Silverhand
Banned
- Joined
- Jul 20, 2021
- Location
- Usa
- Member Type
- Student or Learner
- Native Language
- Hausa
- Home Country
- Kyrgyzstan
- Current Location
- Oman
Hello.
Please correct any mistakes in the second part of my story.
In just a month, an ordinary Brazilian casts a digital shadow of over 10 Gb. What does this include? Credit cards, medical records, reading habits, work schedules and the like. Massive data silos track and sort every moment of a person's digital life, revealing how they think, and what they believe. That information could be turned against them at any point or utilized as blackmail. From a marketing and political standpoint, the possibilities are endless. This data is valuable since it can be utilized to attract the attention of consumers towards certain products, and to influence an entire population's world views. AAI straightforwardly links personal information to the physical devices an average citizen uses every day, essentially providing a direct line to laptops, tablets, smartphones, desktop computers because everything is interconnected. If this vast infrastructure were to be exploited by unauthorized parties or ended up in the wrong hands, society, as we know, would collapse.
Please correct any mistakes in the second part of my story.
In just a month, an ordinary Brazilian casts a digital shadow of over 10 Gb. What does this include? Credit cards, medical records, reading habits, work schedules and the like. Massive data silos track and sort every moment of a person's digital life, revealing how they think, and what they believe. That information could be turned against them at any point or utilized as blackmail. From a marketing and political standpoint, the possibilities are endless. This data is valuable since it can be utilized to attract the attention of consumers towards certain products, and to influence an entire population's world views. AAI straightforwardly links personal information to the physical devices an average citizen uses every day, essentially providing a direct line to laptops, tablets, smartphones, desktop computers because everything is interconnected. If this vast infrastructure were to be exploited by unauthorized parties or ended up in the wrong hands, society, as we know, would collapse.