HAL-9001 AI

[tatsu_section bg_color= “” bg_image= “” bg_repeat= “no-repeat” bg_attachment= ‘{“d”:”scroll”}’ bg_position= ‘{“d”:”top left”}’ bg_size= ‘{“d”:”cover”}’ bg_animation= “none” padding= ‘{“d”:”90px 0px 90px 0px”}’ margin= ‘{“d”:”0px 0px 0px 0px”}’ bg_video_mp4_src= “” bg_video_ogg_src= “” bg_video_webm_src= “” overlay_color= “” overlay_blend_mode= “none” section_height_type= “auto” custom_height= ‘{“d”:””}’ vertical_align= “center” top_divider= “none” top_divider_zindex= “9999” bottom_divider_zindex= “9999” bottom_divider= “none” top_divider_height= ‘{“d”:100}’ top_divider_position= “above” bottom_divider_height= ‘{“d”:100}’ bottom_divider_position= “below” top_divider_color= “#ffffff” bottom_divider_color= “#ffffff” invert_top_divider= “0” invert_bottom_divider= “0” flip_top_divider= “0” flip_bottom_divider= “0” section_id= “” section_class= “” section_title= “” offset_value= “” full_screen_header_scheme= “background–dark” overflow= “” z_index= “0” hide_in= “0” animate= “1” animation_type= “none” animation_delay= “0” animation_duration= “300” border_style= ‘{“d”:”solid”,”l”:”solid”,”t”:”solid”,”m”:”solid”}’ border= ‘{“d”:”0px 0px 0px 0px”}’ border_color= “” border_radius= “” box_shadow= “0px 0px 0px 0px rgba(0,0,0,0)” key= “HJvq2a0RF”][tatsu_row full_width= “0” bg_color= “” border_style= ‘{“d”:”solid”,”l”:”solid”,”t”:”solid”,”m”:”solid”}’ border= ‘{“d”:””}’ border_color= “” no_margin_bottom= “0” equal_height_columns= “0” gutter= “medium” column_spacing= “px” fullscreen_cols= “0” swap_cols= “0” padding= ‘{“d”:”0px 0px 0px 0px”}’ margin= ‘{“d”:”0px 0px”}’ row_id= “” row_class= “” box_shadow= “0px 0px 0px 0px rgba(0,0,0,0)” border_radius= “0” hide_in= “0” animate= “1” animation_type= “none” animation_delay= “0” animation_duration= “300” layout= “1/1” key= “HJxPqhT0At”][tatsu_column bg_color= “” bg_image= “” bg_repeat= “no-repeat” bg_attachment= “scroll” bg_position= ‘{“d”:”top left”}’ bg_size= ‘{“d”:”cover”}’ padding= ‘{“d”:”0px 0px 0px 0px”}’ margin= ‘{“d”:””}’ border_style= ‘{“d”:”solid”,”l”:”solid”,”t”:”solid”,”m”:”solid”}’ border= ‘{“d”:””}’ border_color= “” border_radius= “0” box_shadow_custom= “0px 0px 0px 0px rgba(0,0,0,0)” bg_video_mp4_src= “” bg_video_ogg_src= “” bg_video_webm_src= “” overlay_color= “” overlay_blend_mode= “none” animate_overlay= “none” link_overlay= “” vertical_align= “none” sticky= “0” offset= ‘{“d”:”0px 0px”}’ column_parallax= “0” column_width= ‘{“d”:”100″}’ column_mobile_spacing= “0” image_hover_effect= “none” column_hover_effect= “none” hover_box_shadow= “0px 0px 0px 0px rgba(0,0,0,0)” overflow= “” col_id= “” column_class= “” top_divider= “none” top_divider_height= ‘{“d”:”100″,”m”:”0″}’ top_divider_color= “#ffffff” flip_top_divider= “0” top_divider_zindex= “9999” bottom_divider= “none” bottom_divider_height= ‘{“d”:”100″,”m”:”0″}’ bottom_divider_color= “#ffffff” flip_bottom_divider= “0” bottom_divider_zindex= “9999” left_divider= “none” left_divider_width= ‘{“d”:”50″,”m”:”0″}’ left_divider_color= “#ffffff” invert_left_divider= “0” left_divider_zindex= “9999” right_divider= “none” right_divider_width= ‘{“d”:”50″,”m”:”0″}’ right_divider_color= “#ffffff” invert_right_divider= “0” right_divider_zindex= “9999” z_index= “0” hide_in= “0” animate= “1” animation_type= “none” animation_delay= “0” animation_duration= “300” layout= “1/1” key= “rJ-vc3a0CK”][tatsu_image image= “http://xhal.uk/wp-content/uploads/2022/02/cyber-security.png” image_varying_size_src= “” alignment= “center” border_width= “0” border_color= “” id= “5178” size= “full” adaptive_image= “0” max_width= ‘{“d”:20}’ rebel= “0” width= ‘{“d”:”100%”}’ shadow= “none” custom_shadow= “0px 0px 0px 0px rgba(0,0,0,0)” drop_shadow= “drop-shadow(0px 0px 0px rgba(0,0,0,0))” border_radius= “0” lazy_load= “1” placeholder_bg= “” offset= ‘{“d”:”0px 0px”}’ lightbox= “0” link= “” new_tab= “0” hide_in= “” css_id= “” css_classes= “” animate= “1” animation_type= “none” animation_delay= “0” animation_duration= “300” padding= ‘{“d”:””}’ margin= ‘{“d”:””}’ key= “ryMP52a0AK”][/tatsu_image][tatsu_special_heading title_content= “Cyber Security ion Expanding Impact Of Hostile Tech” border_style= “style2” font_size= “35px” letter_spacing= “2px” margin= “0px 0px 20px 0px” title_color= “” border_color= “” expand_border= “0” title_hover_color= “” alignment= “center” outer_border_style= ‘{“d”:”solid”,”l”:”solid”,”t”:”solid”,”m”:”solid”}’ border= ‘{“d”:”0px 0px 0px 0px”}’ outer_border_color= “” hide_in= “” css_id= “” css_classes= “” animate= “1” animation_type= “none” animation_delay= “0” animation_duration= “300” padding= ‘{“d”:””}’ border_radius= “” box_shadow= “0px 0px 0px 0px rgba(0,0,0,0)” key= “BJmP5na0Rt”][/tatsu_special_heading][tatsu_text bg_color= “” color= “” max_width= ‘{“d”:”100″}’ wrap_alignment= “center” text_alignment= ‘{“d”:”left”}’ margin= ‘{“d”:”0px 0px 30px 0px”}’ box_shadow= “0px 0px 0px 0px rgba(0,0,0,0)” padding= ‘{“d”:”0px 0px 0px 0px”}’ border_style= ‘{“d”:”solid”,”l”:”solid”,”t”:”solid”,”m”:”solid”}’ border= ‘{“d”:”0px 0px 0px 0px”}’ border_color= “” border_radius= “0px” text_typography= ‘{“d”:””}’ hide_in= “” css_id= “” css_classes= “” animate= “1” animation_type= “none” animation_delay= “0” animation_duration= “300” key= “HyVDcnpR0t”]

Through this lens we explore the idea that even good technology can be used for bad purposes. Hostile’ tech can encompass not just criminal tech such as malware and hacking tools but also use cases like GDPR, Data security, advertising and customer targeting. One example is bias in algorithms or machine learning systems.
These may exhibit ‘hostile’ tendencies towards certain customer groups without having been compromised or deliberately designed that way, because of unplanned and unnoticed distortions in the way they were constructed or developed.

Even lawful activity such as tracking people as they surf the web can be viewed as hostile by some people, while other people freely give up their privacy in return for perceived benefits such as target advertising.

Some trends to watch in this space include: privacy-respecting computation, privacy-aware communications, differential privacy and, in the more distant future, quantum machine learning and the metaverse.

[/tatsu_text][/tatsu_column][/tatsu_row][/tatsu_section]