Another day, another Tesla suddenly veers off a road and kills someone.
The crash took place about 5:20 p.m. on Sunday, Oct. 20, at Joshua and South roads in Apple Valley, San Bernardino County Sheriff’s Department officials said.
Romo was at the wheel of a Tesla Model 3 headed south on Joshua Road just before the crash, the sheriff’s department said in a written statement. A 38-year-old Apple Valley man was riding as a passenger.
“The Tesla lost control and veered off the west roadway edge, went airborne after hitting a dirt berm, and rolled several times,” the statement said.
Notably, the crash happened on a clear evening with empty and dry roads.
Roads across America are in danger of a remote controlled Tesla causing distribution, damage and even death.
“Due to reasons under investigation, the Tesla lost control as it attempted to overtake a vehicle in the right lane by using the off-ramp from 12th Street,” state police said. “As a result, the Tesla struck the right side of the Freightliner. The left side of the Freightliner then struck the right side of the Equinox.”
The impact caused the Equinox to go over the concrete median and across northbound traffic, police said.
The out-of-control Chevy SUV then struck a 2021 Ford F-150XLT pickup truck in the right northbound lane, investigators said. The force of impact caused the Ford pickup truck to flip onto its side and slide across the other northbound lanes.
Chain reactions like this, caused by a single small action, are the kind of asymmetric warfare service that Tesla will offer foreign and domestic threats.
The Guardian describes how and why Russians bought Twitter in order to platform domestic terrorism in America.
Ken McCallum, the head of MI5, the UK’s domestic intelligence service, publicly stated earlier this month that Russia was responsible for “arson, sabotage” and other “actions conducted with increasing recklessness” on European and British soil.
In a September announcement on SimpleX, a newly adopted encrypted chat service for some far-right extremists, the Base told its recruits to consume their content via its VK account, the Russian version of Facebook, or its Rutube channel.
And in a series of September and October VK posts where it describes the “process for joining the Base in [the] USA”, the group also curiously dropped a new email with a Mail.Ru address – the email provider of a well-known ally of the Russian president, Vladimir Putin.
The British have it figured out. And while many examples are about Americans moving to Russia, and opening Russian accounts, it’s clear the Russian acquisition of Twitter was a targeted plan to instigate violence and interfere with British, EU and American elections.
Elon Musk’s constant display of an affinity for Nazism is simply a case of the puppet serving his foreign master.
While Apple’s technology itself could be seen as innovative and privacy-preserving in a very narrow view, their implementation of a closed ecosystem has dangerous lock-in effects. A properly open, standards-based approach could deliver these benefits while preserving the fundamental user agency and platform choice required for actual safety. Having led the early design and delivery of encrypted virtual machines in 2010 and delivered industry-changing field level client-side encryption of NoSQL by 2019, I can say with confidence there are better fundamental paths ahead for AI safety than what is being offered by Apple.
Security and Privacy Checklist
Here’s a set of tests to expose systems designed with too much lock-in:
Does it use open standards for homomorphic encryption in AI applications?
Does it use interoperable protocols that allow encrypted data sharing across platforms?
Does it have community-audited implementations?
Does it use decentralized approaches where encrypted processing happens on edge devices?
Does it use peer-to-peer networks for sharing encrypted embeddings?
Are encryption keys and processing user-controlled?
Are there clear user controls over data usage and sharing?
Is there an ability to revoke access to historical data?
Are there options for local-only processing?
Critical Analysis of Apple’s AI Encryption Strategy
I couldn’t help but notice how Apple frames their belief in privacy, without the really important part said out loud about barriers to exit.
At Apple, we believe privacy is a fundamental human right [that you lose if you jump ship].
In the late 1700s philosopher David Hume clearly warned that any vendor who gives the option to jump off a ship only in the middle of the ocean is not giving any real option.
Problem 1: Centralized Infrastructure Control
While the data remains encrypted, Apple maintains complete control over the homomorphic encryption infrastructure
Users are dependent on Apple’s proprietary implementation and cannot easily migrate to alternative systems
The “networked” benefits are confined within Apple’s ecosystem
Problem 2: Encryption Implementation
The security relies entirely on Apple’s proprietary implementation of homomorphic encryption