Philosophy Mondays: Human-AI Collaboration
Today's Philosophy Monday is an important interlude. I want to reveal that I have not been writing the posts in this series entirely by myself. Instead I have been working with Claude, not just for the graphic illustrations, but also for the text. My method has been to write a rough draft and then ask Claude for improvement suggestions. I will expand this collaboration to other intelligences going forward, including open source models such as Llama and DeepSeek. I will also explore other moda...

Intent-based Collaboration Environments
AI Native IDEs for Code, Engineering, Science
Web3/Crypto: Why Bother?
One thing that keeps surprising me is how quite a few people see absolutely nothing redeeming in web3 (née crypto). Maybe this is their genuine belief. Maybe it is a reaction to the extreme boosterism of some proponents who present web3 as bringing about a libertarian nirvana. From early on I have tried to provide a more rounded perspective, pointing to both the good and the bad that can come from it as in my talks at the Blockstack Summits. Today, however, I want to attempt to provide a coge...
Philosophy Mondays: Human-AI Collaboration
Today's Philosophy Monday is an important interlude. I want to reveal that I have not been writing the posts in this series entirely by myself. Instead I have been working with Claude, not just for the graphic illustrations, but also for the text. My method has been to write a rough draft and then ask Claude for improvement suggestions. I will expand this collaboration to other intelligences going forward, including open source models such as Llama and DeepSeek. I will also explore other moda...

Intent-based Collaboration Environments
AI Native IDEs for Code, Engineering, Science
Web3/Crypto: Why Bother?
One thing that keeps surprising me is how quite a few people see absolutely nothing redeeming in web3 (née crypto). Maybe this is their genuine belief. Maybe it is a reaction to the extreme boosterism of some proponents who present web3 as bringing about a libertarian nirvana. From early on I have tried to provide a more rounded perspective, pointing to both the good and the bad that can come from it as in my talks at the Blockstack Summits. Today, however, I want to attempt to provide a coge...
>400 subscribers
>400 subscribers
Share Dialog
Share Dialog
Recently Andrew Parker predicted that within 5 years we will have a specialized branch of the military dedicated to defending cyber space (just as we have the army for land, the navy for the seas and the air force for the sky). Given the recent attacks on the New York Times and Wall Street Journal and the past attacks on companies such as Google, the timeline for such a separate branch may have to be sooner.
While I am in favor of strengthening our defensive and even offensive capabilities in cyber space I am concerned about doing so without proper oversight. We are already allowing way too much government snooping on our communications without transparency or accountability. I am also concerned that these and similar incidents will be used as arguments for the need to prevent endusers from controlling their devices.
Tim Berners-Lee just re-iterated at a conference the importance of enduser root access to devices. This is a belief that I share and one of the reasons why I have been unhappy about Apple’s increasing controls and the carriers recent success in making it illegal to unlock phones. From there it is only a small step to make the rooting of devices illegal and cyber defense would provide a convenient excuse.
Recently Andrew Parker predicted that within 5 years we will have a specialized branch of the military dedicated to defending cyber space (just as we have the army for land, the navy for the seas and the air force for the sky). Given the recent attacks on the New York Times and Wall Street Journal and the past attacks on companies such as Google, the timeline for such a separate branch may have to be sooner.
While I am in favor of strengthening our defensive and even offensive capabilities in cyber space I am concerned about doing so without proper oversight. We are already allowing way too much government snooping on our communications without transparency or accountability. I am also concerned that these and similar incidents will be used as arguments for the need to prevent endusers from controlling their devices.
Tim Berners-Lee just re-iterated at a conference the importance of enduser root access to devices. This is a belief that I share and one of the reasons why I have been unhappy about Apple’s increasing controls and the carriers recent success in making it illegal to unlock phones. From there it is only a small step to make the rooting of devices illegal and cyber defense would provide a convenient excuse.
No comments yet