Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Carefully with Per Axbom

Carefully with Per Axbom

Per Axbom

A podcast that shares learnings about new technology and human rights. For everyone pursuing wellbeing in a modern society. You will hear informal thoughts, essays and observations on practicing digital care... fully.
bookmark
Share icon

All episodes

Best episodes

Top 10 Carefully with Per Axbom Episodes

Goodpods has curated a list of the 10 best Carefully with Per Axbom episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Carefully with Per Axbom for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Carefully with Per Axbom episode by adding your comments to the episode page.

Carefully with Per Axbom - Typing reveals your identity

Typing reveals your identity

Carefully with Per Axbom

play

02/13/23 • 5 min

A rarely talked about field of research, known as keystroke dynamics, involves identifying individuals based on how they type on a keyboard. It's getting better, and also easier for anyone to implement.

As early as 1860, experienced telegraph operators realized they could actually recognize each individual by everyone's unique tapping rhythm. To the trained ear, the soft tip-tap of every operator could be as recognizable as the spoken voice of a family member.

Blog post: Your unique typing rhythm can reveal your identity

bookmark
plus icon
share episode
Carefully with Per Axbom - Join the Journey

Join the Journey

Carefully with Per Axbom

play

02/01/23 • -1 min

Digital tools, smart devices, AI and virtual worlds are celebrated for the problems they solve, while the problems they create are concealed or glossed over.
My name is Per Axbom and I’m a Swedish communication theorist born in Liberia. My international upbringing, my early 80s computer enthusiasm, aligned with a passion for responsible innovation, has resulted in a deep concern for human rights in a digital context.
I want to boost general knowledge about harmful impact and encourage balanced and honest conversations about possible, plausible and desirable futures.
After blogging for more than 25 years about the human perspective in digitalisation I am adding to my channels yet another podcast. You get brief insights in episodes around 7 minutes that can be listened to on a whim, and from time to time some longer expansions on current phenomena.
Do use the episodes as triggers for reflection but also conversation with people in your circles of trust.
The future is not predetermined and not something we can just leave to others to decide over. The future is something we together contribute to through our decisions. But this means we must also better understand the consequences of what we ourselves are doing today. And right now.
To guide the content I would love to hear from you. What makes you curious? What do you feel is hard to grasp in this rapidly changing world? What you think media is getting wrong and deserves a better explanation? How are you affected when it comes to attention, self-determination and health?

Get in touch by emailing [email protected].

Listen

Carefully with Per Axbom – Trailer0:00/144.01306122448981×
bookmark
plus icon
share episode
Carefully with Per Axbom - AI responsibility in a hyped-up world
play

03/20/23 • -1 min

It's never more easy to get scammed than during an ongoing hype. It's March 2023 and we're in the middle of one. Rarely have I seen so many people embrace a brand new experimental solution with so little questioning. Right now, it's important to shake off any mass hypnosis and examine the contents of this new bottle of AI that many have started sipping, or have already started refueling their business computers with. Sometimes outside the knowledge of management.

AI, a term that became an academic focus in 1956, has today mostly morphed into a marketing term for technology companies. The research field is still based on a theory that human intelligence can be described so precisely that a machine can be built that completely simulates this intelligence. But the word AI, when we read the paper today, usually describes different types of computational models that, when applied to large amounts of information, are intended to calculate and show a result that is the basis for various forms of predictions, decisions and recommendations.

Clearly weak points in these computational models then become, for example:

  • how questions are asked of the computational model (you may need to have very specific wording to get the results you want),
  • the information it relies on to make its calculation (often biased or insufficient),
  • how the computational model actually does its calculation (we rarely get to know that because the companies regard it as their proprietary secret sauce, which is referred to as black box), and
  • how the result is presented to the operator* (increasingly as if the machine is a thinking being, or as if it can determine a correct answer from a wrong one).

The operator is the one who uses, or runs, the tool.

Example of explanatory model for AI-driven communication, by Per Axbom.

What we call AI colloquially today is still very far from something that 'thinks' on its own. Even if texts that these tools generate can resemble texts written by humans, this isn't stranger than the fact that the large amount of information that the computational model uses is written by humans. The tools are built to deliver answers that look like human answers, not to actually think like humans.

Or even deliver a correct answer.

It is exciting and titillating to talk about AI as self-determining. But it is also dangerous. Add to this the fact that much of what is marketed and sold as AI today is simply not AI. The term is extremely ambiguous and has a variety of definitions that have also changed over time. This means very favorable conditions for those who want to mislead.

Problems often arise when the philosophical basis of the academic approach is mixed with lofty promises of the technology's excellence by commercial players. And the public, including journalists, of course cannot help but associate the technology with timeless stories about dead things suddenly coming to life.

0:00 /0:21 1×

Clip from the film Frankenstein (1931) where the doctor proclaims that the creature he created is alive. "It's alive!" he shouts again and again.

It's almost like that's the exact association companies want people to make.

We love confident personalities even when they are wrong

Many tech companies seem so obsessed with the idea of ​​a thinking machine that they go out of their way to make their solutions appear thinking and feeling when they really aren't.

With Microsoft's chatbot for Bing, for example, someone decided that in its responses it should randomly shower its operator with emoji symbols. It is the organization's design decision to make the machine more human, of course not something that the chatbot itself "thought of". It is – no matter how boring it sounds and no matter how much you try to make it "human" by having it express personal well-wishes – still an inanimate object without sensations. Even when it is perceived as "speaking its mind".

Example from Microsoft's chatbot showing its use of emojis.The image shows the bot printing text that insinuates that it wishes it was alive.

OpenAI's ChatGPT, in turn, expresses most of its responses with a seemingly incurable assertiveness. Regardless of whether the answers are right or wrong. In its responses, the tool may create references to works that do not exist, attribute to people opinions they never expressed, or repeat offensive sentiments. If you happen to know that it is wrong and point this out, it begs forgiveness. As if the chatbot itself could be remorseful.

Then, in the very next second, it can deliver a completely new and equally incorrect answer.

One problem with the diligent, incorrect answers is of course that it is difficult to know th...
bookmark
plus icon
share episode
Carefully with Per Axbom - The creepy sound of online trackers

The creepy sound of online trackers

Carefully with Per Axbom

play

09/17/22 • -1 min

I can't get the noise out of my head. People who watch the video express awe and disgust. And that is why Dutch software developer Bert Hubert's experiment is so powerful. It doesn't really uncover something that we shouldn't already know. Something we often choose to ignore. The brilliance is that it makes us incapable of ignoring.

Bert himself explains that he has had the idea for years. It's one of those things that live on in the back of your mind, until one day the stars align and you finally find that block of time when your idea surfaces at the same time.

Bert's idea appears simple:

What if your computer made a little noise each time it sends data to Google?

So this is what he did. A piece of software dubbed googerteller designed for his Linux computer that emits a scratchy beep when the computer detects information flowing out from his computer to one of Google's computers.

And here is what his first video looks like. Or rather, sounds like. It's when visiting the official Dutch government jobs site. Bert notes that it does not ask for consent for this data transfer.

Take note in the beginning when each character in the search query sends data to google in order to trigger the search suggestions.

0:00 /0:34 1×

Video by Bert Hubert

Levelling up with more trackers

After announcing the tool in a tweet the video quickly received over a million views. Spurred by this attention Bert decided to develop his tool further and include trackers not only from Google but also Facebook and dozens of other trackers.

When visiting some popular news sites, this is now what his computer sounds like:

0:00 /0:44 1×

Video by Bert Hubert

Even though I personally am acutely aware that this tracking is happening on most sites we visit today, the video and its noise still make me shiver. In case you are hard of hearing, the noise in the second video is almost constant, ongoing even as Bert is just scrolling.

It's not only about the data transfer itself. Imagine the amount of network traffic required when this happens to everyone active online. And the storage and CPU power required to process it all. Yeah, you get it.

The power of transparency

When we talk about transparency we often talk about letting people know what is going on. But it's generally the case that transparency in worded explanations and reports is hard to digest and understand. This experiment shows what can happen when people begin to understand differently. A real-time audio explanation gives new meaning to transparency.

And I believe this is only a first step. Check out Bert's post where he talks about some ideas to take the tool further, including a public live demo installation.

I personally would of course like to see a tool like this available on more platforms. And there is a lot of opportunity to allow users to add trackers and select sounds for different trackers. And of course to add the option of visual feedback for people who can not hear, such as bubbles appearing and popping for each information transfer.

For a person like myself it would almost turn into a game seeing what trackers I manage to block in my Hosts file and which ones make it through.

If someone with more skills than me is building something along these lines I would definitely be interested in contributing with design ideas. I talk a lot about awareness, and this is one of those types of tools that I believe would encourage a lot more people to have important conversations, and take action.

Thank you Bert.

Listen

The sound of online trackers0:00/321.281×
bookmark
plus icon
share episode
Carefully with Per Axbom - Your unique typing rhythm can reveal your identity
play

11/30/20 • -1 min

As early as 1860, experienced telegraph operators realized they could actually recognize each individual by everyone's unique tapping rhythm. To the trained ear, the soft tip-tap of every operator could be as recognizable as the spoken voice of a family member.

In World War II military intelligence used a methodology known as "Fist of the Sender" to identify unique ways of keying in a message's "dots" and "dashes" in Morse code. It was used to distinguish friend from foe. The pace and style of the communication allowed expert operators to deduce who was in the other end.

The more you type, the more of your unique qualities can be collected and identified

Even if people type on keyboards at approximately the same speed, everyone will have specific pauses, sequences and hold-times for certain letters that are true only for them. The more of these variables we have access to, the more certain we can be of a person's identity.

Common misspellings, errors, preferred words, punctuation, capitalisation and use of emojis will of course all play into this data. The more that is known, the closer confidence levels come to being the equivalent of a biometric fingerprint.

The behavioral biometric identifier retrieved through input via keyboard, known as keystroke dynamics, of course only gets better over time - able to take into account that your typing varies over a day or days and can be affected by external factors.

Your typing style can identify you in otherwise anonymized data

As you will likely be aware by now, this technique can of course be used to de-anonymize anyone wanting to appear anonymous online. So whatever security precautions you may have taken, keystroke logging may very well be enough to identify you.

Want to stay under the radar? Random taping of fingers, wearing gloves or consuming an alcoholic beverage may fool some software. But don't forget to also develop your vocabulary.

Note that keylogging is illegal in most countries (akin to wiretapping) and hopefully not employed as much as you might fear. But the data is very easy to collect in a digital world, by any website, and often the creators of software aren't thinking ahead on potential misuse — or maybe aren't even aware that what they are doing is illegal. Facebook was saving everything you typed, even when you didn't hit publish, very early on. TikTok today saves keystrokes when you use their internal web browser.

Who is doing what these days is not always obvious, and sometimes the logging itself is done under the guise of enhanced security, sometimes valid and sometimes not. But once again: consumer control is essentially non-existent. Awareness is all we can spread.

In 1844, on May 24, Samuel Morse sent an historic telegraph message from Washington, D.C. to Alfred Vail in Baltimore, Maryland. The message read

"What hath God wrought?".

This question perhaps invites more reflection than the modern-day oft-used sanity test : "Hello world".

Listen

Typing reveals your identity0:00/321.750204081632661×

Read more

Keystroke dynamics - WikipediaWikimedia Foundation, Inc.Contributors to Wikimedia projectsVIDEO: The Fist Of The Sender: How Much Does Typing Reveal About Us? - Columbia EntrepreneurshipThe Fist Of The Sender: How Much Does Typing Reveal About Us? With Andrew Rosenberg Director of the Computational Linguistics Program at the CUNY GraduateColumbia EntrepreneurshipColumbia Entrepreneurship | July 22, 2015The physiology of keystroke dynamicsA universal implementation for most behavioral Biometric systems is still unknown since some behaviors aren’t individual enough for identification. Habitual behaviors which are measurable by sensors are considered ‘soft’ biometrics (i.e., walking style, typing rhythm), while physical attributes (i.e...NASA/ADSJenkins, JeffreyWhat is keystroke ID (keystroke identification)? - Definition from WhatIs.comThe use of an individual’s distinctive typing dynamics can be used as a non-intrusive and reliable form of biometric authentication.TechTargetTechTarget Contributors
bookmark
plus icon
share episode
Carefully with Per Axbom - The ability that makes me who I am

The ability that makes me who I am

Carefully with Per Axbom

play

02/10/23 • -1 min

"But what is it you really work with, Per?"

I get this question from time to time in the workplace. Over the years it has, contrary to my expectations, become harder to answer. Not because I do not know, but because it is not readily summarised in an easily digestible product name.

Clients wish to purchase UX, or accessibility, or something else to do with digital design. Or perhaps a workshop facilitator, coach or course leader. Someone who fits in a template.

My strength, and weakness, has always been that I do not fit the template. And do not wish to. I can be all the things asked for. On paper. But I also must be allowed to be something more. Maybe that's why, 13 years ago, I started my own company.

I am a listener.

I listen to what you say. And intensely to what you do not say. It might align with tone of voice, choice of words, or body language. But I have difficulty explaining it any other way than this: when I listen I can hear what you already know but haven't yet heard yourself say.

Being a listener has provided me with enormous advantages. I do not rush in vain. When others are in a hurry to deliver, and create, they soon become entangled in thoughts and ideas that are difficult to let go, even as they clash with reality.

I wait until I am confident not setting off in the wrong direction. Try a few small steps, and listen. Again and again during two decades of work with digital solutions I have seen the tortoise reach the goal ahead of the hare.

The problem you have identified is perhaps not the one you need to address first. The solution you see so clearly may have several paths with very different outcomes.

As a listener I can provide what creates more wellbeing within the organisation, within you and within stakeholders impacted by your operations. It may not always turn out the way you had in mind, but often it becomes something immensely valuable.

Sometimes when I've listened a while and someone in a meeting notices my silence I am asked the question, "What do you think, Per?"

It's at this point I stand, walk up to a whiteboard, and describe what I have heard. What has been said, but not always out loud. If it's a digital solution it could be an interface I draw. If it's a strategy it could be a timeline. If it's about decision-making I perhaps sketch a flowchart.

Are you curious about what I would say? Perhaps it's time to hire me.

You have my permission to place any label you want on my role.

But I will be a listener.


You can read more about my services or package deals. But how I can best be of help to you may become more clear if you get in touch.

Listen

Carefully with per axbom 0010:00/274.15510204081631×
bookmark
plus icon
share episode
Carefully with Per Axbom - When your voice runs away from home

When your voice runs away from home

Carefully with Per Axbom

play

04/21/23 • -1 min

Your daughter, on vacation, calls you in a state of panic to let you know that she and her friend are having trouble with a payment. Please can you send some money to her friend so they can pay for the hotel room. What do you do? Your safest option is to hang up and call your daughter back. It may sound exactly like Sophie but that doesn't mean it is.

Fraud with the use of cloned voices is becoming more common. Phone calls where people are conned out of their money has been going on for decades, but the novelty today is that the voice at the other end can be a voice you know. Perhaps even a voice you share a home with.

My podcast colleague James and I have been joking about the existence of many hundreds of hours of sound material with our voices after more than a decade of shows and talks published online. Our voices can be made to say anything. I've let my family know the dilemma of this.

Your voice is also at risk

The truth is that your voice can be just as vulnerable today. The new tools only need a recorded minute of your voice to generate a believable copy. Sixty seconds. Actually Microsoft say they can do it in three. And then your voice can be made to say anything.

Anyone thinking their voice is at least not recorded to any useful extent is likely oblivious to all phone calls recorded for "educational purposes", all video meetings where you may be asking questions, parties where people are constantly filming, or all the omnipresent microphones always in our vicinity that can often be activated remotely. It's almost hard not to mistakenly record yourself from time-to-time.

Imagine: Your boss calls you into their office to ask about the circumstances of your phone call last night where you quit your job. But you haven't called. A funny "practical joke" by a colleague or a premonition of worse things to come?

What can happen?

Last week many outlets reported about Jennifer who received a phone call from a kidnapper where her daughter first said "Mom, I messed up..." and then, while the kidnapper was stating his demands, sobbed in the background, "Mom, please help me".

The undertaking failed when a separate phone call revealed her daughter was safe and sound with a friend. But Jennifer was convinced her daughter was with the supposed kidnapper throughout that fraudulent call.

In Australia voices are used to verify identity with banks and with the tax authority. It's been shown that voice clones can be used to trick the systems into giving account access. Thankfully a pin code is also often needed, which can help in stopping a large portion of these attemps.

But think about the times you've been asked to verify a subscription or contract through a recording of your voice. Your voice. That you assume no one else has.

A chat channel on Telegram lets you order swatting services that make use of voice clones. It's a phenomenon wherein criminals trick emergency services to send police or emergency response teams to someone's address. In the latest episode of Cyber we can hear about it being used to send response teams to schools where computer-generated voices claim to have placed explosives.

How will you know if the next crime or swindle will involve your voice, or the voice of someone close to you? Can your voice even be claimed to belong to you anymore?

Of course good uses exist

Already in 2007 I experimented with using a service known as ReadSpeaker to have my blog posts read aloud by an artificial voice. This allowed more people access to my articles and was of course positive for my website in terms of accessibility.

The modern voice clones provide a quality that lead to further accessibility improvements: the listening experience is more pleasing. And these voices can also be used to convert news and articles to podcast episodes, without any human having to utter a single word.

As I personally read many of my blog posts for podcast publishing I could in theory automate this task. So far I'm somewhat skeptical towards going down...

bookmark
plus icon
share episode
Carefully with Per Axbom - Join the Journey

Join the Journey

Carefully with Per Axbom

play

02/01/23 • 2 min

Digital tools, smart devices, AI and virtual worlds are celebrated for the problems they solve, while the problems they create are concealed or glossed over.

My name is Per Axbom and I’m a Swedish communication theorist born in Liberia. My international upbringing, my early 80s computer enthusiasm, aligned with a passion for responsible innovation, has resulted in a deep concern for human rights in a digital context.

I want to boost general knowledge about harmful impact and encourage balanced and honest conversations about possible, plausible and desirable futures.

After blogging for more than 25 years about the human perspective in digitalisation I am adding to my channels yet another podcast. You get brief insights in episodes around 7 minutes that can be listened to on a whim, and from time to time some longer expansions on current phenomena.

Do use the episodes as triggers for reflection but also conversation with people in your circles of trust.

The future is not predetermined and not something we can just leave to others to decide over. The future is something we together contribute to through our decisions. But this means we must also better understand the consequences of what we ourselves are doing today. And right now.

To guide the content I would love to hear from you. What makes you curious? What do you feel is hard to grasp in this rapidly changing world? What you think media is getting wrong and deserves a better explanation? How are you affected when it comes to attention, self-determination and health?

Get in touch by emailing [email protected]

bookmark
plus icon
share episode
Carefully with Per Axbom - When your voice runs away from home

When your voice runs away from home

Carefully with Per Axbom

play

04/25/23 • 11 min

Cloning a voice can today be done with less than a minute of recorded material. But are you aware of who is using your voice and for what?

Your daughter, on vacation, calls you in a state of panic to let you know that she and her friend are having trouble with a payment. Please can you send some money to her friend so they can pay for the hotel room. What do you do? Your safest option is to hang up and call your daughter back. It may sound exactly like Sophie but that doesn't mean it is.

Fraud with the use of cloned voices is becoming more common. Phone calls where people are conned out of their money has been going on for decades, but the novelty today is that the voice at the other end can be a voice you know. Perhaps even a voice you share a home with.

Blog post: When your voice runs away from home

bookmark
plus icon
share episode
Carefully with Per Axbom - The ability that makes me who I am

The ability that makes me who I am

Carefully with Per Axbom

play

02/06/23 • 4 min

"But what is it you really work with, Per?"

I get this question from time to time in the workplace. Over the years it has, contrary to my expectations, become harder to answer. Not because I do not know, but because it is not readily summarised in an easily digestible product name.

Clients wish to purchase UX, or accessibility, or something else to do with digital design. Or perhaps a workshop facilitator, coach or course leader. Someone who fits in a template.

My strength, and weakness, has always been that I do not fit the template. And do not wish to. I can be all the things asked for. On paper. But I also must be allowed to be something more. Maybe that's why, 13 years ago, I started my own company.

I am a listener.

I listen to what you say. And intensely to what you do not say. It might align with tone of voice, choice of words, or body language. But I have difficulty explaining it any other way than this: when I listen I can hear what you already know but haven't yet heard yourself say.

Blog post: The ability that makes me who I am

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Carefully with Per Axbom have?

Carefully with Per Axbom currently has 12 episodes available.

What topics does Carefully with Per Axbom cover?

The podcast is about Human Rights, Podcasts, Technology, Education, Digital and Ethics.

What is the most popular episode on Carefully with Per Axbom?

The episode title 'When your voice runs away from home' is the most popular.

What is the average episode length on Carefully with Per Axbom?

The average episode length on Carefully with Per Axbom is 11 minutes.

How often are episodes of Carefully with Per Axbom released?

Episodes of Carefully with Per Axbom are typically released every 5 days, 9 hours.

When was the first episode of Carefully with Per Axbom?

The first episode of Carefully with Per Axbom was released on Nov 30, 2020.

Show more FAQ

Toggle view more icon

Comments