Miguel Afonso Caetano<p><a href="https://tldr.nettime.org/tags/UserAgents" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UserAgents</span></a> <a href="https://tldr.nettime.org/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a> <a href="https://tldr.nettime.org/tags/SmartObjects" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartObjects</span></a>: "User agents can be well-designed or they can be poorly made. The fact that a user agent is designed to act in accord with your desires doesn't mean that it always will. A software agent, like a human agent, is not infallible.</p><p>However – and this is the key – if a user agent thwarts your desire due to a fault, that is fundamentally different from a user agent that thwarts your desires because it is designed to serve the interests of someone else, even when that is detrimental to your own interests.</p><p>A "faithless" user agent is utterly different from a "clumsy" user agent, and faithless user agents have become the norm. Indeed, as crude early internet clients progressed in sophistication, they grew increasingly treacherous. Most non-browser tools are designed for treachery.</p><p>A smart speaker or voice assistant routes all your requests through its manufacturer's servers and uses this to build a nonconsensual surveillance dossier on you. Smart speakers and voice assistants even secretly record your speech and route it to the manufacturer's subcontractors, whether or not you're explicitly interacting with them:"</p><p><a href="https://pluralistic.net/2024/05/07/treacherous-computing/#rewilding-the-internet" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pluralistic.net/2024/05/07/tre</span><span class="invisible">acherous-computing/#rewilding-the-internet</span></a></p>