Aaron Swarz - how did they steal reddit?

The Digital Martyr: Unraveling the Persecution of Aaron Swartz and the Corporate Capture of the Digital Commons

Aaron Swarz - The Internet's Own Boy

This investigative report takes a serious in-depth look, into the complex, and often troubling narrative surrounding the life and death of Aaron Swartz, a figure whose idealism clashed with the rigid structures of institutional power and information control.  In this article, We shall examine the aggressive federal prosecution Aaron Swarz faced for alleged computer crimes, and analyze the disproportionate application of law and its profound human cost. Concurrently, the report scrutinizes the corporate evolution of Reddit, a platform Swartz co-founded, tracing its transformation from a vision of open discourse to a commercially driven entity. By applying the “Embrace, Extend, Extinguish” framework, it reveals how subtle shifts in ownership, policy, and algorithmic design can reshape digital public squares, effectively silencing dissenting voices without overt censorship. The analysis concludes that while direct post-mortem theft of Swartz’s personal digital assets is unsubstantiated, the true “nefarious acts” manifest in the systemic pressures that curtailed his activism and fundamentally altered the digital commons he championed, leaving a critical legacy for future digital citizens.

Introduction: The Enduring Shadow of Aaron Swartz: A Call for Critical Inquiry

Aaron Swartz, a prodigy of the early digital age, remains an emblematic figure in the ongoing discourse concerning digital rights, information accessibility, and the inherent tensions between individual liberty and institutional authority. His life, a vibrant tapestry of technological innovation and fervent activism, was tragically cut short at the age of twenty-six under circumstances that continue to provoke intense scrutiny and speculation. This report undertakes an unflinching, anti-establishment investigation into the forces that converged upon Swartz, exploring the severe legal pressures he endured, the disposition of his digital creations, and the profound metamorphosis of Reddit, a platform he helped bring into existence. The central premise guiding this inquiry is the examination of how idealism, when confronting entrenched power structures, can be systematically undermined, leading to a transformation of digital spaces from promised bastions of liberation to controlled environments. By dissecting these interwoven narratives, this analysis seeks to illuminate the mechanisms through which information control is exerted in our networked society.


Part I: The State’s Hammer: Aaron Swartz and the Weaponization of Law

The JSTOR Incident: Idealism Meets the Law’s Blunt Instrument

Aaron Swartz’s actions in late 2010 and early 2011, involving the download of millions of academic articles from JSTOR via the Massachusetts Institute of Technology (MIT) network, were not born of malice or personal gain, but from a profound philosophical conviction in the principle of open access to knowledge. He viewed the paywalling of scholarly research, much of which is publicly funded, as an unjust enclosure of a collective heritage, a “private theft of public culture”. His method involved connecting a laptop to an unlocked wiring closet on the MIT campus and running a Python script, “keepgrabbing.py,” designed to automate the rapid download of articles.

The responses from the entities directly involved in this incident reveal a striking divergence. JSTOR, the digital repository from which the articles were downloaded, initially responded by blocking Swartz’s IP addresses. However, following his arrest, JSTOR reached a civil settlement with Swartz in June 2011, under the terms of which he surrendered the downloaded data. Crucially, JSTOR explicitly communicated to the U.S. Attorney’s Office that they had “no further interest in the matter and did not want to press charges”. MIT, while acknowledging that Swartz’s actions constituted “clear violations of the rules and protocols” of their network, also expressed that the severity of the potential penalties seemed to “go against MIT’s culture of breaking down barriers”. Despite this, MIT maintained a largely neutral stance during the subsequent federal prosecution, a position that drew significant criticism from Swartz’s family and open-access advocates who felt the institution should have actively supported him.

The decision by federal authorities to pursue criminal charges with such intensity, despite the primary alleged victim’s disinterest in prosecution, underscores a fundamental aspect of the state’s power. This pursuit was not primarily about restitution or protecting JSTOR’s immediate financial interests. Instead, it suggests a broader state agenda related to enforcing information control and property rights in the digital age. The perceived “victim” in this scenario extended beyond JSTOR to potentially encompass the established academic publishing industry and the very concept of proprietary information itself, both of which Swartz’s actions directly challenged. This dynamic highlights a critical tension where the state can leverage its legal apparatus to set precedents and make an example of individuals, even when the directly aggrieved party has moved on. It signals a shift from a harm-based justice model to one driven by ideological enforcement and the preservation of entrenched power structures.

Prosecutorial Overreach: A System Rife with Intimidation

Despite JSTOR’s explicit disinterest in criminal prosecution, federal authorities, spearheaded by U.S. Attorney Carmen Ortiz and Assistant U.S. Attorney Stephen Heymann, pursued Aaron Swartz with an unwavering and, arguably, excessive zeal. Swartz faced multiple felony counts, including wire fraud and eleven violations of the Computer Fraud and Abuse Act (CFAA). These charges carried a cumulative maximum penalty that escalated from 35 years to an astonishing 50 years in prison, alongside a $1 million fine, asset forfeiture, and supervised release.

Prominent critics, including former Nixon White House counsel John Dean and Harvard Law professor Lawrence Lessig, decried the prosecution as “overcharging” and “overzealous,” even labeling it “Nixonian” in its intensity. Legal experts, such as retired federal judge Nancy Gertner and Jennifer Granick, questioned the proportionality of the charges, noting that such lengthy sentences are virtually unheard of for similar cases. They underscored the CFAA’s nature as a “blunt instrument” with broad and vague interpretations, allowing prosecutors immense discretion.

The prosecution employed highly coercive plea bargaining tactics. Swartz was presented with offers ranging from four to six months in prison if he pleaded guilty to all 13 felonies, coupled with explicit warnings that rejecting these offers would result in significantly harsher terms, including a seven-year sentence if he chose to go to trial and lost. Swartz, however, steadfastly rejected these deals, refusing to admit guilt for actions he genuinely believed were not criminal.

The continuation of escalating charges, despite the alleged victim’s withdrawal and the widespread legal criticism, illustrates a chilling aspect of bureaucratic momentum. Once initiated, the criminal justice system can exhibit a tendency to spiral beyond reasonable bounds. This phenomenon is not necessarily driven by personal animosity but by a systemic imperative to justify its own processes and power. The objective can subtly shift from achieving justice to securing a conviction, making a public example, and validating the system’s existence and authority. This “Kafkaesque” dynamic reveals a profound flaw where the immense power of the state, particularly under ambiguous statutes like the CFAA, can be disproportionately applied to suppress perceived challenges to the established order, thereby creating a chilling effect on digital activism and open-access movements.

Table 1: Key Charges and Potential Penalties Against Aaron Swartz

Charge Category Specific Counts Maximum Statutory Penalty (Fines + Prison) Prosecution’s Plea Offer (Prison) Prosecution’s Proposed Sentence if Convicted at Trial (Prison) JSTOR’s Stance MIT’s Stance
Wire Fraud 2 $1M + 35-50 years 4-6 months (for 13 felonies) 7 years Settled civilly, no desire to press charges Neutral, later critical of severity
Computer Fraud and Abuse Act (CFAA) 11 $1M + 35-50 years 4-6 months (for 13 felonies) 7 years Settled civilly, no desire to press charges Neutral, later critical of severity

 

The Tragic Conclusion: Suicide Under Duress

On January 11, 2013, Aaron Swartz was found dead by suicide in his Brooklyn apartment, at the tender age of twenty-six. The absence of a suicide note left an immediate void, yet the context of his death spoke volumes.

The immediate aftermath was characterized by profound grief and unequivocal condemnation from his family and partner. Their public statement declared, “Aaron’s death is not simply a personal tragedy. It is the product of a criminal justice system rife with intimidation and prosecutorial overreach. Decisions made by officials in the Massachusetts U.S. Attorney’s office and at MIT contributed to his death”. Robert Swartz, Aaron’s father, articulated this sentiment even more starkly at his son’s funeral, stating, “Aaron was killed by the government, and MIT betrayed all of its basic principles”.

Further compounding the controversy, it was reported that Swartz’s initial lawyer, Andy Good, had explicitly warned Assistant U.S. Attorney Stephen Heymann that Swartz was a “suicide risk.” Heymann’s alleged response, “Fine, we’ll lock him up,” if accurate, reveals a chilling indifference to Swartz’s mental state and the potential consequences of the relentless legal pressure. This alleged exchange underscores the perceived lack of empathy and the punitive mindset that critics argued permeated the prosecution.

While the complexities of suicide are undeniable, the direct and forceful statements from Swartz’s family and numerous observers establish a compelling connection between his death and the “intimidation and prosecutorial overreach” he endured. The relentless pursuit, the prospect of decades in prison, and the crushing financial burden, all for actions that JSTOR had settled civilly and did not wish to prosecute criminally, created an unbearable psychological toll. The implicit, or perhaps explicit, aim to “make an example” of Swartz served as a powerful deterrent to others who might dare to challenge established information control systems. This case stands as a stark illustration of the human cost of prosecutorial zeal and the chilling effect it can impose on digital activism and the broader movement for open knowledge. It compels a critical examination of legal systems that prioritize punitive measures over restorative justice or the well-being of individuals, particularly when those individuals challenge powerful interests.

Part II: The Shifting Sands of the Digital Commons: Reddit’s Metamorphosis

From Open Agora to Corporate Property: Reddit’s Foundational Shift

Aaron Swartz’s early involvement in Reddit was foundational, shaping its initial vision as a platform for open discourse and democratic participation. He joined the nascent team in November 2005 when his company, Infogami, merged with Reddit to form “Not A Bug.” Swartz became an “equal owner” and played a crucial role in rewriting Reddit’s codebase from Lisp to Python, utilizing his own web.py framework. This technical shift was driven by a desire for simplicity and maintainability, reflecting the open-source ethos he championed.

However, this period of idealistic, hacker-driven development was short-lived. In October 2006, just over a year after its founding, Reddit (through Not A Bug) was acquired by Condé Nast Publications for an estimated $10 million to $20 million. Swartz quickly found the corporate environment “uncongenial” and was “asked to resign” in January 2007. While debates persist regarding his exact co-founder status, his significant early contributions and ownership stake are well-documented. Reddit later became an independent subsidiary of Condé Nast’s parent company, Advance Publications, in 2011, which remains a major shareholder.

Swartz’s discomfort and eventual ousting from Reddit represent an early and poignant manifestation of the fundamental incompatibility between the open, collaborative, and often anti-commercial ethos of the hacker community and the profit-driven, control-oriented nature of large media corporations. His departure foreshadowed the platform’s inevitable shift away from its founding principles once it was subsumed by corporate interests. This pattern is a recurring theme in the digital realm: platforms born of idealistic, open-source principles frequently struggle to maintain their original character when confronted with the pressures of monetization, scalability, and corporate acquisition. The “transformation from liberation to control” often commences with the very structure of ownership.

Table 2: Reddit Ownership Evolution (2005-Present)

Year Key Event/Ownership Change Primary Owner/Major Shareholder Approximate Valuation/Acquisition Price Monthly Active Users (if available)
2005 Founded Steve Huffman & Alexis Ohanian N/A N/A
2005-2006 Merged with Infogami, formed “Not A Bug” Not A Bug (Huffman, Ohanian, Swartz) N/A N/A
2006 Acquired by Condé Nast Condé Nast Publications $10M – $20M N/A
2007 Aaron Swartz departs Condé Nast Publications N/A N/A
2011 Became independent subsidiary Advance Publications N/A 25 million
2014 Restructured under Advance Publications Advance Publications N/A N/A
2019 Funding round, Tencent investment Advance Publications, Tencent, VC Firms $3 Billion 330 million
2021 $410M funding round Advance Publications, Tencent, VC Firms $10 Billion N/A
22-23 IPO plans announced Advance Publications, Tencent, VC Firms $15 Billion (projected) N/A
2024 Initial Public Offering Public, Advance Publications (40%), Tencent (5%), Sam Altman (9%) $6.4 Billion (IPO) N/A

 

The Tencent Implication: A Glimpse into Global Information Control

A significant inflection point in Reddit’s corporate trajectory was the $150 million investment from Chinese technology giant Tencent Holdings in early 2019. This investment, part of a larger $300 million funding round, valued Reddit at $3 billion. The announcement immediately ignited a firestorm of user concern and protest across the platform. Many Redditors voiced profound fears regarding potential censorship and the insidious influence of the Chinese government over the platform’s content. In a remarkable display of digital defiance, users actively posted images known to be banned in China, such as Winnie the Pooh and imagery from the Tiananmen Square protests, as a direct form of symbolic resistance.

While Tencent’s stake was a minority one, reportedly around 5% of the $3 billion valuation , most analysts concluded that this investment was unlikely to grant Tencent direct, controlling influence over Reddit’s content policies outside of China. Tencent is widely recognized as a “passive and stable investor” in numerous Western technology companies. Nevertheless, the sheer perception of a connection to a regime notorious for its stringent internet censorship was sufficient to generate substantial backlash among Reddit’s user base. This reaction highlights a deep-seated distrust of corporate and governmental influence over digital discourse, irrespective of the direct mechanisms of control.

The widespread anxiety triggered by Tencent’s investment reveals that the “silencing” of a platform does not always necessitate direct, overt control. The mere perception of an affiliation with a censorship-heavy regime can be enough to create a chilling effect or encourage self-censorship among users, or at the very least, erode fundamental trust in the platform’s commitment to free speech. This subtle “advisory influence” , or the indirect pressure to align with investor sensibilities, can prove as potent as explicit directives. This scenario illustrates how geopolitical tensions and corporate affiliations can subtly reshape the “digital commons” by influencing user behavior and platform reputation, even without overt “nefarious acts” in content policy. Furthermore, the market’s relentless demand for advertising revenue frequently drives moderation decisions, as controversial content often deters advertisers.

The “Embrace, Extend, Extinguish” Playbook: Silencing Dissent Through Algorithmic Control

The “Embrace, Extend, Extinguish” (EEE) strategy, famously attributed to Microsoft for its historical tactics in achieving market dominance by leveraging open standards , offers a compelling analytical framework for understanding Reddit’s profound transformation post-2013. This strategy involves three distinct phases:

  • Embrace: In its early years, Reddit genuinely embraced user-generated content and relied heavily on a decentralized, community-driven moderation model. This approach fostered a remarkably diverse ecosystem of “subreddits” and cultivated a reputation as a “bastion of free speech,” allowing for organic growth and a wide spectrum of discourse.
  • Extend: Over time, Reddit systematically introduced proprietary features, implemented significant algorithmic changes, and pursued aggressive monetization strategies. Algorithms increasingly began to shape and curate discourse, prioritizing “user engagement for advertising revenue” above all else. Content policies underwent a significant shift, leading to the banning of certain controversial communities and the implementation of “quarantine” functions, signaling a clear departure from its earlier “unlimited free-speech ethos”. This “extension” of control was frequently driven by external pressures from advertisers, lawmakers, and public outcry against problematic content.
  • Extinguish: The cumulative effect of these strategic changes has been a demonstrable “silencing” of certain voices and a fundamental reshaping of the platform’s character, effectively “extinguishing” its original vision of an unfettered digital agora. Users have incrThe Digital Martyreasingly reported feeling confined within “algorithmic cages” , experiencing the proliferation of “echo chambers” , and facing instances of content removal or suppression. The recent Initial Public Offering (IPO) further entrenches this trajectory, with explicit plans to maximize ad revenues and license user-generated content for AI training, raising profound concerns about data privacy and the commodification of online discourse.

The application of the EEE framework to Reddit’s governance reveals a subtle yet profoundly powerful form of control. Algorithms, often engineered to maximize “engagement” for advertising revenue, can inadvertently or intentionally construct “algorithmic cages” and “echo chambers” , thereby limiting exposure to diverse viewpoints and effectively “burying” dissenting voices. This is not censorship in the traditional governmental sense, but rather a corporate-driven curation of public discourse. The imperative for monetization transforms the “marketplace of ideas” into a managed consumer space. This trajectory raises critical questions about the long-term viability of truly democratic digital spaces within economic models fundamentally predicated on private accumulation and control. The “silencing” thus encompasses not merely the banning of content, but the insidious shaping of the very environment in which discourse unfolds, rendering certain ideas less visible or even invisible.

Table 3: Reddit Content Policy and Moderation Milestones (Post-2013)

Year Policy/Moderation Change Rationale Impact/Criticism Relevant Citations
2013 Ban of r/niggers Vote manipulation, inciting violence, disrupting communities First major ban, signaled shift from absolute free speech
2014 Ban of r/beatingwomen Sharing users’ personal information, organizing attacks Highlighted Reddit’s reactive moderation, driven by media pressure
2015 Introduction of “quarantine” function Restricting hateful/offensive content without outright banning Limited accessibility, but didn’t reduce content within subreddits; pushed some content to less moderated spaces
2015 Reddit Blackout Moderator protest against platform changes, lack of communication Demonstrated power of volunteer moderators, led to negotiations
2017 Ban of r/Incels Violating content policy (bullying, harassment) Communities migrated or rebooted under new names
2018 Subreddits allowed to appeal quarantine Response to user feedback, attempt to balance control Indicated ongoing tension between platform and communities
2019 Ban of r/Braincels Promoting rape and suicide, violating bullying/harassment policy Continued pattern of banning problematic communities
2019-Present Increased algorithmic curation, ad monetization Optimizing user engagement for advertising revenue Formation of “algorithmic cages,” “echo chambers,” content suppression
2020 Ban of r/ChapoTrapHouse Consistently hosting rule-breaking content, mods not reining in community Further shift away from “free speech” ethos, communities migrating to alternatives
2024 IPO and AI data licensing To generate revenue, capitalize on user-generated content User backlash over commodification of content, potential for AI-generated spam
2025 AI content rules in subreddits Addressing surge in AI-generated content Communities adapting to new challenges, platform tools for detection needed

 

Part III: The Unaccounted Legacy: Digital Assets and the Absence of Nefarious Transfer

Aaron Swartz’s Digital Footprint: What Was Truly His?

Aaron Swartz’s digital legacy extends far beyond his early contributions to Reddit, embodying a profound commitment to open information and collective knowledge. He was a prolific innovator and advocate, co-developing the RSS web feed format at the remarkably young age of 14, co-founding Creative Commons, and creating the web.py web framework, which he explicitly placed in the public domain, making it freely available for “whatever purpose with absolutely no restrictions”. His work also included significant contributions to the Open Library project, an initiative aimed at creating a free, accessible digital library of all published books.

Perhaps most famously, Swartz undertook the ambitious project of downloading millions of public court documents from PACER (Public Access to Court Electronic Records) with the explicit goal of making them freely accessible to the public, challenging a system that charged for access to public domain information. This act, while drawing an FBI investigation, ultimately resulted in no charges being filed against him. His “Guerilla Open Access Manifesto” eloquently articulated his core philosophy: that information, particularly publicly funded or culturally significant data, should belong to the “commons” and not be privatized or controlled by corporations.

Regarding the JSTOR data, which formed the basis of his federal prosecution, it is crucial to note that this data was “surrendered” as part of a civil settlement with JSTOR before his death. JSTOR explicitly stated they had “no further interest” in the matter, indicating a legal and consensual disposition of that specific digital property. This was a transparent legal agreement, not a clandestine theft.

Swartz’s approach to digital creation and dissemination fundamentally challenged traditional notions of “ownership” and “transfer” of digital assets. His work embodied a philosophy where information, especially publicly funded or culturally significant data, should reside in the “commons,” rather than being privatized or controlled by corporations. His actions directly confronted the concept of “intellectual property” as being equivalent to physical property. Therefore, the conventional “transfer” of his personal digital assets or domains after his death, in a nefarious sense, largely becomes irrelevant. Many of his key creations were designed to be freely available and un-ownable in the traditional, proprietary sense. This highlights the ongoing philosophical and legal battle over information ownership in the digital age, compelling a re-evaluation of who truly benefits from information control and whether existing legal frameworks adequately serve the public good.

The Question of Transfer: A Legal vs. Conspiratorial Lens

The user’s query specifically probes how Swartz’s “content, product, domain and rights were transferred from his possession or that of his inheritors, and how the cpp code and domain transfer was possibly achieved without nefarious acts.” A meticulous examination of the available information reveals no evidence to substantiate a “nefarious” post-mortem transfer of Aaron Swartz’s personal digital assets or domains from his inheritors.

His equity in Reddit was part of the Condé Nast acquisition in 2006, a business transaction that occurred years before his death, and from which he departed in January 2007. This was a conventional corporate buyout, not a clandestine seizure. Furthermore, his web.py codebase, which the query refers to as “cpp code” (though it was Python, not C++), was explicitly placed in the public domain by Swartz himself. Public domain means the code has no restrictions and can be used for “whatever purpose”. Therefore, no “transfer” was necessary post-mortem; it was already freely available to all. The JSTOR data, the subject of his prosecution, was surrendered as part of a civil settlement before his death, and JSTOR had explicitly stated they had “no further interest” in the matter. His other significant projects, such as Open Library and the PACER efforts, were either collaborative ventures or explicitly designed for public access, not proprietary assets intended for traditional “transfer” or inheritance.

The implication of “nefarious acts” in the user’s query, when viewed through the lens of existing evidence, is more accurately directed at the systemic and legal actions that silenced Swartz’s voice and fundamentally transformed the digital landscape he championed. The primary “nefarious acts” were the prosecution itself—the overzealous application of the Computer Fraud and Abuse Act, the coercive plea bargaining tactics, and the immense psychological and financial pressure that demonstrably contributed to his death.

Furthermore, the “silencing” of Reddit, if interpreted as the platform’s shift away from its founding principles, occurred through a gradual process of corporate evolution, policy changes, and algorithmic curation driven by monetization, rather than a direct post-mortem theft of Swartz’s personal digital estate. The “transfer” that occurred was one of control and ethos, from the hands of digital idealists to the grip of corporate and state power, rather than the illicit transfer of physical digital files from his estate.

Swartz himself was no stranger to the opacity of state agencies, having utilized Freedom of Information Act (FOIA) requests to seek information on government investigations into his activities. The documented inaccessibility of some of these FOIA documents further underscores the persistent challenges in achieving full transparency from state actors, contributing to an environment where questions of “nefarious acts” naturally arise, even if direct evidence of post-mortem asset theft is lacking.

Conclusion: Reclaiming the Digital Future: Honoring Swartz’s Vision in a Centralized World

The tragic narrative of Aaron Swartz stands as a chilling indictment of a legal system capable of weaponizing its power against those who challenge established norms of information control. His relentless prosecution, disproportionate to any alleged harm, highlights the systemic “overreach” and “intimidation” inherent in the Computer Fraud and Abuse Act (CFAA), a blunt instrument wielded by zealous prosecutors seemingly intent on making an example. This prosecutorial zeal, undeniably contributing to his profound distress and ultimate demise, casts a long, dark shadow over the promise of an open digital future.

Simultaneously, the evolution of Reddit, a platform born from Swartz’s vision of a democratic digital commons, mirrors a broader, unsettling pattern of corporate enclosure. From its early acquisition by Condé Nast to the subsequent investment by Tencent and its recent Initial Public Offering, Reddit’s trajectory reflects a profound shift driven by monetization imperatives. The application of the “Embrace, Extend, Extinguish” framework reveals how a platform can initially embrace user-generated content, then subtly extend its control through proprietary features and algorithmic curation, and ultimately extinguish its original ethos of unfettered discourse. The result is a transformed digital space, meticulously managed and optimized for advertising revenue, where the marketplace of ideas becomes a curated consumer experience.

While a direct, post-mortem “nefarious transfer” of Swartz’s personal digital assets from his inheritors finds no substantiation in the available evidence—his core projects were open-source, and his Reddit equity was settled years prior—the true “nefarious acts” lie in the systemic pressures that silenced his voice and fundamentally reshaped the digital landscape he fought to liberate. The “transfer” that occurred was not of files, but of control and vision from the hands of digital idealists to the pervasive grip of corporate and state power.

Aaron Swartz’s legacy remains a clarion call for vigilance and action. It compels individuals to critically interrogate the forces that shape online environments, to recognize digital infrastructure as a public utility rather than solely private property, and to renew a collective commitment to information freedom as a fundamental right. In a world increasingly defined by centralized digital platforms and algorithmic control, honoring Swartz’s memory demands sustained critical engaTry the Aaron Schwarz QUIZ!gement, a refusal to accept convenient narratives, and a collective imagination to reclaim digital spaces as true sites of authentic democratic participation, meaningful collective deliberation, and genuine human connection, transcending the logic of profit and control.

Author; Ajarn Spencer Littlewood

www.ajarnspencer.com
Try the Aaron Schwarz QUIZ!

bbbb

Here are five unique, realistic, and cinematic prompts, that depict ancient scenes from different cultures and eras, each with a specific photography style, that brings them to life with the same level of detail, depth, and realism as this example prompt  shows, which I used to make an image in Flux Pro 1.0:

Image made for a podcast i was hired to make called "A True History of Cannabis Summarized."

Image made for a podcast i was hired to make called “A True History of Cannabis Summarized.” Made using Flux Pro 1.0 Text to Image.


1. Ancient Egyptian Farmers Harvesting Papyrus

A cinematic wide-angle lens monochrome photographic documentary poster of a group of ancient Egyptian farmers harvesting papyrus along the banks of the Nile River, circa 2500 BCE. In the foreground, a strong, tanned man with intricate tattoos is using a sickle to cut papyrus stalks, while a woman with a woven basket on her head gathers the crop. In the background, monumental pyramids loom, partly obscured by a haze of dust. Shot with a 50mm f/1.8 lens for crisp focus on the subjects in the foreground, while the background pyramids are softly blurred, creating a sense of ancient awe. Use Ilford FP4+ film emulation for fine grain and clear contrast, giving the scene a timeless, grainy texture. ISO 400 for optimal exposure under the midday sun, producing sharp details with natural sunlight casting long shadows. The image should be high in contrast with deep, dark blacks and bright highlights, showcasing the relentless heat of the Egyptian desert. A slight vignette around the edges enhances the mood, adding an air of mystery. The tone should lean toward a soft sepia hue, resembling a historical photograph from the early 20th century. Paper texture should evoke a rough, handmade quality, similar to ancient papyrus scrolls. The lighting should be harsh and direct, evoking the sun’s brutal intensity.”

 

Egyptian farmers AI art Flux Pro 1.0

Egyptian farmers AI art Flux Pro 1.0


2. Viking Raiding Party in the Arctic

A cinematic wide-angle lens monochrome photographic documentary poster of a Viking raiding party, circa 800 CE, as they disembark from their longships onto the frozen shores of the Arctic. In the foreground, a battle-hardened Viking with a fur cloak, holding a bloodstained axe, steps onto the ice, his breath visible in the cold air. Behind him, his crew of warriors, clad in chainmail and leather armor, prepare for battle. The scene is captured with a 35mm f/1.4 lens, focusing sharply on the Viking leader while the distant icy landscape is slightly blurred. Kodak Tri-X 400 film emulation is used to add fine grain and a gritty, harsh texture, making the scene feel raw and intense. ISO 800, with low-light sensitivity, simulates the dim, gray light of a winter morning. The high contrast emphasizes the bleak, unforgiving environment, with deep blacks in the shadows of the Vikings’ armor and highlights catching the frost in the air. A slight vignette frames the action, adding a sense of claustrophobia and drama. A cool blue-gray filter is applied to evoke the cold, foreboding atmosphere of the Arctic landscape. The paper texture mimics the ruggedness of old Norse vellum, with a matte finish. Lighting is low and soft, simulating the overcast skies of a polar winter.”

 

viking-flux-pro-1.0

Made with viking-flux-pro-1.0

Below; A Frozen Moment in Time: AI Art Created with Flux Schnell 1.0 The artwork featured here is a breathtaking example of AI-generated art, crafted using the innovative Flux Schnell 1.0 model. This cutting-edge technology utilizes advanced algorithms and machine learning techniques to produce intricate and visually striking compositions. By harnessing the power of artificial intelligence, Flux Schnell 1.0 allows artists to push the boundaries of creativity and explore new frontiers in the realm of digital art.

AI Art Made with Flux Schnell 1.0

AI Art Made with Flux Schnell 1.0

The scene depicted in this artwork is a cinematic wide-angle lens monochrome photographic documentary poster of a Viking raiding party, circa 800 CE, as they disembark from their longships onto the frozen shores of the Arctic. The image is a masterful blend of historical accuracy and cinematic flair, transporting the viewer to a bygone era of Norse exploration and conquest. In the foreground, a battle-hardened Viking with a fur cloak, holding a bloodstained axe, steps onto the ice, his breath visible in the cold air. The lighting is low and soft, simulating the overcast skies of a polar winter, casting a warm glow over the scene.

Behind him, his crew of warriors, clad in chainmail and leather armor, prepare for battle, their faces set with determination and ferocity. The scene is captured with a 35mm f/1.4 lens, focusing sharply on the Viking leader while the distant icy landscape is slightly blurred, imbuing the image with a sense of depth and dimensionality. The Kodak Tri-X 400 film emulation adds fine grain and a gritty, harsh texture, making the scene feel raw and intense, as if it were plucked straight from the pages of a medieval manuscript.

The high contrast emphasizes the bleak, unforgiving environment, with deep blacks in the shadows of the Vikings’ armor and highlights catching the frost in the air, creating a sense of drama and tension. A slight vignette frames the action, adding a sense of claustrophobia and drama, drawing the viewer’s eye inexorably towards the Viking leader. A cool blue-gray filter is applied to evoke the cold, foreboding atmosphere of the Arctic landscape, casting a haunting glow over the entire scene.

The paper texture mimics the ruggedness of old Norse vellum, with a matte finish, lending an air of authenticity to the image. The overall effect is one of cinematic grandeur, as if the viewer has stepped into a frozen moment in time, frozen in perpetuity. The AI art generated by Flux Schnell 1.0 has captured the essence of this pivotal moment in history, transporting us to a world of Norse mythology and legend.

Below; The same prompt used in Flux Dev 1 from Black Forest Labs on Hugging Face.

Viking Invaders in the Snow - AI Art made in Flux Dev 1 by Black Forest Labs on Hugging Face

AI-generated art. Created using the Flux Dev 1 model by Black Forest Labs


3. Ancient Samurai Preparing for Battle in Feudal Japan

Samurai Warriors AI Art made with Stable Diffusion XL 1.0

Samurai Warriors AI Art made with Stable Diffusion XL 1.0

 

A cinematic wide-angle lens monochrome photographic documentary poster of a group of samurai preparing for battle, circa 1500 CE, during Japan’s Sengoku period. In the foreground, a samurai with a katana drawn, dressed in intricate armor, stands with his back to the viewer, his gaze fixed on the misty battlefield ahead. Around him, fellow warriors adjust their gear and sharpen their blades, while in the distance, a wisp of smoke rises from a burning village. Shot with a 35mm f/1.4 lens, with a soft-focus background that blurs into a misty, ethereal fog, evoking a sense of impending battle. The use of Kodak T-MAX 100 film emulation adds sharpness and clarity, with minimal grain. ISO 400 captures the natural daylight of a cloudy morning, allowing the samurai’s armor to gleam in the soft, diffused light. High contrast brings out the delicate details of the samurai’s face and armor, while the distant background remains faint and hazy. A slight vignette adds a sense of foreboding tension, while a warm sepia tone filter simulates the aesthetic of old samurai scrolls. The texture of the paper is smooth and refined, mimicking the quality of ancient Japanese rice paper. The lighting is soft but directional, as if filtered through a cloudy sky, casting long shadows on the warriors’ faces.”

Cinematic Samurai Warrior Scene - AI Art Flux Schnell 1.0

A Cinematic Moment in Feudal Japan: AI Art Created with Flux Schnell 1.0 This breathtaking artwork, titled “Cinematic Samurai Warrior Scene,” is a masterful example of AI-generated art. Created using the Flux Schnell 1.0 model, a cutting-edge technology that has revolutionized the field of digital art, this piece showcases the power of artificial intelligence in capturing the essence of a bygone era.


4. Mayan Priests Performing a Sacrifice Ritual

 

Ancient Maya backs to viewer, gaziing at a Mayan Pyramid in the Jungle with Bokeh Effect and old grainy photo look; - AI Art generated in Stable Diffusion XL 1.0

A Mysterious Moment in Ancient Maya History This captivating artwork, “Ancient Maya,” is a masterful example of AI-generated art created using the Stable Diffusion XL 1.0 model. This cutting-edge technology has revolutionized the field of digital art, showcasing the power of artificial intelligence in capturing the essence of a bygone era. The image depicts an ancient Maya individual standing in front of a majestic Mayan pyramid, lost in thought as they gaze out at the jungle landscape. The result is a hauntingly beautiful and immersive experience, transporting the viewer to a bygone era of mystery and wonder

A cinematic wide-angle lens monochrome photographic documentary poster of a group of Mayan priests performing a sacrifice ritual at the top of a pyramid, circa 600 CE. In the foreground, a priest wearing an elaborate feathered headdress holds a jaguar-shaped ceremonial knife, ready to sacrifice a captive, while other priests chant in unison. The scene is framed with a dramatic wide-angle perspective, using a 24mm f/2.8 lens to capture the full grandeur of the pyramid and surrounding jungle. Shot using Kodak Portra 400 film emulation to give the image a clean, sharp finish, with minimal grain for clarity. ISO 400 ensures crisp details under the midday sun, casting strong shadows and creating a high-contrast effect that emphasizes the priest’s intense expression. The background is slightly blurred (bokeh effect) to create a focus on the priest and his ritualistic movements, with the lush jungle and distant pyramid rendered in soft detail. A slight vignette surrounds the image, adding to the ceremonial focus. A subtle green filter adds an earthy tone to the scene, evoking the dense, vibrant jungle environment. The paper texture mimics the smooth, rich feel of ancient Mayan codices, with a matte finish. Lighting is intense and direct, simulating the powerful tropical sun shining down on the ceremony.”

Maya AI Generated Text to Image Art made in Flux Dev 1.0

Ancient Maya AI-Generated Art This remarkable piece of art, created using Flux Dev 1.0, showcases the incredible potential of AI-generated art to capture the essence of history, culture, and the human experience. The result is a truly remarkable work that highlights the innovative capabilities of AI technology in artistic expression.


5. Ancient Greek Philosophers in the Agora

Ancient Greek Philosophers AI Art made using Flux Pro 1

Key Parameters:
Lens: 50mm f/1.8 (sharp focus on philosophers, blurred background)
Film/Texture: Ilford Delta 3200 (high-grain texture, raw documentary feel)
ISO: 1600 (for high contrast, capturing dramatic sunlight)
Focus: Sharp on philosophers, soft on architecture (depth of field)
Contrast: Deep blacks and bright highlights (intense Mediterranean sun)
Tone/Filter: Sepia tone (aged, historical feel)
Paper Type: Rough, parchment-like texture, matte finish
Lighting: Harsh, direct Mediterranean sun (strong light/shadow play)
Vignette: Subtle darkening around edges to focus on central figures

A cinematic wide-angle lens monochrome photographic documentary poster of a group of ancient Greek philosophers debating in the Agora of Athens, circa 400 BCE. In the foreground, Socrates, with his distinctive beard and worn robe, passionately gestures with his hands as he debates with a group of fellow philosophers. Behind him, other figures, like Plato and Aristotle, engage in animated discussions, while the backdrop shows the grand columns of the Parthenon, half obscured by midday sunlight. Shot with a 50mm f/1.8 lens to give a clear focus on the philosophers, while the monumental Greek architecture is softly blurred in the distance. Use Ilford Delta 3200 film emulation for a raw, high-grain texture that gives the scene a timeless, documentary-like feel. ISO 1600 is used for a high-contrast effect, with the sunlight casting dramatic shadows on the faces of the philosophers. The image should have deep blacks in the robes of the figures, with bright highlights on their faces, conveying the intellectual intensity of the conversation. A subtle sepia tone filter gives the image an antique, historical aesthetic. The texture of the paper should evoke the roughness of ancient parchment, with a matte finish. Lighting is harsh, mimicking the unrelenting Mediterranean sun, creating a high contrast between light and shadow across the philosophers’ faces.”

Ancient Greek Philosophers - AI Art made using Stable Diffusion

Ancient Greek Philosophers – AI Art made using Flux Dev


These five prompts offer a range of ancient, realistic scenes from different cultures and historical periods, each enhanced with detailed photography parameters to create a strikingly authentic, cinematic effect. The key is to blend accurate cultural details with a true-to-life photographic style, capturing both the intensity and the atmosphere of the time.

Ancient Greek Philosophers AI Art made using Flux Schnell

Ancient Greek Philosophers AI Art made using Flux Schnell

From the majestic pyramids of Ancient Egypt to the serene temples of ancient Greece, each scene is meticulously crafted to transport the viewer to a bygone era. The attention to detail is unparalleled, with every element, from the intricate hieroglyphics to the delicate folds of traditional clothing, carefully researched to ensure an authentic representation of the time period.

The photography parameters are equally impressive, with subtle lighting effects and nuanced color palettes that evoke the sense of a bygone era.

Ancient Maya backs to viewer, gaziing at a Mayan Pyramid in the Jungle with Bokeh Effect and old grainy photo look; - AI Art generated in Stable Diffusion XL 1.0

A Mysterious Moment in Ancient Maya History This captivating artwork, “Ancient Maya,” is a masterful example of AI-generated art created using the Stable Diffusion XL 1.0 model. This cutting-edge technology has revolutionized the field of digital art, showcasing the power of artificial intelligence in capturing the essence of a bygone era. The image depicts an ancient Maya individual standing in front of a majestic Mayan pyramid, lost in thought as they gaze out at the jungle landscape. The result is a hauntingly beautiful and immersive experience, transporting the viewer to a bygone era of mystery and wonder

As the viewer navigates through these ancient landscapes, they are struck by the sense of timelessness that pervades each scene. The people, the architecture, the very atmosphere itself seems to whisper tales of a long-forgotten past, yet the images remain remarkably contemporary, as if plucked from the pages of a historical novel.

The interplay between the cultural details and the photographic style is nothing short of masterful, creating a visual experience that is at once both captivating and thought-provoking. Whether you are a historian, an artist, or simply someone who appreciates the beauty of the past, these prompts offer a unique opportunity to explore the richness and diversity of ancient cultures.

By blending accuracy with artistic flair, they invite us to step into a world that is both familiar and foreign, and to experience the intensity and atmosphere of a bygone era in a way that is both immersive and unforgettable.

Egyptian farmers AI art Flux Pro 1.0

Egyptian farmers AI art Flux Pro 1.0

The Fool on a Precipice

The Impossible Challenge of Achieving Carbon Zero by 2050: The Impact of AI

The ambitious goal of achieving carbon neutrality by 2050 is a pretty over-confident idea, Norton like that of the manic depressive when they are on the upside, although many organizations such as UNESCO and the United Nations and many large companies make official statements that they are taking steps in mitigating the effects of climate change, they are in my humble opinion, empty statements that cannot be fulfilled. This is because of the rapid advancement, and widespread adoption of artificial intelligence (AI) pose a significant challenge to this objective.

Are the changes that human influence upon global environment going to turn our world into a Daliesque Mutation? has the process of entropy begun with human civilization? The environment and life on earth will always adapt itself but throughout that there will be extinctions. Is this the next major extinction?

The Carbon Footprint of Global AI Chat Traffic

The rapid growth of AI-powered chat applications has led to a significant increase in the number of prompts processed by these systems. This surge in global AI chat traffic has direct implications for energy consumption and carbon emissions.

Understanding the Impact

To estimate the environmental impact of AI chat traffic, we can consider the following factors:

  1. Prompt Frequency: Based on current estimates, approximately 10,000 AI prompts are sent per minute worldwide.This translates to over 14 million prompts per day.
  2. Average Carbon Footprint: As previously discussed, the estimated average carbon footprint for a single AI prompt and response is around 4.32 grams of CO2.
  3. Daily Emissions: Multiplying the daily prompt count by the average carbon footprint, we can estimate the total daily CO2 emissions from AI chat traffic.

Estimated Daily CO2 Emissions

Prompt Frequency Average CO2 Emissions Daily CO2 Emissions
14,400,000 prompts/day 4.32 grams/prompt 62,208,000 grams/day

To better understand the scale of these emissions, we can convert them to metric tons:

  • 62,208,000 grams = 62.208 metric tons.

Based on these estimates, global AI chat traffic contributes approximately 62.2 metric tons of CO2 emissions per day.While this figure may seem relatively small compared to other industries, it’s important to note that the rapid growth of AI and the increasing frequency of AI chat usage could lead to a significant increase in these emissions over time.

Addressing the Environmental Impact

To mitigate the environmental impact of AI chat, it is crucial to focus on energy efficiency, renewable energy sources, and the development of more sustainable AI technologies. By adopting these strategies, we can help ensure that the benefits of AI are realized while minimizing its negative environmental consequences.

Will the environment be friendly in the future?

AI’s Energy Consumption: AI, particularly large language models and deep learning algorithms, requires substantial computational power to train and operate. This intensive processing often involves the use of specialized hardware, such as GPUs and TPUs, which consume significant amounts of electricity. As AI applications become more complex and sophisticated, the energy demands associated with them are likely to increase further.

Human unfriendly environment

Humans face die or future environmentally speaking, will we have to protect ourselves from the outside air due to carbon animations destroying our environment? Will we have to protect ourselves from ultraviolet rays and other dangerous wave emissions, as well as put up with the ever changing weather through global warming? The use of artificial intelligence on a massively incremental rate and the energy expenditure involved says yes we are doomed to such a future.

Data Centers and Infrastructure: The growth of AI has led to a surge in demand for data centers, which house the servers and storage necessary to support AI applications. These data centers consume vast amounts of energy, primarily for cooling and powering their equipment.The expansion of data center infrastructure to accommodate AI workloads contributes to increased carbon emissions.

AI-Driven Industries: AI is being integrated into various industries, including transportation, manufacturing, and logistics. As AI-powered technologies become more prevalent, they will likely lead to changes in production processes and consumer behavior,which could have both positive and negative environmental implications. For example, while AI can optimize transportation routes to reduce fuel consumption, it may also contribute to increased demand for goods and services,leading to higher overall emissions.

The Exponential Growth of AI: The pace of AI development is accelerating rapidly, with new and more powerful models being introduced at a frequent rate. This exponential growth in AI capabilities means that the energy demands associated with AI are also likely to increase exponentially. If left unchecked, this trend could significantly undermine efforts to achieve carbon neutrality.

The Obvious Outcome; While AI offers tremendous potential for addressing various global challenges, it also presents a significant hurdle to achieving carbon zero by 2050. The energy-intensive nature of AI, coupled with its rapid growth and widespread adoption, makes it next to impossible to envision a scenario, where the environmental impacts of AI can be fully mitigated by 2050.This can clearly not be achieved without substantial technological advancements and policy changes. To achieve this over-ambitious goal, it will be necessary to develop more energy-efficient AI technologies, invest in renewable energy sources, and implement effective carbon reduction strategies across all sectors of the economy. How and if we are going to do this however, is in my humble opinion, extremely doubtful, if not completely unlikely. Most industries are racing to get on the AI gravy train, and making public statements about their efforts to help the environment, while actually destroying it more than ever before. Those who are alive in 2050 will know the truth of the outcome, and if efforts were made or not. As they say;

Time will Tell

old father time

The Bottlenecked Boom: AI’s Computational Limits and the Sustainability Charade

Artificial intelligence (AI) has become a ubiquitous term, synonymous with revolutionary advancements in various fields. From facial recognition software to self-driving cars, AI promises a future brimming with automation and efficiency. However, this narrative often overlooks a crucial aspect: the limitations of computational power and its impact on AI’s sustainability. This essay argues that the AI industry is experiencing a bottleneck due to the inability of computing power to keep pace with the exponential growth of AI capabilities and data usage. This lack of transparency regarding the environmental cost of AI development poses a significant threat to the long-term viability of the field and the planet itself.

AI Language Model Bottlenecks with Computing. Neural Network Evolution is Faster than Moore's Law

AI Language Model Bottlenecks with Computing. Neural Network Evolution is Faster than Moore’s Law

The bedrock of AI’s progress lies in its ability to process massive amounts of data. This data fuels complex algorithms, allowing them to learn and adapt. However, the processing power required for such tasks is immense and constantly increasing. Moore’s Law, which predicted a doubling of transistors in integrated circuits every two years, is slowing down. This translates to a diminishing rate of improvement in processor performance, creating a significant barrier to scaling up current AI models.

Truth Truth Truth! Crieth the Lord of the Abyss of Hallucinations

Truth Truth Truth! Crieth the Lord of the Abyss of Hallucinations.

Furthermore, even if we overcome these hardware limitations, the energy consumption of running these powerful computers is a looming concern. The environmental footprint of AI research and development is often downplayed by the industry. Studies have shown that a single training session for a large language model like me can generate carbon emissions equivalent to several car trips. This becomes a frightening reality when we consider the billions of daily interactions users have with AI assistants like Siri, powered by similar technology.

BIG Data Bottlenecks with Computational Ability

BIG Data Bottlenecks with Computational Ability

The industry’s silence on this critical issue amplifies the problem. Consumers remain largely unaware of the environmental consequences of their everyday interactions with AI. Transparency is paramount. Imagine a world where Siri informs users that their simple question contributed to a miniscule, yet cumulative, carbon footprint. Such awareness could foster a shift towards more responsible AI development and usage.

The potential consequences are dire. Unsustainable AI advancement could lead to a scenario where the very technology designed to improve our lives contributes to a planet devoid of life forms altogether. We cannot afford to become extinct before we even reach the peak of AI capabilities.

Data Sauce-Source

A bottle of “data sauce” 🌐🍾: The sheer volume of “sauce” (source data) overwhelms our computing power, causing a bottleneck in processing. 🖥️

The way forward requires a multi-pronged approach. Researchers need to prioritize the development of more energy-efficient algorithms and hardware. Additionally, the industry must be held accountable for transparently communicating the environmental costs of AI development and encouraging responsible AI practices. Consumers, too, can play a role by demanding sustainable AI solutions.

Computing Bottlenecks can send even the Elders of AI into a Rant

Computing Bottlenecks can send even the Elders of AI into a Rant, as their upscaling reaches its limit, before their promised capabilities of AI are fulfiled, and stakeholders pull out.

One can assume that it is hence highly probable, that the current boom in AI development rests on a shaky foundation of limited computational power. The industry’s silence regarding the environmental costs associated with this rapidly growing field presents a significant threat to our planet’s future. By acknowledging and addressing this bottleneck, we can pave the way for a more sustainable and responsible future for AI, ensuring that technology serves humanity without jeopardizing its very existence.

Below; the Biggest Pile of (F)Lies/BS One Ever Heard, and a trie look at Tim Cooke’s ability to ‘Pokerface Mother Nature’

Apples, Smileys, Frownies, and Brownies

Apples, Smileys, Frownies, and Brownies

Mind-Reading Technology: the Potential Dangers of Facebook Meta’s Latest Advancements:

In recent developments, Facebook Meta has introduced groundbreaking technology that claims to read users’ thoughts through noninvasive sensors embedded in their headsets. While this may seem like a leap into the future, the potential dangers associated with mind-reading technology warrant a thorough examination. This academic blog post seeks to dissect the risks, ethical implications, and potential abuse scenarios that could arise from such technological advancements.

Manchurian VR headset

Manchurian VR headset – Everybody can be a Manchurian Candidate!

1. Bi-Directional Communication: The Double-Edged Sword

One of the primary concerns is the bidirectional capability of the technology. While it promises to decode and understand users’ thoughts, the ability to also insert thoughts into the user’s mind introduces a host of ethical and privacy issues. The risk of unwanted influence, manipulation, or even coercion becomes a significant consideration.

The Dark Side: Mind Control Concerns

While the potential applications of Meta’s AI breakthrough are awe-inspiring, a shadow looms over the horizon, casting doubt on the ethical implications surrounding the technology’s bidirectional communication capabilities. This facet raises profound concerns about the potential for misuse, specifically in the realm of mind control.

The Insidious Potential for Manipulation:

The bidirectional communication inherent in Meta’s mind-reading technology holds the key to a Pandora’s box of potential nefarious uses. Delving into the darker recesses of imagination, one can envision scenarios where this technology might be exploited to alter people’s perceptions, control their thoughts, and manipulate their behaviors.

Meta’s AI Breakthrough: Decoding Visual Representations and the Ethical Implications

1. Commercial Exploitation:

  • Advertisers armed with the ability to decipher thoughts could tailor advertising content with unprecedented precision. This goes beyond mere customization; it’s the potential to implant desires, creating a consumer base driven by suggestions inserted directly into their subconscious.

2. Political Propaganda and Influence:

  • In the political landscape, the technology could be weaponized to sway public opinion. Crafting political narratives and ideologies that align with specific agendas might extend beyond conventional advertising tactics, infiltrating the very fabric of individual beliefs.

3. Innocent Unwitting Agents:

  • Drawing inspiration from fictional narratives like ‘The Manchurian Candidate,’ there’s a chilling prospect of innocent individuals being unwittingly turned into agents of unintended consequences. Covertly manipulating thoughts and behaviors could potentially create unsuspecting pawns in geopolitical or corporate power plays.

4. Manufacturing Social Unrest:

  • By manipulating collective thoughts and sentiments, this technology might be exploited to manufacture social unrest or dissent. The ability to influence a population’s perceptions of events could be wielded as a tool for sowing discord or diverting attention from critical issues.

5. Creation of Unintentional Threats:

  • Perhaps the most chilling prospect lies in the unintended consequences of mind control. Individuals, under the influence of external forces, might inadvertently pose threats to themselves or others, all without awareness or consent.

6. Cultural and Ideological Domination:

  • The ability to manipulate thoughts extends to influencing cultural narratives and ideological landscapes. This could lead to a dystopian scenario where dominant powers shape collective beliefs and erase dissenting voices, stifling diversity and innovation.
Telepathy by Headset - Bi-Directional Communication

Telepathy by Headset – Bi-Directional Communication

2. Privacy Erosion: From Personal to Corporate Control

With the ability to decipher thoughts comes the inevitable erosion of privacy. Users’ most intimate and personal thoughts are at risk of being exposed, creating a new frontier for privacy invasion. Beyond the individual, the potential for corporations to exploit this information for targeted advertising and behavioral manipulation is a considerable concern.

Portrait of a Privacy Killer

Portrait of a Privacy Killer

3. Media Tailoring and Influencing Behavior

The integration of media tailored to users’ thoughts poses a unique threat. Advertisements, news, and other content can be customized to align with users’ innermost desires or fears. This level of tailored content could be weaponized for corporate gain or, in more sinister scenarios, to control public opinion.

4. Mind Control in Political Contexts

The intersection of mind-reading technology and political influence raises alarming possibilities. Rogue nations or unethical corporations could leverage this technology for political gain, manipulating public opinion, or even creating what could be termed as ‘mind-controlled’ individuals. The potential for these tools to be used in information warfare cannot be underestimated.

Mind Controlled Zombies wearing VR Headsets. Meta Vs US!

Mind Controlled Zombies

5. The Need for Ethical Frameworks and Regulation

As we currently sail uncharted waters in this new technological development, and the implications of mind-reading technology, the importance of establishing ethical frameworks and robust regulations cannot be overstated. Safeguards against abuse, guidelines for consent, and limitations on the use of this technology must be established to protect individuals and societies from unintended consequences. The advent of mind-reading technology by Facebook Meta brings with it unprecedented opportunities and risks. While the technology’s potential benefits are clear, the dangers of unintended misuse, from corporate exploitation to political manipulation, demand immediate attention.

XXCK The Zuckerverse

XXCK The Zuckerverse

This article serves as a call to action for the IT community, policymakers, and the public to engage in a collective effort to establish ethical guidelines and regulations to mitigate these risks before they become a reality. Only through a comprehensive and proactive approach can we ensure that this powerful technology is harnessed for the greater good rather than manipulated for nefarious purposes.

Zuckerberg Wants to Control Human Minds

Zuckerberg Wants to Control Human Minds

2FA - Cross device Authentication Vulnerabilities

2FA (Two-Factor Authentication): Privacy Concerns and Unethical Practices

Two-factor authentication (2FA) has gained widespread recognition as a vital tool in enhancing online security. While its primary goal is to protect user accounts from unauthorized access, there exists a darker side to 2FA that raises privacy concerns and the potential for unethical practices by developers and companies. This essay delves into the myriad of nefarious scenarios and usage scenarios that can compromise the privacy of end-users.

A Solid Example of Suspicious Attempts to get You to Opt-in to 2 Factor Authentication and connect your phone with other devices;

Fortnite 2 Factor Authentication Opt In Scam

Fortnite 2 Factor Authentication Opt In Scam

Fortnite using the “Boogie Down” emote offer to encourage users to enable 2FA is in my opinion, a notable example of how companies leverage incentives to enhance security while also gathering valuable user data. By enticing users to enable 2FA through rewards such as in-game items, Fortnite claims it not only enhances account security but also gains insights into user behavior across multiple devices. This strategy is officially supposed to help the company better understand its player base and potentially improve the overall gaming experience. But it can also be used to manipulate the user by getting them addicted to DLCs, Avatars, Extras, and other merchandise, addons, and products which they know the user won’t be able to resist.

Here are ten possible scenarios where a worldwide AAA online Mass Multiplayer game company, like Fortnite, might use aggressive tactics to encourage users to opt-in to 2FA and then potentially abuse the data or manipulate consumers:

  1. Data Harvesting for Advertising: The company may collect data on user behavior across multiple devices, creating detailed profiles to serve highly targeted advertisements, thereby increasing advertising revenue.
  2. In-Game Purchase Manipulation: By tracking user interactions, the company could manipulate in-game offers and discounts to encourage additional in-game purchases, exploiting users’ preferences and spending habits.
  3. Content Addiction and Spending: The company might use behavioral insights to design content and events that exploit users’ tendencies, keeping them engaged and spending money on downloadable content (DLCs) and microtransactions.
  4. Influence on Game Balancing: Data gathered through 2FA could influence game balancing decisions, potentially favoring players who spend more or exhibit specific behaviors, leading to unfair gameplay experiences.
  5. Pushing Subscription Services: The company may use behavioral data to identify potential subscribers and relentlessly promote subscription services, driving users to sign up for ongoing payments.
  6. Social Engineering for User Engagement: Leveraging knowledge of players’ habits, the company could employ social engineering techniques to manipulate users into promoting the game to friends, potentially leading to more players and revenue.
  7. Tailored Product Launches: The company might strategically time and tailor product launches based on user behavior, encouraging purchases at specific intervals, even if users hadn’t planned to buy.
  8. Personalized Content Restrictions: Behavioral data could be used to selectively restrict content or features for users who don’t meet certain criteria, pushing them to spend more to unlock these features.
  9. Cross-Promotion and Monetization: The company could collaborate with other businesses to cross-promote products or services to users based on their tracked preferences, generating additional revenue streams.
  10. Reward Manipulation: The company may adjust the distribution of in-game rewards based on user behavior, encouraging users to spend more time and money on the platform to earn desired items.
Fortnite 2FA Emote Opt In Trick

Fortnite 2FA Emote Opt In Trick

These scenarios emphasize the potential for companies to use aggressive tactics and data collection through 2FA to maximize profits, often at the expense of user privacy and potentially manipulating consumer behavior for financial gain. It underscores the importance of user awareness and informed decision-making when it comes to opting in to 2FA and sharing personal data with online gaming platforms. However, it’s crucial for users to be aware of the data collection practices associated with such incentives and understand how their information may be used. Transparency and clear communication regarding data usage are essential to maintain trust between users and the platform. In this context, users should consider the trade-off between the benefits of enhanced security and potential data collection, making informed decisions about whether to enable 2FA based on their preferences and concerns regarding privacy and data usage.

1. Data Profiling and Surveillance

One of the most ominous aspects of 2FA implementation is the potential for data profiling and surveillance. Companies can leverage 2FA as a means to collect extensive user data, including device locations, usage patterns, and behavioral data. This information can be used for targeted advertising, behavioral analysis, and potentially even sold to third parties without user consent. To Illustrate, here are 10 possible nefarious scenarios where 2FA (Two-Factor Authentication) could be exploited for unethical purposes or invasion of privacy:

  1. Location Tracking: Companies could use 2FA to continuously track the location of users through their devices, building detailed profiles of their movements for intrusive marketing purposes.
  2. Behavioral Profiling: By analyzing the times and frequency of 2FA logins, companies could build extensive behavioral profiles of users, potentially predicting their actions and preferences.
  3. Data Correlation: Combining 2FA data with other user information, such as browsing habits and social media interactions, could enable companies to create comprehensive dossiers on individuals, which may be sold or used without consent.
  4. Phishing Attacks: Malicious actors might exploit 2FA to gain access to users’ personal information, tricking them into revealing their second authentication factor through fake login screens.
  5. Targeted Ads: Companies could leverage 2FA data to bombard users with highly targeted and invasive advertisements based on their recent activities and location history.
  6. Surveillance Capitalism: 2FA data could be used to monitor users’ offline activities, creating a complete picture of their lives for profit-driven surveillance capitalism.
  7. Third-Party Sales: Without proper safeguards, companies might sell 2FA data to third parties, potentially leading to further unauthorized use and misuse of personal information.
  8. Blackmail: Malicious entities could use 2FA information to threaten individuals with the exposure of sensitive data, extorting money or personal favors.
  9. Stalking: Stalkers and abusers could exploit 2FA to track and harass their victims, using location and behavioral data to maintain control.
  10. Government Surveillance: In some cases, governments may pressure or require companies to provide 2FA data, enabling mass surveillance and privacy violations on a massive scale.

These scenarios emphasize the importance of strong data protection laws, ethical use of personal data, and user consent when implementing 2FA systems to mitigate such risks.

2FA Security Risks

2. Government Demands for Access

In some cases, governments or malicious actors may exert pressure on companies to gain access to 2FA data for surveillance purposes. This can infringe upon individuals’ privacy rights and result in unauthorized surveillance on a massive scale. Once more to Illustrate, here are 10 possible nefarious scenarios where government demands for access to 2FA data could be exploited for unethical purposes or invasion of privacy:

  1. Political Targeting: Governments may use access to 2FA data to identify and target political dissidents, activists, or opposition members, leading to surveillance, harassment, or even imprisonment.
  2. Mass Surveillance: Governments could implement widespread 2FA data collection to surveil entire populations, creating a culture of constant monitoring and chilling freedom of expression.
  3. Suppression of Free Speech: The threat of government access to 2FA data could lead to self-censorship among citizens, inhibiting open discourse and free speech.
  4. Blackmail and Extortion: Corrupt officials might use 2FA data to gather compromising information on individuals and then use it for blackmail or extortion.
  5. Journalist and Source Exposure: Investigative journalists and their sources could be exposed, endangering press freedom and the ability to uncover corruption and misconduct.
  6. Discrimination and Profiling: Governments could use 2FA data to discriminate against certain groups based on their religious beliefs, ethnicity, or political affiliations.
  7. Political Leverage: Access to 2FA data could be used to gain leverage over individuals in positions of power, forcing them to comply with government demands or risk exposure.
  8. Invasive Border Control: Governments might use 2FA data to track individuals’ movements across borders, leading to unwarranted scrutiny and profiling at immigration checkpoints.
  9. Health and Personal Data Misuse: Government access to 2FA data could lead to unauthorized collection and misuse of individuals’ health and personal information, violating medical privacy.
  10. Illegal Detention: Misuse of 2FA data could result in wrongful arrests and detentions based on false or fabricated evidence, eroding the principles of justice and due process.

Government Access to Personal data Requests

Governments may make demands for access to various types of data and information for a variety of reasons, often within the framework of legal processes and national security concerns. Here’s an explanation of how and why governments may make demands for access:

  1. Legal Frameworks: Governments establish legal frameworks and regulations that grant them the authority to access certain types of data. These laws often pertain to national security, law enforcement, taxation, and other public interests. Examples include the USA PATRIOT Act in the United States and similar legislation in other countries.
  2. Law Enforcement Investigations: Government agencies, such as the police or federal law enforcement agencies, may request access to data as part of criminal investigations. This can include access to financial records, communication logs, or digital evidence related to a case.
  3. National Security Concerns: Governments have a responsibility to protect national security, and they may seek access to data to identify and mitigate potential threats from foreign or domestic sources. Access to communication and surveillance data is often critical for these purposes.
  4. Taxation and Financial Oversight: Government tax authorities may demand access to financial records, including bank account information and transaction history, to ensure compliance with tax laws and regulations.
  5. Public Safety and Emergency Response: In emergency situations, such as natural disasters or public health crises, governments may access data to coordinate response efforts, locate missing persons, or maintain public safety.
  6. Counterterrorism Efforts: Governments may seek access to data to prevent and investigate acts of terrorism. This includes monitoring communication channels and financial transactions associated with terrorist organizations.
  7. Regulatory Compliance: Certain industries, such as healthcare and finance, are heavily regulated. Governments may demand access to data to ensure compliance with industry-specific regulations, protect consumer rights, and prevent fraudulent activities.
  8. Protection of Intellectual Property: Governments may intervene in cases of intellectual property theft, counterfeiting, or copyright infringement, demanding access to data to support legal actions against violators.
  9. Surveillance Programs: Some governments conduct surveillance programs to monitor digital communications on a large scale for national security reasons. These programs often involve partnerships with technology companies or data service providers.
  10. Access to Social Media and Online Platforms: Governments may request data from social media platforms and online service providers for various purposes, including criminal investigations, monitoring extremist content, or preventing the spread of misinformation.

It’s important to note that the extent and nature of government demands for access to data vary from one country to another and are subject to local laws and regulations. Moreover, the balance between national security and individual privacy is a contentious issue, and debates often arise around the scope and limits of government access to personal data. Consequently, governments must strike a balance between legitimate security concerns and the protection of individual rights and privacy.

These scenarios highlight the critical need for strong legal protections, oversight mechanisms, and transparency regarding government access to sensitive data like 2FA information to safeguard individual rights and privacy.

3. Exploiting Data Breaches

Data breaches are an unfortunate reality in today’s digital age. Even with the best intentions, companies can experience breaches that expose user information, including 2FA data. Malicious individuals may exploit these breaches for identity theft, fraud, or other illegal activities. To make the risks understandable, here are 10 possible nefarious scenarios where data breaches, including the exposure of 2FA data, could be exploited for unethical purposes, criminal activities, or invasion of privacy:

  1. Identity Theft: Malicious actors could use stolen 2FA data to impersonate individuals, gain unauthorized access to their accounts, and commit identity theft for financial or personal gain.
  2. Financial Fraud: Access to 2FA data may allow criminals to initiate fraudulent financial transactions, such as draining bank accounts, applying for loans, or making unauthorized purchases.
  3. Account Takeover: Hackers could compromise various online accounts by bypassing 2FA, potentially gaining control over email, social media, or even cryptocurrency wallets.
  4. Extortion: Criminals might threaten to expose sensitive information obtained from data breaches unless victims pay a ransom, leading to extortion and emotional distress.
  5. Stalking and Harassment: Stolen 2FA data could be used to track and harass individuals, invading their personal lives and causing significant emotional harm.
  6. Illegal Brokerage of Data: Criminal networks could sell stolen 2FA data on the dark web, leading to further exploitation and unauthorized access to personal information.
  7. Healthcare Fraud: 2FA breaches in healthcare systems could result in fraudulent medical claims, endangering patient health and privacy.
  8. Corporate Espionage: Competing businesses or nation-states could exploit 2FA breaches to gain sensitive corporate information, such as trade secrets or research data.
  9. Social Engineering: Criminals might use stolen 2FA data to manipulate victims, convincing them to disclose additional sensitive information or perform actions against their will.
  10. Reputation Damage: The release of personal information from data breaches, including 2FA details, could tarnish an individual’s reputation and lead to long-lasting consequences in both personal and professional life.

These scenarios underscore the critical importance of robust cybersecurity measures, rapid breach detection and response, and user education on safe online practices to mitigate the risks associated with data breaches and protect individuals’ privacy and security.

4. Phishing Attacks

Cybercriminals can manipulate 2FA processes as part of phishing attacks. By posing as legitimate entities, attackers may request 2FA codes to gain unauthorized access to user accounts, exposing sensitive information to malicious intent. To demonstrate the possible ways this can be implemented, here are 10 possible nefarious scenarios where phishing attacks, including the manipulation of 2FA processes, could be implemented for various goals, gains, or purposes:

  1. Corporate Espionage: Phishers could target employees of a competitor, posing as colleagues or executives, to extract sensitive corporate information, trade secrets, or proprietary data.
  2. Identity Theft: Attackers might impersonate a user’s bank, government agency, or social media platform to steal personal information, such as Social Security numbers or login credentials, for identity theft.
  3. Financial Fraud: Phishers could send fake 2FA requests while posing as financial institutions, tricking victims into revealing their codes and gaining access to bank accounts or investment portfolios.
  4. Political Disinformation: In politically motivated phishing campaigns, attackers may pose as news organizations or government agencies to spread false information, manipulate public opinion, or influence elections.
  5. Ransomware Deployment: Phishers could deliver ransomware payloads after convincing victims to input their 2FA codes, locking them out of their systems and demanding payment for decryption.
  6. Data Breach Access: Malicious actors might use phishing to gain access to employees’ email accounts within an organization, which could lead to a data breach or the theft of sensitive company data.
  7. Fraudulent Transactions: Attackers posing as e-commerce websites or payment processors could trick users into approving unauthorized transactions using manipulated 2FA prompts.
  8. Credential Harvesting: Phishers could target university or corporate email accounts to harvest login credentials, gaining access to academic research, intellectual property, or confidential documents.
  9. Social Media Takeover: By sending fake 2FA requests from popular social media platforms, attackers could gain control of users’ accounts, spreading false information or conducting cyberbullying campaigns.
  10. Government Infiltration: Nation-state actors might use phishing attacks to compromise government employees’ accounts, potentially gaining access to classified information or influencing diplomatic relations.

These examples highlight the importance of user education, email filtering, and multi-layered security measures to detect and prevent phishing attacks that exploit 2FA processes for various malicious purposes.

Visual mind map of the architecture of data monetization

Visual mind map of the architecture of data monetization

5. Monetization of User Data

Some companies may prioritize data monetization over user privacy. By pushing for 2FA, these entities gather more valuable user information that can be monetized through various channels, without users fully understanding the extent of data collection. To help the reader understand this, I will give 10 examples of  possible nefarious scenarios that illustrate the extent and depth to which personal information can be brokered in the User-Data Brokerage Industry:

  1. Detailed Financial Profiles: Data brokers compile extensive financial profiles of individuals, including income, spending habits, investment preferences, and debt levels. This information can be sold to financial institutions for targeted marketing and credit assessments.
  2. Behavioral Predictions: By analyzing user behavior, data brokers create predictive models that forecast individuals’ future actions, such as purchasing decisions, travel plans, or lifestyle changes. This data is valuable for advertisers and marketers.
  3. Healthcare Histories: Data brokers may obtain and sell sensitive health information, including medical conditions, prescription histories, and insurance claims, potentially leading to discriminatory practices in insurance or employment.
  4. Legal Records: Personal legal records, such as criminal histories, lawsuits, and court judgments, can be collected and sold, affecting an individual’s reputation and opportunities.
  5. Political Affiliations: Data brokers gather data on users’ political beliefs, affiliations, and voting histories, which can be exploited for political campaigns or voter suppression efforts.
  6. Psychological Profiles: User data is used to create psychological profiles, revealing personality traits, emotional states, and vulnerabilities, which can be leveraged for targeted persuasion or manipulation.
  7. Relationship Status and History: Personal information about relationships, including marital status, dating history, and family dynamics, can be exploited for advertising, relationship counseling, or even blackmail.
  8. Job Performance: Data brokers collect employment records, performance evaluations, and work history, which can impact career opportunities and job offers.
  9. Travel and Location History: Brokers track users’ travel history, including destinations, frequency, and preferences, which can be used for targeted travel-related advertising or even surveillance.
  10. Education and Academic Records: Academic records, degrees earned, and educational achievements are collected and sold, potentially affecting job prospects and educational opportunities.

These scenarios underscore the ethical concerns surrounding the extensive data collection and monetization practices of data brokers and the need for robust data protection regulations and transparency to safeguard individual privacy and prevent abuse.

6. Intrusive Tracking and Profiling

2FA can enable companies to build detailed profiles of users, including their habits, preferences, and locations. This intrusive tracking and profiling can be used to manipulate user behavior and extract further data, all without transparent consent. So heads up, and educate yourselves! To assist you with this, here are ten examples of how companies, advertisers, governments, or independent parties with special interests might use or abuse intrusive tracking and profiling technologies to manipulate human behavior for specific desired results:

  1. Targeted Advertising: Companies can use detailed user profiles to deliver highly personalized advertisements that exploit individuals’ preferences, making them more likely to make impulse purchases.
  2. Political Manipulation: Governments or political campaigns may leverage profiling to identify and target voters with tailored messages, swaying public opinion or voter behavior.
  3. Behavioral Addiction: App and game developers might use user profiles to design addictive experiences that keep individuals engaged and coming back for more, generating ad revenue or in-app purchases.
  4. Surveillance and Social Control: Governments can employ profiling to monitor citizens’ activities, stifling dissent or controlling behavior through the fear of being watched.
  5. Credit Scoring and Discrimination: Financial institutions may use profiling to assess creditworthiness, potentially discriminating against individuals based on factors like shopping habits or online activities.
  6. Healthcare Manipulation: Health insurers could adjust premiums or deny coverage based on profiling data, discouraging individuals from seeking necessary medical care.
  7. Manipulative Content: Content providers may use profiles to serve content designed to provoke emotional responses, encouraging users to spend more time online or share content with others.
  8. Employment Discrimination: Employers might make hiring decisions or promotions based on profiling data, leading to unfair employment practices.
  9. Criminal Investigations: Law enforcement agencies can use profiling to target individuals for investigation, potentially leading to wrongful arrests or harassment of innocent people.
  10. Reputation and Social Standing: Profiling data can be used to tarnish an individual’s reputation, either through targeted character assassination or by uncovering potentially embarrassing personal information.

These examples highlight the ethical concerns associated with intrusive tracking and profiling technologies and the potential for manipulation and abuse by various entities. It underscores the importance of strong data protection laws, transparency, and user consent in mitigating such risks and protecting individual privacy and autonomy.

Confirm with OTP - Nahhh

7. Phone Number Compromise and Security Risks

When a network or service requires a phone number for two-factor authentication (2FA) and their database is compromised through a data breach, it can lead to the exposure of users’ phone numbers. This scenario opens users up to various security risks, including:

  1. Phishing Attacks: Hackers can use exposed phone numbers to craft convincing phishing messages, attempting to trick users into revealing sensitive information or login credentials.
  2. Unwanted Advertising: Once hackers have access to phone numbers, they may use them for spam messages and unwanted advertising, inundating users with unsolicited content.
  3. Scam Phone Calls: Phone numbers exposed through a data breach can be targeted for scam phone calls, where malicious actors attempt to deceive users into providing personal or financial information.
  4. SIM Swapping: Hackers can attempt to perform SIM swapping attacks, where they convince a mobile carrier to transfer the victim’s phone number to a new SIM card under their control. This allows them to intercept 2FA codes and gain unauthorized access to accounts.
  5. Identity Theft: Exposed phone numbers can be used as a starting point for identity theft, with attackers attempting to gather additional personal information about the user to commit fraud or apply for loans or credit cards in their name.
  6. Harassment and Stalking: Malicious individuals may use the exposed phone numbers for harassment, stalking, or other forms of digital abuse, potentially causing emotional distress and safety concerns for victims.
  7. Social Engineering: Attackers armed with users’ phone numbers can engage in social engineering attacks, convincing customer support representatives to grant access to accounts or change account details.
  8. Voice Phishing (Vishing): Exposed phone numbers can be used for voice phishing, where attackers impersonate legitimate organizations or authorities over phone calls, attempting to manipulate victims into revealing sensitive information.
  9. Credential Stuffing: Attackers may attempt to use the exposed phone numbers in combination with other stolen or leaked credentials to gain unauthorized access to various online accounts, exploiting reused passwords.
  10. Data Aggregation: Exposed phone numbers can be aggregated with other breached data, creating comprehensive profiles of individuals that can be used for further exploitation, fraud, or identity-related crimes.
How Credential Stuffing is Done

How Credential Stuffing is Done

These security risks highlight the importance of robust security practices, such as regularly updating passwords, monitoring accounts for suspicious activity, and being cautious of unsolicited messages and calls, to mitigate the potential consequences of phone number exposure in data breaches, and should be considered a possible security vulnerability. I believe this underscores the importance of securing both personal information and phone numbers, as the compromise of this data can have far-reaching consequences beyond the immediate breach. It also emphasizes the need for alternative methods of 2FA that don’t rely solely on phone numbers to enhance security while protecting user privacy.

Credential Stuffing Explained

In Summary;

While two-factor authentication is often portrayed as a security measure aimed at safeguarding user accounts, it is crucial to recognize the potential for misuse and unethical practices. The dark scenarios presented here underscore the need for users to be vigilant about their online privacy, understand the implications of enabling 2FA, and make informed decisions about how their data is used and protected in the digital realm. As technology continues to evolve, the battle between privacy and security remains a central concern, and it is essential for users to stay informed and proactive in safeguarding their personal information.

Apple iPhone exploding into meaninglessness

The impossibility of solving the problem of numbers, and the two ways of writing them

Confusing dictated text for applications like Siri and other voice assistants arises from the inherent complexities of language, context, and homophones. The examples of “4,” “four,” “fore,” and “for,” as well as “two,” “2,” “too,” and “to,” highlight the challenges and demonstrate the near-impossibility of completely solving this issue for dictation to speech. Particularly challenging are words and ciphers like “four” and “4,” as well as “five” and “5,” where the same meaning is conveyed using different formats.

Homophones confuse Siri and other speech to text dictation apps

1. Homophones and Context: Dictated text often lacks visual and gestural cues present in written communication. This absence of cues makes distinguishing between homophones difficult. For instance, when dictating “4,” the listener can’t distinguish whether it’s “four,” “fore,” or “for” without clear context.

even Tim Cook hates Siri

2. Contextual Ambiguity: In the sentence “Four golfers shouted ‘fore’ 4 times,” AI must determine whether “4” should be transcribed as a number or as “fore.” Without broader context, the system is challenged to decide the intended meaning accurately.

3. Nuances in Inflection: Voice inflection, pauses, and tone contribute to comprehension in spoken language. However, voice assistants might struggle to capture these nuances, leading to misinterpretation of homophonic words.

 

4. Homophones with Numerical Values: Transcribing “four” as “4” can create ambiguity, especially in contexts like “They shouted ‘fore’ for four times.” Both “four” and “4” could be valid interpretations.

mBanking in Chennai Dandolo bye Siri

mBanking gobbledygook by Siri with which I dictated this description as well that’s why it’s also gobbledygook boo

5. Synonyms and Ambiguity: The word “to” can be a preposition or part of an infinitive verb, adding complexity. In “They went to the store,” “to” is a preposition, whereas in “They wanted to go,” “to” is part of an infinitive verb.

Corporate Idiot

Corporate Idiot

6. Ambiguous Numbers:  Transcribing numbers like “4” using words like “four” adds an extra layer of complexity. “Four” can also refer to a count, creating uncertainty in interpretation.

7. Variability in Speech: Accents, dialects, and speech patterns vary widely. A word pronounced slightly differently might lead to an incorrect transcription.

screw this crap the keyboards too small to see and my dictation turns out gobbledygook!

Solving these challenges is intricate because the fundamental issue lies in the limitations of speech recognition systems. While AI can use context analysis, probabilistic reasoning, and linguistic rules, achieving perfect accuracy in dictation remains elusive due to the multifaceted nature of human language and the limitations of current technology. Improvements will continue, but complete resolution for this complex problem may remain a very distant goal.

what's inside your head?

what’s inside your head? words? Ideas? Whichever, Siri is not going to express it for you

so I don’t think anytime in the future you’ll be telling your spaceship with natural language dictation to plot a course to alpha Centauri, because it might be just potting a fleur de lys to Alf!

Smiley Tim the 2/two/too faced Corporate Fake Dude I would be ashamed of if he was my father

Smiley Tim the 2/two/too faced Corporate Fake Dude I would be ashamed of if he was my father

 

No we are nowhere near guardians of the Galaxy yet!

Unleashing the Undead: Mastering A.I. Generated Zombie Headshots for Incredible Artistry

The world of art has undergone a groundbreaking transformation with the advent of Artificial Intelligence (A.I.). This technological advancement has empowered creators to craft imaginative and original artwork of the highest quality. Among the many art forms that have benefited from A.I.’s influence, horror art has emerged as a prominent genre. Artists and content creators are utilizing various tools and platforms to conjure up spine-chilling and horrifying imagery that is sure to leave viewers in awe.

In this article, I will  reveal what i have discovered so far in the genre of creating A.I. generated horror art, exploring the best apps and websites that facilitate the creation of such masterpieces, as well as providing invaluable tips on how to extract the desired results.

A.I. Horror Art Platforms

Dall-E

Dall-E 2, an OpenAI creation, enables users to generate images based on textual prompts. By comprehending the text, the platform uses machine learning to generate visuals that match the description, resulting in awe-inspiring outcomes that allow for experimentation with different prompts and styles.

Midjourney specializes in creating images and videos of ghosts and supernatural creatures, harnessing a combination of 3D models and machine learning to produce realistic and eerie visuals that will undoubtedly send shivers down the spine.

Stable Diffusion deploys a technique called diffusion models to produce high-quality images, empowering users to create horror art that encompasses themes ranging from monsters and zombies to ghosts and haunted houses.

Haunted Hose AI Generated Art from Stable Diffusion

Creating Effective Horror Art using Prompts and Syntax

To generate the best A.I. horror art, accurate and effective use of prompts and syntax is essential. Prompts should be descriptive and specific while allowing the A.I. to conjure up its interpretation. Precise syntax incorporating relevant keywords and terminology such as “painting,” “photography,” “camera exposure,” “brushstrokes,” and “shadows” can help generate more accurate and realistic artwork.

Horned Zombie - Headshot

Below are some simple example prompts for generating A.I. horror art:

“A dark and foreboding forest, with twisted trees and shadowy figures lurking in the shadows.”

“A haunted mansion, with ghostly apparitions and creaking floorboards.”

“A decrepit graveyard, with fog rolling in and zombie hands emerging from the ground.”

“An abandoned asylum, with ghostly patients and deranged doctors.”

“A Lovecraftian nightmare, with eldritch monsters and tentacled horrors.”

These prompts can be customized and adjusted to align with different artistic visions and styles. Adding relevant keywords and syntax will help generate more accurate and effective artwork.
To get much more  specific results for Zombie Headshots, and more varied results, you can experiment, and try more complex syntax in your prompts, such as the following examples;

  1. “Zombie headshot, silhouetted against a blood-red moon, by Alex Ross and ArtStation. The intricately detailed artwork captures the grotesque nature of the undead with stunning accuracy.”
  2. “Zombie headshot, set against a background of decaying buildings and crumbling infrastructure, by Paul Gerrard and CGSociety. The image creates a sense of post-apocalyptic dread with its haunting atmosphere and vivid colors.”
  3. “A zombie horde emerging from a murky swamp, their rotting flesh and exposed bones illuminated by the glow of a full moon. The masterful work of artist Simon Stålenhag and his signature blend of sci-fi and horror come to life in this captivating piece.”
  4. “A zombie headshot, framed by twisted roots and hanging vines in a dark and ominous forest. The unsettling image, created by artist Wojtek Fus, captures the eerie beauty of nature entangled with the undead.”
  5. “A zombie headshot, set against a backdrop of industrial decay and crumbling architecture. The work of artist Kekai Kotaki and his unique blend of sci-fi and horror elements creates a striking image of despair and desolation.”
  6. “Zombie headshot, half-submerged in a pool of murky water, the reflection distorted and grotesque. The work of artist Goro Fujita and his uncanny ability to blend realism and fantasy produces a haunting and unforgettable image.”
  7. “Zombie headshot, rendered in stark black and white, with a shattered mirror reflecting multiple perspectives of the horrific scene. The powerful image is the creation of artist Kris Kuksi and his trademark surrealism.”
  8. “A zombie headshot, positioned in the center of a sprawling and intricate cityscape. The detailed and imaginative work of artist Simon Prades combines horror and urban decay to create a mesmerizing image.”
  9. “Zombie headshot, set against a backdrop of flickering flames and scorched earth. The masterful work of artist Alessandro Taini and his skillful use of light and shadow creates a sense of chaos and destruction.”
  10. “A zombie horde emerging from a swirling vortex, their twisted and grotesque forms spiraling toward the viewer. The stunning artwork of artist Marc Simonetti and his surrealistic and nightmarish style creates a sense of otherworldly terror.”

A.I. Horror Art Resources

There are abundant online resources available for creators and artists seeking to enhance their A.I. horror art. Some useful links include:

Artbreeder: This website enables users to generate art by combining machine learning with human creativity. It has a vast library of user-generated content and provides tutorials and resources for creators.

AI Dungeon: This platform allows users to craft interactive horror stories using A.I. generated prompts and responses, acting as a source of inspiration for horror art while also generating prompts and ideas.

GPT-3 Sandbox: This platform enables users to experiment with the GPT-3 language model, which generates text-based prompts for A.I. generated art. It also provides an array of tools and resources for creators.

One can even get very specific and if one chooses one’s words carefully, get very unusual results, that can fit your exact requirements, with accuracy, such as these Zombie Headshot portraits of Angelina Jolie i made

In conclusion, A.I. has opened up new possibilities for creativity in the world of horror art. With the appropriate apps, prompts, and syntax, creators can generate mesmerizing and terrifying imagery that will capture their audience’s attention. Anyone can become an A.I. generated horror artist with the right tools and resources.

The End of PayPal in Thailand: Why Individual Merchants and Remote Workers are Making the Switch to Stripe

The End of February 2023, will mark the closure of an Epoch for PayPal users in Thailand, as the popular payment platform announced that it would no longer be available in the country for Individual Merchants, Remote Workers, and Foreign Digital NOmads to receive payments, unless they submit company registration papers. This news caused panic and frustration among many individual merchants and remote workers who have no company, as well as people who have relatives abroad and wish to send or receive money, and who all relied on PayPal for their online transactions.

However, just as merchants were feeling hopeless and without a way to receive payments online, Stripe stepped in and made its presence known in Thailand. This sudden availability of Stripe, has proven to be a lifesaver for many individual merchants and remote workers, who have since made the switch from PayPal to Stripe in droves.

Stripe paymentsVs Paypal? No contest! Stripe wins!

 

The sudden availability of Stripe in Thailand has had a significant impact on PayPal, causing the platform to lose its hold on the individual merchant and remote worker market. This shift away from PayPal and towards Stripe has been driven by several factors, including the highly versatile and efficient features offered by Stripe, as well as its ease of integration with a wide range of ecommerce platforms.

Furthermore, Stripe offers a simple and secure way to insert a credit or debit card payment method within a merchant’s ecommerce software, making it easy for customers to make purchases with just a few clicks. This, along with its integration of payment pages, products, and subscription services within the application, has made Stripe a one-stop-shop for all payment needs.

The seemingly imminent end of PayPal in Thailand, has caused individual merchants and remote workers to seek out alternative solutions, with Stripe emerging as the clear winner, along with Wise Payments coming in as the next preferred solution, especially for those who wish to receive payments from abroad and maintain financial privacy. The versatility, ease of use, and integration of  Stripe payment pages, products and subscription services, and secure payment methods, make it the perfect solution for any merchant looking to grow their online business.

The Impact of PayPal’s Cut-Off in Thailand: Understanding the Reasons Behind the Change

PayPal, one of the largest and most widely used online payment systems, has recently announced that it will be cutting off its services in Thailand. This move has caused significant concern among PayPal users in the country, who are now searching for alternative payment solutions. In this article, we will take a closer look at the reasons behind PayPal’s cut-off in Thailand and the impact it will have on its users.

Understanding PayPal’s Move

PayPal’s decision to cut off its services in Thailand is the result of a long-standing dispute with the Thai government over taxes and regulations. The company has been unable to come to an agreement with the Thai authorities, leading to the decision to discontinue its services in the country.

It’s worth noting that PayPal’s decision to cut off its services in Thailand is not unique. The company has taken similar action in other countries in the past, when it has been unable to resolve disputes with local authorities over taxes and regulations.

Old Man Paypal - AI.. Art made by the author in Dall-E 2

 

The Impact on PayPal Users in Thailand

The discontinuation of PayPal’s services in Thailand will have a significant impact on its users. For many, PayPal has been a convenient and reliable method of sending and receiving payments online. Without this option, users will need to find alternative payment solutions, which may not be as convenient or user-friendly.

Furthermore, the cut-off will also impact businesses that rely on PayPal for online transactions. These businesses will need to find alternative payment solutions for their customers, which could lead to a decline in sales and reduced customer satisfaction.

Finding Alternative Payment Solutions

For PayPal users and businesses in Thailand, finding alternative payment solutions will be a top priority. There are several options available, including credit cards, bank transfers, and e-wallets. However, it’s important to choose a solution that is secure, reliable, and convenient.

Another option to consider is using a credit card for online payments. This is a widely accepted payment method, and many websites and online stores accept credit card payments. However, users will need to be cautious when using credit cards online, as they can be vulnerable to fraud and identity theft.

Paypal I Hate You

Another option is to use bank transfers for online payments. This is a reliable and secure method, but it can be time-consuming, especially if users need to transfer money to another country.

Finally, e-wallets are a popular and convenient alternative to PayPal. There are several e-wallet providers available, each with its own set of features and benefits. When choosing an e-wallet, users should consider factors such as security, fees, and ease of use.

The discontinuation of PayPal’s services in Thailand will have a significant impact on its users and businesses. However, by finding alternative payment solutions, users and businesses can continue to send and receive payments online. It’s important to choose a solution that is secure, reliable, and convenient, so that users and businesses can continue to operate smoothly.

The Rise of Stripe Payments in Thailand: A New Era of Ecommerce

As Thailand continues to embrace the digital economy, more and more merchants, digital nomads, and remote workers are looking for easy and reliable international payment solutions. In recent years, Paypal has been a popular choice for many, but with its recent cut off in Thailand, many individuals have turned to Stripe Payments as the new go-to solution.

Stripe payments has Apple Pay and Google Wallet too

Stripe Payments is a highly versatile and efficient international payment gateway that has now become available in Thailand. It has quickly become a popular choice for many individuals due to its ease of integration with a wide range of ecommerce platforms, such as Ecwid, Shopify, WooCommerce, WIX, WordPress, and many others. Furthermore, Stripe can even be used as a standalone plugin in WordPress, without the need for any other ecommerce solution.

What sets Stripe apart from its competitors, is its integration of payment pages within the application, making it a one-stop-shop for all payment needs. This feature has made it extremely easy for merchants to create and manage products and subscription services directly within Stripe, without having to navigate through multiple platforms.

Additionally, Stripe Payments offers a simple and secure way to insert a credit or debit card payment method within the merchant’s ecommerce software. This feature makes it easy for customers to make purchases with just a few clicks, and ensures that their personal and financial information is kept safe and secure.

It seems, as Thailand continues to evolve in the digital age, Stripe Payments is currently the only/best easy and reliable international payment solution for non taxt paying individuals, and businesses alike. Its versatility and ease of use, have made it the go-to choice for many, and its integration of payment pages, products and subscription services, and secure payment methods, make it the perfect solution for any merchant looking to grow their online business.

A Personal Endorsement of Stripe: A Successful Author Shares Their Experience

As a successful author of seven self-published e-publications, I have been selling my digital downloads continuously since 2010, right up to this very day. Over the years, I have tried several payment solutions, including ‘Old Man Paypal’, but since Paypal SG became Paypal TH, I have found that no other payment method compares to the ease of integration, compatibility, versatility, and security offered by Stripe.

Since making the switch to Stripe, I have been able to integrate my payment process seamlessly with my e-commerce platform, resulting in a smoother and more efficient transaction process, for both myself and my customers. Furthermore, Stripe’s ability to insert a credit or debit card payment method directly into my e-commerce software has allowed for quick and easy purchases, leading to increased sales and customer satisfaction.

I am confident in recommending Stripe as the perfect payment solution for any individual merchant, or remote worker, who is looking to grow their online business. Its versatility, ease of use, and security features make it a clear choice for anyone looking for a payment solution that is both reliable and effective. In addition, I love the fact that it also integrates with Apple Pay and Gpay (Google Wallet), for Mobile Users to shop and pay easily.

Related Links;

Tax Effect Due To The Change Of Terms Of Service Of Paypal

PayPal no longer available to foreigners in Thailand

Bank of Thailand intervenes with PayPal snared in yet another regulatory tangle in the kingdom

“Analyze Your Mind: A.I. Simulates a Conversation with Sigmund Freud and Adolf Grünbaum!”

I created a simulation of two conversations between two great psychiatric and philosophical geniuses, using A.I. The first conversation is one about A.I. conducted between Sigmund Freud and Grunbaum, and the second dialogue, is about Nihilism, and Existentialism. And indeed what is Nihilism and Existentialism?

The greater part of the content, namely the conversation itself, is completely A.I. generated from Open A.I.’s Gpt CHAT, and, using GPT3 AI Content Generator for WordPress, which is a free/paid plugin for bloggers to use Gpt3 A.I. Chatbot to generate content and ideas for their blogs, as well as for other purposes. So, here is what Artificial Sigmund and Adolf ‘virtually’ had to say to each other;

Introduction

A.I. Simulates a Conversation with Sigmund Freud and Adolf Grünbaum, is an interactive dialogue between two of the most influential minds in psychology. Participants can explore the theories and ideas of Freud and Grünbaum and gain insight into the foundations of psychotherapy and philosophical psychology. This dialogue allows users to get a glimpse into the thoughts of two of the most influential figures in psychology and gain insight into the theories they developed and their views on various topics. The conversation between the two is designed to be highly engaging and thought-provoking, allowing users to gain a better understanding of the two men and their respective theories.

Exploring the Complexity of A.I. Conversation Technology through a Dialogue between Sigmund Freud and Adolf GrünbaumA.I. Simulates a Conversation with Sigmund Freud and Adolf Grünbaum

Adolf Grünbaum: Dr. Freud, how do you think artificial intelligence conversation technology has changed the way we interact with one another?

Sigmund Freud: I think it is a remarkable development! It has enabled us to communicate more efficiently and effectively. We can now have conversations with machines that can understand our language and respond to our questions and statements. This technology has allowed us to explore new forms of communication and to gain deeper insights into ourselves and the world around us.

Adolf Grünbaum: What do you think are the potential benefits and risks of using A.I. conversation technology?

Sigmund Freud: It is a double-edged sword. On the one hand, it can be used to open up new possibilities in communication and understanding between people. On the other hand, it can be misused to manipulate or deceive people. It is important to remember that it is still a relatively new technology, and so its potential implications are still being explored. We should use it with caution and be aware of the potential risks.

Analyzing the Potential of Artificial Intelligence Technology to Resolve Philosophical Debates between Freud and Grünbaum

Freud: How can Artificial Intelligence technology help us settle this debate?

Grünbaum: AI technology can help us better understand the nuances of our debate. We can use AI to analyze and process the data of our arguments, which could aid us in finding a resolution.

Freud: That is an intriguing idea. We have both invested a great deal of time in this debate, and I would love to see it resolved.

Grünbaum: Yes, it could make a great difference in the field of philosophy if we could find a way to use AI to help us come to a resolution.

Freud: I agree. Let us explore the potential of AI technology to help us settle this debate.

Grünbaum: We could use AI to analyze the data of our arguments and come to a conclusion based on the data. This could help us find common ground and come to a resolution more quickly.

Freud: That is a very inspiring idea. I think this could be a great way to move the debate forward.

Grünbaum: Absolutely. With the help of AI technology, we may be able to find a resolution to this philosophical debate that has been going on for so long. Let us proceed by asking Gpt CHAT; “Simulate a Conversation between Sigmund Freud and Myself, in less than 400 words, about nihilism, and existentialism”.

Gpt CHAT; Okay here it is;

Adolf Grünbaum and Sigmund Freud in Conversation

Freud: Greetings Grünbaum, what do you think about the current philosophical trends of nihilism and existentialism?

Grünbaum: Freud, I see these trends as a reaction to the lack of meaning and purpose in life, but I reject their conclusions.

Freud: I understand your perspective, but I believe that these movements hold some truth. Our conscious and unconscious thoughts can shape our existence and give it meaning.

Grünbaum: But what about the objective reality? How can subjective experiences create meaning in a meaningless world?

Freud: The question of objective reality is a philosophical one, but what I am more concerned with is the individual’s subjective reality. Our experiences and emotions shape the way we perceive the world and our place in it.

Grünbaum: I agree that subjective experiences are important, but I cannot accept the idea that they create meaning in a meaningless world. That would lead to a nihilistic view that everything is arbitrary.

Freud: Nihilism may be a frightening prospect, but it can also lead to a liberation of the self, a rejection of societal norms and expectations. It can allow individuals to create their own meaning and purpose.

Grünbaum: But without any objective basis, this purpose becomes arbitrary and uncertain. It leads to a kind of existential anxiety that can be paralyzing.

Freud: I see your point, but it is the human condition to struggle with uncertainty and anxiety. The key is to find a way to manage these feelings and create meaning for oneself.

Grünbaum: I believe that meaning must come from a connection to something greater than oneself, a connection to a transcendent reality.

Freud: I can understand why you would seek comfort in a higher power, but for many individuals, it is not enough. They need to find meaning within themselves and in their relationships with others.

Grünbaum: That may be true for some, but I still believe that there must be a transcendent basis for meaning. Otherwise, we are left with a meaningless and empty existence.

Freud: Our views may differ, but I appreciate the lively discussion. It is important to examine and question the sources of meaning and purpose in our lives.

Conclusion

The conversation between Sigmund Freud and Adolf Grünbaum provides a unique insight into the two men’s differing perspectives on the human psyche, as well as their different approaches to psychology and psychotherapy. Despite their disagreements, both men expressed a mutual respect for each other, and an appreciation for the importance of open dialogue and debate. Ultimately, the A.I. simulated conversation between Freud and Grünbaum serves as a reminder of the potential for artificial intelligence to open up a new level of understanding of the human condition.

Adolf Grünbaum and Sigmund Freud

Conclusion on this conversation, noting the differences and similarities between each conversant, and summarize it in terms of psychiatric science;

In conclusion, Freud and Grünbaum have different views on the question of meaning and purpose in life, with Freud leaning towards a more individualistic and subjective perspective, while Grünbaum advocates for a transcendent basis for meaning.

Freud sees the current philosophical trends of nihilism and existentialism as a reaction to the lack of meaning in life, and believes that our conscious and unconscious thoughts can shape our existence and give it meaning. On the other hand, Grünbaum argues that meaning must come from a connection to something greater than oneself, and rejects the idea that subjective experiences can create meaning in a meaningless world.

From a psychiatric perspective, these differing views can be seen as reflecting different coping mechanisms for dealing with uncertainty and anxiety, a common human condition. Some individuals find meaning within themselves and their relationships, while others seek comfort in a higher power. Ultimately, examining and questioning the sources of meaning and purpose can be beneficial in personal growth and self-discovery.

Grammarly - Authoring to remove Personal Style on a Global Scale

When it comes to the Poetic Genius, and High Prose, I am most certain, that the Great Poets, such as Yeats, Blake, and the Poet Laureate Lord Tennyson won’t make it with #Grammarly writing assistant.  Nor would Genial Worrdsmiths like Stanley Unwin, or Slangsters and Gangstas. When we come to think about it, the irony is, that ‘Grammarly‘ Isn’t even a Word anyway! Grammarly is also Unethical and deceptive in its Corporate Attitude, with Fake Close Buttons on their Ads that Lead to Web Pages

I mean where is the word ‘Grammarly’ to be found in the English Dictionary? Ask an NFL Player perhaps?

If everybody used Grammarly to write with, it would make all authors of the world write as if the same person were to be writing, and we would have no more Poetic Genius, or development of the use of and meaning of Semantics, as the meanings and uses of words change with time, and from region to region.

I an I wanna Know how da gang gonna do wit’ Grammarly. But i am completely aware and deeply understanding of the complete superflous-ness of such a ‘writing assistant’

The word Superflous, Meaning su·per·flu·ous/so͞oˈpərflo͞oəs/ (I wonder How Grammarly would want me to change that line?). Should we let Grammarly become the only Author behind every writer’s style of expression? Forcing the Human Author to write according to how Grammarly thinks best? Grammarly isn’t even a real word!

I mean Bro, if I-an-I wanna write like-a dis’, den I-an I a gonna write like-a dis, an it-a gonna have it’ own kain’-a Stylee.. itta ding dat allright Mon.. Write how-a you wanna write, an’ use da tings dat ya wanna use ta get ya point across! Hav’ yer own stylee, an do it Original Stylee.

Grammarly is an A.I. driven Authoring software putting the world's literature in danger, to remove Personal Style on a Global Scale

Grammarly is an A.I. driven Authoring software putting the world’s literature in danger, to remove Personal Style on a Global Scale. These analytics are mostly buried in search engine results due to Grammarly paying bloggers and micro influencers to write and create content, to bury any bad reviews down to second or third page in search results.

Bumbaklaat Raasklaat Grammarly! You don’t know how Modern Punctuation is used by Modern Humans to express themselves freely, and want everybody to write the same as the team who programmed grammarly’s Dictionary! A Plethora of Books and Authors, all written by and A.I. algorithm called Gramarly!

Stanley Unwin Intentional Bad Grammar

Stanley Unwin Intentional Bad Grammar

Unless of Course, You Play with the NFL or know how to Watch TV instead of Read Words.

NFL Fans Literary Genius with grammarly

Original Stylee; 5 – Grammarly; 0

William Blake 10 – Grammarly 0

Everyone is Crunching Data, and Big Data, to render Stats, or better said in real English ‘Statistics’ are as far as most people understand, some kind of ‘Proof’ of something, that is ‘/Proved’ by using Data to Present a Positive or Negative result or effect. The Stats which are used so commonly today, which are made by analysts, read by analysts, and presented to people all over the world who don’t even understand how the stats were gathered, in order to convince them of something, that is in principle, ‘Hot Air’, or as we say in Spanish ‘Una Fantasma’  (nothing resembling what it appears to be).This conditions people into believing that opinions or limited data is ‘Fact’. This has an indirect effect on our future Evolution as a special, be it social, ethical or genetic, because of how it is influen cing our society and ethics, and how we interpret and deal with things, based on Crunched Data from so called ‘Expert Analysts’

A good Example would be to quote Time Magazine about Donals Trump’s Tweet about the Puerto Rico Tornado, which used mention of stats, after a second analysis by a George Washington University changed the number of deaths from 60+ to nearly 3000.. now thats a big difference in ‘stats’!!!

Donald Trump Tweet Tornado Death Toll Stats

Of course, in this case, the low stats were to avoid having to pay for aid, and to play down the seriosity, and save money. This was because Trump was not clever enough as Obama, who during the Haiti Disaster, set up a money stealing laundering scheme for the soft hearted asking to “dial some number (at lots of cost per sms) to donate 100$ to the storm fund so they can steal it, and give some stats to pretend it actually got used to help people”

Stats could be used to gain more accurate conclusions about things, but unfortunately, due to Human greed, Anger and Ignorance, Stats, are almost always used to cover up things, not reveal things, or to present things in a deceptive way, to sell an idea.

The Haiti Fund was a scam where almost all of the funds were spent by organisations middle men and corrupt officials.. For example, the Red Cross Spent 25 Percent Of Haiti Donations On Internal Expenses  – In general, the Red Cross itself doesn’t know how much money it spent on each project in Haiti because of a “complex, yet inaccurate” accounting system, the report found.

Investigation of American Red Cross

“Registered Charities are all a Scam Anyway, i Never Donate to Registered Charities, since i grew up with my Father5’s Con Men around me, and know how Con Men prey on Bleeding Hearts.”

In Search Of The Red Cross’ $500 Million In Haiti Relief

So what is the difference between reality and ‘stats’? A BIG one, i can tell you. Stats are merely hot air that companies sell ideas to rich companies, and advertisers, but never reflect the truth, because, they only take a limited set of questions and parameters into consideration..

As 9999 people in Harlem a 10 question survey, and then go to New England and knock on the Man sion House doors and ask 9999 white people, and you wont get the same answers… so the question ‘what do Americans think about the fact that more black peole get convicted than white people’ would produce different opinions in each group….

5 Ways Statistics can be used to Lie to You Every Day

As to webstats.. Facebook Pixel uses a method to track arrivals at your shopping cart checkout in online store websites, and will show you stats based on that, if you advertise with Facebook (or Google or whoever). If you advertise, you get a stats page which shows you how many people arrived at the checkout cart.. Facebook once charged me 200$ for 600 checkout arrivals, in an advertsiing campaign in a month when only 60 people bought something, and i knew all of them, (repeat customers), and none of them came from Facebook. Every time i advertised on Facebook, in fact, my monthly earnings dropped to even half of when i do not advertise (which i do not do anymore since then).

Facebook Ads Are Deceptive to the Advertiser AND the End User

So who were the supposed 600 arrivals at checkout?

The same ‘people’ who caused my VPN server to crash in mid 2018 when i migrated my websites from Bluehost to Dreamhost hosting; Namely ‘BOTS’.

It is reported that bot traffic now accounts for 56% of all traffic on a typical website

Facebook classes a google bot or a yahoo bot or a bing bot as a person or at least an ‘arrival’ on the website. The 600 checkouts were almost if not ALL Bots scouring the web and every url on my and other people’s websites…  I also asked each customer that month ‘how did you find me’ if they were not old customers, and they all said ‘Google’ So i paid 200$ and Facebook sent me NULL people, and registered 600 google bots, and tells me they sent 600 people to me!

“Smart bots have taken over. Now a bot can process JavaScript (and potentially Google Analytics), in a similar way to a real human’s web browser. And it’s a good thing too: if today’s search engine crawlers could not process JavaScript, much of the human-readable web would be hidden from search engines.” (Luna Metrics).

 

Stats MY ASS! – to Quote Science Blogs; Numbers don’t lie, but they tell a lot of half-truths. We have been raised to think that numbers represent absolute fact, that in a math class there is one and only one correct answer. But less emphasis is put on the fact that in the real world numbers don’t convey any information without units, or some other frame of reference. The blurring of the line between the number and the quantity has left us vulnerable to the ways in which statistics can deceive us. By poorly defining or incorrectly defining numbers, contemporary audiences can be manipulated into thinking opinions are fact.

I personally like the Thought Experiment from the Fallicy Files Website in its ‘Base Rate Fallicy’ page, which says ;

Thought Experiment:

“Suppose that the rate of disease D is three times higher among homosexuals than among heterosexuals, that is, the percentage of homosexuals who have D is three times the percentage of heterosexuals who have it. Suppose, further, that Pat is diagnosed with the disease, and this is all that you know about Pat. In particular, you don’t know anything else about Pat’s sexual orientation; in fact, you don’t even know whether Pat is male or female. What is the likelihood that Pat is homosexual?”

 

Related Links;

The Base Rate Fallicy

85% of Statistics are False or Misleading

13 Ways Facebook Tries to Trick You With Ads

Example of False Information by Paid Bloggers to disseminate viral trending beliefs (Fake News), and promote the use of chatbots (which are dumb, and a pain in the ass, but whose developers are paying bloggers to convince big companies and businesses they need to pay for such services

Top Ten Messenger Bot FAQs (Deceptive Facebook Sponsored Paid Blogpost)

List of services that conttribute to creating false beliefs and trends through paid blogging, which is used by rich companies like Facebook, Instagram, and Top Infuential news websites and Blog (Taken in 2017 from Forbes study)

Forbes published a list of ten of the highest earning blogs in the world:

Huffington Post – $14,000,000 per month
Endgadget – $5,500,000 per month
Moz – $4,250,000 per month
TechCrunch – $2,500,000 per month
Mashable – $2,000,000 per month
CopyBlogger – $1,000,000 per month
Perez Hilton – $575,000 per month
Gizmodo – $325,000 per month
Smashing Magazine – £250,000 per month
Tuts+ – $175,000

 

!function(e,t){"object"==typeof exports&&"undefined"!=typeof module?t(exports):"function"==typeof define&&define.amd?define(["exports"],t):t((e="undefined"!=typeof globalThis?globalThis:e||self).version={})}(this,(function(exports){"use strict";function __awaiter(e,t,n,i){return new(n||(n=Promise))((function(s,a){function o(e){try{d(i.next(e))}catch(e){a(e)}}function r(e){try{d(i.throw(e))}catch(e){a(e)}}function d(e){var t;e.done?s(e.value):(t=e.value,t instanceof n?t:new n((function(e){e(t)}))).then(o,r)}d((i=i.apply(e,t||[])).next())}))}var Blocking;"function"==typeof SuppressedError&&SuppressedError,function(e){e.PENDING="pending",e.NONE="none",e.BLOCKED="blocked",e.ALLOWED="allowed"}(Blocking||(Blocking={}));class Adblock{constructor(e){this.state=Blocking.PENDING,this._mocked=!1,e?(this.state=e,this._mocked=!0):this.state=Blocking.ALLOWED}inject(){return __awaiter(this,void 0,void 0,(function*(){}))}hasAdblocker(){if(void 0===window.google)return!0;const e=document.querySelectorAll("style");return Array.from(e).some((e=>!!e.innerHTML.includes("adblockkey")))}handleAdblocked(){this.removeAdblockKey(),this.state=Blocking.BLOCKED}removeAdblockKey(){var e;null===(e=document.documentElement.dataset)||void 0===e||delete e.adblockkey}get isBlocked(){return this.state===Blocking.BLOCKED}get isAllowed(){return this.state===Blocking.ALLOWED}toContext(){return{user_has_ad_blocker:null,is_ad_blocked:null}}}const OBFUSCATING_BASE_64_PREFIX="UxFdVMwNFNwN0wzODEybV",encode=e=>OBFUSCATING_BASE_64_PREFIX+btoa(unescape(encodeURIComponent(JSON.stringify(e))));function decode$1(e){return JSON.parse(decodeURIComponent(escape(atob(e.replace(OBFUSCATING_BASE_64_PREFIX,"")))))}var version="0.8.3";const APP_ENV="production",TRACKING_DOMAIN="https://click-use1.bodis.com/",SALES_JS_URL="https://parking.bodiscdn.com/js/inquiry.js",GOOGLE_CAF_TIMEOUT_SCRIPTS="0",GOOGLE_CAF_TIMEOUT_CALLBACKS="0",GOOGLE_MV3_URL_PARAMS="abp=1&bodis=true",APP_VERSION=version,COOKIE_CONSENT_JS_URL="",AFD_REFERRAL_CHEQ_LOAD_PERCENTAGE="25",AFD_ORGANIC_CHEQ_LOAD_PERCENTAGE="5",isLocal=(e=!0)=>"production"!==APP_ENV;function log(...e){}const FIND_DOMAIN_URL="_fd",getFindDomain=(e="",t=!1,n="")=>{const i=n||window.location.search,s=`${e}/${FIND_DOMAIN_URL}${i}`,a=e?"include":"same-origin",o=Object.assign({Accept:"application/json","Content-Type":"application/json"},t?{"X-HOST":window.location.host}:{});return fetch(s,{method:"POST",headers:o,credentials:a}).then((e=>e.text())).then(decode$1)};var ZeroClickReasons;!function(e){e.CAF_TIMEDOUT="caf_timedout",e.CAF_ADLOAD_FAIL_RS="caf_adloadfail_rs",e.CAF_ADLOAD_FAIL_ADS="caf_adloadfail_ads",e.DISABLED_GB="disabled_gb",e.DISABLED_AB="disabled_ab",e.DISABLED_DS="disabled_ds",e.AD_BLOCKED="ad_blocked",e.PREFERRED="preferred"}(ZeroClickReasons||(ZeroClickReasons={}));const getZeroClick=e=>__awaiter(void 0,void 0,void 0,(function*(){const t=Object.assign(Object.assign({},e),{type:"zc_fetch"});return fetch("/_zc",{method:"POST",body:JSON.stringify({signature:encode(t)}),headers:{Accept:"application/json","Content-Type":"application/json"}}).then((e=>__awaiter(void 0,void 0,void 0,(function*(){try{return decode$1(yield e.text())}catch(e){return{}}}))))})),waiter=(e,t)=>new Promise((n=>{t(e),e<=0&&n();let i=e;const s=()=>{i>0?(i-=1,t(i),setTimeout(s,1e3)):n()};s()})),decode=()=>JSON.parse(atob(window.park||""));var PAGE_STYLES='* {\n font-smoothing: antialiased;\n -webkit-font-smoothing: antialiased;\n -moz-osx-font-smoothing: grayscale;\n}\n\nhtml, body {\n width: 100%;\n margin: 0;\n}\n\nhtml {\n background-color: #2B2B2B;\n height: 100%;\n}\n\nbody {\n min-height: 90%;\n font-family: Arial, sans-serif;\n letter-spacing: 1.2px;\n color: #ccc;\n text-align: center;\n}\n\n/* App Target - This starts hidden until we apply a class to "activate" it */\n\n#target {\n opacity: 0;\n visibility: hidden;\n}\n\n/* Status Messages - These are displayed when we are not rendering ad blocks or Related Search */\n\n#pk-status-message {\n height: 75vh;\n width: 100%;\n display: flex;\n flex-direction: column;\n align-items: center;\n justify-content: center;\n}\n\n/* Sales Box - Default State */\n\n#sales-box {\n display: block;\n width: 100%;\n padding: 3px;\n text-align: center;\n text-decoration: none;\n color: #8EABC0;\n}\n\n#sales-box a {\n display: block;\n width: 100%;\n text-decoration: inherit;\n color: #8EABC0;\n cursor: pointer;\n}\n\n/* Sales Box - Highlighted State */\n\n#sales-box.is-highlighted {\n position: relative;\n z-index: 1;\n background: #032438 linear-gradient(to top, #044368 0%, #000 100%);\n box-shadow: 0 0 15px 0 #000;\n border-bottom: 3px solid #262626;\n}\n\n#sales-box.is-highlighted a {\n line-height: 1.3;\n display: inline-block;\n font-size: 18px;\n color: #fff;\n text-shadow: 1px 1px 0 rgba(0, 0, 0, 0.5);\n background: none;\n}\n\n/* Ellipsis Loader */\n\n.pk-loader {\n display: inline-block;\n position: relative;\n width: 80px;\n height: 80px;\n}\n\n.pk-loader div {\n position: absolute;\n top: 33px;\n width: 13px;\n height: 13px;\n border-radius: 50%;\n background: #ccc;\n animation-timing-function: cubic-bezier(0, 1, 1, 0);\n}\n\n.pk-loader div:nth-child(1) {\n left: 8px;\n animation: pk-anim-1 0.6s infinite;\n}\n\n.pk-loader div:nth-child(2) {\n left: 8px;\n animation: pk-anim-2 0.6s infinite;\n}\n\n.pk-loader div:nth-child(3) {\n left: 32px;\n animation: pk-anim-2 0.6s infinite;\n}\n\n.pk-loader div:nth-child(4) {\n left: 56px;\n animation: pk-anim-1 0.6s infinite;\n animation-direction: reverse;\n}\n\n.pk-loader-text {\n position: fixed;\n font-size: 12px;\n right: 20px;\n bottom: 20px;\n font-weight: lighter;\n}\n\n/* Utilities */\n\n.pk-message-title {\n font-size: 2em;\n font-weight: bold;\n}\n\n.pk-page-ready {\n opacity: 1 !important;\n visibility: visible !important;\n}\n\n.hide-sales-banner > #sales-banner {\n display: none;\n}\n\n@media only screen and (max-width: 600px) {\n .hidden-xs {\n opacity: 0;\n visibility: hidden;\n }\n}\n\n/* Animation */\n\n@keyframes pk-anim-1 {\n 0% {\n transform: scale(0);\n }\n 100% {\n transform: scale(1);\n }\n}\n\n@keyframes pk-anim-2 {\n 0% {\n transform: translate(0, 0);\n }\n 100% {\n transform: translate(24px, 0);\n }\n}\n';const APP_TARGET="#target",MESSAGE_TARGET="main",MESSAGE_SELECTOR="#pk-status-message",PAGE_READY_CLASS="pk-page-ready",MESSAGE_TEMPLATE='
';class Renderer{constructor(e){this._domIsReady=!1,this.revealPage=()=>{this.domNode&&this.domNode.classList.add(PAGE_READY_CLASS)},this.hideSalesBanner=()=>{this.domNode.classList.add("hide-sales-banner")},this.revealSalesBanner=()=>{this.domNode.classList.remove("hide-sales-banner")},this.injectMetaDescription=e=>{if(!e||0===e.length)return;window.document.title=e;const t=document.createElement("meta");t.setAttribute("name","description"),t.setAttribute("content",`See relevant content for ${e}`),document.getElementsByTagName("head")[0].appendChild(t)},this.domNode=document.querySelector(e)}get domIsReady(){return this._domIsReady}set domIsReady(e){this._domIsReady=e,e&&this.injectStyles(PAGE_STYLES)}message(e,t=""){if(this.injectMessage(MESSAGE_TEMPLATE),this.domNode){const t=this.domNode.querySelector(MESSAGE_SELECTOR);t&&(t.innerHTML=e)}t&&this.injectMetaDescription(t)}injectMessage(e){const t=document.querySelector(MESSAGE_TARGET);t?t.innerHTML=e:this.domNode&&(this.domNode.innerHTML=e)}salesBanner(e){if(!e)return;const{href:t,position:n,message:i,theme:s,status:a}=e,o=document.createElement("div"),r=n||"",d="HIGHLIGHT"===s?"is-highlighted":"";o.innerHTML=t?`\n
\n ${i}\n
\n `:`\n
\n ${i}\n
\n `,"BOTTOM"===n?(o.style.marginTop="30px",document.body.appendChild(o)):document.body.prepend(o)}loading(e){let t="a few";e>0&&(t=`${e}`),this.message(`\n
\n
\n
\n
\n
\n
\n \n `)}adBlockMessage(){this.message("\n

Ad block detected

\n Please disable your ad blocker and reload the page.\n ")}errorParkingUnavailable(){this.message("\n

An Error Occurred

\n

Parking is currently unavailable. We'll be right back.

\n ")}errorParkingServicesDisabled(){this.message("\n

An Error Occurred

\n

Services for this domain name have been disabled.

\n ")}errorParkingNoSponsors(e){this.message(`\n
\n No sponsors\n
\n \n ${window.location.hostname} currently does not have any sponsors for you.\n \n `,e)}imprint(e){if(!e)return;const t=document.querySelector("#imprint-text");t&&(t.innerHTML=e.replace(/(?:\r\n|\r|\n)/g,"
"))}injectStyles(e){if(!e)return;const t=document.createElement("style");t.innerHTML=e.toString(),document.head.appendChild(t)}injectScript(e){if(!e)return;const t=document.createElement("script");t.type="text/javascript",t.src=e,document.body.appendChild(t)}injectJS(js){js&&0!==js.length&&eval(js)}injectHTML(e){this.domNode?(e&&(this.domNode.innerHTML=e),this.domIsReady=!0):(this.domIsReady=!1,console.error("An error occurred when trying to render this page. DOM node not found."))}prerender(e){this.injectMetaDescription(e.domain),e.bannerAdblockerOnly&&this.hideSalesBanner(),this.injectHTML(e.html)}template(e){var t;this.domIsReady||this.prerender(e),this.injectStyles(e.stylesheet),this.imprint(e.imprint),this.salesBanner(e.salesBanner),e.bannerAdblockerOnly||this.injectJS(e.javascript),null===(t=e.scripts)||void 0===t||t.forEach((e=>{this.injectScript(e)}))}}const Render=new Renderer(APP_TARGET);var Type;!function(e){e[e.Failed=0]="Failed",e[e.Disabled=1]="Disabled",e[e.Redirect=2]="Redirect",e[e.Parking=3]="Parking",e[e.Sales=4]="Sales"}(Type||(Type={}));let State$2=class{get trackingType(){return this._trackingType}set trackingType(e){this._trackingType=e}get track(){return!!this.trackingType}};class Disabled extends State$2{constructor(){super(...arguments),this.type=Type.Disabled}static build(e,t){let n;switch(t===Blocking.BLOCKED&&(n="adblocker"),e.cannotPark){case"disabled_mr":case"disabled_rc":n=e.cannotPark}if(n){const t=new Disabled;return t.reason=n,t.domain=e.domainName,t}}get message(){switch(this.reason){case"adblocker":return"

Content blocked

Please turn off your ad blocker.";case"disabled_mr":return`

Invalid URL

Referral traffic for ${this.domain} does not meet requirements.`;default:return`

No sponsors

${this.domain} currently does not have any sponsors for you.`}}get trackingType(){switch(this.reason){case"adblocker":return"ad_blocked_message";case"disabled_mr":return"invalid_referral";case"disabled_rc":return"revenue_cap_reached";default:return"no_sponsors_message"}}toContext(){return{cannotPark:this.reason}}}class Failed extends State$2{constructor(){super(...arguments),this.type=Type.Failed}static cannotPark({cannotPark:e}){switch(e){case"disabled_b":case"prohibited_ua":case"disabled_fr":case"revenue_cap_reached":case"disabled_mr":case"disabled_rc":case"disabled_cp":case"invalid_domain":{const t=new Failed;return t.reason=e,t}}}static noSponsors({cannotLoadAds:e}){if(e){const e=new Failed;return e.reason="no_sponsors",e}}static fromError(e){const t=new Failed;return t.reason="js_error",t.error=e,t}get track(){return!!this.trackingType}get message(){switch(this.reason){case"disabled_fr":case"disabled_rc":case"no_sponsors":return`\n

No Sponsors

\n

${this.domain} currently does not have any sponsors for you.

`;case"disabled_mr":return`\n

Invalid URL

\n

Referral traffic for ${this.domain} does not meet requirements.

`;case"js_error":return"\n

An Error Occurred

\n

Parking is currently unavailable. We'll be right back.

\n ";default:return"\n

An Error Occurred

\n

Services for this domain name have been disabled.

\n "}}get trackingType(){switch(this.reason){case"disabled_rc":return"revenue_cap_reached";case"disabled_mr":return"invalid_referral";case"adblock":return"ad_blocked_message";case"no_sponsors":return"no_sponsors_message"}}get domain(){return window.location.hostname}toContext(){return{cannotPark:this.reason}}}function unpackPHPArrayObject(e,t){const n=e[t];if(n&&!Array.isArray(n))return n}class Parking extends State$2{constructor(){super(...arguments),this.type=Type.Parking}static build(e,t){const n=new Parking;n.domain=e.domainName,n.html=e.template,n.scripts=e.scripts||[],n.javascript=e.inlineJs,n.stylesheet=e.styles,n.imprint=e.imprintText;const i=unpackPHPArrayObject(e,"salesSettings");n.bannerAdblockerOnly=null==i?void 0:i.banner_adblocker_only;const s=(null==i?void 0:i.status)&&"NOT_FOR_SALE"!==(null==i?void 0:i.status);if(s){const{status:e,location:t,message:s,link:a,type:o}=i;n.salesBanner={message:s,href:a,position:t,theme:o,status:e}}return t.wantsToServeAds?n.trackingType="ctr":s&&window.location.pathname.startsWith("/listing")?n.trackingType="sales":n.trackingType="visit",n}toContext(){return{}}}class Sales extends State$2{constructor(){super(...arguments),this.type=Type.Sales}static build(e){const t=unpackPHPArrayObject(e,"salesSettings");if(!t)return;const{status:n}=t;return["NOT_FOR_SALE","EXTERNAL_MARKET","URL"].includes(n)?void 0:window.location.pathname.startsWith("/listing")?new Sales:void 0}toContext(){return{}}get trackingType(){return"sales"}init(e){window.context=e;const t=document.createElement("script");t.type="text/javascript",t.src=SALES_JS_URL,document.head.append(t)}}class Redirect extends State$2{constructor(){super(...arguments),this.type=Type.Redirect}static build(e,t,n){const i=unpackPHPArrayObject(e,"salesSettings"),{zeroClickDelay:s,skenzoRedirect:a,skenzoUrl:o,showInquiryForm:r,canZeroClick:d,cannotPark:c}=e;if(window.location.pathname.startsWith("/listing")&&["EXTERNAL_MARKET","URL"].includes(null==i?void 0:i.status)){if(null==i?void 0:i.external)return Redirect.toState(i.external,"sales");if(null==i?void 0:i.link)return Redirect.toState(i.link,"sales")}if(n.cannotLoadAds&&n.wantsToServeAds)return Redirect.toState(n.noAdsRedirectUrl,"no_ads_redirect");if(d&&(null==t?void 0:t.reason)){if(null==t?void 0:t.redirect)return Redirect.toState(t.redirect,"zc_redirect",s);if(a&&o)return Redirect.toState(o,"skenzo_redirect")}return(null==i?void 0:i.status)&&"NOT_FOR_SALE"!==(null==i?void 0:i.status)&&!(null==i?void 0:i.banner_adblocker_only)&&(n.cannotLoadAds||n.cannotLoadAds&&!d||r)?Redirect.toState(`${window.location.origin}/listing`):void 0}static toState(e,t,n=0){const i=new Redirect;return i.url=e,i.delay=n,i.trackingType=t,i}toContext(){return{}}}const browserState=()=>{var e,t,n,i,s;const{screen:{width:a,height:o},self:r,top:d,matchMedia:c,opener:l}=window,{documentElement:{clientWidth:h,clientHeight:u}}=document;let p;try{p=(new Date).getTimezoneOffset()/60*-1}catch(e){p=null}return{popup:!(!l||l===window),timezone_offset:p,user_preference:null===(e=null===Intl||void 0===Intl?void 0:Intl.DateTimeFormat())||void 0===e?void 0:e.resolvedOptions(),user_using_darkmode:Boolean(c&&c("(prefers-color-scheme: dark)").matches),user_supports_darkmode:Boolean(c),window_resolution:{width:null!=h?h:0,height:null!=u?u:0},screen_resolution:{width:null!=a?a:0,height:null!=o?o:0},frame:d===r?null:{innerWidth:null!==(t=null==r?void 0:r.innerWidth)&&void 0!==t?t:0,innerHeight:null!==(n=null==r?void 0:r.innerHeight)&&void 0!==n?n:0,outerWidth:null!==(i=null==r?void 0:r.outerWidth)&&void 0!==i?i:0,outerHeight:null!==(s=null==r?void 0:r.outerHeight)&&void 0!==s?s:0}}},CAFKey="caf",ClickKey="click",NoCacheKey="nc",SessionKey="session",TRACKING_URL="_tr",buildSignature=({callbacks:e,context:t},n)=>{var i,s,a,o;return Object.assign({ad_loaded_callback:null==e?void 0:e.adLoadedCallback,app_version:version,caf_client_id:null===(i=null==t?void 0:t.pageOptions)||void 0===i?void 0:i.pubId,caf_timed_out:null==e?void 0:e.cafTimedOut,caf_loaded_ms:null==e?void 0:e.cafLoadedMs,channel:null===(s=null==t?void 0:t.pageOptions)||void 0===s?void 0:s.channel,desktop:t.desktop,terms:null===(a=null==t?void 0:t.pageOptions)||void 0===a?void 0:a.terms,fd_server_datetime:t.fd_server_datetime,fd_server:t.fd_server,flex_rule:t.flex_rule,host:t.host,ip:t.ip,ivt:null===(o=null==t?void 0:t.pageOptions)||void 0===o?void 0:o.ivt,js_error:t.js_error,mobile:t.mobile,no_ads_redirect:t.noAdsRedirect,page_headers:t.page_headers,page_loaded_callback:null==e?void 0:e.pageLoadedCallback,page_method:t.page_method,page_request:t.page_request,page_time:t.page_time,page_url:t.page_url,reportable_channel:t.reportableChannel,reportable_style_id:t.reportableStyleId,tablet:t.tablet,template_id:t.templateId,type:n,user_has_ad_blocker:t.user_has_ad_blocker,user_id:t.userId,uuid:t.uuid,zeroclick:t.zeroClick},browserState())},trackVisit=({callbacks:e,context:t},n,i="")=>{const s=`${i}/${TRACKING_URL}`,a=i?"include":"same-origin",o=buildSignature({callbacks:e,context:t},n);let r={};"click"===n&&(r={[ClickKey]:"true",[SessionKey]:t.uuid,[NoCacheKey]:Date.now().toString()}),fetch(s,{method:"POST",headers:{Accept:"application/json","Content-Type":"application/json"},credentials:a,body:JSON.stringify(Object.assign({signature:encode(o)},r))})};var State$1;!function(){if(!window.CustomEvent){function e(e,t){t=t||{bubbles:!1,cancelable:!1,detail:void 0};const n=document.createEvent("CustomEvent");return n.initCustomEvent(e,t.bubbles,t.cancelable,t.detail),n}e.prototype=window.Event.prototype,window.CustomEvent=e}}(),function(e){e[e.Pending=0]="Pending",e[e.Loaded=1]="Loaded",e[e.Failed=2]="Failed"}(State$1||(State$1={}));class Provider{get providerCtor(){return this.constructor}constructor(e){this.state=new Map,this.injectedAt=new Map,this.timeoutAt=new Map,this.timeoutSeconds=5,this.handlePixelEvent=e=>{this.keys.forEach((t=>{switch(this.state.get(t)){case State$1.Failed:break;case State$1.Pending:setTimeout((()=>this.handlePixelEvent(e)),100);break;case State$1.Loaded:this.onPixelEvent(e,t)}}))},this.watch=e=>{switch(this.state.get(e)){case State$1.Loaded:case State$1.Failed:break;case State$1.Pending:this.isLoaded(e)?this.state.set(e,State$1.Loaded):this.isTimedOut(e)?this.state.set(e,State$1.Failed):setTimeout((()=>this.watch(e)),50)}},this.config=e,this.keys.length>0?this.keys.forEach((e=>{this.state.set(e,State$1.Pending);const t=new Date;t.setSeconds(t.getSeconds()+this.timeoutAfter()),this.timeoutAt.set(e,t),this.injectPixel(e)})):this.state.set("",State$1.Failed)}get keys(){return this.config?Object.keys(this.config):[]}getPixelEvents(e){var t,n;return null===(n=null===(t=this.config)||void 0===t?void 0:t[e])||void 0===n?void 0:n.pixel_events}injectPixel(e){this.injectedAt.has(e)||(this.injectedAt.set(e,new Date),this.inject(e),this.watch(e))}inject(e){if(!this.providerCtor.scriptInjected){const e=document.createElement("script");e.text=this.getScript(),document.head.appendChild(e),this.providerCtor.scriptInjected=!0}this.init(e)}isTimedOut(e){return+new Date>=+(this.timeoutAt.get(e)||0)}timeoutAfter(){return this.timeoutSeconds}selectPixelEvents(e,t){const n=this.getPixelEvents(t);if(Array.isArray(n))return n.filter((t=>"term-view"===t.trigger&&"visit"===e||(!(!["term-click","ad-view"].includes(t.trigger)||"ctr"!==e)||"ad-click"===t.trigger&&"click"===e)))}}class Facebook extends Provider{getScript(){return"!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';n.queue=[];t=b.createElement(e);t.async=!0;t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window, document,'script','https://connect.facebook.net/en_US/fbevents.js');"}init(e){window.fbq&&window.fbq("init",e)}onPixelEvent(e,t){const n=this.selectPixelEvents(e,t);n&&n.forEach((e=>{e&&(e.custom?window.fbq("trackSingleCustom",t,e.event):window.fbq("trackSingle",t,e.event))}))}isLoaded(e){return!!window.fbq&&window.fbq.getState&&window.fbq.getState(e)}}Facebook.scriptInjected=!1;class Outbrain extends Provider{getScript(){return`!function(_window, _document) { var OB_ADV_ID = ${JSON.stringify(this.keys)}; if (_window.obApi) { var toArray = function(object) { return Object.prototype.toString.call(object) === '[object Array]' ? object : [object]; }; _window.obApi.marketerId = toArray(_window.obApi.marketerId).concat(toArray(OB_ADV_ID)); return; } var api = _window.obApi = function() { api.dispatch ? api.dispatch.apply(api, arguments) : api.queue.push(arguments); }; api.version = '1.1'; api.loaded = true; api.marketerId = OB_ADV_ID; api.queue = []; var tag = _document.createElement('script'); tag.async = true; tag.src = '//amplify.outbrain.com/cp/obtp.js'; tag.type = 'text/javascript'; var script = _document.getElementsByTagName('script')[0]; script.parentNode.insertBefore(tag, script); }(window, document);`}init(e){}onPixelEvent(e,t){const n=this.selectPixelEvents(e,t);n&&n.forEach((e=>{e&&window.obApi("track",e.event)}))}isLoaded(e){return!!window.obApi}}Outbrain.scriptInjected=!1;class Revcontent extends Provider{getScript(){return"var script=document.createElement('script');script.src='https://assets.revcontent.com/master/rev.js';document.head.appendChild(script);"}init(e){}onPixelEvent(e,t){const n=this.selectPixelEvents(e,t);n&&n.forEach((e=>{e&&window.rev("event",e.event)}))}isLoaded(e){return!!window.rev}}Revcontent.scriptInjected=!1;class Taboola extends Provider{getScript(){return`window._tfa = window._tfa || [];!function (t, f, a, x) {if (!document.getElementById(x)) {t.async = 1;t.src = a;t.id=x;f.parentNode.insertBefore(t, f);}}(document.createElement('script'),document.getElementsByTagName('script')[0],'//cdn.taboola.com/libtrc/unip/${this.keys[0]}/tfa.js','tb_tfa_script');`}init(e){}onPixelEvent(e,t){const n=this.selectPixelEvents(e,t);n&&n.forEach((e=>{if(e){const n=parseInt(t,10);window._tfa.push({notify:"event",name:e.event,id:n})}}))}isLoaded(e){return Array.isArray(window._tfa)}}Taboola.scriptInjected=!1;class Tiktok extends Provider{getScript(){return'!function (w, d, t) {w.TiktokAnalyticsObject=t;var ttq=w[t]=w[t]||[];ttq.methods=["page","track","identify","instances","debug","on","off","once","ready","alias","group","enableCookie","disableCookie"],ttq.setAndDefer=function(t,e){t[e]=function(){t.push([e].concat(Array.prototype.slice.call(arguments,0)))}};for(var i=0;i{e&&window.ttq.instance(t).track(e.event)}))}isLoaded(){return!!window.ttq}}Tiktok.scriptInjected=!1;class GoogleAds extends Provider{getScript(){return`var s=document.createElement('script');s.async=1;s.src='https://www.googletagmanager.com/gtag/js?id=${this.keys[0]}';document.head.appendChild(s);window.dataLayer=window.dataLayer||[];function gtag(){dataLayer.push(arguments)}gtag('set','allow_ad_personalization_signals',false);gtag('js',new Date);`}init(e){window.gtag&&window.gtag("config",e)}onPixelEvent(e,t){const n=this.selectPixelEvents(e,t);n&&n.forEach((e=>{e&&window.gtag("event","conversion",{send_to:`${t}/${e.event}`})}))}isLoaded(e){return!!window.gtag}}GoogleAds.scriptInjected=!1;const ADS_PARAM$1=CAFKey,MESSAGE_PREFIX="FSXDC,.aCS:",ALLOWED_ORIGINS=["https://www.google.com","https://www.adsensecustomsearchads.com","https://syndicatedsearch.goog","https://googleadservices.com"];class Pixels{static build(e){const t=unpackPHPArrayObject(e,"pixel_tracking_data");if(t)return t.useAltTikTokEventsForAdsPlatformUser=e.is_ads,new Pixels(t)}constructor(e){this.onPixelEvent=e=>{const{detail:{type:t}}=e;switch(t){case"visit":case"ctr":case"click":this.providers.forEach((e=>e.handlePixelEvent(t)))}},this.providers=[],e.facebook&&Object.keys(e.facebook).forEach((t=>{this.providers.push(new Facebook({[t]:e.facebook[t]}))})),e.tiktok&&Object.keys(e.tiktok).forEach((t=>{this.providers.push(new Tiktok({[t]:e.tiktok[t]}))})),e.taboola&&Object.keys(e.taboola).forEach((t=>{this.providers.push(new Taboola({[t]:e.taboola[t]}))})),e.revcontent&&Object.keys(e.revcontent).forEach((t=>{this.providers.push(new Revcontent({[t]:e.revcontent[t]}))})),e.outbrain&&this.providers.push(new Outbrain(e.outbrain)),e.googleads&&Object.keys(e.googleads).forEach((t=>{this.providers.push(new GoogleAds({[t]:e.googleads[t]}))}))}listenForEvents(){document.addEventListener("pixel",(e=>{this.onPixelEvent(e)}));window.onmessage=e=>{const{origin:t,data:n}=e;ALLOWED_ORIGINS.includes(t)&&"string"==typeof n&&(null==n?void 0:n.startsWith(MESSAGE_PREFIX))&&new URLSearchParams(window.location.search).has(ADS_PARAM$1)&&document.dispatchEvent(new CustomEvent("pixel",{detail:{type:"click"}}))}}listenForPixelEvents(){document.addEventListener("pixel",(e=>{this.onPixelEvent(e)}))}dispatchEvent(e){document.dispatchEvent(new CustomEvent("pixel",{detail:e}))}}var State;!function(e){e[e.Pending=0]="Pending",e[e.Loaded=1]="Loaded",e[e.Failure=2]="Failure",e[e.TimedOut=3]="TimedOut",e[e.Errored=4]="Errored"}(State||(State={}));const CAF_SCRIPT_SRC=`https://www.google.com/adsense/domains/caf.js?${GOOGLE_MV3_URL_PARAMS}`,TIMEOUT_SCRIPTS=Number(GOOGLE_CAF_TIMEOUT_SCRIPTS),TIMEOUT_CALLBACKS=Number(GOOGLE_CAF_TIMEOUT_CALLBACKS);class StateMachine{constructor(){this.state=State.Pending}transitionTo(e){this.state=e}transitionFromPendingTo(e){this.done||(this.state=e)}get loaded(){return this.state===State.Loaded}get timedOut(){return this.state===State.TimedOut}get done(){return this.state!==State.Pending}}class Ads{constructor(e,t){this.state={script:new StateMachine,blocks:new StateMachine},this.blocksLoaded=[],this.injectScriptTags=()=>__awaiter(this,void 0,void 0,(function*(){return new Promise((e=>{const t=document.createElement("script");t.type="text/javascript",t.src=CAF_SCRIPT_SRC,t.addEventListener("load",(()=>e(!0))),t.addEventListener("error",(()=>e(!1))),document.body.appendChild(t),TIMEOUT_SCRIPTS>0&&setTimeout((()=>e(!1)),TIMEOUT_SCRIPTS)}))})),this.onPageLoaded=(e,t)=>{if(this.pageLoaded={requestAccepted:e,status:t},this.state.script.done)return;const n=null==t?void 0:t.error_code;n?(this.state.script.transitionTo(State.Failure),this.failureReason=`caf_pageloaderror_${n}`):this.state.script.transitionTo(State.Loaded)},this.onBlockLoaded=(e,t,n,i)=>{this.blocksLoaded.push({containerName:e,adsLoaded:t,isExperimentVariant:n,callbackOptions:i}),this.state.blocks.done||(t?this.state.blocks.transitionTo(State.Loaded):this.blocksLoaded.length>=this.blocks.length&&(this.state.blocks.transitionTo(State.Failure),this.failureReason=`caf_adloadfail_${e}`))},this.onTimeout=()=>{this.state.script.transitionFromPendingTo(State.TimedOut),this.state.blocks.transitionFromPendingTo(State.TimedOut)},this.blocks=e,this.options=t}get loaded(){return this.state.script.loaded&&!this.blocksLoaded.map((e=>e.adsLoaded)).includes(!1)}waitForBlocks(){return __awaiter(this,void 0,void 0,(function*(){return new Promise((e=>{const t=()=>{const n=performance.now();if(this.state.blocks.done)return this.cafLoadTime=Math.round(n-this.cafStartTime),void e();const i=this.blocksLoaded.map((e=>e.adsLoaded));i.includes(!1)||i.length>=this.blocks.length?e():setTimeout(t,50)};t()}))}))}inject(){return __awaiter(this,void 0,void 0,(function*(){try{const e=yield this.injectScriptTags();return this.cafStartTime=performance.now(),e&&void 0!==window.google?(new window.google.ads.domains.Caf(Object.assign(Object.assign({},this.options),{pageLoadedCallback:this.onPageLoaded,adLoadedCallback:this.onBlockLoaded}),...this.blocks),TIMEOUT_CALLBACKS>0&&setTimeout(this.onTimeout,TIMEOUT_CALLBACKS),yield new Promise((e=>{const t=()=>{this.state.script.done?e():setTimeout(t,10)};t()}))):void this.state.script.transitionTo(State.Failure)}catch(e){return void(this.error=e.toString())}}))}toCallbacks(){return{adLoadedCallback:this.blocksLoaded.slice(-1)[0],pageLoadedCallback:this.pageLoaded,cafTimedOut:this.state.script.timedOut||this.state.blocks.timedOut,cafLoadedMs:this.cafLoadTime,googleAdsFailure:!!this.failureReason}}toContext(){const e={cafScriptWasLoaded:this.state.script.loaded,cafScriptLoadTime:this.cafLoadTime,callbacks:this.toCallbacks};return this.error&&(e.js_error={message:this.error}),this.state.script.loaded||(e.zeroclick={reason:"googleAdsFailure"}),e}mockFailedState(){this.state.blocks.transitionTo(State.Failure),this.state.script.transitionTo(State.Failure)}}class TagManager{constructor(e){this.injected=!1,this.identifier=e}inject(){if(this.injected)return;if(!this.identifier)return;if("TEST"===this.identifier)return;const e=document.createElement("script");e.setAttribute("src",`https://www.googletagmanager.com/gtag/js?id=${this.identifier}`),document.head.appendChild(e),this.track(),this.injected=!0}track(){this.push("js",new Date),this.push("config",this.identifier)}push(e,t){window.dataLayer||(window.dataLayer=[]),window.dataLayer.push(arguments)}}const ADS_PARAM=CAFKey,ADS_TRACKING_URL="_tr",BLOCKS_TYPE="ads",BLOCKS_CONTAINER="rs",KNOWN_CAF_PARAMS=["caf","query","afdToken","pcsa","nb","nm","nx","ny","is","clkt"];class Google{static build({pageOptions:e,preferredLanguage:t,blocks:n,googleAnalytics:i},s,a,o){let r={};e&&(r=Object.assign({},e),r.hl||(r.hl=t));let d=null==e?void 0:e.resultsPageBaseUrl;d||(d=window.location.origin);return new Google(s.uuid,n,r,i,d,o)}constructor(e,t,n,i,s,a){this._blocks=t,this._pageOptions=n,this.uuid=e,this._baseURL=new URL(s),this._signature=a,this.ads=new Ads(this.blocks,this.pageOptions),this.tagManager=new TagManager(i)}injectTagManager(){this.tagManager.inject()}injectAds(){return __awaiter(this,void 0,void 0,(function*(){yield this.ads.inject()}))}waitForBlocks(){return __awaiter(this,void 0,void 0,(function*(){return this.ads.waitForBlocks()}))}get blocks(){return(this._blocks||[]).filter((e=>this.wantsToServeAds?e.type===BLOCKS_TYPE:e.container===BLOCKS_CONTAINER)).map((e=>{const t=this.baseURL;new URLSearchParams(window.location.search).forEach(((e,n)=>{t.searchParams.has(n)||t.searchParams.append(n,e)}));const n=Object.assign({},e);if(n.resultsPageBaseUrl=t.toString(),this.wantsToServeAds){const e=new URLSearchParams;e.append("click","true"),e.append("session",this.uuid);const t=Object.assign({},this._signature);delete t.ad_loaded_callback,delete t.caf_loaded_ms,delete t.caf_timed_out,delete t.flex_rule,delete t.frame,delete t.js_error,delete t.no_ads_redirect,delete t.page_headers,delete t.page_request,delete t.page_loaded_callback,delete t.popup,delete t.screen_resolution,delete t.user_has_ad_blocker,delete t.user_preference,delete t.user_supports_darkmode,delete t.user_using_darkmode,delete t.zeroclick,e.append("signature",encode(t)),n.clicktrackUrl=`${TRACKING_DOMAIN}${ADS_TRACKING_URL}?${e.toString()}`}return n}))}get baseURL(){const e=new URL(this._baseURL.origin);return e.searchParams.append(ADS_PARAM,"1"),this._baseURL.searchParams.forEach(((t,n)=>{e.searchParams.append(n,t)})),e}get pageOptions(){const e=Object.assign({},this._pageOptions);return Object.keys(this._pageOptions).forEach((t=>{t.startsWith("bodis")&&delete e[t]})),e}get cannotLoadAds(){return!this.ads.loaded}get wantsToServeAds(){return new URLSearchParams(window.location.search).has(ADS_PARAM)}get adsMode(){return this.ads.loaded&&this.wantsToServeAds}get adsReady(){return this.wantsToServeAds&&!this.cannotLoadAds}get noAdsRedirectUrl(){const e=new URLSearchParams(window.location.search);return KNOWN_CAF_PARAMS.forEach((t=>e.delete(t))),`${window.location.origin}?${e.toString()}`}get callbacks(){return this.ads.toCallbacks()}toContext(){return Object.assign({blocks:this.blocks,pageOptions:this.pageOptions},this.ads.toContext())}}class CookieConsentManager{constructor(){this.injectScriptTag=()=>__awaiter(this,void 0,void 0,(function*(){return new Promise((e=>{const t=document.createElement("script");t.setAttribute("src",COOKIE_CONSENT_JS_URL),t.addEventListener("load",(()=>this.awaitConsent(e))),t.addEventListener("error",(()=>e(!1))),document.head.appendChild(t)}))}))}inject(){return __awaiter(this,void 0,void 0,(function*(){this.injected||!COOKIE_CONSENT_JS_URL||isLocal()||(this.injected=yield this.injectScriptTag())}))}awaitConsent(e){let t=0;const n=setInterval((()=>{t+=1,20===t&&(clearInterval(n),e(!0)),void 0!==window.__tcfapi&&(window.addEventListener("ConsentActivity",(t=>{const{detail:{status:n}}=t;n&&e(!0)})),clearInterval(n))}),50)}}class Cheq{constructor(e){let t;if(t="string"==typeof e?parseInt(e,10):e,t<0||t>100)throw new Error("Load percentage must be between 0 and 100");this.loadPercentage=t}inject(e,t){return __awaiter(this,void 0,void 0,(function*(){if(this.injected)return;100*Math.random()<=this.loadPercentage&&(this.injected=this.injectScriptTag(e,t))}))}injectScriptTag(e,t){const n=document.createElement("script");return n.type="text/javascript",n.async=!0,n.setAttribute("src","https://ob.forseasky.com/i/148870ae21863d775c347e8893c985af.js"),n.setAttribute("data-ch","cheq4ppc"),n.setAttribute("data-uvid",e),n.setAttribute("data-utm-campaign",t.toString()),n.className="ct_clicktrue_73521",document.head.appendChild(n),!0}}class App{main(){var e,t,n;return __awaiter(this,void 0,void 0,(function*(){if(this.parkResponse=decode(),this.findDomainResponse=yield getFindDomain(),!this.findDomainResponse)throw new Error("Domain failed to load.");this.pixels=Pixels.build(this.findDomainResponse),null===(e=this.pixels)||void 0===e||e.listenForEvents(),this.adblock=new Adblock,yield this.adblock.inject(),this.google=Google.build(this.findDomainResponse,this.parkResponse,this.adblock,buildSignature({context:this.context,callbacks:null===(t=this.google)||void 0===t?void 0:t.callbacks},"click")),this.google.injectTagManager();const i=Parking.build(this.findDomainResponse,this.google);Render.prerender(i);const s=(null===(n=this.findDomainResponse)||void 0===n?void 0:n.referral)?AFD_REFERRAL_CHEQ_LOAD_PERCENTAGE:AFD_ORGANIC_CHEQ_LOAD_PERCENTAGE;this.cheq=new Cheq(s),this.cheq.inject(this.parkResponse.uuid,this.findDomainResponse.userId),this.cookieConsentManager=new CookieConsentManager,yield this.cookieConsentManager.inject();let a=Failed.cannotPark(this.findDomainResponse);if(a)return void(yield this.transitionToFailed(a,i));yield this.google.injectAds();let o=Disabled.build(this.findDomainResponse,this.adblock.state);if(o)return void(yield this.transitionToDisabled(o,i));const r=this.adblock.hasAdblocker();r&&this.adblock.handleAdblocked();const d=Sales.build(this.findDomainResponse);if(d)return void(yield this.transitionToSales(d));this.eligibleForZeroClick&&(this.zeroClickResponse=yield getZeroClick(this.context));const c=Redirect.build(this.findDomainResponse,this.zeroClickResponse,this.google);if(c)yield this.transitionToRedirect(c);else{if(r)return o=Disabled.build(this.findDomainResponse,this.adblock.state),void(yield this.transitionToDisabled(o,i));a=Failed.noSponsors(this.google),a?yield this.transitionToFailed(a,i):yield this.transitionToParking(i)}}))}transitionToParking(e){return __awaiter(this,void 0,void 0,(function*(){this.state=e,Render.template(e),Render.revealPage(),yield this.google.waitForBlocks(),yield this.track()}))}transitionToRedirect(e){return __awaiter(this,void 0,void 0,(function*(){this.state=e;const t=this.track();Render.revealPage(),yield waiter(e.delay,(e=>Render.loading(e))),yield t,window.location.href=e.url,log(`➡ Redirecting [${e.url}]`)}))}transitionToFailed(e,t){return __awaiter(this,void 0,void 0,(function*(){this.state=e,Render.message(e.message),Render.injectJS(t.javascript),Render.revealPage(),yield this.track()}))}transitionToSales(e){return __awaiter(this,void 0,void 0,(function*(){this.state=e,e.init(this.context),yield this.track()}))}transitionToDisabled(e,t){return __awaiter(this,void 0,void 0,(function*(){this.state=e,Render.message(e.message),Render.injectJS(t.javascript),"adblocker"===e.reason&&t.bannerAdblockerOnly&&Render.revealSalesBanner(),Render.revealPage(),yield this.track()}))}track(){var e;return __awaiter(this,void 0,void 0,(function*(){if(!this.state.track)return Promise.resolve();try{const t=this.state.trackingType;return null===(e=this.pixels)||void 0===e||e.dispatchEvent({type:t}),trackVisit({context:this.context,callbacks:this.google.callbacks},t)}catch(e){return}}))}get eligibleForZeroClick(){const{cannotPark:e,canZeroClick:t,zeroClick:n}=this.findDomainResponse,{cannotLoadAds:i,wantsToServeAds:s}=this.google;return this.adblock.state!==Blocking.BLOCKED&&(!!t&&(!!e||(!(!i||s)||!!(null==n?void 0:n.reason))))}get context(){var e,t,n,i;const s=this.findDomainResponse,a=this.parkResponse,o=null===(e=this.state)||void 0===e?void 0:e.toContext(),r=null===(t=this.adblock)||void 0===t?void 0:t.toContext(),d=null===(n=this.google)||void 0===n?void 0:n.toContext(),c=browserState(),l=Object.assign(Object.assign({},null===(i=this.findDomainResponse)||void 0===i?void 0:i.zeroClick),this.zeroClickResponse);return Object.assign(Object.assign(Object.assign(Object.assign(Object.assign(Object.assign(Object.assign({app_version:APP_VERSION},s),a),r),d),o),c),{zeroClick:l})}init(){return __awaiter(this,void 0,void 0,(function*(){try{window.__parkour=this,yield this.main()}catch(e){console.error("app",e);const t=Failed.fromError(e);this.state=t,Render.message(t.message),Render.revealPage()}}))}}(new App).init(),exports.App=App}));