• 3 Posts
  • 12 Comments
Joined 17 days ago
cake
Cake day: February 5th, 2025

help-circle







  • Not directly the state actors really more to do with the consequences ie common hacks into state actors resources make the data open to misuse and the state actors do not take any responsibility if they are hacked, right!

    When an AI system is given access to it , it can uncover hidden patterns or vulnerabilities that humans might miss. This ability can lead to consequences, such as exposing sensitive information or breaking security measures, especially if the data is encrypted or anonymized. AI might also exploit weaknesses in the data, resulting in data breaches, privacy violations, or malicious manipulation. AI could leak personal details or confidential information, leading to significant risks like reputational damage or financial loss. AI to operate beyond traditional oversight makes these risks harder to predict and control.







  • Thank you everyone so much for your responses. You’ve truly opened my eyes to so many aspects I hadn’t even considered before.

    Your insights were not only thoughtful but also incredibly helpful. It’s rare to come across such comprehensive answers that cover so many angles, and I really appreciate the time and effort you took to share them.

    Each of you has given me a lot to think about, and

    I’m grateful for the depth of understanding you provided. Thanks again!

    As a first step, I’d like to pick one of the programs to start with:

    Cryptomator

    gocryptfs (not so Windows-friendly)

    GnuPG

    VeraCrypt (slower than TrueCrypt, and since it’s offered as a replacement, it makes me suspicious, especially since TrueCrypt mysteriously vanished without providing any explanation. Some people believe VeraCrypt might have backdoors, whereas TrueCrypt’s abandonment perhaps didn’t provide any backdoors.)

    TrueCrypt (I have used it occasionally on my Windows PC, although it is no longer updated)