking year for robotics. With advancements in generative AI and robotics, humanoid machines are becoming more adept at handling both blue and white-collar tasks.</p><p>This convergence of AI and robotics signals a new era of collaboration between humans and machines, one that promises to reshape industries from manufacturing to home care.</p><p>Now let&#8217;s look forward into the future.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>What Does the Future Hold?</strong></h2><p>While the benefits of humanoid robots are clear, improved productivity, safer workplaces, and enhanced quality of life, many questions arise:</p><p>What will be left for humans to do as robots take over more jobs?</p><p>How will this transformation impact our society and our sense of purpose?</p><p>Will humans find new ways to work alongside robots, or will automation lead to a shift in how we perceive labor and productivity?</p><p>These questions reflect the profound impact humanoid robots may have on the future. As this technology evolves, now is the time to reflect on how we can harness it to benefit all aspects of human life.</p><p><strong>What</strong> <strong>do</strong> <strong>you</strong> <strong>think</strong> <strong>about</strong> <strong>this</strong> <strong>robotics</strong> <strong>revolution</strong>?</p><p>As humanoid robots become more sophisticated and integrated into everyday life, the next decade promises a dramatic shift in how we interact with technology. Several key trends and developments may shape the future of humanoid robotics:</p><ol><li><p><strong>Widespread</strong> <strong>Adoption</strong> <strong>in</strong> <strong>Industry</strong>: Over the next 10 years, humanoid robots will likely become essential in industries like manufacturing, logistics, and healthcare. These robots will not just automate repetitive tasks but also handle more complex roles, such as maintenance, quality control, and even customer interaction. Companies will invest heavily in humanoid robots, seeing them as critical assets for improving efficiency and reducing costs.</p></li><li><p><strong>Household</strong> <strong>Integration</strong>: We could see humanoid robots like 1X&#8217;s NEO Beta becoming common in homes, where they would assist with daily chores, caregiving, and companionship. By 2034, it&#8217;s conceivable that advanced humanoids will be affordable for middle-class households, transforming the way we live and interact within our homes. They may act as assistants for elderly or disabled individuals, making independent living more accessible.</p></li><li><p><strong>Human-Robot</strong> <strong>Relationships</strong>: As humanoid robots become more life-like and capable of complex social interactions, the nature of human relationships with machines may evolve. While it may sound like science fiction, we could see robots taking on emotional and social roles, leading to ethical discussions about the boundaries of human-robot relationships. Could robots replace human companionship for some individuals? What would that mean for society&#8217;s view of relationships and emotional fulfillment?</p></li><li><p><strong>Workforce</strong> <strong>Transformation</strong>: As robots take over more jobs, both manual and cognitive&#8212;society will need to rethink the role of human workers. In the next decade, we could see the rise of new job sectors focused on overseeing, programming, and maintaining humanoid robots. Additionally, governments and industries may explore universal basic income (UBI) or other social support systems to address potential job displacement. Humans may shift toward more creative, strategic, and empathetic roles, areas where machines currently lack the necessary capabilities.</p></li><li><p><strong>Ethics</strong> <strong>and</strong> <strong>Regulation</strong>: The rise of humanoid robotics will also bring a wave of ethical and regulatory challenges. Governments and international bodies will need to establish laws governing the rights of robots, safety protocols, and guidelines for human-robot interactions. The ethical concerns surrounding autonomy, privacy, and control will intensify, leading to debates about how much power should be given to AI-driven robots.</p></li><li><p><strong>Advancements</strong> <strong>in</strong> <strong>AI</strong> <strong>and</strong> <strong>Emotional</strong> <strong>Intelligence</strong>: The next generation of humanoid robots could feature emotional intelligence, allowing them to better understand human emotions and respond accordingly. This would deepen their role in care settings, education, and even entertainment, as robots could engage more meaningfully with people on an emotional level.</p></li></ol><p>In short, by 2034, humanoid robots could not only be an integral part of our professional and personal lives but also redefine what it means to be human in an age where intelligent machines walk among us.</p><p>The course of history for humanoid robotics is just beginning, and the next decade will be crucial in shaping how we live, work, and interact with these remarkable technologies.</p><p>Happy computing</p><p><strong>Michael Plis</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Dark Side of Social Media: Trolling and Negative Intent]]></title><description><![CDATA[In this article I delve deeper into the effects of trolling and those who imply negative intent to satisfy their righteousness. It suggests a better way to communicate with each other.]]></description><link>https://blog.cyberkite.com.au/p/dark-side-of-social-media-trolling-and-negative-intent</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/dark-side-of-social-media-trolling-and-negative-intent</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Tue, 27 Aug 2024 01:41:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3OGi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3OGi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3OGi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3OGi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3OGi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3OGi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3OGi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg" width="844" height="845" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:845,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of social media on phone next to crying person and a rain cloud&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of social media on phone next to crying person and a rain cloud" title="AI image of social media on phone next to crying person and a rain cloud" srcset="https://substackcdn.com/image/fetch/$s_!3OGi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3OGi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3OGi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3OGi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff73a5718-f91b-476b-87a3-7627c8b6ffbb_844x845.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Trolling can be harmful for the victim and the troller. Img Credit: ChatGPT</figcaption></figure></div><p>Social media has revolutionized how we connect, share ideas, and build communities. It&#8217;s a place where we can express ourselves, stay informed, and engage with others across the globe. However, with the benefits of social media also comes the darker side, trolling and the constant implication of negative intent. This toxic behavior has become alarmingly common, causing significant harm not just to those who are targeted, but also to those who engage in it.</p><h2><strong>What is trolling in social media?</strong></h2><p>Trolling is a term used to describe the act of deliberately provoking or antagonizing others online, often through inflammatory, offensive, or misleading comments. The intent behind trolling is typically to evoke strong emotional reactions, such as anger, frustration, or distress, in the target.</p><p>Trolls often exploit the anonymity of the internet to engage in these behaviors without facing immediate consequences. Trolling can range from relatively mild teasing to severe harassment and can occur in various online spaces, including social media, forums, and comment sections. While some trolls claim to be &#8220;just joking,&#8221; the impact of their actions can be profoundly harmful to those on the receiving end.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>The Emotional Toll on Victims</strong></h2><p>Being the target of social media trolling can be an emotionally devastating experience. Imagine logging into your account, expecting to see messages from friends or updates on topics you care about, only to find yourself bombarded with hateful comments, unfounded accusations, or vicious rumors. This type of harassment can quickly spiral into serious emotional distress, leading to:</p><ul><li><p><strong>Anxiety and Depression:</strong> Constant exposure to negativity can trigger or exacerbate mental health issues. Victims may find themselves struggling with feelings of anxiety, helplessness, and depression as they grapple with the relentless onslaught of toxic comments.</p></li></ul><ul><li><p><strong>Social Isolation:</strong> To escape the negativity, many victims withdraw from social media or social interactions altogether. What was once a space for connection turns into a source of pain, pushing individuals further into isolation.</p></li></ul><ul><li><p><strong>Erosion of Self-Esteem</strong>: Repeated attacks can severely damage a person&#8217;s self-worth. Trolls often target insecurities, making victims question their abilities, their character, and even their value as human beings.</p></li></ul><h3><strong>The Lasting Damage to Reputation</strong></h3><p>Social media trolling doesn&#8217;t just hurt emotionally&#8212;it can have long-term consequences for a person&#8217;s reputation. In the digital age, information (whether true or false) spreads rapidly. A single post, even if unfounded, can go viral, leading to widespread public scrutiny. The damage to a victim&#8217;s reputation can be hard to repair, affecting personal relationships, career opportunities, and overall social standing.</p><p>In some cases, the repercussions can be severe. Professional opportunities might be lost, relationships can be strained or broken, and the victim may find themselves stigmatized by a narrative they had no control over. The permanence of digital content means that even after the trolling stops, the damage can linger, with negative content being searchable long after the incident.</p><h2><strong>The Hidden Cost to the Troll</strong></h2><p>While it&#8217;s easy to focus on the harm done to victims, it&#8217;s important to recognize that trolling also negatively affects the perpetrator. Engaging in trolling behavior desensitizes individuals to the pain they cause. Over time, this desensitization can lead to:</p><p><strong>Loss of Empathy</strong>: Regularly participating in or even witnessing trolling can erode one&#8217;s ability to empathize with others. Trolls often view their actions as harmless or justified, failing to see the real emotional and psychological impact on their targets.</p><p><strong>Reputation Risks</strong>: Just as victims can suffer from reputational damage, so can trolls. Screenshots, records of hateful comments, and patterns of negative behavior can resurface, potentially jeopardizing future job prospects, relationships, or social acceptance.</p><p><strong>Internal Negativity:</strong> A troll&#8217;s focus on negativity can become an internalized mindset. Constantly looking for faults, engaging in hostile interactions, and spreading negativity can lead to a darker, more cynical view of the world, ultimately affecting the troll&#8217;s own mental well-being.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Breaking the Cycle of Negativity</strong></h2><p>The cycle of social media trolling and negativity can seem never-ending, but it doesn&#8217;t have to be. Both individuals and communities can take steps to break free from this harmful pattern:</p><ul><li><p><strong>Promote Positivity</strong>: Actively choosing to engage in positive, supportive interactions can change the tone of your social media experience. Compliment someone&#8217;s work, share uplifting content, or offer a kind word to someone who might need it.</p></li></ul><ul><li><p>P<strong>ause Before Posting:</strong> Before hitting &#8220;send,&#8221; take a moment to consider how your words might affect the other person. Would you say the same thing in a face-to-face conversation? Is there a more constructive way to express your thoughts? This simple practice can help reduce the spread of negativity.</p></li></ul><ul><li><p><strong>Support Victims:</strong> If you see someone being trolled, don&#8217;t stay silent. Offer support, report the behavior to the platform, and encourage others to do the same. Standing up against trolling sends a strong message that this behavior is not acceptable.</p></li></ul><ul><li><p><strong>Seek Help if Needed:</strong> For those who find themselves drawn into trolling, it&#8217;s important to recognize the need for change. Whether it&#8217;s talking to a counselor, reflecting on the reasons behind the behavior, or simply making a conscious effort to engage more positively, change is possible.</p></li></ul><h2><strong>Conclusion: A Call to Action</strong></h2><p>Social media has the power to connect, inspire, and bring out the best in us&#8212;but only if we choose to use it responsibly. Trolling and the implication of negative intent are harmful behaviors that have no place in a healthy, supportive online community. By promoting empathy, positivity, and respect, we can make social media a better place for everyone.</p><p>The next time you find yourself tempted to engage in or ignore trolling behavior, remember the real people on the other side of the screen. Choose kindness. Choose positivity. Choose to be part of the solution.</p><p>Safe and happy computing</p><p><strong>Michael Plis</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Is Technology Fueling the Global Loneliness Epidemic?]]></title><description><![CDATA[Loneliness is becoming an epidemic infecting something like 1 in 4 people in the world. This article covers possible causes, effects of and possible solutions to loneliness from a technologists point.]]></description><link>https://blog.cyberkite.com.au/p/is-technology-fueling-the-global-loneliness-epidemic</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/is-technology-fueling-the-global-loneliness-epidemic</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Thu, 15 Aug 2024 22:43:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IKnf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IKnf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IKnf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IKnf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IKnf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IKnf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IKnf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg" width="844" height="482" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:482,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Loneliness person standing with their phone lost in a city of people.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Loneliness person standing with their phone lost in a city of people." title="Loneliness person standing with their phone lost in a city of people." srcset="https://substackcdn.com/image/fetch/$s_!IKnf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IKnf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IKnf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IKnf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F863cb511-b762-45b1-9b32-15f6ef06a4ad_844x482.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Are we exacerbating chronic mass loneliness partly through our insatiable desire for more technology and is it the type that matters and how it's used? Image: OpenAI ChatGPT</figcaption></figure></div><p>In recent years, the global loneliness epidemic has become a pressing issue, with nearly <strong>ONE</strong> <strong>IN</strong> <strong>FOUR</strong> adults worldwide reporting feelings of loneliness.</p><p>A <a href="https://news.gallup.com/opinion/gallup/512618/almost-quarter-world-feels-lonely.aspx">Meta-Gallup</a> survey highlighted this alarming trend, revealing that young adults are particularly vulnerable. But as we examine the factors behind this loneliness, a critical question arises: Is technology playing a role in exacerbating this crisis?</p><h2><strong>The Double-Edged Sword of Technology</strong></h2><p>On the surface, technology promises connection. Social media platforms, video calls, and instant messaging apps are designed to keep us in touch with friends, family, and colleagues. However, the reality is more complex. The very tools meant to unite us can often drive us apart.</p><p>Over the past decade, social media driven by AI algorithms has increasingly pushed us toward passive consumption, scrolling through endless feeds of carefully curated, often unrealistic snapshots of other people&#8217;s lives. This passive engagement can lead to harmful comparisons, reinforcing feelings of inadequacy and isolation rather than fostering genuine connections. Add to this the overuse of TV, streaming services, video games, and social media, and it&#8217;s easy to see how people are drawn into a cycle of isolation.</p><p>Furthermore, clickbait journalism, consumerism, and workaholism, especially prevalent in places like Australia, are interconnected with these technological advancements. The constant drive for faster, better, and cheaper solutions can make us impatient with the slower, more deliberate pace of human interaction, leading many to prefer virtual interactions over real-world connections.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>The Broader Implications of a Tech-Driven Society</strong></h2><p>Technology&#8217;s impact on loneliness extends beyond just our screens. The rise of &#8220;me-ism&#8221; and a culture where individualism and material success are prioritized over communal well-being has taken hold, especially in Western societies. This culture fosters an environment where loneliness thrives, as people become more disconnected from their communities and each other. They are also living further apart in vast cities such Melbourne (Australia) spanning a width of 100 km or more and other such cities in Australia and other countries are similar. I actually grew up in a small town in the Pomeranian Region of Poland and I can tell you till today, its got a more relaxed and safer feeling till today. Mega cities in my opinion are a breeding ground for loneliness - which is funny because there is more people in mega cities than small towns. You may know the answer to that.</p><p>In some countries, like Australia, societal pressures such as workaholism and tall poppy syndrome (where people are criticized for standing out) compound the issue.</p><p>Then also in Australia mass focus on national interests such as protests and great sport events or mass events seem to fill the loneliness void but they don&#8217;t as those events don&#8217;t  always fulfill one-on-one and social interaction often benefited by small groups and outings.</p><p>These factors, combined with the distractions of technology, leave little room for meaningful human connections, further fueling the loneliness epidemic in my opinion.</p><h2><strong>The Physical and Psychological Toll of Loneliness Epidemic</strong></h2><p>The consequences of loneliness are profound, affecting both our bodies and minds. Researchers reveal the following effects of loneliness:</p><p>The <strong>physical</strong> effects include:</p><ul><li><p>Weakened Immune System: Increased susceptibility to infections.</p></li><li><p>Cardiovascular Issues: Higher risk of heart disease and stroke.</p></li><li><p>Increased Mortality: Up to 30% higher risk of early death.</p></li><li><p>Deprivation of Oxytocin: in small doses Oxytocin is important for humans daily - but being isolated we are deprived of it as its generated with friends, good experiences and human contact such as a touch, handshake, hug, kiss, cuddle. Stronger forms such as sex are great but they can be overdosed which I think may be unhealthy for relationships according to early research but small doses daily are really important such as hugs.</p></li></ul><p>The <strong>psychological</strong> effects are equally damaging:</p><ul><li><p>Depression and Anxiety: Strongly linked to prolonged loneliness.</p></li><li><p>Cognitive Decline: Faster mental deterioration, especially in older adults.</p></li><li><p>Sleep Disturbances: Poor sleep quality.</p></li></ul><p>And <strong>socially</strong>, loneliness can lead to social withdrawal, which in turn reduces resilience and the ability to cope with stress.</p><p><strong>Spiritually</strong>, a lack of connection weakens spiritual health, as reduced support hinders engagement in spiritual activities.</p><p>Suffice it to say it&#8217;s a bad report card on the effects of loneliness. I used to think its ok I can endure it.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Overusing technology for entertainment contributes to these issues</strong></h2><p>Researchers often talk about these effects of use of technology for entertainment:</p><ul><li><p>Eye strain</p></li><li><p>Sleep disruption</p></li><li><p>Sedentary lifestyle</p></li><li><p>Decreased attention span</p></li><li><p>These are just a few of the side effects so you can Google more or ask AI.</p></li><li><p>Oxytocin deprivation</p></li></ul><p>Moreover, the addictive nature of digital content can pull individuals away from activities that nurture their well-being including spiritual practices.</p><h2><strong>Imagining a Better Future</strong></h2><p>So, what is the solution?</p><p><strong>My TV</strong>, <strong>Streaming</strong> <strong>Services</strong> &amp; <strong>Social</strong> <strong>Media Cancel Goal</strong>: One thing I&#8217;m working on is detaching myself from TV, streaming services, tv and movie video files from the Torrent era and social media - given the bad effects on the brain which may I think contribute to  loneliness. During COVID lockdowns I got into audiobooks, podcasts, books and hobbies and when possible I socialized with friends. Question is in terms of loneliness, has society actually fully recovered from COVID lockdowns or we are still there with loneliness? I plan to keep detaching myself more form these things and do occasional watching with friends of an episode or cinema outing etc. Thats less risky. I think using technology alone for entertainment is risky.</p><p><strong>My Oxytocin Goal</strong>: Also I&#8217;ve been researching the effects of Oxytocin deprivation in humans as a result of loneliness and isolation. And the importance of positive experiences in person with friends, good music , good outings, hugs, kisses, touch, cuddles(of you are in a position to get them since we are talking about loneliness) and sex in moderation (if you are in a relationship and studies show too much of that and not enough of the mild forms of oxytocin can create overdose which can affect a relationships due to desensitisation effect) - as they say too much of a good thing can be bad. Unfortunately, I live alone so I don&#8217;t have much access to this, but I am working on connecting with people around the community as well as friends and spiritual community. And I encourage everyone to recognise the need of oxytocin in their daily lives and understand how to get it and how to give it. Because in the end giving Oxytocin to others means you may likely receive some yourself.</p><p>While technology isn&#8217;t the sole cause of loneliness, its role cannot be ignored. Limiting the use of technology for entertainment and focusing on real-life connections are essential steps. However, as a technologist, I also envision a future where technology supports rather than detracts from what matters most.</p><p>Imagine a world 300 years from now, much like the future depicted in &#8220;Star Trek: The Next Generation.&#8221; In this society, technology exists in the background, enhancing life without overshadowing the importance of our relationships and connections with:</p><ul><li><p>Sentient creatures</p></li><li><p>Animals</p></li><li><p>Plants</p></li><li><p>Earth</p></li><li><p>The physical universe</p></li><li><p>What lies beyond</p></li></ul><p>There would be no &#8220;technoworship,&#8221; only a balanced integration of technology that respects our need for connection, purpose, and community.</p><h2><strong>Conclusion: Striking the Right Balance</strong></h2><p>As we continue to navigate the digital age, it&#8217;s crucial to strike a balance between embracing technology and maintaining the human connections that are vital to our well-being. While technology has the potential to isolate, it also holds the promise of bringing us closer&#8212;if we use it wisely.</p><p>In the end, the answer to whether technology is helping to cause the global loneliness epidemic lies in how we choose to interact with it. By being mindful of its impact and taking steps to foster real connections, we can mitigate its negative effects and build a more connected, compassionate world.</p><p>Happy computing</p><p><strong>Michael Plis</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p><a href="https://www.cyberkite.com.au/blog/hashtags/digitaldetox">#digitaldetox</a> <a href="https://www.cyberkite.com.au/blog/hashtags/worklifebalance">#worklifebalance</a> <a href="https://www.cyberkite.com.au/blog/hashtags/loneliness">#loneliness</a> <a href="https://www.cyberkite.com.au/blog/hashtags/mentalhealth">#mentalhealth</a> <a href="https://www.cyberkite.com.au/blog/hashtags/technology">#technology</a> <a href="https://www.cyberkite.com.au/blog/hashtags/happiness">#happiness</a></p><h2><strong>References</strong></h2><p>Article: <strong>CNN</strong>: The loneliness epidemic: Nearly 1 in 4 adults feel lonely, new survey finds</p><p><a href="https://www.cnn.com/2023/10/24/health/lonely-adults-gallup-poll-wellness/index.html">https://www.cnn.com/2023/10/24/health/lonely-adults-gallup-poll-wellness/index.html</a></p><p>Research: <strong>Meta-Gallup Survey</strong>: Almost a Quarter of the World Feels Lonely</p><p><a href="https://news.gallup.com/opinion/gallup/512618/almost-quarter-world-feels-lonely.aspx">https://news.gallup.com/opinion/gallup/512618/almost-quarter-world-feels-lonely.aspx</a></p>]]></content:encoded></item><item><title><![CDATA[Is a fire sale possible after Crowdstrike global IT outage?]]></title><description><![CDATA[CYBERSECURITY: Is a &#8220;fire sale&#8221; possible given what happened in Crowdstrike & Azure global IT outage? I explore the potential of this happening.]]></description><link>https://blog.cyberkite.com.au/p/is-a-fire-sale-possible-after-crowdstrike-global-it-outage</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/is-a-fire-sale-possible-after-crowdstrike-global-it-outage</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Sun, 21 Jul 2024 02:15:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7_pZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7_pZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7_pZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7_pZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7_pZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7_pZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7_pZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg" width="844" height="633" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:633,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Fire sale&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Fire sale" title="Fire sale" srcset="https://substackcdn.com/image/fetch/$s_!7_pZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7_pZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7_pZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7_pZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F549eac52-1e59-4088-ad5f-088e947186b7_844x633.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Although fiction, a fire sale could one day happen. Made by Google Gemini</figcaption></figure></div><p>In the context of hacking and cybersecurity, a &#8220;fire sale&#8221; refers to a coordinated, multi-stage cyber attack intended to disrupt and compromise multiple critical infrastructure systems, often with catastrophic effects.</p><p>The term gained popularity from the <a href="https://youtu.be/GpUkpPoVP2g">2007 movie &#8220;Live Free or Die Hard,&#8221;</a> where the plot centers around such an attack.</p><div id="youtube2-GpUkpPoVP2g" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;GpUkpPoVP2g&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/GpUkpPoVP2g?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>A fire sale typically involves three phase</strong>s:</p><p>1. <strong>Disruption of Transportation Systems:</strong> Attacks on traffic signals, railways, and air traffic control to create chaos and confusion.</p><p>2. <strong>Financial Systems Attack:</strong> Targeting banks, stock markets, and other financial institutions to cripple the economy.</p><p>3. <strong>Utilities and Communication Attack</strong>: Disabling utilities like electricity, water, and telecommunications to further exacerbate the crisis.</p><p>The goal of a <strong>fire sale</strong> is to create widespread panic and chaos by systematically crippling key infrastructure elements. While this is a fictional concept, it underscores the importance of robust cybersecurity measures to protect critical systems from sophisticated and coordinated attacks.</p><p>Given what happened with Crowdstrike and at same time Microsoft Azure had major outages seperate to Crowdstrike it may encourage further multi-pronged attacks. It may spur malicious hackers and hardline states that use malicious hacking to plan and undertake multi-staged attacks with careful planning and staged execution in the future.</p><p>There is increasing reports that state backed malicious hackers are quietly positioning themselves in critical assets and laying low undetected and ready for when a fire sale is ready for activation eg in case of a Taiwan war or something else.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>AI Could Bring About a Global IT Outage</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bKBs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bKBs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!bKBs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!bKBs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!bKBs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bKBs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg" width="844" height="844" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:844,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of Android woman burning&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of Android woman burning" title="AI image of Android woman burning" srcset="https://substackcdn.com/image/fetch/$s_!bKBs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!bKBs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!bKBs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!bKBs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F068c80b7-fb67-4b72-8e26-9db0f97bf3e4_844x844.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Could AI bring about a fire sale? Image Credit: Google Gemini</figcaption></figure></div><p>I think generative AI in the hands of hackers as it gets smarter and smarter AI will be built release into different parts of the world and potentially create the possibility of a fire sale where everything must go and everything gets attacked.</p><p>Particularly, hardline states have had a desire to inflict fear on the western populations to show that their style of government is better and their lifestyle is better. I&#8217;m not going to judge whether this type of lifestyle or that type of lifestyle is better. The one thing is clear. Everyone should be able to choose how they live as long as they don&#8217;t refer to anyone. Rest is personal choice and faith-based options.</p><p>The potentiality of AI coming in and being designed on the next intelligence level like reasoning and creativity and having that combined with hackers intention to inflict damage and find vulnerabilities and access critical areas could cause entire governments to shut down and cause fear in the public similar to the movie I mentioned.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Conclusion</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xRLi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xRLi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xRLi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xRLi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xRLi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xRLi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg" width="844" height="844" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:844,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;AI image of a future Android war&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="AI image of a future Android war" title="AI image of a future Android war" srcset="https://substackcdn.com/image/fetch/$s_!xRLi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xRLi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xRLi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xRLi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3769034e-3db8-462d-b6cc-3af3b5f8e48b_844x844.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Governmetns and companies must continue to advace their AI and robots to defend against a future fire sale on critical assets. Image Credit: Google Gemini</figcaption></figure></div><p>All governments, citizens and organizations must stay vigilant and do proper monitoring relevant to their target value.</p><p>Constantly innovating and matching the veracity and advanced AI that hackers might create all governments and developers need to work together to stay one step ahead of malicious hackers in developing intelligent AI defence systems. And having offensive attack AI designed just like as if it&#8217;s a human and multiply them by hundreds of thousands of instances to defend a country and an organisation for example. That I think is the future of cyber defence in the light of the possibility of a fire sale.</p><p>And of course, the usual advice for developers is to carefully test their code in simulated environments before releasing it automatically to the world. And then careful and Street security around developing because if malicious code is inserted by malicious developer within the organisation or government then were all in trouble.</p><p>Stay safe online.</p><p><strong>Michael Plis</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Is social media better or worse for mental health?]]></title><description><![CDATA[Social media has become an undeniable force in our lives. We connect with friends and family, share experiences, and consume information, all through our devices. But what about the impact on our men]]></description><link>https://blog.cyberkite.com.au/p/is-social-media-better-or-worse-for-mental-health</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/is-social-media-better-or-worse-for-mental-health</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Tue, 25 Jun 2024 08:04:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WAXr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WAXr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WAXr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WAXr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WAXr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WAXr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WAXr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg" width="844" height="844" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:844,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Young man is addicted to social media and he can't stop using social media&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Young man is addicted to social media and he can't stop using social media" title="Young man is addicted to social media and he can't stop using social media" srcset="https://substackcdn.com/image/fetch/$s_!WAXr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WAXr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WAXr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WAXr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b957c8-83f7-4096-b32d-63e9d488e27e_844x844.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Entire generations of young people are growing up with social media addiction. Image by Meta AI</figcaption></figure></div><p>In recent years, the debate over whether social media is beneficial or detrimental to mental health has intensified. Researchers, healthcare professionals, and parents are increasingly concerned about the impact of social media on mental well-being, particularly among young people. Here, we will explore the latest findings on this issue and consider practical advice for managing social media use.</p><h2><strong>Contents</strong></h2><p><strong>The Benefits of Social Media</strong></p><p><strong>The Drawbacks of Social Media</strong></p><p><strong>US Surgeon General&#8217;s Warning</strong></p><p>&#9;The Surgeon General&#8217;s Call for Legislative Action</p><p>&#9;Legislative Efforts</p><p><strong>Social Media and Suicidal Ideation Statistics Worldwide</strong></p><p><strong>Practical Tips for Social Media Users</strong></p><p>&#9;Suicide Help Lines</p><p>&#9;Social Media Advice for Adults</p><p>&#9;Tips for Parents with Teenagers and Children</p><p>&#9;Alternatives to mass social media</p><p><strong>Is social media better or worse for mental health?</strong></p><p>&#9;Lessons from the Tower of Babel for ancient peoples at the time</p><p>&#9;Lessons from Tower of Babel in the attention economy and social media</p><p><strong>References</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1><strong>The Benefits of Social Media</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!M8Vq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!M8Vq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!M8Vq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!M8Vq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!M8Vq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!M8Vq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg" width="844" height="562" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:562,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Friends talking to each other&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Friends talking to each other" title="Friends talking to each other" srcset="https://substackcdn.com/image/fetch/$s_!M8Vq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!M8Vq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!M8Vq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!M8Vq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa861a5fe-9aa7-42fa-ba7d-8c70409a1c17_844x562.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Social media has a few benefits - but only a few. Priscilla Du Preez &#127464;&#127462; on Unsplash</figcaption></figure></div><p>Social media can offer few mental health benefits:</p><ul><li><p><strong>Connection and Support</strong>: Social media platforms can help individuals stay connected with friends and family, offering a sense of community and support. For those who feel isolated, these connections can provide emotional comfort and a feeling of belonging. But can you get that with other forms of social connection? Yes</p></li></ul><ul><li><p><strong>Access to Information and Resources</strong>: Social media can serve as a valuable source of information on mental health issues. Users can find support groups, mental health resources, and professional advice more easily. Do you need social media to access information and resources? No- you have the whole internet and physical libraries.</p></li></ul><ul><li><p><strong>Self-Expression and Creativity</strong>: Platforms like Instagram, TikTok, and Twitter allow users to express themselves creatively, which can be therapeutic and boost self-esteem. Do you need social media to express yourself? No, you can do that online on your own website, in person by holding an exhibition or performance or going on TV or radio.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1><strong>The Drawbacks of Social Media</strong></h1><p>Despite these benefits, there are significant concerns about the negative impact of social media on mental health:</p><ul><li><p><strong>Comparison and Low Self-Esteem</strong>: Constant exposure to curated, idealized images of others&#8217; lives can lead to feelings of inadequacy and low self-esteem. This phenomenon, known as &#8220;social comparison,&#8221; can be particularly harmful to adolescents.</p></li></ul><ul><li><p><strong>Unrealistic beauty standards and body image issues:</strong>  The constant exposure to edited photos and unrealistic beauty standards can lead to body dissatisfaction and low self-esteem.</p></li></ul><ul><li><p><strong>Cyberbullying, online harassment &amp; reputation damage</strong>: Social media can be a breeding ground for cyberbullying, which can have severe emotional and psychological consequences for victims. Reputation damage can be extreme with such things as the cancel culture.</p></li></ul><ul><li><p><strong>Sleep, Addiction and Time Management</strong>: Excessive use of social media can lead to addiction, negatively impacting productivity, sleep, and real-life social interactions. Studies have shown that spending too much time on social media can exacerbate feelings of anxiety and depression.  The stimulating nature of social media and the blue light emitted from screens can disrupt sleep patterns, leading to fatigue and impacting mental well-being.</p></li></ul><ul><li><p><strong>Fear of missing out (FOMO) and social comparison:</strong> Seeing others&#8217; seemingly perfect lives online can lead to feelings of inadequacy and dissatisfaction with your own life.</p></li></ul><ul><li><p><strong>Difficulty concentrating and attention problems:</strong>  The constant notifications and distractions from social media can make it difficult to focus on tasks and can shorten attention spans.</p></li></ul><ul><li><p>There are many more drawbacks of social media.</p></li></ul><p>There is a really good documentary that shows the mechanics of how social media works and it&#8217;s effects on the brain and humans. Its called &#8220;The Social Dilemma&#8221; available on Netflix (Watch the full documentary on Netflix here: <a href="https://www.netflix.com/title/81254224">https://www.netflix.com/title/81254224</a> ). Here is the trailer: <a href="https://youtu.be/uaaC57tcci0">The Social Dilemma | Official Trailer | Netflix</a></p><div id="youtube2-uaaC57tcci0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;uaaC57tcci0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/uaaC57tcci0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1><strong>US Surgeon General&#8217;s Warning on Mental Health</strong></h1><p>U.S. Surgeon General Dr. Vivek Murthy has emphasized the urgent need to address the negative effects of social media on children. He likened the mental health crisis among young people to a public health emergency, noting that social media is a significant contributor. In a recent op-ed in the New York Times, Murthy called for a warning label on social media apps, similar to those on cigarettes and alcohol, highlighting the profound risks they pose to mental health.</p><p>Murthy cited studies indicating that teens who spend three hours a day on social media double their risk of depression. Given that teens spend nearly five hours a day on these platforms, the potential for harm is considerable. He pointed out that the prevalence of social media use among kids is nearly universal, with over 95% of them engaged on these platforms.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>The Surgeon General&#8217;s Call for Legislative Action on Mental Health</strong></h2><div id="youtube2-wg6I9Syh9lQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;wg6I9Syh9lQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/wg6I9Syh9lQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Murthy has consistently warned about the harms of social media on children&#8217;s well-being, and his recent declaration of an emergency underscores the urgency of the issue. In May 2023, he issued an advisory highlighting that there is insufficient evidence to deem social media safe for children&#8217;s mental health, describing it as a &#8220;profound risk of harm.&#8221;</p><p>Murthy has advocated for practical measures parents can take, such as restricting social media use and ensuring that environments like schools and family gatherings remain phone-free. He also recommended that children should not join social media platforms until they are older and more capable of managing their time and emotional responses.</p><p><a href="https://youtu.be/wg6I9Syh9lQ?si=Jf1ZbqMh1VVJYLBx">In recent development Dr Murphy suggested to congress</a> that it might be advisable to require apps display and warning labels similar to cigarettes and alcohol when people enter social media apps. But Dr Murphy said that this may not be sufficient. He argues that schools should become phone free, which is no surprise when Australian schools have already adopted that and other countries are following suit.</p><h2><strong>Legislative Efforts</strong></h2><p>Some states have already started taking legislative action. For instance, Florida has passed a bill prohibiting children under 14 from having their own social media accounts and requiring parental consent for those under 16. Similarly, New York is working on legislation to limit the influence of algorithms on children&#8217;s feeds and protect their data privacy.</p><p>Australia has discussed banning social media for people under 16. Will the rest of the US and other English speaking nations follow in this direction? But the problem according to the eSafety Commissioner is when you ban social media children will hide access to social media anyway - so what&#8217;s the solution? Here are some ideas to help with this:</p><p><strong>Education and Open Communication:</strong></p><ul><li><p><strong>Talk about online safety:</strong> Discuss cyberbullying, privacy settings, and responsible online behaviour.</p></li><li><p><strong>Promote critical thinking:</strong> Help them evaluate what they see online and identify unrealistic portrayals.</p></li><li><p><strong>Set boundaries together:</strong> Create age-appropriate time limits and discuss responsible content creation.</p></li></ul><p><strong>Platform Features and Parental Controls:</strong></p><ul><li><p><strong>Age-appropriate versions:</strong> Encourage platforms to develop safer versions for younger users.</p></li><li><p><strong>Stronger parental controls:</strong> Platforms can offer more granular controls over content, privacy, and screen time.</p></li><li><p><strong>Reporting and Support:</strong> Easy reporting systems for bullying and clear support options for struggling users.</p></li></ul><p><strong>Building Alternatives:</strong></p><ul><li><p><strong>Focus on real-world connections:</strong> Encourage hobbies, sports, and in-person activities.</p></li><li><p><strong>Promote positive online spaces:</strong> Highlight educational content creators and online communities.</p></li></ul><p><strong>Remember:</strong> It&#8217;s a collaborative effort. Parents, educators, and social media platforms all have a role to play in creating a safer online environment for young people.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1><strong>Social Media and Suicidal Ideation Statistics Worldwide</strong></h1><p>While pinpointing a direct causal link between social media and suicide is challenging, research suggests a correlation between social media use and an increased risk of suicidal ideation (thoughts about suicide) especially among young adults but I think in extension this is data that relates to young adults but the public in general. The data is very clear and very blunt: <a href="https://youtu.be/P8MRnx7ELMk">social media is having dangerous effects.</a></p><div id="youtube2-P8MRnx7ELMk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;P8MRnx7ELMk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/P8MRnx7ELMk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Here are some key statistics:</p><p><strong>Correlation between Social Media and Mental Health:</strong></p><ul><li><p>A 5,000 person study &#8220;Association of Facebook Use With Compromised Well-Being: A Longitudinal Study&#8221; found that <strong>higher social media use correlated with self-reported declines in mental and physical health and life satisfaction</strong>. &#8212; American Journal of Epidemiology, 2017 [<a href="https://academic.oup.com/aje/article/185/3/203/2915143">https://academic.oup.com/aje/article/185/3/203/2915143</a>]</p></li><li><p>A 2023 study by MDPI found a significant <strong>correlation</strong> between social media addiction and suicidal ideation in young adults, with platforms like TikTok showing a higher association [<a href="https://www.mdpi.com/2075-4698/13/4/82">https://www.mdpi.com/2075-4698/13/4/82</a>].</p></li><li><p>Studies consistently link <strong>heavy social media use</strong> to increased social comparison and feelings of inadequacy, which <strong>can contribute to depression and anxiety</strong> &#8211;<strong> both risk factors for suicidal ideation</strong> [<a href="https://socialmediavictims.org/mental-health/suicide/">https://socialmediavictims.org/mental-health/suicide/</a>].</p></li></ul><p><strong>Cyberbullying and Suicidal Thoughts:</strong></p><ul><li><p>Research by Sameer Hinduja and Justin Patchin suggests <strong>cyberbullying increases suicidal thoughts by 14.5% and suicide attempts by 8.7% </strong>[<a href="https://en.wikipedia.org/wiki/Social_media_and_suicide">https://en.wikipedia.org/wiki/Social_media_and_suicide</a>].</p></li><li><p><strong>Young people under 25</strong> who experience <strong>cyberbullying</strong> are more than <strong>twice as likely to self-harm and engage in suicidal behavior</strong> [<a href="https://socialmediavictims.org/mental-health/suicide/">https://socialmediavictims.org/mental-health/suicide/</a>].</p></li></ul><p><strong>Exposure to Specific Content:</strong></p><ul><li><p>Studies suggest exposure to <strong>certain types of content on social media</strong>, such as <strong>cyberbullying or self-harm content</strong>, can increase suicidal ideation, particularly in teens and young adults [<a href="https://socialmediavictims.org/mental-health/suicide/">https://socialmediavictims.org/mental-health/suicide/</a>].</p></li></ul><p>However, it&#8217;s important to note that some platforms are actively working to remove harmful content and promote mental health resources., but I wonder whether those automated algorithms are getting rid of everything harmful or does viral content still contain mentally damaging content? From what I have seen on social media those defences aren&#8217;t working and AI&#8217;s promise of improved content filtering for Meta, TikTok and X are not really working. Is mass social media starting to be something more detrimental than beneficial?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1><strong>Practical Tips for Social Media Users</strong></h1><p>There are a few techniques that I have learned as I occasionally experience social media addiction to help me and also some tips for parents and social media.</p><p><strong>Disclaimer</strong>: The suggestions and tips in this article don&#8217;t replace professional help such as a local doctor, psychologist and other professionals that will help parents and citizens to deal with social media and if need be help in breaking the addiction to social media.</p><h2><strong>Suicide Help Lines</strong></h2><p>Visit <strong>Find a helpline</strong> website to find a helpline in your country: <a href="http://findahelpline.com/">findahelpline.com</a></p><p>With over 1300 suicide prevention helplines in 130 countries you can access help almost anywhere in the world. They can be beneficial in addressing a critical situation and help you see another angle to the situation especially when it involves online or social media causes.</p><p><strong>Support Phone Lines in English speaking countries:</strong></p><ul><li><p>Support lines for Australia: <a href="https://findahelpline.com/countries/au">https://findahelpline.com/countries/au</a></p></li><li><p>Support Lines for New Zealand: <a href="https://findahelpline.com/countries/nz">https://findahelpline.com/countries/nz</a></p></li><li><p>Support lines for USA: <a href="https://findahelpline.com/countries/us">https://findahelpline.com/countries/us</a></p></li><li><p>Support Lines for Canada: <a href="https://findahelpline.com/countries/ca">https://findahelpline.com/countries/ca</a></p></li><li><p>Support lines for South Africa: <a href="https://findahelpline.com/countries/za">https://findahelpline.com/countries/za</a></p></li><li><p>Support lines in the England: <a href="https://findahelpline.com/countries/gb-eng">https://findahelpline.com/countries/gb-eng</a></p></li><li><p>Support Lines in Ireland: <a href="https://findahelpline.com/countries/ie">https://findahelpline.com/countries/ie</a></p></li><li><p>There are other english speaking countries and other langue countries listed at the bottom of this page under subheading <strong>Helplines &amp; hotlines by country</strong>: </p></li></ul><p>https://findahelpline.com/</p><h2><strong>Social Media Advice for Adults</strong></h2><p>Here is some advice I have to share with adults and of course with young people in principle from my experience as an adult using social media:</p><p><strong>a) When you start spending too much time on social media</strong>, uninstall the apps and use the web versions of the social media sites only if its helping to reduce your use. If still a problem then delete the accounts and uninstall social media apps. It&#8217;s that simple! Abstinence is better than trying to deal with the addictive effects of it. Withdrawal symptoms will be hard and it&#8217;s important to fill that time with social connection and meaningful tasks and relaxation and work  - as long as its nothing, otherwise you will most likely go back to social media.</p><p><strong>b) Turn off all notifications for these social media apps or any app that may be too annoying </strong>(there is research around this to be helpful):</p><ul><li><p><strong>Android:</strong></p><ul><li><p>Open <strong>Settings</strong>.Tap <strong>Apps &amp; notifications</strong> (or similar wording depending on your device).</p></li><li><p>Select <strong>See all apps</strong> (if needed).</p></li><li><p>Choose the app you want to silence notifications for.</p></li><li><p>Tap <strong>Notifications</strong>.</p></li><li><p>Toggle <strong>All notifications</strong> to off for complete silence.</p></li><li><p>Alternatively, you can choose specific notification categories to turn off</p></li></ul></li></ul><ul><li><p><strong>Apple:</strong><br></p><ul><li><p>Open <strong>Settings</strong>.</p></li><li><p>Tap <strong>Notifications</strong>.</p></li><li><p>Scroll down and find the app you want to manage.</p></li><li><p>Toggle <strong>Allow Notifications</strong> off to silence all notifications.</p></li><li><p>You can also customise notification settings like sound, badges, and Lock Screen display.</p></li></ul></li></ul><ul><li><p><strong>Tip</strong>: Both <strong>Android </strong>and <strong>iPhone </strong>allow you to silence notifications directly from the notification itself. Swipe down on the notification shade (Android) or Notification Center (iPhone), then long-press the notification and tap &#8220;Settings&#8221; to manage for that specific app.</p></li></ul><p><strong>c) Setup Do not disturb schedules or activate them manually as needed</strong>. I&#8217;ve been using do not disturb schedules and settings for a long time because it helps you focus on tasks and deal with other non urgent things later. Modern society has gotten too addicted to text messaging via sms, chat and email. This has created a giant flood of information messages towards every person. It&#8217;s logistically impractical to be checking all of these coming every minute thus breaking concentration on tasks you might be undertaking.</p><p><strong>So I now have a rule: If I get a text message or email I don&#8217;t treat it as urgent at this current time, but I do treat calls as on the spot</strong>. With that principle you can configure Do Not Disturb accordingly to silence messages and notifications and allow calls and calendar reminders (but on certain times of the day eg: work hours, if you have sick or those you ned to watch you may have to allow calls 24/7):</p><ul><li><p><strong>Android:</strong></p><ul><li><p>Access Do Not Disturb via quick settings panel (swipe down then tap and hold Do Not Disturb button to get to settings) or Settings app (Sound or Notifications then into Do Not Disturb).</p></li><li><p>Turn on Do Not Disturb quickly   via Quick Settings by pressing the Do Not Disturb or set up schedules for automatic activation.</p></li><li><p>In Do not Disturb Settings you can customize exceptions to allow calls, messages, or alarms even in Do Not Disturb mode.</p></li><li><p><strong>Scheduling</strong>: Within the Do Not Disturb menu (from either method), find options like &#8220;Schedules&#8221; or &#8220;Automatic rules.&#8221; Here, you can create new schedules or edit existing ones.</p><ul><li><p>For example, you could set Do Not Disturb to turn on during sleep hours (e.g., 10 PM to 7 AM) or during weekdays for a focused work session.</p></li><li><p>Look for options like &#8220;Exceptions&#8221; or &#8220;Allow interruptions from&#8221; within the Do Not Disturb menu. This lets you choose what gets through even when Do Not Disturb is on.</p></li></ul></li></ul></li></ul><ul><li><p><strong>iPhone:</strong></p><ul><li><p>Swipe down from the top-right corner (iPhone X and later) or swipe up from the bottom (older iPhones) to open the <strong>Control Center</strong>.</p></li><li><p>Tap the <strong>Focus</strong> icon (might resemble a crescent moon). This activates Do Not Disturb.</p></li><li><p><strong>Set Duration:</strong> After tapping Focus, choose a duration (e.g., 1 hour).</p></li><li><p><strong>Schedules (Optional):</strong>  Settings &gt; Focus &gt; Do Not Disturb &gt; Turn on Automatically. Set schedules based on time, location, or app usage.</p></li><li><p><strong>Allowed Notifications (Optional):</strong> Settings &gt; Focus &gt; Do Not Disturb. Choose apps and people allowed to send notifications during Do Not Disturb.</p></li></ul></li></ul><ul><li><p><strong>Bonus Tip:</strong> Both <strong>Android </strong>and <strong>iPhone </strong>offer more granular Do Not Disturb settings. Explore these options within the dedicated Do Not Disturb menus to customise how interruptions are silenced.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Tips for Parents with Teenagers and Children</strong></h2><p>In light of these concerns, parents can take several steps to protect their children from the potential negative effects of social media. Consider these Bible principles:</p><p><strong>&#8220;The shrewd one ponders each step.&#8221;&#8203;&#8212;Proverbs 14:15 (New world translation)</strong></p><ul><li><p>Considering the potential risks, do not succumb to pressure to permit your child to use social media. Before granting access, ensure your child demonstrates maturity by adhering to time restrictions, fostering positive relationships, and avoiding inappropriate content.</p></li></ul><ul><li><p><strong>Why? </strong>I spoke to a few parents and one told me of an example of a child under 9 years old who ended up watching adult anime on TikTok, then the teacher called and said the child tried to hurt themselves seriously. The power over an impressionable mind is huge. Each parent needs to weigh the risks and benefits. Can Chat apps like WhatsApp and Viber be a safer option? Perhaps those apps have their own dangers - but they could be safer than mass social media.</p></li></ul><p><strong>&#8220;[Make] the best use of your time.&#8221;&#8212;Ephesians 5:16 (New world translation)</strong></p><ul><li><p><strong>If you decide to permit your child to use social media, establish clear guidelines for its use and explain how these rules contribute to their safety.</strong> Remain vigilant for any shifts in your child&#8217;s behaviour that may signal the necessity to adjust or restrict their social media access. <br>It&#8217;s so important for parents to be interested in their child&#8217;s life and be involved in it.</p></li></ul><ul><li><p><strong>Why?</strong> Because if they don&#8217;t get your attention, they may get attention on social media in wrong ways. I have been testing TikTok (a portrait reel viral social media site) for my creative business to showcase my creative works and there is a Live feature on TikTok and I see thousands of teenagers and even children and parents and adults that look very lost, sad and getting attention of strangers giving them little animated gifts and this is allowed in Australia, US and around the world.</p></li></ul><h2><strong>Alternatives to mass social media</strong></h2><p>Being social doesn&#8217;t mean we have to be on social media. There are many other forms of social connection that could be more rewarding,</p><ul><li><p>Talking to humans in real life by meeting with them in person and doing stuff</p></li><li><p>Chat apps like Whatsapp and Viber</p></li><li><p>Talking to someone on a traditional telephone call to catch up</p></li><li><p>Doing a video conferencing method</p></li><li><p>Join an interest group via Meetup or Eventbrite</p></li><li><p>Send someone an email letter</p></li><li><p>Send someone a written letter by mail</p></li><li><p>Can you think of other ways?</p></li></ul><h1><strong>Is social media better or worse for mental health?</strong></h1><p>Balancing the benefits and risks of social media use is crucial for maintaining mental health. While social media can offer valuable connections and resources, it also poses significant risks, particularly for young people.</p><p>By staying informed, setting boundaries, and fostering open communication, individuals and parents can navigate the complexities of social media use and protect their mental well-being. Integrating authoritative insights and practical advice, such as those from Dr. Vivek Murthy and biblical principles, can help create a healthier relationship with social media.</p><p>In my opinion, as I have been saying for a long time, mass social media (where everyone in the world is connected to the same platform is not only impractical and dangerous). There is an ancient Biblical story of the tower of Babel in Babylon. Early Mesopotamian period there was the old version of the City of Babel with king Nimrod mentioned in the book of Genesis in the bible (one of the oldest books ever written). Everyone lived there and nobody lived anywhere else. It advanced technology and knowledge very quickly but apparently bad traits developed:</p><h2><strong>Lessons from the Tower of Babel for ancient peoples at the time</strong></h2><ul><li><p><strong>Pride</strong>: The people of Babylon aimed to &#8220;make a name for themselves&#8221; by building a tower reaching heaven. This is seen as prideful defiance of God&#8217;s authority.</p></li></ul><ul><li><p><strong>Unity for the Wrong Reasons</strong>:  While collaboration isn&#8217;t inherently bad, here it&#8217;s used for a purpose seen as arrogant and disobedient to God&#8217;s plan to spread humanity.</p></li></ul><ul><li><p><strong>Disobedience</strong>: God instructed humanity to &#8220;fill the earth&#8221; (Genesis 9:1). Building a giant tower suggests a desire to stay concentrated in one place, ignoring God&#8217;s command.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Lessons from Tower of Babel in the attention economy and social media</strong></h2><p>Here&#8217;s how the lessons from the Tower of Babel story can be applied to social media addiction:</p><ul><li><p><strong>Pride and Inflated Self-Image:</strong> Social media can cultivate pride through curated profiles and constant comparison, leading to a distorted sense of self-worth.</p></li></ul><ul><li><p><strong>Misguided Unity (Echo Chambers):</strong> Algorithms can create echo chambers where people only see opinions they agree with, hindering critical thinking and fostering division.</p></li></ul><ul><li><p><strong>Disobedience of a Higher Purpose:</strong> Social media can become a distraction from real-world connections and responsibilities, hindering personal growth and community building.</p></li></ul><p>Just like the story suggests a punishment for disobedience, excessive social media use can have negative consequences.</p><p>Here&#8217;s the hopeful part: The Babel story also suggests the importance of:</p><ul><li><p><strong>Diversity of Thought:</strong> Encouraging exposure to different viewpoints than just the ones churned through social media can combat echo chambers.</p></li></ul><ul><li><p><strong>Spreading Out:</strong> Taking breaks from social media and focusing on real-world connections can lead to a more balanced life. Maybe even eliminating social media altogether might help.</p></li></ul><ul><li><p><strong>Using Social Media for Good:</strong> Social media can be a tool for positive connection, learning, and community building if used responsibly.</p></li></ul><p>By recognizing the potential pitfalls and utilising social media for positive purposes (if at all), we can avoid replicating the mistakes of the Tower of Babel in our digital age. But in the attention economy that we are in I think this is wishful thinking and society will keep falling apart and government officials will continue to feel helpless to make lasting change.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ekyw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ekyw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ekyw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ekyw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ekyw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ekyw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg" width="844" height="844" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:844,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Young man with a backpack is walking along a tropical island beach&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Young man with a backpack is walking along a tropical island beach" title="Young man with a backpack is walking along a tropical island beach" srcset="https://substackcdn.com/image/fetch/$s_!Ekyw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ekyw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ekyw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ekyw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cdca6f-0bdd-4ca2-9d0d-040c5a30766f_844x844.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The real world is more interesting. Image by Meta AI</figcaption></figure></div><p><em>So all I can say, stay safe online and discover that the real world is more beautiful than the digital.</em></p><p>Regards</p><p><strong>Michael Plis</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1><strong>References</strong></h1><p><strong>CNN: Surgeon general demands warning label on social media apps</strong></p><p><a href="https://edition.cnn.com/2024/06/17/media/surgeon-general-social-media-apps-warning-label/index.html">https://edition.cnn.com/2024/06/17/media/surgeon-general-social-media-apps-warning-label/index.html</a></p><p><strong>New York Times: Is Social Media Harming Your Child?&#8212;&#8288;How the Bible Can Help Parents</strong></p><p><a href="https://www.nytimes.com/2024/06/17/opinion/social-media-health-warning.html">https://www.nytimes.com/2024/06/17/opinion/social-media-health-warning.html</a></p><p><strong><a href="http://jw.org/">jw.org</a>: Is Social Media Harming Your Child?&#8212;&#8288;How the Bible Can Help Parents</strong></p><p><a href="https://www.jw.org/en/library/series/more-topics/social-media-harm-children-bible/">https://www.jw.org/en/library/series/more-topics/social-media-harm-children-bible/</a></p><p><strong>The Social Dilemma movement &amp; film</strong></p><p>https://www.thesocialdilemma.com/</p><p><strong>Cyberbullying Research Center</strong></p><p>https://cyberbullying.org/</p><p><strong>eSafety Commissioner of Australia</strong>. Resources for eSafety:</p><p>https://www.esafety.gov.au/</p><p><strong>The eSafety Guide </strong>(released by eSafety Comissioner in Aus) - Find out how to protect your personal information and report harmful content on common social media, games, apps and sites.</p><p><a href="https://www.esafety.gov.au/key-topics/esafety-guide">https://www.esafety.gov.au/key-topics/esafety-guide</a></p><p><strong>FBI Safe Online Surfing (SOS) Game</strong>. This game will help train older kids and younger teenagers</p><p><a href="https://sos.fbi.gov/en/">https://sos.fbi.gov/en/</a></p><p>(Sadly that&#8217;s all the US has except a few basic online safety websites. Other countries including US could learn from the extensive resource provided by Australian eSafety commissioner)</p><p><a href="https://youtu.be/eUSBKj5ZQpo?si=IjxcN9KLl-1YvWL4">How to Successfully Delete Social Media | Dr. Cal Newport &amp; Dr. Andrew Huberman</a></p><div id="youtube2-eUSBKj5ZQpo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;eUSBKj5ZQpo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/eUSBKj5ZQpo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><a href="https://youtu.be/kc_Jq42Og7Q?si=lO76Ja8OUCCBOLwO">Jaron Lanier interview on how social media ruins your life</a></p><div id="youtube2-kc_Jq42Og7Q" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;kc_Jq42Og7Q&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/kc_Jq42Og7Q?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Why is customisability & devices the future of AI?]]></title><description><![CDATA[In this article I discuss future of AI, such as for the need for customisability of Al and also the need for portable Al focused devices and I showcase a couple of them.]]></description><link>https://blog.cyberkite.com.au/p/customizable-ai-ai-devices-is-the-future</link><guid isPermaLink="false">https://blog.cyberkite.com.au/p/customizable-ai-ai-devices-is-the-future</guid><dc:creator><![CDATA[Michael Plis]]></dc:creator><pubDate>Thu, 06 Jun 2024 03:52:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rBjO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rBjO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rBjO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rBjO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rBjO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rBjO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rBjO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg" width="844" height="633" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:633,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Abstract AI generated formation of fluids flowing&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Abstract AI generated formation of fluids flowing" title="Abstract AI generated formation of fluids flowing" srcset="https://substackcdn.com/image/fetch/$s_!rBjO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rBjO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rBjO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rBjO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e590d1-4cce-4f7e-873e-8261b3e9ba89_844x633.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">AI customisation and AI devices will drive the future of AI. Credit: Unsplash/Google DeepMind</figcaption></figure></div><p>Imagine customised Generative AI models with settings &amp; uploaded documents specifically tailored to each business or individual is the future of AI and AI devices to go with it. This is what&#8217;s needed to start to make AI specifically usable to each individual and business. Imagine your personal assistant customise to your preferences, interests, and your own data.</p><h2><strong>Contents</strong></h2><p><strong>What is needed for more customized AI models?</strong></p><p><strong>Google NotebookLM - early version of customised AI</strong></p><p><strong>Future of AI is customisation</strong></p><p><strong>Are the new AI devices a replacement to smartphones?</strong></p><p>   1. The Humane Ai pin</p><p>   2. Rabbit Ai pin</p><h2><strong>What is needed for more customized AI models?</strong></h2><p>Firstly, this would be accomplished by providing a whole set of optionalities in settings to define the parameters such as preferences in politics, religion, and personal choices.</p><p>Then you should be able to simply upload various types of documents and images to train your AI.</p><p>Then you should also be able to add text snippets to learn from your Google keep notes or other not taking platforms. All those little snippets can add more knowledge to the model.</p><p>It should be highly secure since it will be company data.</p><p>Then being able to plug it into various reputable sources to get the facts.</p><p>I think a low-cost subscription per month to acce this kind of ability could revolutionize Ai and it&#8217;s usefulness.</p><p>I&#8217;m just not that good with database stuff and not that good with programming. so it would be good to do simple file submission and have it automatically learn the data inside it and incorporated into its AI model to train and through use. it would make it better and better by staff using it every day.</p><p>And it could then be used for all sorts of things. and maybe multiple models, one for client support and one for internal support and one for IT support and another for HR support and so on and so on.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Google NotebookLM - early version of customised AI</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Td6b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Td6b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png 424w, https://substackcdn.com/image/fetch/$s_!Td6b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png 848w, https://substackcdn.com/image/fetch/$s_!Td6b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png 1272w, https://substackcdn.com/image/fetch/$s_!Td6b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Td6b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png" width="844" height="597" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:597,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Screenshot of Gogole product called NotebookLM&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Screenshot of Gogole product called NotebookLM" title="Screenshot of Gogole product called NotebookLM" srcset="https://substackcdn.com/image/fetch/$s_!Td6b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png 424w, https://substackcdn.com/image/fetch/$s_!Td6b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png 848w, https://substackcdn.com/image/fetch/$s_!Td6b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png 1272w, https://substackcdn.com/image/fetch/$s_!Td6b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d0f515d-1441-4f0c-a9c5-06cb267b72bf_844x597.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Products like Gogole NotebookLM are the future of personalised AI but it needs some work. Credit: Google NotebookLM</figcaption></figure></div><p>Here is an early example of this sort of customised AI.</p><p>Google NotebookLM: </p><p>https://notebooklm.google/</p><p>Unfortunately, this tool is only available to people over 18 and only in the US. can I play with that in Australia? Please Google DeepMind,  Google &amp; Google Workspace open it up to Australia and the rest of the world.</p><p>This tour is very interesting because all you have to do is upload up to 10 documents and set some parameters and there&#8217;s no programming required and you&#8217;ve got yourself a customised AI that has the information contained with the 10 documents that you&#8217;ve uploaded. Not sure about the length of these documents but I think it has no limit on its size so I could have large notebooks and upload them. And perhaps i would create multiple notebooks one for each interest of topic.</p><p>Advertisement</p><h2><strong>Future of AI is customisation</strong></h2><p>As a lot of technologists are saying this year will be the year for customised tailored AI through customised settings and preferences as well as documents full of data.</p><p>Because creating custom databases with snippets of data is extremely hard to create and there are off the shelf stuff, but they&#8217;re not tailored to each business. So the only way to generate that custom database is through data extraction of files.</p><p>Obviously cybersecurity considerations will need to be met but the potentials are great across all levels of business and obviously job losses as a result.</p><h2><strong>Are the new AI devices a replacement to smartphones?</strong></h2><p>A new form factor is arising as a solution to having full access to AI and using it to good use as a personal assistant in our lives.</p><p>Early creations of this are for example Humane AI and Rabbit AI.  My guess in January 2024 is that they were early versions f what smartphones will be in the future. But will they work well in business?</p><h3><strong>1. The Humane Ai pin</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-brF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-brF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-brF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-brF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-brF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-brF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg" width="844" height="633" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:633,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Humane AI pin&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Humane AI pin" title="Humane AI pin" srcset="https://substackcdn.com/image/fetch/$s_!-brF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-brF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-brF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-brF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70cb6cba-db48-445f-88db-5222d5f160f6_844x633.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Will Humane AI pin survive the AI bubble? Credit: Humane</figcaption></figure></div><p>The Humane Ai Pin is a small, wearable AI device meant to replace smartphones. It clips onto your clothes and features:</p><p>* <strong>Privacy-focused</strong>: Doesn&#8217;t record or listen when not actively engaged.</p><p>* <strong>On-demand AI</strong>: Activated by voice, touch, or gesture.</p><p>* <strong>Contextual awareness</strong>: Uses sensors to react to your surroundings.</p><p>* <strong>Powerful processing</strong>: Runs on a Snapdragon chipset.</p><p>* <strong>Rich interactions</strong>: Features a laser projection display and a special speaker.</p><p>* <strong>Subscription-based</strong>: Requires a monthly fee for software updates and services.</p><p>It&#8217;s still new and has some kinks, but aims to offer a more personal and convenient way to interact with technology. Think of it as a powerful, AI-powered assistant attached to your clothes. If you&#8217;d like to have a look at the product you can go on their website: </p><p><a href="https://hu.ma.ne/">https://hu.ma.ne/</a> (looks like acquired by HP)</p><p>But as per number of recent reviews of this device, it&#8217;s a good concept but it&#8217;s too expensive. It has battery issues and it&#8217;s recharging pad has problems. It&#8217;s an early version and perhaps in the future subsequent generations who refine the idea and the cost will drop. But it certainly has potential at the very least as a device on the table at home with the face attached to the AI. But the reign of the smartphone isn&#8217;t disappearing anytime soon because of its reliability and multitasking. An AI first device would need to do everything that smartphone does and more. Humane pin doesn&#8217;t.</p><p>Let&#8217;s wait and see how Humane develops future iterations either as a standalone company or under the watchful wings of a large tech behemoth like Microsoft, Google or Apple. A lot of R&amp;D money will need to be poured in to refine the design, but it has a useful potential.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>2. Rabbit Ai pin</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XX4-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XX4-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XX4-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XX4-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XX4-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XX4-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg" width="844" height="633" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:633,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Rabbit AI pin&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Rabbit AI pin" title="Rabbit AI pin" srcset="https://substackcdn.com/image/fetch/$s_!XX4-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XX4-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XX4-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XX4-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F645f837d-73cd-4bdb-bf00-5e573a8a2c80_844x633.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Will Rabbit AI pin survive the AI bubble? Credit: Rabbit Ai</figcaption></figure></div><p>The Rabbit R1, not Ai pin, is actually a pocket-sized AI device also aiming to replace smartphones, but with a different approach. Here&#8217;s a quick rundown:</p><p>* <strong>Minimalist design</strong>: Fits in your pocket, like a smaller phone.</p><p>* <strong>Natural language interface</strong>: No menus or screens, works with conversation.</p><p>* <strong>Contextual assistance</strong>: Learns your preferences and adapts to situations.</p><p>* <strong>Multi-device contro</strong>l: Seamlessly operates various smart home devices.</p><p>* <strong>Open platform</strong>: Developers can create custom apps and experiences.</p><p>* <strong>One-time purchase</strong>: No subscriptions, pay upfront for the hardware.</p><p>Think of the Rabbit R1 as a conversational AI companion that lives in your pocket and helps you navigate the world hands-free. You can check it out here on their website: </p><p>https://www.rabbit.tech</p><p><strong>So there you have it?</strong> These are the two devices I&#8217;ve heard and I think Apple, Google and Samsung will come out with their own devices to match or outpace or there will be purchased by those companies.</p><p>This device has been tested in recent months and has so many bugs don&#8217;t even get me started. It also has a lot of battery issues as well as its promise functionality is bug full. But the concept is not a bad idea. So after multiple versions and refinements and perhaps being bought out by some of the larger companies This device might be very useful in many applications and those wanting to simplify their life.</p><p>As with Humane pin let&#8217;s wait and see how Rabbit develops future versions and refines the software and the AI automations.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Choice is important in Technology</strong></h2><p>The balance between dependence on technology and independence from technology cannot be understated.</p><h2><strong>2024-onwards AI predictions</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!roGa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!roGa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg 424w, https://substackcdn.com/image/fetch/$s_!roGa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg 848w, https://substackcdn.com/image/fetch/$s_!roGa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!roGa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!roGa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg" width="844" height="474" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:474,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Abstract AI generated formation of transparent blocks&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Abstract AI generated formation of transparent blocks" title="Abstract AI generated formation of transparent blocks" srcset="https://substackcdn.com/image/fetch/$s_!roGa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg 424w, https://substackcdn.com/image/fetch/$s_!roGa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg 848w, https://substackcdn.com/image/fetch/$s_!roGa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!roGa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59dc1f61-4005-42dd-931b-e59f9f3a015e_844x474.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The future of AI is personalisation, customisability and digital assistants.Credit: Unsplash/Google DeepMind</figcaption></figure></div><p>I think in the coming years these devices will become a competitor to smartphones and perhaps for some parts of the population may be 50% it will replace the smartphone all together.</p><p>But I worry a lot about how these devices will start to replace the reasoning centre of the human brain and will be reliant on these devices to make decisions and will stop thinking for ourselves. So as an IT professional for over 20 years, I highly recommend do not ever surrender your reasoning centre. Always think for yourself</p><p>Signing out</p><p>Happy and intelligent computing</p><p><strong>Michael Plis</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.cyberkite.com.au/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Cyberkite blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item></channel></rss>