Reflecting on the decline of my personal blog during the pandemic, driven by changes in search rankings and competition made me realise that there is more to the system than meets the eye. Inspired by a podcast featuring Cory Doctorow's concept of "enshittification," I now am determined to empower others to regain control over their online experiences and focus. Future posts will explore strategies for online protection.
Tag: advice
Understanding the DASUD Framework in the World of AI
After launching the DASUD Framework, I am now focused on AI governance, emphasising the importance of understanding fundamental problems to govern efficiently. I highlight the risks of multi-agent systems compromising data security and stress collaborative governance solutions. The piece invites readers to seek guidance on Data Governance and related topics.
The Risks of Public Wi-Fi and How to Stay Safe
Public Wi-Fi is convenient but poses significant security risks, including Man-in-the-Middle attacks, fake hotspots, and unencrypted networks. To enhance safety, users should employ VPNs, avoid sensitive activities, verify network legitimacy, and enable two-factor authentication. Staying informed and adopting security measures can help protect personal data while using public Wi-Fi.
Are Your Smart Devices Spying on You?
Smart devices enhance daily convenience but raise significant privacy concerns. They often collect extensive data through microphones and cameras, leading to risks like eavesdropping and hacking. Users should review privacy settings, secure devices, and understand manufacturers' data practices. Legislation like GDPR and CCPA aims to improve data control and transparency.
Guarding Against Emerging Online Scams: A 5-Year Overview
The digital landscape has seen an increase in sophisticated online scams over the past five years, including phishing, impersonation, ransomware, online shopping frauds, and cryptocurrency scams. Individuals must remain vigilant by educating themselves, verifying communications, using strong authentication, and regularly backing up data to protect against these evolving threats.