Logo
    Search

    Podcast Summary

    • Streamlining hiring with Indeed and managing personal finances with Rocket MoneyUsing Indeed for hiring saves time and money, while Rocket Money helps manage finances by identifying and canceling unwanted subscriptions, saving an average of $720 per year. Be cautious with technology, as convenience can sometimes compromise security.

      When it comes to hiring efficiently and effectively, using a platform like Indeed can save time and money, while delivering high-quality candidates. Indeed's large visitor base and advanced matching engine help streamline the hiring process, allowing employers to focus on connecting with the best candidates. Additionally, personal finance management is crucial, and apps like Rocket Money can help identify and cancel unwanted subscriptions, saving an average of $720 per year. Meanwhile, advancements in technology, such as computers, offer incredible flexibility but also vulnerabilities. In the context of computer hacking, convenience often trumps security, and even well-meaning individuals can unintentionally compromise systems. Listen to the podcast for a deeper exploration of these topics with guest Scott Shapiro.

    • The intersection of technology, philosophy, and law in cybersecurityExploring the ethical and philosophical implications of hacking beyond just the technical and legal aspects can help us better understand the motivations and consequences of cyber attacks, and inform steps to mitigate risks and secure our digital world.

      The intersection of technology, philosophy, and law is crucial in understanding the complex issue of hacking and cybersecurity. Scott Shapiro, a philosophy professor and author of "Fancy Bear Goes Fishing," shares his personal background in computer science and how his work on the history of war led him to explore cybersecurity. He discusses the challenges of teaching a class on law and technology of cyber conflict and how he eventually focused on separate classes for technology, law, and philosophy. The philosophy of Internet hacking class, in particular, highlights the importance of considering the ethical and philosophical implications of hacking, beyond just the technical and legal aspects. This multi-disciplinary approach can help us better understand the motivations behind hacking, the potential consequences, and the steps we can take to mitigate risks and secure our digital world.

    • Understanding the Differences Between Viruses and Worms in HackingViruses trick users to execute them while worms operate autonomously and spread through networks, requiring unique approaches to combat cyber threats

      Hacking goes beyond just exploiting computer code and also targets the principles of computation. Hacking is defined as an activity that attempts to bypass security controls, such as entering credentials or passwords. While viruses and worms are self-replicating computer programs, they use trickery differently. Viruses trick users into executing them, while worms trick operating systems or network protocols. The difference between viruses and worms lies in who executes them and how they spread. Worms operate autonomously and spread through networks, making them particularly dangerous on the Internet. Historically, viruses were spread through physical means like floppy disks, but they don't move from one computer to another via networks. The technical, philosophical, and legal aspects of hacking are closely interconnected, and it's important to understand the nuances of viruses and worms to effectively combat cyber threats.

    • The principles of computing that make computers possible also make hacking possibleDespite advancements in technology, the ongoing battle between hackers and developers continues due to the inherent vulnerabilities in the principles of computing

      The concept of completely secure computers, free from hacking, is a utopian idea. This idea stems from the fact that the very principles that make computers possible, such as those proposed by Alan Turing in 1936, also make hacking possible. Turing, a brilliant mathematician and computer scientist, invented the theory of a general computing machine at the age of 23, which paved the way for modern computing. However, the same principles that enable computers to solve problems are exploited by hackers to gain unauthorized access. The floppy disk, an ancient technology, serves as a reminder of the evolution of computing and the inherent vulnerabilities that come with it. While we can learn new languages like French using modern tools such as Babbel, the iconic floppy disk icon still represents the past and the present of the digital world. Ultimately, the cat-and-mouse game between hackers and developers will continue, and it's essential to understand the historical context and philosophical implications of this ongoing battle.

    • Turing's Discovery of Code and Data UnityTuring discovered that code and data can be processed using the same symbols, leading to the development of universal computers and shaping modern computing.

      Alan Turing, a pioneering computer scientist, made a groundbreaking discovery that code and data, which we perceive as distinct, can be represented and processed using the same symbols, specifically binary digits or bits. This revelation led to the development of universal computers, capable of running various programs without requiring a complete rebuild, as opposed to early computing systems where each program required significant hardware modifications. Turing's insight also highlighted that the distinction between code and data is a human construct, and that both are fundamentally physical entities, made up of atoms, in the case of computers. This discovery, which bridged the gap between code and data, has significant implications for modern computing and continues to shape our understanding of hacking and the evolving nature of technology.

    • Exploiting physical systems and human psychology in hackingHacking can exploit both the physical limitations of systems and human psychology, requiring a holistic approach to cybersecurity that considers both technical 'down code' and social 'up code'.

      Hacking can exploit both the physical limitations of systems and the imperfect human psychology. Physical systems, such as computers, can be hacked through side channel attacks, which read off information from the changes in the physical system. Meanwhile, humans can be hacked through phishing attempts that exploit our psychological shortcuts. Additionally, the author emphasizes the importance of considering the "up code" or the norms and rules above our fingertips, as they provide incentives for certain behaviors and can be just as vulnerable to exploitation as the technical "down code." For instance, the infamous Morris Worm incident in 1988, which caused the early internet to crash, showcased both human error and the importance of social context in cybersecurity. Overall, understanding the connection between physical systems, human psychology, and social norms is crucial for effectively addressing cybersecurity challenges.

    • First major Internet worm causes chaos in 1988In 1988, a graduate student unintentionally caused widespread Internet crashes with a worm, leading to the first major cybersecurity incident and the recognition of the need for cybersecurity laws.

      The Internet in 1988 was vastly different from what we know today. Robert Morris Jr., a graduate student at Cornell University and an astronomer at Harvard, released a worm exploiting vulnerabilities in the Unix operating system, specifically UNIX 4.2, which was the first major distribution connected to the Internet. Morris, intrigued by the size of the Internet, unintentionally caused a massive infection that led to widespread crashes. He was eventually prosecuted under the Computer Fraud and Abuse Act, marking a significant event in cybersecurity history. Despite the chaos, the Internet did not have a widely recognized name or definition, making it a fascinating time in the development of digital communication.

    • The Fragility of Complex Systems: A Connection Between Computers and BiologyThe connection between computers and biological systems reveals the importance of evolutionary challenges and resilience in complex systems, highlighting the coexistence of good and bad elements

      The Internet, like complex systems such as living organisms or ecosystems, has both designed and evolved elements. The Internet's vulnerability comes from its lack of evolutionary challenges and the constant efforts to keep it safe. The analogy between computers and biological systems was first explored by John Von Neumann, who discovered the fragility of early computers and was fascinated by the resilience of biological systems. He hypothesized that self-replication was the key to their resilience and later, this idea became the basis for computer viruses and worms. This connection between biological systems and computer systems highlights the idea that the good (computers) cannot exist without the bad (hacking or viruses). The historical and intellectual significance of this analogy continues to shape our understanding of complex systems.

    • The Bulgarian Virus Era: A Time of Underemployment and Cyber ThreatsDuring the Bulgarian Virus Era, underemployed tech professionals created sophisticated viruses, like Dark Avenger's polymorphic engine, highlighting the need for continuous cybersecurity advancements.

      While progress has been made in creating self-repairing computer systems, they are not yet advanced enough to regenerate their own parts or outsmart sophisticated viruses like the one created by the infamous Dark Avenger. The Bulgarian viruses in the early 1990s were a major issue, and Dark Avenger, a prolific virus writer with a fondness for heavy metal music, created a polymorphic virus engine that constantly mutated, making it difficult for antiviral software to identify and neutralize. This period in computer history was significant because Bulgaria, which was the Silicon Valley of the Eastern Bloc, had many underemployed engineers who turned to creating viruses as a way to express their skills. While the identity of Dark Avenger remains a mystery, the story serves as a reminder of the importance of staying ahead of cyber threats and the potential consequences of underemployment in tech industries.

    • Hacking is a social activity with a desire for recognitionContrary to stereotype, hackers crave social validation and recognition from their peers, and there's a gender imbalance in the hacking community, with efforts being made to divert young offenders into the cybersecurity industry.

      Hacking, as portrayed in popular culture, is not an antisocial or solitary activity. The woman in the story, who was a pioneer in the field of crisis counseling for young men involved in virus writing, discovered this firsthand. She encountered many young hackers, mostly boys and men, on Fido Net, a precursor to the modern Internet. Contrary to the stereotype of hackers as socially awkward or neurodivergent individuals, she found that they craved recognition and social validation from their peers. This desire for clout is still present in the hacking community today. The gender imbalance in hacking is also a significant issue, with most hackers being male. To address this, some countries have started creating legitimate hacking venues and diverting young offenders into the cybersecurity industry. Hacking, despite its negative connotations, has a crucial social aspect. Even in the anonymous world of the Internet, hackers want their peers to acknowledge their skills and achievements.

    • Exploiting Systems for ProfitCybercriminals can cause damage and then sell solutions, highlighting the importance of addressing up code and systems incentives.

      Individuals with malicious intentions can exploit systems and create problems, then offer solutions to those problems for a profit. This was exemplified in the story of Paras Shah, who used his skills to disrupt Rutgers University's registration system and then offered his services to mitigate the very attacks he had created. This is a classic example of racketeering and a common occurrence in the world of cybersecurity. Additionally, the Mirai botnet, which took advantage of Internet of Things devices, demonstrated a new and concerning trend in cyber attacks. Up code, or the systems and incentives that shape down code, should be a focus in preventing these types of attacks. Regarding the unrelated topic of Maybelline's Instant Age Rewind Eraser Foundation, it is a medium coverage foundation that provides a natural finish while protecting and nourishing the skin with SPF 20 and pro vitamin B5. The blurring sponge tip applicator makes application easy and helps achieve a flawless, radiant complexion.

    • Lack of strong security policies led to Mirai botnet attackWeak security policies can lead to massive botnet attacks, exploiting publicly available information and default passwords. Rehabilitation programs for cyber offenders and securing personal data are potential solutions.

      Strong security policies are just as important as advanced technology in protecting against cyber threats. The Mirai botnet, which exploited default passwords in Internet of Things devices, serves as a prime example. In 2016, these hackers used publicly available information to gain access to countless devices and created a massive botnet, causing widespread internet outages. The problem wasn't the technology itself, but the lack of security measures. Hackers continue to exploit these vulnerabilities, releasing new variants of malware. Moreover, hackers can deceive by renaming malware and presenting it as new, improved versions. However, there is hope in the form of rehabilitation programs for cyber offenders. The FBI's use of hackers for community service to help catch malware providers is a promising approach. Lastly, we can't forget about the infamous hack of Paris Hilton's cell phone in 2005, which highlighted the importance of securing personal data. Despite advancements in technology, it's crucial to remember that weak security policies can lead to significant consequences.

    • A 16-year-old hacked Paris Hilton's cloud in 2004Weak authentication systems and interconnected tech vulnerabilities were exploited in a simple yet significant hack, emphasizing the importance of strong security measures and ongoing education in cybersecurity.

      The cloud, not Paris Hilton's cell phone, was hacked by a 16-year-old boy named Cameron LaCroix in 2004. He exploited weak corporate policies and authentication systems to gain access to her data. The hack was simple yet significant, highlighting the vulnerabilities of interconnected systems and the human element in cybersecurity. Law professors, including those who write about cybersecurity, play a crucial role in understanding both the technical aspects and the human incentives behind cyber attacks. They aim to teach students how to create robust security systems and navigate the ethical complexities of the digital world. This story underscores the importance of strong authentication systems, awareness of the interconnected nature of technology, and the ongoing need for education and innovation in cybersecurity.

    • Understanding the human motivations behind cyber attacksCyber espionage is legal under international law and human motivations play a significant role in cyber attacks, often leading to complex interplays between nations and organizations.

      The Fancy Bear story, which is the title of the book, highlights the complex interplay between the philosophical and social aspects of cybersecurity. While people often focus on the technical indicators, it's essential to understand the human motivations and rationales behind cyber attacks. The author emphasizes that when hacking is done for collecting national security information, it's known as espionage, and it's legal under international law. This explains why hacking is a common practice among nations, and why the FBI might not prioritize responding to such attacks. Additionally, the DNC's reluctance to engage with the FBI could be due to their ongoing investigation into Hillary Clinton's email server. These up code elements shed light on the nuanced reasons behind the delayed response and the seemingly irresponsible actions of both the FBI and the DNC.

    • Russian hackers break unspoken rule, leading to 2016 DNC data breachHuman error and vulnerabilities can lead to significant data breaches, even for politically powerful organizations with extensive resources.

      The 2016 DNC hack was a result of a change in tactics by the Russian hacking group "Fancy Bear," who broke the unspoken rule of keeping information quiet after gaining access to a system. Everyone involved was acting rationally within their respective contexts, but the massive data dump turned espionage into something akin to cyber war. In a world where anonymity is increasingly difficult due to social media, the crucial step in the hack was John Podesta's giving up his password to the Russians. Securing a political campaign is a complex task, and despite the resources of state-sponsored agencies, human error and vulnerabilities can lead to significant breaches.

    • Hillary Clinton email scandal: Russian hacking was not due to campaign's lack of cybersecurityBe cautious with emails, especially those asking for password changes or sensitive info. Phishing emails are a common tactic for hackers to make money, not steal data.

      While the Hillary Clinton email scandal involved Russian hacking, it was not her campaign's lack of cybersecurity that led to the breach. Instead, the Russians targeted the personal Gmail account of John Podesta using a phishing email, which he mistakenly thought was legitimate. This incident underscores the importance of being cautious with emails, especially those that ask for password changes or other sensitive information. Hackers often use phishing emails as part of a high-volume business model to make money, not to spy on individuals or steal personal data. However, it's crucial to stay vigilant and not be reckless with cybersecurity. For most people, taking basic precautions like not clicking on links from unknown sources and keeping software up-to-date can help protect against cyberattacks.

    • Staying Safe: High-Value Targets and CybersecurityHigh-value targets like journalists, politicians, CEOs, and activists should seek expert advice to protect themselves from cyber threats. Everyone should be aware of potential risks and take basic security measures.

      Individuals considered high-value targets, including journalists, politicians, CEOs, and human rights activists, should assume they are being targeted and take professional help if they're not sophisticated enough to protect themselves. While it's unavoidable for nation-states to hack each other for national security information, individuals not in these categories can still implement basic security measures to stay safe. However, if you fall under the high-value target category, seeking expert advice is crucial. Given the broad audience of this podcast, it's essential for everyone to be aware of these risks and take necessary precautions. Scott Shapiro's book provides valuable insights and practical advice for individuals to secure their digital footprint and mitigate potential threats. In summary, being informed and proactive is the best defense against cyber threats.

    Recent Episodes from Sean Carroll's Mindscape: Science, Society, Philosophy, Culture, Arts, and Ideas

    276 | Gavin Schmidt on Measuring, Predicting, and Protecting Our Climate

    276 | Gavin Schmidt on Measuring, Predicting, and Protecting Our Climate

    The Earth's climate keeps changing, largely due to the effects of human activity, and we haven't been doing enough to slow things down. Indeed, over the past year, global temperatures have been higher than ever, and higher than most climate models have predicted. Many of you have probably seen plots like this. Today's guest, Gavin Schmidt, has been a leader in measuring the variations in Earth's climate, modeling its likely future trajectory, and working to get the word out. We talk about the current state of the art, and what to expect for the future.

    Support Mindscape on Patreon.

    Blog post with transcript: https://www.preposterousuniverse.com/podcast/2024/05/20/276-gavin-schmidt-on-measuring-predicting-and-protecting-our-climate/

    Gavin Schmidt received his Ph.D. in applied mathematics from University College London. He is currently Director of NASA's Goddard Institute for Space Studies, and an affiliate of the Center for Climate Systems Research at Columbia University. His research involves both measuring and modeling climate variability. Among his awards are the inaugural Climate Communications Prize of the American Geophysical Union. He is a cofounder of the RealClimate blog.


    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    275 | Solo: Quantum Fields, Particles, Forces, and Symmetries

    275 | Solo: Quantum Fields, Particles, Forces, and Symmetries

    Publication week! Say hello to Quanta and Fields, the second volume of the planned three-volume series The Biggest Ideas in the Universe. This volume covers quantum physics generally, but focuses especially on the wonders of quantum field theory. To celebrate, this solo podcast talks about some of the big ideas that make QFT so compelling: how quantized fields produce particles, how gauge symmetries lead to forces of nature, and how those forces can manifest in different phases, including Higgs and confinement.

    Blog post with transcript: https://www.preposterousuniverse.com/podcast/2024/05/13/275-solo-quantum-fields-particles-forces-and-symmetries/

    Support Mindscape on Patreon.

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    AMA | May 2024

    AMA | May 2024

    Welcome to the May 2024 Ask Me Anything episode of Mindscape! These monthly excursions are funded by Patreon supporters (who are also the ones asking the questions). We take questions asked by Patreons, whittle them down to a more manageable number -- based primarily on whether I have anything interesting to say about them, not whether the questions themselves are good -- and sometimes group them together if they are about a similar topic. Enjoy!

    Blog post with questions and transcript: https://www.preposterousuniverse.com/podcast/2024/05/06/ama-may-2024/

    Support Mindscape on Patreon.

    Here is the memorial to Dan Dennett at Ars Technica.

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    274 | Gizem Gumuskaya on Building Robots from Human Cells

    274 | Gizem Gumuskaya on Building Robots from Human Cells

    Modern biology is advancing by leaps and bounds, not only in understanding how organisms work, but in learning how to modify them in interesting ways. One exciting frontier is the study of tiny "robots" created from living molecules and cells, rather than metal and plastic. Gizem Gumuskaya, who works with previous guest Michael Levin, has created anthrobots, a new kind of structure made from living human cells. We talk about how that works, what they can do, and what future developments might bring.

    Blog post with transcript: https://www.preposterousuniverse.com/podcast/2024/04/29/274-gizem-gumuskaya-on-building-robots-from-human-cells/

    Support Mindscape on Patreon.

    Gimez Gumuskaya received her Ph.D. from Tufts University and the Harvard Wyss Institute for Biologically-Inspired Engineering. She is currently a postdoctoral researcher at Tufts University. She previously received a dual master's degree in Architecture and Synthetic Biology from MIT.

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    273 | Stefanos Geroulanos on the Invention of Prehistory

    273 | Stefanos Geroulanos on the Invention of Prehistory

    Humanity itself might be the hardest thing for scientists to study fairly and accurately. Not only do we come to the subject with certain inevitable preconceptions, but it's hard to resist the temptation to find scientific justifications for the stories we'd like to tell about ourselves. In his new book, The Invention of Prehistory, Stefanos Geroulanos looks at the ways that we have used -- and continue to use -- supposedly-scientific tales of prehistoric humanity to bolster whatever cultural, social, and political purposes we have at the moment.

    Blog post with transcript: https://www.preposterousuniverse.com/podcast/2024/04/22/273-stefanos-geroulanos-on-the-invention-of-prehistory/

    Support Mindscape on Patreon.

    Stefanos Geroulanos received his Ph.D. in humanities from Johns Hopkins. He is currently director of the Remarque Institute and a professor of history at New York University. He is the author and editor of a number of books on European intellectual history. He serves as a Co-Executive Editor of the Journal of the History of Ideas.


    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    272 | Leslie Valiant on Learning and Educability in Computers and People

    272 | Leslie Valiant on Learning and Educability in Computers and People

    Science is enabled by the fact that the natural world exhibits predictability and regularity, at least to some extent. Scientists collect data about what happens in the world, then try to suggest "laws" that capture many phenomena in simple rules. A small irony is that, while we are looking for nice compact rules, there aren't really nice compact rules about how to go about doing that. Today's guest, Leslie Valiant, has been a pioneer in understanding how computers can and do learn things about the world. And in his new book, The Importance of Being Educable, he pinpoints this ability to learn new things as the crucial feature that distinguishes us as human beings. We talk about where that capability came from and what its role is as artificial intelligence becomes ever more prevalent.

    Blog post with transcript: https://www.preposterousuniverse.com/podcast/2024/04/15/272-leslie-valiant-on-learning-and-educability-in-computers-and-people/

    Support Mindscape on Patreon.

    Leslie Valiant received his Ph.D. in computer science from Warwick University. He is currently the T. Jefferson Coolidge Professor of Computer Science and Applied Mathematics at Harvard University. He has been awarded a Guggenheim Fellowship, the Knuth Prize, and the Turing Award, and he is a member of the National Academy of Sciences as well as a Fellow of the Royal Society and the American Association for the Advancement of Science. He is the pioneer of "Probably Approximately Correct" learning, which he wrote about in a book of the same name.

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    AMA | April 2024

    AMA | April 2024

    Welcome to the April 2024 Ask Me Anything episode of Mindscape! These monthly excursions are funded by Patreon supporters (who are also the ones asking the questions). We take questions asked by Patreons, whittle them down to a more manageable number -- based primarily on whether I have anything interesting to say about them, not whether the questions themselves are good -- and sometimes group them together if they are about a similar topic. Enjoy!

    Blog post with questions and transcript: https://www.preposterousuniverse.com/podcast/2024/04/08/ama-april-2024/

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    271 | Claudia de Rham on Modifying General Relativity

    271 | Claudia de Rham on Modifying General Relativity

    Einstein's theory of general relativity has been our best understanding of gravity for over a century, withstanding a variety of experimental challenges of ever-increasing precision. But we have to be open to the possibility that general relativity -- even at the classical level, aside from any questions of quantum gravity -- isn't the right theory of gravity. Such speculation is motivated by cosmology, where we have a good model of the universe but one with a number of loose ends. Claudia de Rham has been a leader in exploring how gravity could be modified in cosmologically interesting ways, and we discuss the current state of the art as well as future prospects.

    Blog post with transcript: https://www.preposterousuniverse.com/podcast/2024/04/01/271-claudia-de-rham-on-modifying-general-relativity/

    Support Mindscape on Patreon.

    Claudia de Rham received her Ph.D. in physics from the University of Cambridge. She is currently a professor of physics and deputy department head at Imperial College, London. She is a Simons Foundation Investigator, winner of the Blavatnik Award, and a member of the American Academy of Arts and Sciences. Her new book is The Beauty of Falling: A Life in Pursuit of Gravity.


    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    270 | Solo: The Coming Transition in How Humanity Lives

    270 | Solo: The Coming Transition in How Humanity Lives

    Technology is changing the world, in good and bad ways. Artificial intelligence, internet connectivity, biological engineering, and climate change are dramatically altering the parameters of human life. What can we say about how this will extend into the future? Will the pace of change level off, or smoothly continue, or hit a singularity in a finite time? In this informal solo episode, I think through what I believe will be some of the major forces shaping how human life will change over the decades to come, exploring the very real possibility that we will experience a dramatic phase transition into a new kind of equilibrium.

    Blog post with transcript and links to additional resources: https://www.preposterousuniverse.com/podcast/2024/03/25/270-solo-the-coming-transition-in-how-humanity-lives/

    Support Mindscape on Patreon.

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    269 | Sahar Heydari Fard on Complexity, Justice, and Social Dynamics

    269 | Sahar Heydari Fard on Complexity, Justice, and Social Dynamics

    When it comes to social change, two questions immediately present themselves: What kind of change do we want to see happen? And, how do we bring it about? These questions are distinct but related; there's not much point in spending all of our time wanting change that won't possibly happen, or working for change that wouldn't actually be good. Addressing such issues lies at the intersection of philosophy, political science, and social dynamics. Sahar Heydari Fard looks at all of these issues through the lens of complex systems theory, to better understand how the world works and how it might be improved.

    Blog post with transcript: https://www.preposterousuniverse.com/podcast/2024/03/18/269-sahar-heydari-fard-on-complexity-justice-and-social-dynamics/

    Support Mindscape on Patreon.

    Sahar Heydari Fard received a Masters in applied economics and a Ph.D. in philosophy from the University of Cincinnati. She is currently an assistant professor in philosophy at the Ohio State University. Her research lies at the intersection of social and behavioral sciences, social and political philosophy, and ethics, using tools from complex systems theory.


    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    Related Episodes

    270 | Solo: The Coming Transition in How Humanity Lives

    270 | Solo: The Coming Transition in How Humanity Lives

    Technology is changing the world, in good and bad ways. Artificial intelligence, internet connectivity, biological engineering, and climate change are dramatically altering the parameters of human life. What can we say about how this will extend into the future? Will the pace of change level off, or smoothly continue, or hit a singularity in a finite time? In this informal solo episode, I think through what I believe will be some of the major forces shaping how human life will change over the decades to come, exploring the very real possibility that we will experience a dramatic phase transition into a new kind of equilibrium.

    Blog post with transcript and links to additional resources: https://www.preposterousuniverse.com/podcast/2024/03/25/270-solo-the-coming-transition-in-how-humanity-lives/

    Support Mindscape on Patreon.

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    17 | Annalee Newitz on Science, Fiction, Economics, and Neurosis

    17 | Annalee Newitz on Science, Fiction, Economics, and Neurosis
    The job of science fiction isn't to predict the future; it's to tell interesting stories in an imaginative setting, exploring the implications of different ways the world could be different from our actual one. Annalee Newitz has carved out a unique career as a writer and thinker, founding the visionary blog io9 and publishing nonfiction in a number of formats, and is now putting her imagination to work in the realm of fiction. Her recent novel, Autonomous, examines a future in which the right to work is not automatic, rogue drug pirates synthesize compounds to undercut Big Pharma, and sentient robots discover their sexuality. We talk about how science fiction needs more economics, how much of human behavior comes down to dealing with our neuroses, and what it's like to make the transition from writing non-fiction to fiction. Annalee Newitz is currently an Editor at Large at Ars Technica. She received her Ph.D. in English and American Studies from UC Berkeley. She founded and edited io9, which later merged with Gizmodo, where she also served as editor. She and Charlie Jane Anders host the podcast Our Opinions Are Correct, a bi-weekly exploration of the meaning of science fiction. Home page Wikipedia page Amazon author page Articles at io9/Gizmodo Articles at Ars Technica Our Opinions Are Correct podcast See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    97 | John Danaher on Our Coming Automated Utopia

    97 | John Danaher on Our Coming Automated Utopia

    Humans build machines, in part, to relieve themselves from the burden of work on difficult, repetitive tasks. And yet, despite the fact that machines are everywhere, most of us are still working pretty hard. But maybe that’s about to change. Futurists like John Danaher believe that society is finally on the brink of making a transition to a world in which work would be optional, rather than mandatory — and he thinks that’s a very good thing. It will take some adjusting, personally as well as economically, but he envisions a future in which human creativity and artistic impulse can flourish in a world free of the demands of working for a living. We talk about what that would entail, whether it’s realistic, and what comes next.

    Support Mindscape on Patreon.

    John Danaher received an LLM degree from Trinity College Dublin and a Ph.D. from University College, Cork. He is currently Senior Lecturer in the School of Law at the National University of Ireland, Galway. His research is situated at the overlap of legal studies and philosophy, and frequently involves questions of technology, automation, and the future. He is the coeditor of Robot Sex: Social and Ethical Implications, and author of the recent book Automation and Utopia: Human Flourishing in a World Without Work. He writes frequently for publications such as The Atlantic, The Guardian, and The Irish Times, and is the host of his own podcast, Philosophical Disquisitions.


    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.