AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
How to Get Into a System Security Vulnerable Environment?
Google is running thousands of psychological experiments on all its users every day. They wanted to fight against the whole digital addiction thing, so they needed a way to measure digital addiction. So i hacked up versions of our ap that would be adictive for a week and ran an experiment where we never got anybody's permission,. We did it in order to test whether or not Google could be emotionally manipulated outside of its safety boundaries. It was like 30 seconds of conversation. Why wouldn't google do that?