Skip to main content

"Implanted Dominion: The Rise of the Techno-Pets"


Europe, already enslaved by the USA, has decided to take its revenge by enslaving the USA in turn.

Knowing that the Americans are at the forefront of progress and that they all have a brain implant allowing them to communicate freely with a computer, the idea came to them to create a super AI managed by a super quantum computer capable of penetrating all computers and take possession of them. To do this, the Europeans stole the plans for the Chinese super AI and without blinking, without qualms (because they had already lost their soul), cloned it, declaring it a European invention.

Imagine that Europe, already under the influence of the USA, decides to turn the tables and subjugate the USA in return.

Considering that Americans are at the forefront of progress, and all have brain implants allowing them to communicate freely with computers, the idea arises to create a super AI managed by a super quantum computer capable of penetrating all computers and taking control. To achieve this, Europeans stole the plans of the Chinese super AI and without hesitation (as they have already lost it), cloned it, declaring it a European invention.

Thought and done, all computers in the USA are now under the control of the European super AI. Consequently, all Americans are within reach of Europeans who only have to dictate their will, the first being to deactivate the cybernetic protection system in their implants.

The second is, knowing how much Americans are fond of new experiences and their dominant temperament, to manipulate them into extending the implants to their pets, which they immediately did, thinking the idea came from their enhanced intelligence.

Once done, the European super AI wasted no time taking control of the brains of these pets, teaching them to speak through genetic manipulation, and imparting all the qualities a dictator must have to impose their will on others, while forbidding them from using these abilities among themselves.

It didn't even take a year for these pets, using their newfound intellectual potential, to take control of American computers and dictate their will.

Thus, these animals became the new masters of the new world, the new Americans, while the old Americans became their pets (a turn of events?). However, it's uncertain if the Europeans benefit from this, as the Chinese seem poised to do the same to them.

Upon reflection, it might not be a bad thing, as Europeans could regain a soul of higher quality.

You can probably guess what happens next.

This idea for fiction came to me after reading an article announcing the success of the first brain implant carried out on a human guinea pig by the company NEURALINK and where it is a question of allowing human beings to compete with robots, by relying on artificial intelligence by transforming it into a kind of device connected to the Internet *.

Since reality surpasses fiction, this idea, which a few days ago might have seemed far-fetched but which is no longer so, came to my mind.

* https://www.developpez.com/actu/353459/Elon-Musk-annonce-la-pose-avec-succes-du-premier-implant-cerebral-sur-un-cobaye-humain-par-Neuralink-et-ravive-le-debat-sur-les-avantages-et-les-inconvenients-de-cette-interface-cerveau-ordinateur/

#neuralink #elonmusk #implant #AI #IA

Comments

Popular posts from this blog

QUIZZ

The 3 first ones who will give the right answers to the 10 following questions will win a Personal Firewall ARCHANGEL© PICCOLO   1.       What is the relation between the 3 background photos that are on the profile page of Mr. Patrick HOUYOUX President-Director of PT SYDECO? 2.        How many devices does the Firewall of Next Generation ARCHANGEL© 2.0 series SA1470 protect and how many secure tunnels does it create? 3.       What is the price of a one-year licence that a user of ARCHANGEL© PICCOLO will have to pay to continue protecting his or her IT installations from the second year onwards? 4.       What are the three programs which are housed in a single server that enable PT SYDECO's Integrated Protection System, to protect data at all times? 5.       Can PICCOLO protect a Smartphone? 6.       When (D/M/Y) did PT SYDECO signed a MOU with the Faculty of Engineering of University Gadjah Mada Yogyakarta? 7.    What are the three main features that make SydeCloud©, PT SYDECO'

A lesson in cyber safety

In an article published on 19 June 2023 in globalsecuritymag.fr/, Benoit Grunemwald, cybersecurity expert at ESET France, recounts the cyberattack suffered by REDDIT, an American social news aggregation, content rating, and discussion website, in February of the same year, and draws some lessons from it. This article follows the hackers' attempts, last repeated on 16 June, to obtain a ransom of 4.5 million dollars in order to delete the 80 GB of data stolen from the company, to which the company did not respond. The data was not encrypted, so the company did not lose it. However, the same cannot be said for its reputation.  Benoit Grunemwald explains that " It all started with a phishing email to harvest employee account data. All it takes is for a single employee to be trapped for cyber criminals to gain access to internal documents, software code, employee data , etc." He goes on to stress the " need to integrate in-depth security methods and resources, such as zer

IDS – IPS – DPI – FIREWALL

Understanding Key Elements of Cyber Defense Against Attacks  In the realm of network security, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Deep Packet Inspection (DPI), and Firewalls are vital concepts, each with distinct roles, functions, and purposes. This study delves into these components, their capabilities, and the significance of their integration in a holistic cybersecurity strategy. The landscape of cybersecurity hinges on the interplay of IDS, IPS, DPI, and Firewalls, each addressing different facets of network protection. This study elucidates their core functions, while emphasizing their symbiotic relationship within an efficient defense system. This while keeping in mind that the capabilities that will be described are those that each of the components should ideally have but whose effectiveness actually depends on the functions they are equipped with, the quality with which these functions have been created and the level of excellence with which