Honeypotting and Developer Verification

Fraud through digital honeypotting isn’t new; it’s among the slew of weapons hackers and other bad-faith actors on the web have at their disposal. When it’s already so pervasive in our own world, would it not be even more horrifying in a universe where people have access to the internet directly through their minds?

The answer is clearly yes, but what do EMPATHY’s creators, Human/Etech, have in place to prevent would-be honeypotters from taking advantage of the unsuspecting?

First of all, Human/Etech requires cerenet apps be developed in house. This is similar to Apple’s policy regarding the availability of apps in its app store, though Human/Etech goes a step further in that it doesn’t—at least at the time the EMPATHY series begins—allow for third parties of any kind to have a role in the development of cerenet-specific apps.

This should, in theory, prevent malevolent technophiles from duping unsuspecting users as happened in the story at the first link above. As one might expect, however, things don’t always go according to plan; as more hands touch any project, the likelihood increases that someone will either make a mistake or outright defy the wishes of those who set policy. But who would dare defy Wyatt Halman, Human/Etech CEO and the world’s most powerful technocrat?

You’ll have to wait until January 2019 to find out. Until then, you can stay tuned to this blog, my Twitter feed, and my newsletter for more. Thanks for visiting.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s