5 Increasingly Effective Ways to Achieve Immortality

5 Increasingly Effective Ways to Achieve Immortality



[ Subscribe to the Podcast: iTunes | Android | RSS ]



I think a lot about how to become immortal. More than I should, probably.

Many think it’s a waste of time. Everyone dies, and it’s foolish to think we can avoid it. This piece takes a different view, and describes a number of ways, with varying levels of requirement and effectiveness, one can either avoid dying or live on after death.

They’ll go from most practical to most effective.

1. Live On Through Your Children

This one is cheating a bit, mostly because you’re not actually becoming immortal.

But the fact remains that this does give many people (probably billions) a genuine feeling of lastingness, and that’s significant.

Again, I don’t really count it because it’s an extremely tenuous way of living on, but it deserves mention.

2. Live On Through Your Works

This one is kind of like the first, in that you’re not actually getting to continue living. So it’s a bit of a misnomer too.

What it deals with, however, can also provide a significant sense of contentment at the end of one’s life. Basically, if you leave behind works and ideas that will be used by significant numbers of people, for a significant period of time, you can think of this as living on.

It’ll take some sting off of dying, perhaps. But not much. You’re still dead.

3. Reconstruction Through Reproduction of Variables

Ok, now we’re getting into actual survivability.

This one works like this: either before you die, or after you are dead, an organization collects a series of inputs about you and uses them to create a working model of you.

Here are some of the input types:


* Your DNA (this is really important)
* Everything there is to know about where you grew up (what was happening in the world then, where you went to high school, what the major news events were, the major themes in culture and art, etc.)
* Everything there is to know about the people you grew up with
* All your personal, transformational experiences. This can be gathered from a myriad of sources, but your own description of the incidents will be key. It’ll also come from interviews with people who know those experiences and how they affected you
* Every piece of output you left behind, e.g. blog posts, Facebook posts, books, essays, schoolwork, letters, videos, whatever. They’re all harvested for evidence of who you are


Then, the system takes the environment data and models it against your DNA, which it got from a piece of hair or something. It runs your entire genome and determines how you would respond mentally to these various stimuli.

The output is a digital life form that is, as much as it can be, you. You now live in cyberspace somewhere, and you’re introduced to the fact that you were reconstructed using this method, and that you have this rich history, etc. You are you.

4. Preserving Your Brain to Be Put in Another Body in the Future

Another method for achieving comfort that you’ll continue to live after death is to have a reliable way to preserve your brain once you pass, with the belief that it’ll be either 1) put into another body later (not my favorite idea), or 2) it’ll be downloaded into a digital form to live permanently in cyberspace.

Become a Member: https://danielmiessler.com/upgrade

See omnystudio.com/listener for privacy information.

Jaksot(532)

Unsupervised Learning: No. 173

Unsupervised Learning: No. 173

Amazon has many thousands of people doing quality control on Alexa, meaning that they're listening to incoming audio captured on Echo devices. This shouldn't be surprising. The question is how they're doing it, and what policies they have around privacy when doing so. I don't personally see a major problem here. But at the same time I'd never put a Facebook device in my home. To me it's more about the company and its incentives than anything else. LinkA number of FBI-affiliated websites were hacked, and information on thousands of federal agents and law enforcement officers are now being sold online. LinkChinese schools are using facial recognition on students, and using ML to determine whether or not they're currently paying attention, distracted, etc. LinkSift is a service that builds a risk profile on you so merchants can determine whether you're a benign actor or someone about to commit fraud. I think people need to accept that continuous risk scoring for people and situations is both inevitable and actually already happening. The moment you try to block bad actors by looking at their behavior, you quickly end up with a score that determines action based on various thresholds. And the moment you do it for bad actors, you're kind of implicitly doing it for good actors as well. There are better and worse ways to approach this, but profile scoring is not something we're going to be able to avoid going forward. Let's accept this reality and start having the conversations about how to make (and keep) this functionality as benign as possible. LinkA Dutch F-16 was damaged by rounds from its own 20MM cannon. So it fired bullets, and then flew into them. Life is awesome. LinkBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

14 Huhti 201924min

Unsupervised Learning: No. 171

Unsupervised Learning: No. 171

Mastercard is looking to create a Digital ID service that can bind your digital presence to your mobile device, which will be able to verify you to various services. Palantir has won an $800 million contract to build the next combat intelligence system (to replace DCGS-A) for the Army. Putin appears to be causing brain drain in Russia. Dropbox has an interesting proposal for improving vendor security assessments. TL;DR: They turned their requirements into contractual points. LOVE IT. Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

1 Huhti 201919min

Unsupervised Learning: No. 169

Unsupervised Learning: No. 169

Multiple governments have now blacklisted Huawei, which Huawei seems very confused by. The best explanation I've heard so far about why this move makes sense for western countries came from Rob Joyce of NSA. He basically said that just like Kaspersky in Russia, the reason you can't trust Huawei is that it's a Chinese company, and even if they're not already infiltrated by the Chinese government, they can be at any moment without anyone knowing that it happened. And there's nothing Huawei or anyone else could do to stop it. Strong argument. Link2/3 of Android antivirus apps are hot garbage. Gasp. LinkDARPA is building an open-source, secure voting system. That's their goal, anyway. I'm skeptical of being able to build truly secure systems, but I have lots of confidence in DARPA, and I also know the bar for improvement over the current state is quite low. So, yeah, go forth and prosper. LinkThe RAND Think Tank conducts wargames between the U.S. and its potential enemies, such as Russia and China, and one analyst said that we keep losing. The issue seems to be that our key advantages can be neutralized rather easily, and it'd take a lot of money to fix the biggest issues. LinkBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

18 Maalis 201918min

Unsupervised Learning: No. 167

Unsupervised Learning: No. 167

This is a description of cyberwar that sounds quite realistic to me, and it's based around the thousand-cuts idea. Ring Doorbells have a vulnerability that allows one to capture clear-text videos and other data from the cameras if you can get on the wireless network that the camera is using. An independent security researcher found the Dow Jones Watchlist database sitting open on the internet. Schneier talks here about how easy it is to influence people in sensitive positions, similar to my post on China building a database on us.…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

3 Maalis 201934min

Unsupervised Learning: No. 165

Unsupervised Learning: No. 165

OpenAI text spoofing, Twitter DMs, Chinese tracking database, Ponemon Cyber Risk Score, Technology News, Human News, Ideas Trends & Analysis, Discovery, Recommendations, and the Weekly Aphorism…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

21 Helmi 201923min

Unsupervised Learning: No. 163

Unsupervised Learning: No. 163

My takeaways from ENIGMA 2019—one of my two favorite conferences in the world. The US has charged Huawei with stealing trade secrets, money laundering, and fraud. This escalates the already tense situation with China on a number of fronts. An engineer does a Twitter thread on AI-created videos on YouTube. He describes how they are created, promoted, and selected for display in recommendations. Fascinating read. This is a video of thieves scanning a BMW key fob through the wall of the owner's house, and driving away in their car. It could be that proximity-based security devices might need a trigger event (from the owner) before becoming active, like for mobile payments.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

4 Helmi 201916min

An Overview of the OWASP IoT Top 10 for 2018

An Overview of the OWASP IoT Top 10 for 2018

We just released the 2018 version of the OWASP Internet of Things Top 10, and in this episode I talk you through the list and give the philosophy, methodology, and next steps for the project.Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

7 Tammi 201914min

Unsupervised Learning: No. 159

Unsupervised Learning: No. 159

German politicians hacked, NSA's new RE tool, Weather Channel tracking, sick TSA agents, Facebook dust tracking, Technology News, Human News, Ideas, Discovery, Recommendations, and the weekly Aphorism…Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

7 Tammi 201928min