• 2 Posts
  • 6 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle


  • I didn’t want to say that Twitters execution of it is perfect, it’s just why Elon comes up with all these seemingly insane ideas. He has a huge userbase that won’t leave, he had advertisers who he thought wouldn’t want to leave and now he’s trying to squeeze. The problem is that he obviously didn’t have his grasp as tightly around the advertisers as he thought, which is why step 3 of Enshittitication entirely fails, at least from what is known to us. The idea is to keep everyone kind of hostage while you squeeze and while it seems to work with a huge chunk of the userbase, a bigger portion of the advertisers simply move on.


  • Putting a name on a century-old concept isn’t the worst idea because now we can easily refer to it when it happens once again. And yes, the old age of that problem is why I consider it a bit of a rabit-hole. It’s not just something Twitter does now or that tech companies do now because they copy from each other. It’s a quite old concept you’ll hear about again and again and can read up on quite a bit, if you really are interested into more than the basic concept or why companies keep trying even though the outcome does not always see positive (from an outside, users perspective).


  • Look up enshittitication, it’s an interesting rabbit hole.

    Basically, the idea is that there is a path companies go along where they first please users to build a user base, once you are bound to a platform and don’t want to leave (because “everyone” is there) they instead start to shift towards pleasing advertisers until they also feel trapped (because “everyone” advertises there). The final move is trying to squeeze as much as possible out of all these trapped people and companies. It’s not just social media, although this of course makes it most obvious at least for a trapped user base. But this also applies for any other big thing that “evryone” uses.



  • All 22 are:

    • The Beginners 2023 Cyber Security Awareness Training Course
    • Writing Secure Code in ASP.NET
    • The Complete Guide to Android Bug Bounty Penetration Tests
    • Intermediate Ethical Hacking Hands-on Training
    • Offensive Hacking Unfolded - Become a Pro Pentester
    • Burp Suite Unfiltered - Go from a Beginner to Advanced
    • Web Hacking Expert - Full-Stack Exploitation Mastery
    • Fundamentals of Secure Software
    • Practical Cyber Hacking Skills for Beginners
    • Risk Management for Cyber Security Managers
    • The Complete Ethical Hacking Course
    • Software Security Testing
    • Pentesting Fundamentals for Beginners
    • Ethical Hacking - Capture the Flag Walkthroughs - v1
    • Ethical Hacking - Capture the Flag Walkthroughs - v2
    • Web Hacker’s Toolbox - Tools Used by Successful Hackers
    • Becoming a Cyber Security Professional - A Beginner’s Career Guide
    • The Absolute Beginners 2023 Guide to Cybersecurity - Part 3
    • Cyber Security for Absolute Beginners - 2022 Edition - Part 01
    • Cyber Security for Absolute Beginners - 2022 Edition - Part 02
    • Learn Man in the Middle Attacks from Scratch.
    • Learn Ethical Hacking From A-Z: Beginner To Expert Course