This article is from the source 'rtcom' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.
You can find the current article at its original source at https://www.rt.com/news/438968-assange-last-interview-blackout/
The article has changed 4 times. There is an RSS feed of changes available.
Version 2 | Version 3 |
---|---|
Generation being born now is the last to be free – Assange in last interview before blackout (VIDEO) | Generation being born now is the last to be free – Assange in last interview before blackout (VIDEO) |
(about 20 hours later) | |
Before his links to the world were cut by his Ecuadorian hosts, WikiLeaks founder Julian Assange gave an interview on how technological advances are changing humankind. He said global surveillance will soon be totally unavoidable. | |
The interview was provided to RT by organizers of the World Ethical Data Forum in Barcelona. Assange, who is currently stranded in the Ecuadorian Embassy in London with no outside communication except with his legal team, has a pretty grim outlook on where humanity is going. He says it will soon be impossible for any human being to not be included in global databases collected by governments and state-like entities. | |
“A small child now in some sense has to negotiate its relationship with all the major world powers… It puts us in a very different position. Very few technically capable people are able to live apart, to choose to live apart, to choose to go their own way,” he added. “It smells a bit like totalitarianism – in some way.” | “A small child now in some sense has to negotiate its relationship with all the major world powers… It puts us in a very different position. Very few technically capable people are able to live apart, to choose to live apart, to choose to go their own way,” he added. “It smells a bit like totalitarianism – in some way.” |
The capacity to collect and process information about people has been growing exponentially and will continue to grow fast, he stated. With advancements in applying Artificial Intelligence (AI) to big data, the next logical step is coming. | The capacity to collect and process information about people has been growing exponentially and will continue to grow fast, he stated. With advancements in applying Artificial Intelligence (AI) to big data, the next logical step is coming. |
READ MORE: Ecuador pledged to not kick out Assange, but threat of US prosecution still serious – lawyer to RT | READ MORE: Ecuador pledged to not kick out Assange, but threat of US prosecution still serious – lawyer to RT |
“Look at what Google and Baidu and Tencent and Amazon and Facebook are doing. They are basically open-cut harvesting the knowledge of humankind as we express it, when we communicate with each other… This classical model, which people in academia call ‘surveillance capitalism’… has changed now. | “Look at what Google and Baidu and Tencent and Amazon and Facebook are doing. They are basically open-cut harvesting the knowledge of humankind as we express it, when we communicate with each other… This classical model, which people in academia call ‘surveillance capitalism’… has changed now. |
Assange also predicted that the scale of hostile activities through cyberspace will see a breakout point as soon as AI is trained to sufficiently automate hacking attacks. | Assange also predicted that the scale of hostile activities through cyberspace will see a breakout point as soon as AI is trained to sufficiently automate hacking attacks. |
“There is no border [online]. It’s 220 milliseconds from New York to Nairobi. Why would there ever be peace in such a scenario?” he said. “[Entities online] are creating their own borders using cryptography. But the size of the attack surface for any decent-sized organization, the number of people, different types of software and hardware it has to pull inside itself means that it is very hard to establish. | “There is no border [online]. It’s 220 milliseconds from New York to Nairobi. Why would there ever be peace in such a scenario?” he said. “[Entities online] are creating their own borders using cryptography. But the size of the attack surface for any decent-sized organization, the number of people, different types of software and hardware it has to pull inside itself means that it is very hard to establish. |
WATCH FULL INTERVIEW: | WATCH FULL INTERVIEW: |