Technology Is The Master Of Modern Slavery

Tyler Durden's picture

Authored by Tom Chtham via Project Chesapeake,

The recent cyber attack on computers worldwide is just the latest wakeup call to the future we are blindly building for ourselves. The vast majority of humanity embraces technology like it is their next breath of air. Without it, they feel like they will die.

Technology is a double edged sword that we wield that must be handled with care less we cut off one of our own limbs. Technology allows us to be more productive and work faster than without it but as we embrace more technology to relieve us of many manual tasks we must not let it rule our very existence.

Technology must be used as a lever, not a crutch. When we give up our ability to function in daily life and allow technology to rule our every move, we ultimately give up our freedom. To allow technology to dictate what we can do and when we can do it is to reduce ourselves to nothing more than compliant slaves to it.

When a hospital cannot perform operations or even see patients because their computers are down or we cannot communicate or travel because of computer hacking, we have allowed technology to become a crutch that prevents us from falling on our faces in its absence. When we cannot buy food or fuel or depend on electrical power for basic needs we have become too dependant on the technology we invented to assist us.

The use of technology is a good thing that allows us to move forward and build things we never dreamed of before but when it becomes a weakness, we need to reexamine our use of it. If we become so dependant on technology that we cannot function without it we are preparing ourselves for a doomsday scenario when it eventually fails and we are helpless to care for ourselves.

It is only logical to have backup systems to utilize in the event our technology fails for some reason. This is the whole reason we have people to warn us before hand such as the EMP Commission to tell us we are in danger if certain events happen. Technology provides us with many good things but it also leaves us susceptible to many bad things as well if we ignore our responsibility to use it wisely and not become too dependant on it.

Many people today can actually have withdrawal symptoms if they lose access to their technology for any length of time. This should be an alarm to society but most just brush it off as fear mongering. When the loss of technology causes a business to completely stop operations, that should be an indication they do not have sufficient backup systems to fall back on.

One of the prime tenants of the prepper movement is that they have multiple backup systems to rely on if technology stops working. This is just a logical step taken by people that have taken the time to analyze the threats posed by the loss our technology and determine action is warranted for the preservation of life following certain events. The less technology you require to take care of daily activities, the more freedom you have to live a normal life.

Most people still do not take the threat of technological disruptions to society seriously. They think that if something happens, someone will fix it and life will go on as normal. What they refuse to contemplate is if something happens and nobody can fix it. As society moves along this technological road they become more dependent on it and the risk to their lives increases as they lose the ability to do basic tasks. Hopefully this latest cyber attack will instill in people the need to have backup systems in place to continue their daily activities and live life as a free person and not be a slave to the technology they so eagerly seek.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
East Indian's picture

Then they could replace the ruling class too

meta-trader's picture

you can add an extra 1500/USD week after week in your income just working on the internet for a couple of hours each day... check this link...

tmosley's picture

>When we give up our ability to function in daily life and allow technology to rule our every move, we ultimately give up our freedom.

180 degrees, completely and totally incorrect. I, for one, don't feel any less free for not knowing how to nap stone arrows. No, my mindpower has been freed up for more useful things. When we let technology take over for us on basic tasks, and eventually more aand more advanced tasks, that frees us up to to the things we want to do. This is the opposite of slavery.

The author would do well to pick up a dictionary and find out what the difference is between "master" and "slave". Just because you need to practice basic security doesn't make you a slave.

0valueleft's picture

You sound a bit like an addict, not saying you are of course. It might be that you are the exception and actually do use your extra free time generated by technology for more than just more kitten videos and more porn.

The truth is a small percentage of our population is actually productive, and said tech certainly can increase their production, but the rest, not so much. I just wasted 3 minutes reading and responding to your comment. Now multiply that times 40 facebook twitter instagram snap whatfuckingever interfaces a day (conservatively) and multiply that times the unproductive population and it might be obvious why they have to fake the GDP or all data for that matter.

If you were born after 1980, you'll never understand and I don't blame you for defending it. There is no contrast for perspective.


bonderøven-farm ass's picture

Technology is deflationary.

Bask in your self-imposed servitude, bitchezz.......

tyrone's picture

This article is bullshit.  The problem with computer technology which allows intrusions is virtually unique to only one operating system:  Microsoft windows.

The other common operating systems on servers and workstations are Linux, UNIX,  BSD, and Apple iOS (a BSD variant) all have more robust security against intrusions.  The blatant flaw is that Microsoft Windows does not prevent UNSOLICITED incoming traffic.  Meaning, that the only traffic which should\ be permitted is response to traffic INITIATED by the local computer

neighsayer's picture

It doesn't help if people don't maintain their computers...

07564111's picture

How can people maintain their computer when M$ shit comes with security issues pre-installed or when so called 'fixes' supplied by the Mossad/NSA/CIA/MI6 stooges at M$ continue to open holes.

Are you a M$ shill ??

Sam.Spade's picture

Short answer:  Go open source.  Go Linux and ditch Microsoft and Apple.

But, to address the underlying question that you are really asking:  How can we stay free when Fascists use technology to own our thoughts?

There is a positive answer to that question, but it's neither simple or easy.  But you do need to start seeking it if you don't want your children to be slaves.

As I said in my post below, start your search by getting your hands on a copy of Thieves Emporiium.

lil dirtball's picture

> getting your hands on a copy of Thieves Emporiium

Slop. Simplistic, shallow, unimaginative and outdated. Stop promoting this drivel.

Sam.Spade's picture

120 Amazon readers disagree with you.  Quoting some recent Amazon reviews:

"Frightening, but great read from an author who has clearly learned to think for himself and fear the masses."  David V. Farrell

"BEST fictionaized practical intro to the still-emerging post-Internet "Underground" yet! Comprehensive, practical, concise and clearly presented. 100% cybertech-accurate and STILL comprehensible to the newcomer to the Web. (NOT "cyuberpunk", please rtest assured.)

Full of surprises from the start, plotwise. A fast-paced, thoroughly enjoyable romp of a realistically gritty Human Interest adventure."  Reverend Walking Turtle

"The story is intriguing and the writing is excellent, but it's the issues that the author addresses that make this an important read. The world is changing, perhaps irreversibly, and we each owe it to ourself to at least understand the issues at stake before our freedom is lost."  Marion Wright

Have you even read the book, or are you just shooting off your mouth for fun?

lil dirtball's picture

> 120 Amazon readers disagree with you.

120 zombies are still 120 zombies regardless of where they congregate on the interwebs.

> Have you even read the book, or are you just shooting off your mouth for fun?

Hold on ... I'm in the badlands and don't have my wheels.

L0l. The vernacular is bullshit and makes no sense in light of when it was written (2014). Is the author trying to coin some new tech terms for technological terms that have been in use for going on 30 years? It's like he used an Ad-Lib Futuristic Dystopian Novel template with some words his kids thought were cool. And to make matters worse, they try and pawn this off as non-fiction when it is clearly just bad fiction.

It's bullshit writing, written by some wannabe who is obviously not an insider to tech and has little knowledge of it (completely missed digital currency as late as '14). I don't care what the Amazonians say about it. It's garbage. And, I invite anyone reading this to go read it for themselves:

Sam.Spade's picture

"I invite anyone reading this to go read it for themselves:"


Sounds like a good idea to me, too.

lil dirtball's picture

Okay, Max ... you're welcome.

Sanity Bear's picture

Your understanding of how networks work has excellent odds of being the funniest thing I will read today.

ft65's picture

>> The problem is Microsoft windows. Linux, UNIX,  all have more robust security against intrusions.

You have no clue, all systems have flaws in their code, it's just Microsoft's dominance and upgrade / patch cycle (which break other applications).

Computers are designed to run programs and instructions, which they do, all too well. Trojan horse programs designed by amateurs is only the tiny tip of a huge iceberg of computer theft.


ThanksIwillHaveAnother's picture

Flaws in code is one thing.  Flaws in architecture are entirely different.  

bjdodo's picture

Just to avoid a false sense of security, the Intel chipsets contain hardware, _hardware_, that allow intrusions. This article is about a Linux guru trying to stop this unit from functioning.

You see he is using, again, hardware to achieve what he wants. There is no way to block this functionality from software.

To quote from this article:

"The Intel Management Engine with its proprietary firmware has complete access to and control over the PC: it can power on or shut down the PC, read all open files, examine all running applications, track all keys pressed and mouse movements, and even capture or display images on the screen. And it has a network interface that is demonstrably insecure, which can allow an attacker on the network to inject rootkits that completely compromise the PC and can report to the attacker all activities performed on the PC. It is a threat to freedom, security, and privacy that can’t be ignored."

All the games that are played on our PCs at home happen at multiple levels. If you stop using Windows, you potentially block access on one level. That means that you trust the other OS that you use which might or might not be correct. However that is only one level. They have access via multiple other levels. And, just saying, if you prepare your computer to be completely safe, you have your phones, tablets and smart TVs. You will surely miss one.


Sam.Spade's picture

What do you think of computers?

bjdodo's picture

Again, you can do whatever you want form software, if your hardware is flaky and these computers seem to use the average popular Intel hardware.

Intel also has another backdoor that I am aware of:

But I am no guru at all and as you can see the Linux founder guy claims that Linux is not affected by this backdoor, I cannot judge whether this is true or not. However the intention of Intel is fully obvious, they _want_ to give access. And who really has the skillset to figure out if they are successful or not, I surely do not.

IMO we average guys simply cannot judge what exactly is going on here. What is leaked is obviously only the tip of the iceberg and that already shows that you cannot fight against such things by simply buyig something from a different vendor. Also I do not want to give the wrong impression: I strongly believe (and this is just a belief) that AMD & ARM are cooperating with those that utilize these backdoors just as happily.

If you want to fight against these things, rely on stuff that you fully understand and control. If you are as unskilled in these things as I am then this would be the power switch on the wall socket in your house, maybe the network cable. Beyond these everything is complex and you need to trust someone about your protection. Someone that you pay and do not know in person.

I am not saying that this, turning everything off is worth it because it might not be. All I am saying is that we should not let ourselves feel comfortable about these things because we utilize some technology that promises some level of security. A promise needs trust and in this area we should be very careful about what and who we trust IMO.



SgtShaftoe's picture

Yes, there is code baked into the hardware, but it's fairly easy to stop things like that from talking at the network level. Do some advanced firewalling. Also, AMD may not be quite as integrated as Intel.

exi1ed0ne's picture

Where do you think the instructions to do all that fancy filtering come from?  Even a secondary device has a CPU, and Cisco (or vendor of choice) is so far in bed with the man I'm suprised little routers don't fall out of the big one when you open the box.

BorisTheBlade's picture

They are still on Intel architecture.

Sam.Spade's picture

But they claim that all the digital blobs in the standard Intel UEFI have been elimiated in their computers with open-source code which you can, if you want, compile yourself.

bjdodo's picture

This starts to be a bit a blind leading a blind kind of discussion :-), but just for the sake of argument I'll share my opinion with you.

You understand that the first issue I gave as an example, a guy who understands what he was doing was trying to circumvent it using hardware. My understanding is that this "feature" cannot be blocked by software. I trust the skills of that guy that he would have done a software solution (or someone else) if that was possible. I doubt that the company you were asking about would have implemented a hardware solution for this problem.

About the second example, you may know that encryption algorithms rely on random numbers being unpredictable. Actually it is very difficult to write a random number generator that is really random, and it is almost impossible is to detect if the random number generator has a flaw in it, unless you know the internals or the exact behavior of the flaw. So the intel hardware have this feature that can generate random numbers. The mechanism is implemented within hardware again, I imagine in a relatively small black plastic thing. Unless you can get to the internals of that, reverse engineer exactly what is there, understand all the details and then detect the errors there, you will not be aware of this security issue. You can then rebuild your open source encryption algorithm, in the end if it is using the Intel random number generator then for those, and only for those that understand how the flaw in the random number generation works, your encryption will be breakable. No matter whether you compiled the encryption library yourself. As I said, this might not be an issue on Linux, but who knows how many other tricks Intel is pulling. And if you think that reverse engineering a piece of hardware is possible, just think about how Intel and AMD try to hide their secrets from each other.

About rebuilding your own binaries and how extra safe open source is. I know the intention is the best and I admire those guys that work on it and I am a nobody compared to them. Yet I do not trust the result of their work, here is an example why.

So when this relatively elementary security hole was relvealed in Sept 2014, this bug existed since 1.03 (August 1989) according to wikipedia ( For 25 years there was an elementary security hole. Now if you were to buy an extra secure Linux PC in August 2014, no matter who builds the binaries, the issue will be there until September, when the issue becomes publicly announced and then patched. I assume neither you nor your computer manufacturer will be able to detect a bug like this, since nobody else amongst the good people announced that they have found this hole. Simply it is impossible for small guys or organizations to discover all security holes unless it is their main job and they can compete with those that need these security holes to break into computers. At this stage this is down to statistics. Secret service that wants to remotely get into computers employs teams of highly skilled people whose daily job is to figure out security holes and not tell anyone if they find one, you are competing against them. Read about stuxnet, how that was implemented, what players knew what during its development, this can give you an idea. So this is why I personally do not trust anything, because whatever I trust that is just a belief and nothing more. I do not know how many other elementary bugs will be announced in the next 25 years.

Finally of course I use a computer and many of these gadgets, I am just keeping in mind that many people have access to everything down to the beckground image on my destop on my computer and these people can infect my computer any time with anything. It is not technology that keeps them back IMO but policies, laws, lack of motivation and all such things. Well this is what I believe.

exi1ed0ne's picture

Unless you recreate the compilers from scratch yourself there is no way to detect rogue parts of your binary until it becomes active in a detectable way.  Compilers are written in a contrived language, and optimize certain functions automatically - even assembly compilers.  That doesn't even get into the microcode inside the chips themselves that you aren't going to alter without a chip fab plant in your back yard.

Hell, there have been root kits that virtualize the the OS.  If you don't know what that means think so bad it's impressively cool.  Impossible for the average (and intermediate) user to detect.  I've been in IT for a long time and I don't know if I could do it even if I was looking for it specifically.

OnErrorResumeNext's picture

+1000 internetz for you. The MS bashing is reflexive bs propagated by anticaptialist assholes. Let another player take the top spot in the market and they become the target of the malware authors (ie, cia, nsa, etc). Those hardware holes are also there courtesy of .gov. And you can bet yer last bitcoin on that.

Relentless's picture

@tyrone you don't have a fucking clue what you're talking about do you? Unix systems were being hacked before Bill Gates even invented windows. All systems have flaws, no security is perfect. MS writes shit software, but you're fooling youself if you think your Apple or Linux system is secure. TCP/IP is the underlying protocol for the vast majority of networks out there and its a broadcast protocol, which means that everything talks to everything else. Its what ever security software you put on your network connection thats going to limit what gets sent up the wire to your system. Firewalls, access controls, whitelists, vpns, all of these are entirely dependent on the quality of the software implementing them. And even if you put good software in, you've got to face whatever vulnerabilities you've got in the embedded software running in your chipsets.

OnErrorResumeNext's picture

Agreed. TCP/IP was invented to allow missle silos to talk to each other no matter what happened. The security was given by the guys with rifles walking around the facility. Newer protocols have been developed with security baked in but between installed user base and .gov wanting continuous access to your shit it's unlikely we will see these protocols on the public web anytime soon.


Infnordz's picture

Yes, rejecting technology is stupid and too much redundancy is a cost which competition will make unaffordable.

Your last sentence is dumb, because the whole purpose of a server, TCP listener ports, and UDP ports, on all OSs, is to receive traffic not requested by the local (server) computer, only a TCP sender socket requires requested data, but can still be attacked by MitM exploits if MitM proof end-to-end encryption was not used...

MitM proof end-to-end encryption, like maybe HTTPS, should be used for most TCP network traffic and some UDP traffic, and for all Internet traffic ( ZEROHEDGE! ), to frustrate f's like the spy agencies.

That incident was caused by many complacent idiots still running, not isolated, XP/2003 instances, which was widely known to be EOL, and using a harder to secure OS architecture, with very easy to crack SMB authentication in the very dated SMB version; if NSA tools hadn't been available, it was only a matter of time!

What should happen to prevent further XP/2003 exploits (and possibly later Windows) is:

  1. Upgrade/replace all non-embedded XP/2003 machines, to at least Windows 7, and run any critical XP/2003 stuck software in an emulation environment e.g. the downloadable one for Windows 7 Pro. or locked-down XP VMs, possibly via remote access to a VM hosted on a server.  It may even be possible to use Wine in Linux/*BSD, which may remove any need to buy new hardware.
  2. Expensive machines with non-upgradeable embedded XP/2003 must be on a separate subnet isolated from stupid phisable/trickable user's machines by a security firewall or secure bridge server.
  3. OSs should support application level resource permissions, like Android, but per user, including which directories they are allowed to access.
  4. OSs should support default sandboxing application sessions, with behaviour monitoring, to safely reveal malware, with only safe changes released from the sandbox.
Victor999's picture

Before the 1800s we were slaves to horses.  What would have happened if all the horses were killed?

Juggernaut x2's picture

Horses? We can't afford to lose no horses, you dummy- send over a couple of *******.

austinmilbarge's picture

Without horses, pre 1800 productivity would have slowed for sure. But you could always walk, plow the field yourself, or use waterways for transport. Pre 1800s didn't rely on horses to support and deliver healthcare, or rely on horses to transact a sale.

Apples to oranges.

Without tech and electrical power, today's world grinds to a halt.

exi1ed0ne's picture

No, but beasts of burden are required for our complex society of specialization.  Without them the amount of labor required to feed yourself HAS to increase.  A gas powered garden tiller is technology.  So is the fucking fertilizer AND most of the seeds.  Yes, you can hand till your garden.  Yes you can get heritage seeds.  Have fun living the life of a 14th century serf without the benefit of refined metals and alloys (technology). 

Tech has set the human conciousness free to an extent that is unimaginable even 100 years ago.  Yes there are idiots who use their smartphone to facebook all day, and piss away that huge gift.  Layabouts are not unique to this point in time, and won't ever be out of fashion for the 80% or so of the population.

Yen Cross's picture

  Who's ever in charge of F/X for the SNB and ME clearing houses is really stupid. Egos destroy traders.

Sam.Spade's picture

I fear you miss the real problem entirely.

Yen Cross's picture

 I know you're clueless, and have your head up your ass.

Lore's picture

Perceptive article, IMO.  It's a long time since I worked in an office where any work could be performed during a power outage.  The usual response is for everybody to pack up and go home. 

The situation seems more disturbing for many smartphone-dependent millennials, who seem incapable even of holding a train of thought without that little screen in their hands.  It drives me nuts, going to a movie or concert or sports event and having to put up with hundreds if not thousands of those accursed little screens, glowing in the dark like a jiggly-giggly starfield. 

East Indian's picture

Lucky you. It's a long time since I worked in an office where any work could be performed at all. 

ft65's picture

Computer technology was a good tool when it was used wisely and kept relatively simplistic. But like everything, the march of time has made it overly complex and used inappropriately. Like with many things our existence has become totally dependant on computer technology which has removed all the manual (human) systems. Unlike previous technology, few people actually understand how it works how to tinker with it or how to fix it when it goes wrong.


Dependency on computer technology and the population explosion of lowly educated / unintelligent people will be mankind's downfall.   

Juggernaut x2's picture

My exposure to technology extends to my smartphone- if that goes kaput, oh well- I'll just go hunting or fishing or chase the old lady around the house.

Sam.Spade's picture

I fear the author misses the real problem entirely.  The issue facing our world is not how we can live without technology if we have to, but how we can live without the tyranny that is being imposed upon us because we use that technology.

Computers and the Internet are bifurcating our world.  The middle ground of Leave It To Beaver and Fresh Prince is gone forever.  Now we are all going to have to choose:  Either allow the uberwealthy to monitor and control our every action, to run our lives as they choose through the phones we carry in your pockets, or learn to become anonymous, to hide from them using the same technology they rely on to enslave us. 

Of course, the government won't want you to escape their harvest, so they will make any attempt to digitally 'disappear' illegal.  And that will make your choice more difficult.

So which would you rather be?  A data serf, owned by the highest bidder, or an anonymous and free cybercriminal?

The subject isn't a simple one.  No blog post could cover it.  But Thieves Emporium is an excellent book that will get you started.

Think of it as a primer on the future.

Some reviewers consider it the equal of 1984, Brave New World, or Atlas Shrugged.

The Daily Anarchist thought it was so good that they ran it as a serial which you can still read FOR FREE at

Or you can buy a copy at Amazon (rated 4.6 in 120 reviews), Nook (same rating, fewer reviews), Smashwords (ditto), or iBooks.

But however you get a copy, do it now and start reading the thing.  Because, until you do, you won't have any idea where the world around you is really going or how to navigate it.

Sanity Bear's picture

I've been contemplating this issue ever since I realized I had often been hired to implement various elements of it, which was a long long time ago already.

The application of information technology to enforcement makes any law far more oppressive than it would or could have been otherwise.

Well over a decade later I am still struggling to comprehend the full implications.

Sam.Spade's picture

Please take a look at Thieves Emporium.  I think you will find it very enlightening.

Apeon's picture

And you want me to buy it from AMAZON----wow