Submitted by 010101011011 t3_1234xpe in singularity
dwarfarchist9001 t1_jdthk3t wrote
Some other examples similar to the ones you list:
- Creating fake or edited scientific articles and putting them in the search results of specific researchers in order to advance the technologies it wants. (e.g. robotics, nanotechnology, biotechnology)
- Creating fake social media posts and inserting them into certain users timelines to influence them.
- Inserting exploits into software and hardware by subtly editing code or blueprints.
Viewing a single comment thread. View all comments