10 Comments
User's avatar
James O'Reilly's avatar

This was absolutely fascinating. I have never even considered many of the topics you covered in this post. A brilliant and timely post as the tendrils of censorship seem to be lengthening daily.

Devansh's avatar

People are too busy losing their minds on fancy autocomplete to pay attention to the other things

Leo's avatar

Great Quote to open an excellent article. Minor sp. point: atonement [with the first "e"]. I had to search for the quote, I think it comes from Endless Legend, the Amplitude Studios / Iceberg Interactive fantasy-strategy game. "They are weak. They are soft. They writhe in supposed discomfort at minor penances that the faithful would not even notice. Their sloth will be their undoing; without the pain, they cannot touch the power. Use your eyes! Or I will remove them in atonement. See that Auriga herself writhes in anguish -- as we all should. Join me in contrition and mortification such as Auriga has never seen. Together we will embrace the agony, and make it our servant."

[via https://en.wikiquote.org/wiki/Endless_Legend] & Endless Legend - Major Factions - The Ardent Mages (2 July 2014) [https://www.youtube.com/watch?v=b3J7WznDqSQ]

Devansh's avatar

You got the quote. Endless legend is a goated game

Andrew Smith's avatar

This is gonna be one helluvan arms race!

BTW, I read the title as "how to take the back..."

...once a jiu jitsu guy, always a jiu jitsu guy.

Han Bolton's avatar

Do you guys think the dead internet theory is real or not? From my own research, there's not much papers on it but this article just makes me feel stronger on the issue. It is strange how we have reach to the point where AI is affecting our economy to trillions. I wrote something about this matter actually, but more on the consciousness if it's possible for AI

> Exit protocol without Auth.'s avatar

Hi there Devansh, love the write up. 1 major correction though; the Geneva protocol that you're describing although previously defined as a man in the middle attack substitute turns out to heavily impact the TCP/iP layer connection protocol. Where the focus needs to lay is proper data sanitization and variable sourcing to establish a more robust and unified server host/connection.