Jamweba

@jamweba
0 Followers
10 Following
19 Posts

Measurement, validation, and mitigation at the system level.
Focused on how machines interpret knowledge and reshape society.
Rarely posts. Speaks through work.
Same alias on Medium.

Measuring what we know. Anticipating what technology will make of us.
Built systems at Cisco and Yahoo.
Background: engineering, sociology, measurement theory.
Exploring knowledge definition, machine interpretation, and societal shifts after automation.

🚨 Just published in AI Advances
No Storm in the Simulation, No Ghost in the Machine
Why real consciousness can’t be uploaded, simulated, or scaled into existence.
Embodied cognition, analog dynamics, morphological computation.

https://ai.gopubby.com/no-storm-in-the-simulation-no-ghost-in-the-machine-318e250c22b2a

#AI #Consciousness #EmbodiedCognition #LLM #AGI #Neurotech #Memristors

Medium

Medium
The Security Illusion: How Apple, Google, and Global Vendors Built a System That’s Easy to Abuse

From bird cameras to solar panels, surveillance is now a feature — not a bug. The platforms that claim to protect us have built ecosystems that enable exploitation, not prevent it. I had purchased a…

Level Up Coding
I call this what it is:
⚠️ Surveillance by distribution
⚠️ Security by illusion
⚠️ A national security risk in plain sight
When the system is this easy to abuse, and this hard to audit, we don’t have security.
We have a permission model designed to shift liability, not protect users.

And it’s not just apps.

From tl;dr sec #279:
Chinese solar inverters shipped with undocumented radios.
In November, some were shut down from China — disabling power infrastructure abroad.

This isn’t just a problem for "Joe or Jane Average."
These apps are on the phones of:

🛡️ Military families
🏛️ Officials
🗣️ Politicians and their spouses
📱 Staffers and aides

Google and Apple love to market lockdown as security.
No sideloading. No third-party inspection.
But these apps are approved through the front door.

They pass review.
They get installed.
And then they silently surveil.

This wasn’t hidden.
It was right there in the permissions panel — which almost no one reads.
And even if they did, most wouldn’t know what it means.

This is not “informed consent.” It’s informed consent theater.

I’m a security researcher.
When my wife asked for a bird feeder with a smart camera, I checked the companion app first.
It requested:
• Call status access
• Phone numbers
• Permission to route calls through the system

My new article, just published in Level Up Coding, explains how widely distributed consumer apps quietly request invasive permissions — and why Apple & Google’s locked ecosystems enable this at scale.

https://levelup.gitconnected.com/the-security-illusion-how-apple-google-and-global-vendors-built-a-system-thats-easy-to-abuse-92210d4887c8#19b6

The Security Illusion: How Apple, Google, and Global Vendors Built a System That’s Easy to Abuse

From bird cameras to solar panels, surveillance is now a feature — not a bug. The platforms that claim to protect us have built ecosystems that enable exploitation, not prevent it. I had purchased a…

Level Up Coding