HackerSecret.com - The Most Authoritative Site in the World on the Hacking Tools and Techniques, Penetration Testing and CyberSecurity

  • Home
  • Visit Our Shop
  • Download the free App
  • Contact us for Info
VISIT OUR SHOP! CLICK HERE !

The Intellectual Dark Web (IDW) and Dark Forest Theory

by / Friday, 14 June 2019 / Published in Hacking
Share
Tweet
Pin
0 Shares

A sci-fi trilogy called The Three Body Problem included a powerful concept called Dark Forest Theory, which basically says it’s a bad idea for people who don’t know about their surroundings to make noise that might attract attention.

Or, taken as a game theory strategy, it’s better to destroy other civilizations before they get the chance to destroy you.

Steven Hawking also disliked the idea of screaming out to potential scavengers that we’re here and vulnerable.

Another—extremely depressing—perspective is to imagine that the reason we haven’t heard from aliens is that they were all killed as soon as they got enough technology to announce that they were there. Which we just recently did, meaning they could already be on the way.

We would not have detected extraterrestrial radio traffic- nor would any ETIS have ever settled on Earth- because all were killed shortly after discovering radio.

David Brinn

Being in cybersecurity I find the analogy a bit unsettling, since the Dark Web usually traffics in the unsavory.

This reminds me a lot of the Intellectual Dark Web (IDW), which is a term coined by Eric Weinstein on Sam Harris’ podcast. He used it to describe a place where people could have meaningful conversation amongst themselves without unwanted attention—with “Dark Web” referencing the technology term for the part of the internet that isn’t directly exposed to search and browsing by regular people.

In other words, the IDW started as a place to safely enjoy real conversation, and I see this as very similar to Dark Forest Theory where you must hide to avoid being targeted.

The central thread in both the IDW and Dark Forest Theory is that your true self must remain hidden.

This may be a good strategy for a planet in a hostile galaxy, but it’s no way to behave in a democracy. Democracy requires a marketplace of ideas, and you can’t have a market without variation.

ISIS and Nazi types are the exception.

Hiding one’s opinion is the ultimate signal of unhealth in an open society. It means the conversation has ended, and the strategy has shifted to labeling and scheming. And that’s precisely what we have in 2019—not just in the US, but throughout the western world.

Let’s work on Earth climate change before trying to fix the galaxy. Priorities.

The Dark Forest and Intellectual Dark Web are respectable self-defense techniques, but they indicate a world that we don’t want to live in. It’s on all of us to rebuild an environment where they’re no longer needed.

—
Become a direct supporter of my content for less than a latte a month ($ 50/year) and get the Unsupervised Learning podcast and newsletter every week instead of just twice a month, plus access to the member portal that includes all member content.

Daniel Miessler

Share
Tweet
Pin
0 Shares
Tagged under: dark, Forest, Intellectual, Theory

Search on the site

Our customers say

Annabel M. – Systems Engineer

 
Samuel D. – Ethical Hacker

 
Karola M. – Influencer

 
Marcus P. – Private Investigator

 
Rosemary S. – Housewife

 
Amit V. – IT Consultant

 
Matthew C. – Entrepreneur

 
Aisha B. – Computer Science student

 
Li W. – IT Analyst

 
Robert C. – Programmer

 

Click here now to visit our Shop!

Click here now to visit our Shop!

Other 2300 users like you have already done it this year!

DOWNLOADED 1316 TIMES!

DOWNLOADED 1316 TIMES!

Download now Hacker Secret our free Android app.

CONTACT US NOW FOR IMMEDIATE SUPPORT!

Contact Us
Write your email address here
Write here how we can help you - we support you immediately for all your needs!

Latest posts

  • How to tell if someone is stealing your wifi

  • How to check saved passwords on Chrome

  • The Computer Security Day

  • What is digital forensics

  • How to install Metasploit in Termux?

## Are you looking for products for hacking, computer security and penetration testing? Do you need to clean up your smartphone, your PC or your site from viruses and malware? Do you need to track down someone or retrieve urgent information? Do you want to buy devices already configured to experiment all the hacking techniques quickly and easily? Do you have special needs in software or hardware? ##

Contact us now … another 2300 users like you have already done it this year!

Click here now!

 

All the techniques, products and services described or contained on this site are intendend for exclusive use of study and professional training and to test the security of own's computer network in accordance with the national legislations on access to computer and online systems. All the services provided on this site (penetration testing, social accounts hardening, Incident Response & CSIRT, MSSP, Cybersecurity Consultancy, etc.) can be provided only with prior written and documented authorization from the owners or their legitimate representatives in accordance with current national regulations .

TOP
New Order