Una reflexión urgente sobre los cambiosque laIA está generando en las estructurasde poder, la creatividad, la guerra,la responsabilidad y el amor.En 2017 Vladimir Putin sentenció: "Quien domine la InteligenciaArtificial, dominara el mundo". Hace ocho años estas palabras podian sonar desmesuradas, pero hoy en dia reflejan una realidad escalofriante. No por nada, hay quienes comparan la carrera por la supremacia en el desarrollo de la Inteligencia Artificial con el proyecto Manhattan, que produjo las primeras armas nucleares. Es una carrera millonaria, en la que participan Estados y empresas privadas, y que cambiara para siempre ya lo esta haciendo la forma como los seres humanossomos gobernados o dominados, la forma como creamos y nos relacionamos con el arte, nuestra concepcion de la responsabilidad, nuestra forma de hacer la guerra, nuestra forma de amar. Este libro aborda con profunda lucidez los desafios que la Inteligencia Artificial plantea en estos ambitos de la vida humana.Aun no sabemos quien dominara la Inteligencia Artificial; lo que si sabemos, advierte Pedro Salazar Ugarte, es que el empuje tecnologico esta impulsando la mayor concentracion de poder en la historia. El podereconomico, el poder politico y el poder ideologico se funden en una peligrosa alianza totalitaria que amenaza las libertades de las personas. Por ello, este libro es tambien un llamado a imaginar maneras de regular el fuego prometeico de laIA, para explotar sus enormes beneficios y mitigar sus numerosos riesgos.
Stop Relying on Black Box Tools and Start Building Your Own.Offensive security isnt just about running scripts; its about implementing engineering solutions. Red Team Engineering will show you how to transition from penetration tester to red team operatortaking you beyond the basics of exploitation to teach you the how of professional offensive development and infrastructure engineering.Casey Erdmann, an experienced red team operator, guides you through the complete development life cycle of a modern cyber operation. Using a project-based approach, youll engineer a complete offensive arsenal as you: Build full-stack credential harvesting apps with HTML, JavaScript, PHP, and MySQL. Create brute-force and password-spraying tools in Python to attack SMB services. Use Go to craft custom ransomware with encryption/decryption logic. Abandon manual server setups for reproducible, disposable infrastructure. Deploy C2 servers, redirectors, and phishing infrastructure on AWS. Youll also learn how to: Tunnel through firewalls with reverse VPNs using OpenVPN and PiVPN. Manage fleet configurations at scale with Salt Project. Simulate execution of end-to-end scenarios like deploying a physical dropbox. Whether your goal is to understand the enemy or to level up your penetration testing skills, Red Team Engineering will show you how to build professional-grade hacking tools that get the job done.
A personal chronicle of three key legal privacy battles that have defined the digital age and shaped the internet as we know it.From a seasoned leader in the field of digital privacy rights.Throughout her career, Cindy Cohn has been driven by a fundamental question: Can we still have private conversations if we live our lives online? Privacys Defender chronicles her thirty-year battle to protect our right to digital privacy and shows just how central this right is to all our other rights, including our ability to organize and make change in the world.Shattering the hypermasculine myth that our digital reality was solely the work of a handful of charismatic tech founders, the author weaves her own personal story with the history of Crypto Wars, FBI gag orders, and the post-9/11 surveillance state. She describes how she became a seasoned leader in the early digital rights movement, as well as how this work serendipitously helped her discover her birth parents and find her life partner. Along the way, she also details the development of the Electronic Frontier Foundation, which she grew from a ragtag group of lawyers and hackers into one of the most powerful digital rights organizations in the world.Part memoir and part legal history for the general reader, the book is a compelling testament to just how hard-won the privacy rights we now enjoy as tech users are, but also how crucial these rights are in our efforts to combat authoritarianism, grow democracy, and strengthen other human rights.
In the lucrative world of digital loot boxes and card packs, players believe they are at the mercy of pure, mathematical randomness. They grind for hours or spend real money hoping for a legendary drop, completely unaware that the game is actively monitoring their frustration levels. To prevent players from quitting after a streak of bad luck, developers implemented a brilliant psychological safety net: the Pity Timer.This hidden code tracks exactly how many times you have failed to receive a high-value reward. As your losing streak extends, the algorithm quietly manipulates the odds in your favor behind the scenes. Eventually, the Pity Timer hits its threshold and guarantees a legendary drop, providing a massive dopamine hit exactly when you were about to abandon the game.Pity Timer Mechanics dissects the sophisticated behavioral engineering used to keep players addicted. It exposes how pseudo-randomness is weaponized to maintain the illusion of luck while strictly controlling the digital economy.Understand the invisible rules governing your favorite games. By recognizing the mathematical strings pulling your emotions, you can break the cycle of digital slot machines and regain control over your spending habits.