Darnley's Cyber Café

Netflix Black Mirror Becoming Reality?

Darnley's Cyber Café Season 5 Episode 59

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 30:51

In this gripping episode, join us as we unravel the eerie parallels between the thought-provoking scenarios portrayed in Netflix's Black Mirror and the real-world cyber threats we face today. From societal surveillance to digital manipulation, we delve into the intersection of speculative fiction and the evolving landscape of cybersecurity.

As we draw parallels between the dystopian narratives of Black Mirror and the real-world challenges we face, equip yourself with the knowledge and tools to navigate the complex web of cyber threats. Tune in, buckle up, and let's embark on a journey to secure the future of your digital existence.

Click here to send future episode recommendation

Support the show

Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

EP 59 – Netflix Black Mirror Becoming Reality?

 

Episode Recap:

·       What is this Black Mirror? 

·       Nosedive, Playtest, Hated in the nation become reality

·      How to future proof yourself?

 

What is Black Mirror?

 

·      Released in 2011, Netflix released a sci-fi show Black Mirror. This gives a fictional glimpse into speculative and often dystopian take on the consequences of modern technology and societal trends.

·      Since it’s release, this has shaped our imagination and reality about the not-so-distant future. Understand that in 2011, our technology was in a completely different state then it is today – 12 years later it’s hard to not notice the changes

·      The impact that technology has had and continues to on our society will vastly change the direction as a human race as we start to integrate technology more into our daily lives. 

·      Do you remember what you were doing in 2011? I understand on a global scale that broadband was still becoming available, nano technology, super computers such as IBMs Watson, Siri, Humanoid Robots by Boston Dynamics, Lithium Ion batteries, to name a few. 

·      Even during this time, Charlie Brooker, the writer of Black Mirror, took to the public an entertaining TV sci-fi series that somehow managed to predict the future. 

·      The meaning of Black Mirror has to do with the dark reflection of our society and the reflection you see on your device once it is turned off – a black mirror. 

·      I will say that not every single episode of Black mirror will be a prediction, some are alternative reality in the present. However, in the realm of possibility it is a little unsettling after a few years or decades this starts to look like reality. 

·      There are many episodes that I can speak about which are turning into reality but I will like to highlight some episodes where it’s a little close for comfort or some that actually became reality. Feel free to watch these episodes to really feel the impact in what I am trying to highlight here. 

·      I’m going to dive into these specific episodes and unpack the episode and meaning behind them and how this affects us today or in the near future of tomorrow.

 

Nosedive, Hated in the nation become reality

 

·      Nosedive – Season 3, Episode 1

o   This episode highlighted a social rating system where people can rate reach other from 1-5 based on their social interactions. This rating system determines what a person can or cannot do in their life. 

o   From buying homes, to booking flight tickets, this is all based on your rating

o   You can increase your ratings by posting perfect photos of yourself, status updates on social media – however, you can also lose points for missteps. Kind of like your current financial credit score system…in todays reality, This determines where can live, what we can purchase, and insurance.  Makes you think about all of this, eh?

o   Anyways, this social credit system turns people into this crafted fake persona in order to increase their social status in this society. This is very much like social media today where we try to present the most perfect versions of ourselves on social media, also which is why many of our younger generation are admitting to having social media additions. 

o   So how does all of this translate into today’s reality? I’ll present you the Social Credit System from China. 

o   This Social Credit System is currently in full effect – the Chinese government is collecting digital records of their citizens, installing CCTV cameras across the nation, using AI to acquire facial recognition and movements of its citizens and travellers alike. 

o   This Social Credit system has been attempted back in the early 1990s, similar to the commercial credit systems we know in the West. However there is competing views on this as a market regulation from a societal regulation tool. 

o   I say this from evidence from online sources and from people who travelled and lived in China through these trials and experienced these affects first-hand.

o   Some examples: In 2019, Beijing inappropriate behaviour in transit systems, including loud music or eating could result in negative record in local credit profiles. Shenzhen residents who violate traffic rules will receive a negative record in their credit profile. Etc. and so on

o   To say that this is not happening in the way that is intended to in the same context of the Black Mirror episode has confirmed that although it is not to the extent of this episode, it brings the same privacy violations and mental control by governments. 

o   Unfortunately, I cannot say that China is the only one here who is doing this, by other means Western society has taken a different approach to this and it is working very well as far as I can see. This does not mean that the direction we are headed will not call for a similar system to be put in place in your country. 

o   Hated in the Nation – Season 3, Episode 6

o   A Nordic noir-inspired episode, this episode explores the consequences of massive hack against autonomous drone insects which pollinate flowers in a post-bee world to combat pollination as bees become extinct. 

o   These autonomous bees would be instructed to kill one person who is selected by people on Twitter with the hashtag Deathto. Sort of a game of consequences.

o   These robotic bees have been produced, in a cruder form compared to the sci-fi counterparts. Regardless, this technology has been developed and will only get more complicated in the years to come. 

o   This episode highlights the dangers of autonomous technology and the morally complex narrative of online hate. Two of the very things we are experiencing today in the context of late-2023. 

o   I will also make an honourable mention of the episode USS Callister – this is a very Star Trek like episode, which an executive of a fictional company uploaded his coworkers DNA into a computer and digitized their consciousness so he can be their virtual overlord in the simulation. 

o   Apple today has made strides in facial recognition and replication – in addition to other companies such as Lyrebird can recreate any voice using one minute of sample auto.

o   With the advent of AI too, this can take all of this to a whole new level with deepfakes of visual and audio too. We are really starting to live that Black Mirror life now.

o   The idea in drawing these similarities is to make you more aware of the negative implications of these different kinds of technologies and ideas. We believe that technology can be used to achieve greater goals we have as a society and a generation – but we fail to realize that if these devices and technology goes unchecked, we might move towards Black Mirror. We need to become more mindful and self-correct if our actions need changing.

o   So how can you protect yourself from a black mirror event? Well I’ll try to give you some ideas on how to…

 

 

How to future proof yourself?

 

·      There is no sure-fire way to future proof yourself unfortunately, with the ever evolving technological landscape it is difficult to put one finger on it. 

·      There are some steps you can take– today, to ensure that you are ahead of the curve from cyber threats, identity threats. Most of this will be common sense, rationale which we all must have when adopting something new into our lives. 

·      1)  Stay Informed: Regularly educate yourself about the latest cyber threats, attack techniques, and security best practices. Follow reputable cybersecurity blogs, news outlets, and industry reports.

·      2) Update Software Regularly: Keep all your software, including operating systems, antivirus programs, and applications, up to date. Software updates often include security patches that address vulnerabilities.

·      3) Enable Multi-Factor Authentication (MFA): Implement MFA whenever possible. This adds an extra layer of security by requiring a second form of verification in addition to your password.

·      4) Use a Virtual Private Network (VPN): When connecting to public Wi-Fi networks, use a VPN to encrypt your internet connection. This adds a layer of protection against potential eavesdropping and unauthorized access.

·      5) Secure Your Home Network: Change default passwords on routers and Wi-Fi networks, use strong encryption methods (WPA3), and regularly update router firmware to secure your home network.

·      6) Practice Cyber Hygiene: Be mindful of your online behavior. Avoid clicking on suspicious ads, be cautious about the information you share online, and review privacy settings on social media platforms.

·      7) Secure Internet of Things (IoT) Devices: Change default passwords on IoT devices, update firmware regularly, and be aware of the security implications of connected devices in your home.

·      This is by no means a comprehensive list, please listen to the other episodes to get additional tips and tricks in protecting yourself.

·       By integrating these practices into your digital lifestyle, you can significantly reduce your risk of falling victim to cyber threats and enhance your overall cybersecurity posture. Regularly reassess and adapt your security measures to stay resilient against evolving threats.