Posts

Showing posts from November, 2025

Dark Side of AI that No One Talk's about - Tricks and Manipulations to Exploit Human Behaviour

Image
Some of the world’s biggest tech firms have soared in value over the last year. Investment  is simply a bet that AI increases profitability for the firms involved. These massive valuations  are bets that AI will hugely increase future profitability. In some cases these are bets that  AI will improve in capabilities towards some kind of  “artificial superintelligence” capable  of performing everything a human can – or even more. This could raise the living standards  of everyone on Earth. If investors begin to fear that AI profits won’t materialize they will attempt to reclaim  their investments. This realization can appear quite suddenly and can be triggered by  seemingly trivial events. It doesn’t require a big needle to pop a bubble. AI companies more generally do not appear to be profitable right now. Investors are not  putting their money into today’s losses – they are betting on an AI future. However, the big four – Meta, Alphabet, Micro...

Is Your Open Source Software Secretly Vulnerable to Hacking?

Image
An Open-source software (OSS) can absolutely be vulnerable to hacking. If you still believe open-source software is inherently more secure, you may have fallen for one of the biggest corporate lies. Many people operate under the assumption that "open source = more secure," but the reality is more complicated. The key is to understand that open source changes the nature of security, but it does not automatically guarantee it. So, Why Open-Source Software's Can Be Vulnerable? Everyone's Visibility, Even Attackers': Anyone can examine the source code, which is the fundamental tenet of open source. This includes white hat hackers who want to identify and address vulnerabilities, but it also encompasses malevolent actors ("black hat" hackers) who are searching for vulnerabilities to take advantage of. They can examine the code whenever they choose; they are not required to reverse-engineer the software. The Limitations of the "Linus's Law" Assu...