Difference between revisions of "Dead man's switch"
m (clarification / minor addon) |
|||
Line 3: | Line 3: | ||
|description=A system designed to operate if a human is incapacitated. | |description=A system designed to operate if a human is incapacitated. | ||
}} | }} | ||
+ | The standard usage example is to prevent a machine from causing (further) harm.<ref>https://www.wisegeek.com/what-is-a-dead-mans-switch.htm</ref> | ||
+ | Converse examples are designed to ''cause'' harm in the lack of human intervention, for example by firing off nuclear missiles automatically if a country's leaders are incapacitated.<ref>https://foxtrotalpha.jalopnik.com/the-soviets-made-a-real-doomsday-device-in-the-80s-and-1794225196</ref> | ||
+ | |||
+ | In another form it can mean that certain information will be released in case of harm or [[death | unnatural death]]. Among other things, this is likely something that would be considered in case somebody is in the possession of very sensitive information which has the potential to be considered a threat to national security, like video recording of [[sexual blackmail | pedophilia]] acted out by people in influential positions, such as [[politicians]] who are heads of states. | ||
{{SMWQ | {{SMWQ | ||
|source_name=Twitter | |source_name=Twitter | ||
Line 12: | Line 16: | ||
|authors=John McAfee | |authors=John McAfee | ||
}} | }} | ||
− | + | ||
− | |||
{{SMWDocs}} | {{SMWDocs}} | ||
==References== | ==References== | ||
{{reflist}} | {{reflist}} | ||
{{Stub}} | {{Stub}} |
Revision as of 19:20, 3 February 2020
Dead man's switch | |
---|---|
A system designed to operate if a human is incapacitated. |
The standard usage example is to prevent a machine from causing (further) harm.[1] Converse examples are designed to cause harm in the lack of human intervention, for example by firing off nuclear missiles automatically if a country's leaders are incapacitated.[2]
In another form it can mean that certain information will be released in case of harm or unnatural death. Among other things, this is likely something that would be considered in case somebody is in the possession of very sensitive information which has the potential to be considered a threat to national security, like video recording of pedophilia acted out by people in influential positions, such as politicians who are heads of states.
“I've collected files on corruption in governments. For the first time, I'm naming names and specifics. I'll begin with a corrupt CIA agent and two Bahamian officials. Coming today. If I'm arrested or disappear, 31+ terrabytes [sic.] of incriminating data will be released to the press.”
John McAfee (9 June 2019) [3]
Related Quotation
Page | Quote | Author | Date |
---|---|---|---|
Dead man's switch | “I've collected files on corruption in governments. For the first time, I'm naming names and specifics. I'll begin with a corrupt CIA agent and two Bahamian officials. Coming today. If I'm arrested or disappear, 31+ terrabytes [sic.] of incriminating data will be released to the press.” | John McAfee | 9 June 2019 |