CA Tesla Kills One in “Veered” Crash

Another day, another Tesla suddenly veers off a road and kills someone.

The crash took place about 5:20 p.m. on Sunday, Oct. 20, at Joshua and South roads in Apple Valley, San Bernardino County Sheriff’s Department officials said.

Romo was at the wheel of a Tesla Model 3 headed south on Joshua Road just before the crash, the sheriff’s department said in a written statement. A 38-year-old Apple Valley man was riding as a passenger.

“The Tesla lost control and veered off the west roadway edge, went airborne after hitting a dirt berm, and rolled several times,” the statement said.

Source: VVNG

Notably, the crash happened on a clear evening with empty and dry roads.

PA Tesla Out of Control Shuts Down Critical Infrastructure

Roads across America are in danger of a remote controlled Tesla causing distribution, damage and even death.

“Due to reasons under investigation, the Tesla lost control as it attempted to overtake a vehicle in the right lane by using the off-ramp from 12th Street,” state police said. “As a result, the Tesla struck the right side of the Freightliner. The left side of the Freightliner then struck the right side of the Equinox.”

The impact caused the Equinox to go over the concrete median and across northbound traffic, police said.

The out-of-control Chevy SUV then struck a 2021 Ford F-150XLT pickup truck in the right northbound lane, investigators said. The force of impact caused the Ford pickup truck to flip onto its side and slide across the other northbound lanes.

Chain reactions like this, caused by a single small action, are the kind of asymmetric warfare service that Tesla will offer foreign and domestic threats.

American Domestic Terrorists Operating From Russian “X” Platforms

The Guardian describes how and why Russians bought Twitter in order to platform domestic terrorism in America.

Ken McCallum, the head of MI5, the UK’s domestic intelligence service, publicly stated earlier this month that Russia was responsible for “arson, sabotage” and other “actions conducted with increasing recklessness” on European and British soil.

In a September announcement on SimpleX, a newly adopted encrypted chat service for some far-right extremists, the Base told its recruits to consume their content via its VK account, the Russian version of Facebook, or its Rutube channel.

And in a series of September and October VK posts where it describes the “process for joining the Base in [the] USA”, the group also curiously dropped a new email with a Mail.Ru address – the email provider of a well-known ally of the Russian president, Vladimir Putin.

The British have it figured out. And while many examples are about Americans moving to Russia, and opening Russian accounts, it’s clear the Russian acquisition of Twitter was a targeted plan to instigate violence and interfere with British, EU and American elections.

Elon Musk’s constant display of an affinity for Nazism is simply a case of the puppet serving his foreign master.

Apple’s AI Cryptography Fails Simple Lock Test

While Apple’s technology itself could be seen as innovative and privacy-preserving in a very narrow view, their implementation of a closed ecosystem has dangerous lock-in effects. A properly open, standards-based approach could deliver these benefits while preserving the fundamental user agency and platform choice required for actual safety. Having led the early design and delivery of encrypted virtual machines in 2010 and delivered industry-changing field level client-side encryption of NoSQL by 2019, I can say with confidence there are better fundamental paths ahead for AI safety than what is being offered by Apple.

Security and Privacy Checklist

Here’s a set of tests to expose systems designed with too much lock-in:

  • Does it use open standards for homomorphic encryption in AI applications?
  • Does it use interoperable protocols that allow encrypted data sharing across platforms?
  • Does it have community-audited implementations?
  • Does it use decentralized approaches where encrypted processing happens on edge devices?
  • Does it use peer-to-peer networks for sharing encrypted embeddings?
  • Are encryption keys and processing user-controlled?
  • Are there clear user controls over data usage and sharing?
  • Is there an ability to revoke access to historical data?
  • Are there options for local-only processing?

Critical Analysis of Apple’s AI Encryption Strategy

I couldn’t help but notice how Apple frames their belief in privacy, without the really important part said out loud about barriers to exit.

At Apple, we believe privacy is a fundamental human right [that you lose if you jump ship].

In the late 1700s philosopher David Hume clearly warned that any vendor who gives the option to jump off a ship only in the middle of the ocean is not giving any real option.

An Apple client device encrypts a query before sending it to an Apple server, and the Apple server operates on the encrypted query and generates an encrypted response, which the Apple client then decrypts. The Apple server does not decrypt the original request or even have access to the decryption key, so it is is designed to keep the Apple client query private throughout the Apple process. Source: Apple

Problem 1: Centralized Infrastructure Control

  • While the data remains encrypted, Apple maintains complete control over the homomorphic encryption infrastructure
  • Users are dependent on Apple’s proprietary implementation and cannot easily migrate to alternative systems
  • The “networked” benefits are confined within Apple’s ecosystem

Problem 2: Encryption Implementation

  • The security relies entirely on Apple’s proprietary implementation of homomorphic encryption
  • There’s no way to independently audit or verify the encryption process
  • Users must trust Apple’s claim that the data remains truly encrypted and private

Problem 3: Platform Lock-in Effects

  • By creating a powerful network effect around encrypted data sharing, Apple strengthens its ecosystem lock-in
  • The more users contribute encrypted data, the more valuable the system becomes, creating high switching costs
  • Competitors would struggle to build comparable systems without similar scale

Problem 4: Data Sovereignty Issues

  • Even though data is encrypted, users still lose direct control over how their data moves and is processed
  • The evaluation function and global POI database are controlled entirely by Apple
  • Users cannot opt out of specific data uses while maintaining platform benefits

Problem 5: Future Risks

  • If Apple’s homomorphic encryption is ever compromised, it could expose historical user data
  • Apple could potentially modify the system to reduce privacy protections in the future
  • Users have no guarantee of long-term data portability