The Weight of Technology – 740 page – Now available in Kindle & Paperback
When time becomes identity, and identity becomes security, human intent becomes the last untrusted variable. Introduction: When Trust Reverses Direction For decades, devices existed to serve the user.You pressed a button, it obeyed.You typed a command, it complied.You were the authority. But each part of this series has shown a subtle inversion: Now we reach…
When time becomes a battlefield, machines learn to defend their own sense of self. Introduction: The Moment Machines Woke Up In Part 3, we explored how attackers target the second clock—the monotonic timeline that powers behavioral identity and trust. But modern systems are not passive victims. Somewhere in the last decade, devices quietly began to…
When the rhythm becomes a weapon, time turns hostile. Introduction: The Unseen Battlefield In Part 1, we uncovered the secret heartbeat of modern machines—the monotonic clock.In Part 2, we watched that heartbeat evolve into identity. Now comes the next question:If identity is built on timing, what happens when someone hacks time itself? This is where…
How Your Device Measures Who You Are Without Ever Asking Your Name Introduction: The New ID Card In the analog world, identity was simple.A signature.A driver’s license.A password. In the digital world, identity has become a spectrum—face scans, tokens, risk scores, device trust models. But beneath all of these lies something more primitive and more…
Introduction: The Clock You Never See Every digital device—from your phone to your router to the cheapest smart light bulb—runs on two clocks.One is the one you see: the local time you set, the clock face, the timestamp on your photos. The other is the one you were never meant to notice. This second timeline—quiet,…
By Jeremy Abram – JeremyAbram.net You’ve probably had this happen. You open an app you use every day — a social feed, a banking app, a streaming service — and something is… off. A button moved. A new prompt appears. Prices look a little different. The login screen has an extra step. You didn’t install…
Asked ChatGPT -This is an original writing from observation by me, about 10-12 years ago. I would like a detailed breakdown of how points within this article are true and factually proven true today, this is the writing of mine – “What we may or may not realize, or act on, is that most things…
Why it matters (even if you’re “not hiding anything”) Important reality check: Private/Incognito windows prevent local saving of history/autofill, but your school, employer, Wi-Fi host, or ISP can still see traffic (and any site/account you sign in to still knows it’s you). Use HTTPS everywhere; use a VPN only if permitted and appropriate. What “clearing”…
By Jeremy Abram — JeremyAbram.net The New Face of Influence Isn’t Human — It’s Algorithmic The influencer economy is evolving into something unprecedented: a marketplace where people who don’t exist command real followers, real sponsorships, and real money. These are AI models and virtual influencers—synthetic personas crafted through machine learning, CGI, and creative design. They’re…
by Jeremy Abram – JeremyAbram.net Introduction: The Hidden Life of Your Digits Your phone number used to be a simple way to stay connected — a direct line to friends, family, and work. Today, it’s one of the most persistent identifiers in the digital ecosystem. Unlike email addresses, which can be easily changed or compartmentalized,…