MINDSET with Gambrah Sampeney Kwabena Adjei: Over-sharing

0

The phenomenon that seems to characterise the artificial intelligence evolution is very intriguing.

There are also a lot of apprehensions that seems to tag it as well.

Wherever the pendulum swings shouldn’t be too much of a worry, but rather how we can deal with it.

Recently, a friend asked: “Where are all these audio formats that we use on some of these social media platforms stored, and who is actually watching what is done with them? I interjected by asking “aren’t they encrypted?”; to which my friend replied: “There are still loose ends to this stuff”.

Indeed, what my friend said startled me a bit. Then all of a sudden, the awesomeness of artificial intelligence started rushing through my mind.

So, I felt like all these audio formats being used on almost all social media platforms can be compromised in one way or another and some scrupulous people who really understand the power of AI and would want to use these audio formats for other nefarious activities can easily do so.

Due to the simple fact that to every double-edged sword, there are two sides to it.

For example, during the era of software evolution, some people took advantage by producing virus that could be used to hold people to ransom.

More so, with the advent of payment platforms like PayPal during the burst of e-commerce, some scrupulous people managed to usurp the pin code of some of the various cards that were being used to carry out payment.

So it won’t be out of place to think of possible scenarios that these audio formats on social media platforms like WhatsApp, Facebook, Tik Tok, X, etc., can expose us to.

Many of us have over-shared on these social media platforms.

Many of us have got our pictures, voice overs in the form of audio formats, our homes, pets and other extremely personal stuffs on these platforms.

For a simple fact, without one doing anything intentional on these platforms, the very thing you normally follow and its similarities get to be thrown at your face without you asking and these are all forms of the AIs.

Now assuming some people who know how to harness the power of these AIs decide to deploy their expertise in such regards by cloning some of these audio formats that sound like a voice that is known to you and decide to play a fast one on you, how would you possibly know the difference?

So, a clear example is where some people decide to use your audio voice format to lure your loved one and kidnap that loved one and demand a huge ransom for the release of that loved one.

Or your video format used on a call to deceive others.

What if the pictures of your home are being used as a usurper or a disguise to dupe others in acquiring homes or for interior decorations?

What if your audio voice is used as a voice-over for some unsavoury campaign and the like?

Notwithstanding all these possible scenarios, we can still do something about it even if we have over-shared in this regard.

From now onward, we can deploy some codes that are peculiar to us and our immediate loved ones and they can only be activated when there are suspicions of some activities in these regard.

Lastly, let us endeavour to stop over-sharing all our little details on these social media platforms.

Whether we like it or not, AIs are upon us and there is nothing we can do about that; but we can choose to understand its basic functions so as to arm ourselves in dealing with it.

Remember, big corporations or organisations, with all their cyber-security prowess, are still not able to totally deal with some of these AI vices.

Think about it?

Leave a Reply