meta_pixel
Tapesearch Logo
Crrow777Radio

553- This is about Hacking – Choose a Hat Color (Free)

Crrow777Radio

Crrow777Radio

Education

4.81.1K Ratings

🗓️ 22 November 2023

⏱️ 62 minutes

🧾️ Download transcript

Summary

One might think that in the era of AI, computer hacking would become a thing of the past. After all, AI has predictive powers that stagger the imagination. AI can easily predict your death date, to include time, cause and location. It can also predict what you will do long before you do it. So how is it that all hackers and hacking methods are not quickly identified and stopped once and for all? Clearly, stopping hackers is not a priority. In fact, the power of AI could, and someday will, ID and categorize every “user” on the web and make known (to someone, somewhere) everything about them, to include actions they have not even thought of yet. And while we do the usual bang-up job of detailing hacking and its history in this episode, what I am about to describe puts it all into context. At least in terms of where the real threat resides, vis-a-vis personal computer data safety and our expectation of privacy. We all know that “some” people get hacked… but damn near “everyone” is subject to the following description. ALL modern computers using Intel or AMD processors have built-in back doors. This allows free access to all areas of your computer without your knowledge. AMD calls it the Platform Security Processor, and Intel named it the Intel Management Engine. This has been going on since 2008 for Intel, and 2013 for AMD. To be clear, this allows access to all memory, access to every attached device, access to what is on your screen – and – it allows TCP/IP server set up on your network regardless of your OS settings or user wants. The back door also allows remote access even if the computer is off. I would need to write a book to describe what happens to your “private” data with regard to the internet, social media, dumb phones, medical records, credit cards, banking, or, to cut to the chase, the digital footprint that is your life. This so-called “digital footprint” records everything there is to know about you, and is fed to AI which can accurately predict anything else about you… even if you have not done it yet. All of this personal data is actively collected, traded, sold and fed to AI, giving those in control of the data an information blueprint (past, present & future) that could easily stand as your personal book of life. Getting back to the topic of hacking, it is a real headache when it happens, and sometimes much more than a headache. One can educate themselves and implement safeguards and rules to follow that can drastically reduce the possibility of being hacked. There are no guarantees, of course. But in comparison, the state sponsored hacking outlined above affects everyone. And sadly, it was implemented with malice aforethought. The final insult is that it has been made legal – or at least implemented without concern for our rights, or legal blow-back of any kind. What can be done about state sponsored hacking? Back in the early 60s a man named Herbert published a work of fiction that straddles the line between reality and fantasy. The book is called Dune and it single handedly lifted the genre of sci-fi to new levels. In the tome he vaguely describes a war fought because of “thinking machines” and the terrible power and damage they cause to humanity. He called the fictitious war The Butlerian Jihad. The fictitious war results in the total destruction of all “thinking machines” and “conscious robots”, and coins the maxim “Thou shalt not make a machine in the likeness of a human mind”. Coming back to reality, what does Nature tell us is true of computers? It tells me that Nature holds no place for devices that seek to counterfeit reality, and at some point, we must get rid of computers, or surrender, once and for all, natural humanity.

Transcript

Click on a timestamp to play from that location

0:00.0

call. Oh, Oh, Crow, Crow,

0:47.0

Crow, Crow. Pro All right, ma'am. Welcome to Crow Triple 7 radio. This is hour one of episode 553. It's me and

1:07.7

Jason today and we are going to be covering computer hacking. It's a vast topic. We've kind of narrowly decided what we're

1:15.6

going to cover and we've added a little bit that's just outside the realm of

1:20.1

hacking, but it should be an interesting episode also I have to leave my phone

1:25.2

on Jason will edit out what he can but if something gets caught I apologize typically

1:30.2

the phone would be off any Anyhow, welcome, Jason.

1:33.0

Oh, and a pretty cool good morning.

1:36.0

So I'm already feeling the benefits of going back to the original one show a week that we deliver on Wednesdays. I have already got significant reading

1:46.3

done. I've gone back to hierarchies and some other things when I had become so busy, plus there were health issues in the family.

1:55.0

I had been working on the commonality that I had noticed from the works of

2:00.2

like the Rosa Crucians Rudolf Steiner and Greek and Roman myth and I began to realize everybody's

2:08.2

talking about the same thing here so I will be getting into that big as we move forward, but it is such a pleasure to be able to get back to reading, which I have always done, but we had gotten so busy there, and what was it? You know, I think I told you it was four months,

2:26.2

Jason. The last book I had read, Cover to Cover was four months ago, and that was Yogananda's book,

2:36.0

which had been recommended to me, which is quite an interesting book. Anyhow, shifting over to the topic at hand, you want to add anything in before we jump in?

2:42.0

Well, looking at the stuff stuff it's definitely interesting and actually kind of entertaining

2:46.7

in a way just because of all the ways that this concept, these concepts I guess I should say because because there's a lot to it, have gotten into mainstream

2:55.6

culture and different people have different views on what computer hacking even means.

3:00.3

You know what's interesting, Jason, is the rate at which our whole lives shifted over to computers.

3:09.0

At first, I don't think anyone had any view of what was about to happen. They were happy with the

3:14.6

free tools. We even had the CEOs telling us, oh you got all this free stuff, but

3:18.9

all your privacy's gone. No one believed it, but look, how long did it take? I mean it was maybe a decade. I'm guessing about a decade. We had already been headed this way but now absolutely everything is on computers so what we're about to talk about

...

Transcript will be available on the free plan in -452 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from Crrow777Radio, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Crrow777Radio and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.