Pagina's

Outlier ai - Meta x Scale AI

 πŸ§  Meta × Scale AI — the quiet merger of data and power

In June 2025, Meta announced an investment of US$ 14.3 billion to acquire a 49% stake in Scale AI.

Formally, Scale AI remains independent, yet the commercial ties are now “substantially expanded.”

As part of the deal, Alexandr Wang, founder of Scale AI, joined Meta to lead its new Superintelligence Lab — while still holding a board seat at Scale.


⚠️ What this means

This isn’t just a business move.

It’s a structural shift in who owns and governs the training data behind artificial intelligence.

Insiders report that Meta researchers have questioned the quality of Scale’s labeled data — even while the acquisition was underway.

At the same time, several of Scale’s former clients, including Meta’s competitors, have reduced or ended their contracts, citing conflicts of interest.


🌐 Why it matters

When data vendors become subsidiaries of tech giants, the ecosystem that feeds AI narrows.

Transparency fades.

And the same handful of corporations end up controlling both the models and the material that trains them.

This merger doesn’t just reshape the AI market  it reshapes the boundaries between knowledge, ownership, and accountability.


> The age of open data is ending.

What begins now is the era of curated intelligence — owned, filtered, and aligned.


Categorie: AI-ethiek, Digitale integriteit, Juridische

Smartphones & Privacy

 πŸ”’ Digital sustainability begins with privacy


Every smartphone carries a unique Advertising ID that tracks what you watch, type and read — information shared across apps to feed the ad economy.


πŸ“± The good news: you can turn it off.


On Android: Settings → Privacy → Ads → Delete advertising ID


On iPhone: Settings → Privacy → Tracking → Turn off “Allow Apps to Request to Track”



You’ll still see ads, but no longer based on a personal profile.


A small click with a big impact — for more calm, less data waste, and a cleaner digital ecosystem.


🌿 JAS Sustainable Advice

Sustainability also means using information consciously.


πŸ”’ Advertentie ID en data tracking

 πŸ”’ Digitale duurzaamheid begint bij privacy


Wist je dat elke smartphone een advertentie-ID heeft die precies bijhoudt wat jij bekijkt, tikt en leest?

Die code wordt gedeeld met talloze apps en bepaalt welke reclames je ziet.


πŸ“± Gelukkig kun je dat zelf uitschakelen:

Instellingen → Privacy → Advertenties → “Advertentie-ID verwijderen”


Zo voorkom je dat bedrijven jouw gedrag blijven volgen.

Je krijgt nog wel advertenties, maar niet langer persoonlijke profielen over jou.


Een kleine klik met een groot effect — voor meer rust, minder dataverbruik en een schoner digitaal ecosysteem.


🌿 JAS Duurzaam Advies

Duurzaamheid is ook: zuiver omgaan met informatie.


⚖️ Legal Note — EU & Dutch Framework on Digital Fraud

 

⚖️ Legal Note — EU & Dutch Framework on Digital Fraud


Digital deception — whether through romance scams, impersonation or malware — falls within the broader scope of cyber-enabled fraud.

While there is no single international law covering it, several existing instruments apply:


Dutch Criminal Code (Wetboek van Strafrecht)


Art. 326 Sr — Fraud / Oplichting: intentional deception for unlawful gain.


Art. 231 Sr — Identity fraud: use of another person’s identifying data.


Art. 225 Sr — Forgery / Valsheid in geschrifte, including digital evidence.



European & International Frameworks


Budapest Convention on Cybercrime (2001) — cross-border cooperation in online crime.


EU Digital Services Act (2022) — imposes a duty of care on online platforms to prevent misuse.


General Data Protection Regulation (GDPR) — protects personal data used in identity scams.


Together, these norms form a fragmented but evolving system — one that urgently needs a next step:

a clear, international standard for digital integrity and platform responsibility.


More

 

πŸ•΅️‍♀️ When Trust Turns Digital: The New Face of Online Deception


The line between privacy and deception has never been thinner.

Many people choose not to show their real photo or name on dating platforms — understandable, especially when colleagues or clients might be there too. But behind that legitimate caution hides a new risk: identity-based scams and malware traps.


From conversation to compromise


Scammers now use simple tactics: moving the chat from the dating app to WhatsApp or Telegram, sending a “photo” that looks harmless — but hides malware. Once it downloads automatically, your device may be exposed to data theft or remote control.


This is why turning off automatic media download is more than a tech tip; it’s a matter of digital self-protection.


A wider issue: platforms and accountability


The real question is not only how individuals can protect themselves, but why platforms still allow full anonymity without responsibility.

If a digital space functions like a house, then its owner has a duty of care: to know who comes in, to keep the doors safe, and to act when harm occurs.


This principle lies at the heart of a new initiative I am developing — the International Recommendation on Digital Integrity and Platform Responsibility — calling for verified registration, cross-border cooperation, and user protection across Europe and beyond.


Practical takeaway


Until policy catches up, awareness is your best defence.


Never open files from unknown contacts.


Keep your device and apps updated.


Disable automatic downloads (see my LinkedIn post for exact steps).


Report suspicious profiles and conversations.



> Privacy is your right —

but responsibility, yours and theirs, is what keeps the digital world human.




Joan D. Mulder

www.jasduurzaamadvies.nl

⚠️ New Scam Alert: Hidden Malware via WhatsApp Images

 ⚠️ New Scam Alert: Hidden Malware via WhatsApp Images


Cybercrime keeps evolving — and so do scams.

A new method has appeared in which malware is hidden inside images sent via WhatsApp, often by strangers met on dating platforms or messaging groups.

The risk? Simply opening or automatically downloading such an image can infect your phone and compromise personal data or bank access.


πŸ”’ How to protect yourself


Turn off automatic media downloads in WhatsApp:

Settings → Storage and data → Media auto-download

Then open each of the three options and uncheck all boxes:


When using mobile data → uncheck all


When connected on Wi-Fi → uncheck all


When roaming → uncheck all



From now on, photos or files will only download when you choose to tap them.


Avoid opening files from unknown contacts, even if they seem harmless.

Legitimate connections will understand your caution — scammers rely on curiosity and trust.


> Privacy is your right.

Caution is your best defence

Recommendation J.D. Mulder

 πŸŒ International Recommendation on Digital Integrity and Platform Responsibility in Online Relationships


Preamble

Recognizing that human connection increasingly takes place across digital borders;

Acknowledging that online relationship fraud and identity-based deception cause significant emotional, financial and social harm;

Recalling the Budapest Convention on Cybercrime (2001) and the EU Digital Services Act (2022) as key frameworks for digital security and platform accountability;

Emphasizing that privacy is a right, but that intentional deception undermines personal autonomy, dignity and trust;

The undersigned recommend the following principles and measures to promote digital integrity and accountability in online interpersonal relations.



---


Article 1 — Purpose


This Recommendation aims to strengthen international cooperation and platform responsibility in preventing, detecting and addressing intentional digital misrepresentation within online relationship and dating environments.



---


Article 2 — Definition


1. Digital relationship deception means the deliberate and sustained use of false identity, personal data, or relational status with the purpose of gaining trust, affection, influence or advantage.



2. This excludes the use of pseudonyms or privacy measures adopted solely for personal safety or anonymity without intent to mislead.





---


Article 3 — Principles of Digital Integrity


1. Right to Privacy — Every individual retains the right to control how and when personal data is shared online.



2. Duty of Honesty — Participants in online relationships have a moral and legal duty not to intentionally misrepresent essential aspects of their identity.



3. Accountability by Design — Platforms shall embed preventive systems that deter, detect and respond to identity-based deception.





---


Article 4 — Platform Responsibility and Verification


1. Platforms facilitating interpersonal or romantic interaction shall ensure verified registration of users through secure digital identity mechanisms, without publicly revealing private data.



2. Verified data shall be held confidentially but must be available to competent authorities or courts in cases of reported harm or fraud.



3. Platforms shall maintain clear internal protocols for evidence preservation, reporting and user redress.



4. Failure to implement adequate verification and preventive measures shall constitute a breach of the duty of care under the Digital Services Act or equivalent national law.





---


Article 5 — Jurisdiction and Cooperation


1. States should apply an effects-based jurisdiction, allowing proceedings in the country where the victim suffered the harm.



2. States shall ensure mutual legal assistance for cross-border cases involving digital relationship fraud.



3. Europol, Eurojust and similar agencies are encouraged to establish dedicated units or taskforces for identity-based online fraud and interpersonal deception.





---


Article 6 — Remedies and Victim Protection


1. Victims shall have access to civil and administrative remedies in their own jurisdiction, including compensation and asset recovery.



2. Platforms must cooperate in freezing assets or accounts linked to proven identity-based deception.



3. States should simplify cross-border claims and adopt expedited digital complaint procedures.





---


Article 7 — Prevention, Education and Public Awareness


1. Governments and platforms shall jointly promote awareness campaigns on digital integrity and safe online interaction.



2. Users should be informed of verification procedures, reporting tools, and evidence preservation methods.



3. Educational materials should emphasize both privacy protection and honesty in digital relations.





---


Article 8 — Implementation and Follow-Up


1. The Council of Europe, European Union and United Nations are invited to explore the integration of these principles into existing frameworks, such as an Additional Protocol to the Budapest Convention or a Digital Integrity Charter under the DSA.



2. Platforms and civil society organizations are encouraged to adopt voluntary codes of conduct reflecting this Recommendation.



3. A periodic review mechanism shall evaluate the effectiveness of these measures and propose updates as technology evolves.





---


Closing Statement


> In the house of digital connection, every platform is a host.

Privacy is a right — but responsibility is the roof that keeps us safe.

Let integrity, not illusion, be the foundation of our shared digital lives.

Towards an International Framework for Digital Integrity

🌐 Towards an International Framework for Digital Integrity


A call for honesty and accountability in online relationships


In a world where human connection increasingly begins online, there is still no international framework protecting individuals from identity deception and emotional or financial harm.

Existing instruments — the Budapest Convention on Cybercrime (2001) and the EU Digital Services Act (2022) — are important, but insufficient.


The new International Recommendation on Digital Integrity and Platform Responsibility argues that:


privacy remains a right, but honesty is a duty;


dating and social platforms must verify users and be held accountable when negligence leads to harm;


states should cooperate to ensure cross-border justice and compensation for victims of digital relationship fraud.

> “In the house of digital connection, every platform is a host.

Privacy is a right — but responsibility is the roof that keeps us safe.”

---

A proposal for lawmakers, platforms, and citizens to give the digital age its long-overdue moral and legal compass.


Recommendation J.D. Mulder

 The Human Frequency


We live surrounded by invisible signals — Wi-Fi, 4G, 5G — a constant hum that connects everything yet rarely lets us rest. Science says these fields are too weak to damage our DNA, but the danger lies elsewhere: continuous exposure, not of the body, but of the mind.


Constant connection keeps the nervous system on alert. It blurs rest into reaction, focus into fatigue. Radiation may not harm us — but overstimulation does.

Protect the rhythm: recommendations: 

1. Let devices sleep when you do.

2. Keep phones off the body.

3. Create signal-free spaces at home and in schools.

4. Teach presence before dependence.

5. Disconnect one day a week, to remember what silence sounds like.

The real protection is not against radiation, but against forgetting ourselves.

Because in a world that never turns off, stillness becomes the strongest signal of all. 🌿

4G, 5G - The hazards of constant connection.

 

The Invisible Frequency: Living in the Age of Constant Connection


We live inside an invisible ocean of signals — Wi-Fi, 4G, 5G, Bluetooth, satellites.

It hums quietly around us, linking every device, every conversation, every heartbeat of digital life.

The question is no longer if we are connected, but how deeply we remain aware while being so.


1. The Science of Exposure


Electromagnetic fields are everywhere, from sunlight to smartphones.

Most communication technologies use non-ionizing radiation, meaning their energy is too weak to damage DNA or alter human tissue directly.

Major scientific reviews — from the WHO, the EU, and national health councils — agree: there is no confirmed evidence that 4G or 5G signals harm the human body within the current exposure limits.


But: absence of proof is not proof of absence.

The human body evolved in nature’s quiet frequencies, not in a 24-hour signal storm.


2. The Long Shadow of Time


Exposure itself may not wound us — but continuity might.

Our devices pulse while we sleep; our networks breathe while we rest.

Decades of uninterrupted contact remain uncharted territory.

What we do know is that the nervous system falters under constant vigilance.

The danger is not the field — it is the state of permanent readiness we live in.


3. The Body’s Subtle Response


Those who report electromagnetic hypersensitivity often describe headaches, fatigue, or insomnia near active devices.

Laboratory tests rarely confirm a direct biological cause, yet the suffering is real.

Science calls it psychosomatic; the soul might call it overexposure to modern life.

We are beings of rhythm, not repetition — and the signal never sleeps.


4. The True Exposure


Even if radiation itself proves harmless, overstimulation is not.

Constant screen time raises stress hormones, fragments attention, and disrupts sleep cycles.

Our neurons fire as if pursued; our minds hum with unfinished alerts.

We are not built to carry the weight of the world in our pockets.


5. Protecting the Human Frequency


The answer is not fear, but rhythm — self-regulation in a world without pause.


Practical ways to protect yourself (and especially younger generations):


Night mode for the soul: turn off Wi-Fi routers and phones at night. True rest requires silence — even from signals.


Digital sabbath: one day a week without screens or social feeds. It restores the nervous system like fasting restores the body.


Physical distance: keep phones off the body, use speaker or wired earphones, and charge devices outside the bedroom.


Designated quiet zones: create “no-signal” spaces — the dinner table, classrooms, gardens — where presence replaces connection.


Blue-light balance: use reading mode or filters in the evening; light affects the brain’s melatonin and circadian rhythm.


Mindful mentorship: teach children and teens to use technology consciously, not to be used by it. Awareness, not prohibition, builds strength.


Reconnection with the real: encourage movement, art, and nature — the frequencies that repair what the digital storm disrupts.



These are not restrictions; they are acts of sovereignty — ways to remind the body that it still belongs to itself.


6. Reclaiming Stillness


Technology is a tool; addiction is a trance.

We cannot eliminate the electromagnetic world, but we can reclaim our rhythm within it.

Every disconnection becomes a declaration: I am not a signal; I am a being.


Conclusion


The real hazard of the digital age is not radiation, but resonance without rest.

The cure is simple, though not easy: remember to unplug.

Because in a world that never turns off, stillness becomes the strongest form of resistance and awareness, the purest frequency of all.



1 Paraplu, Rana Cantante | JAS

 

Ik heb een Personal Sanctuary waar ik retreats organiseer. Ook ben ik Legal Falcon voor reizigers in nood, aan-en verkoopadviseur en heb ik in juni 2025 een digitale editie gelanceerd van mijn eerste boek, zodoende ben ik nu officieel ook schrijfster te noemen.  Ik Blog al sinds 2012. Daarnaast heb ik een semi-persoonlijke/serieuze content op Instagram gecreΓ«erd. Hier draag ik uit waar ik voor sta.

Rana Cantante raakt het hart: het is stilte, natuur, genezing — impact door aanwezigheid.

JAS raakt het hoofd en het geweten: bewustwording, integriteit, inzicht — impact door helderheid.

Samen vormen ze één beweging: de zachte kracht van het zijn (Rana Cantante) en de bewuste kracht van het weten (JAS).

De één herstelt de mens in zichzelf, de ander herstelt de wereld in zijn geweten.

Twee stemmen, één veld.

Social networks

 The Illusion of Connection: Who Do the Socials Really Serve?


We were told that social media would connect the world.

It did — but not as we imagined.

The networks that promised community have become markets of attention, designed not to serve people, but to serve the systems that profit from their gaze.


1. The Hidden Economy of Influence


Platforms like Facebook, Instagram, and LinkedIn were never built for expression — they were built for extraction.

Every post, every pause, every heartbeat of curiosity becomes a data point in an invisible economy of prediction.

You are not the customer; you are the content.

Your emotions are the currency that keeps the machine alive.


2. The Myth of Visibility


We chase visibility because the system teaches us that what is not seen does not exist.

But visibility is not the same as impact.

It is possible to be everywhere and still say nothing — and to speak once, with truth, and change everything.

Legacy is not measured in followers, but in resonance.


3. Conscious Presence


To step away from the socials entirely is one form of rebellion.

To use them consciously — without surrendering to them — is another.

When you post not to please, but to serve clarity, the algorithm may not reward you, but the field will remember.

Even within the machinery of distraction, awareness has a frequency of its own.


4. Reclaiming the Field


Social media amplifies what is fed into it.

If we bring noise, it multiplies noise.

If we bring silence, it spreads stillness.

That is where real impact begins: not in domination, but in vibration — the quiet power of integrity shared in public view.


Conclusion


The question is no longer whether social media serves us.

It doesn’t.

The question is whether we can still serve truth within it.

Because every post, every word, every act of presence becomes part of our legacy — a signal through the static, reminding others that connection was never meant to be an algorithm.