Suramya's Blog : Welcome to my crazy life…

January 9, 2026

Conscience of a Hacker aka The Hacker Manifesto turns 40

Filed under: My Thoughts,Tech Related — Tags: , — Suramya @ 10:42 PM

The Conscience of a Hacker, also known as The Hacker Manifesto, turned 40 yesterday. If there was a document that shaped entire generations of Hackers, the Hacker Manifesto would be this document. The manifesto was first published in Phrack Volume One, Issue 7, Phile 3 of 10. The full text of the post is below:

\/\The Conscience of a Hacker/\/

by

+++The Mentor+++

Written on January 8, 1986
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Another one got caught today, it’s all over the papers. “Teenager
Arrested in Computer Crime Scandal”, “Hacker Arrested after Bank Tampering”…
Damn kids. They’re all alike.

But did you, in your three-piece psychology and 1950’s technobrain,
ever take a look behind the eyes of the hacker? Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world…
Mine is a world that begins with school… I’m smarter than most of
the other kids, this crap they teach us bores me…
Damn underachiever. They’re all alike.

I’m in junior high or high school. I’ve listened to teachers explain
for the fifteenth time how to reduce a fraction. I understand it. “No, Ms.
Smith, I didn’t show my work. I did it in my head…”
Damn kid. Probably copied it. They’re all alike.

I made a discovery today. I found a computer. Wait a second, this is
cool. It does what I want it to. If it makes a mistake, it’s because I
screwed it up. Not because it doesn’t like me…
Or feels threatened by me…
Or thinks I’m a smart ass…
Or doesn’t like teaching and shouldn’t be here…
Damn kid. All he does is play games. They’re all alike.

And then it happened… a door opened to a world… rushing through
the phone line like heroin through an addict’s veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought… a board is
found.
“This is it… this is where I belong…”
I know everyone here… even if I’ve never met them, never talked to
them, may never hear from them again… I know you all…
Damn kid. Tying up the phone line again. They’re all alike…

You bet your ass we’re all alike… we’ve been spoon-fed baby food at
school when we hungered for steak… the bits of meat that you did let slip
through were pre-chewed and tasteless. We’ve been dominated by sadists, or
ignored by the apathetic. The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.

This is our world now… the world of the electron and the switch, the
beauty of the baud. We make use of a service already existing without paying
for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and
you call us criminals. We explore… and you call us criminals. We seek
after knowledge… and you call us criminals. We exist without skin color,
without nationality, without religious bias… and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it’s for our own good, yet we’re the criminals.

Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.

I am a hacker, and this is my manifesto. You may stop this individual,
but you can’t stop us all… after all, we’re all alike.

+++The Mentor+++

It was a significant force in shaping how I thought about computers and why I went into Computer Security. I first read the manifesto in late 1997 after I got my first computer and became active on the Internet and various BBS forums. Sadly I don’t remember the exact site where I found it but I can tell you it had a profound impact on me. I have always been a person who wanted to know how things work and why things were a particular way. In fact my parents actually went out and bought a series of books called “Tell me Why?” to answer my questions.

Then I found this post that put into words things I was just starting to work out and put them in plain and simple terms. To proudly say that wanting knowledge is not a bad thing, neither is wanting to know how things work and why they are done in a particular way. I still follow the same basic agenda/rule in all my work and it has helped me immensely.

Source: @phrack@haunted.computer

– Suramya

January 8, 2026

Alert when Blood Donated is used

Filed under: My Thoughts — Suramya @ 9:53 PM

This is so cool. It would be awesome if all hospitals did this and messaged you when your donated blood is used. I am sure it would increase the no of people donating blood.

Dear Sanjeev ji, Your donated blood has been received by 58 Years/Male patient. From your vein to a beating heart. Thank You!
Dear Sanjeev ji, Your donated blood has been received by 58 Years/Male patient. From your vein to a beating heart. Thank You!

I would love to donate blood but have a severe phobia of needles which makes it extremely difficult for me to donate blood. The last time I tried the doctors actually refused to take blood because my body temperature had dropped significantly and I was still covered in sweat. Only when Jani intervened and spoke to them they were ok to take the blood. Jani gives blood regularly as do my parents and I am very proud of all of them.

– Suramya

January 7, 2026

AI food delivery hoax that fooled Reddit debunked after investigation

Filed under: Artificial Intelligence,My Thoughts — Suramya @ 8:03 PM

Over the past few days an Anonymous post on Reddit (Archive.org link since the original has been deleted) that alleged significant fraud at an unnamed food delivery app. The post made some serious allegations and the entire thing just exploded everywhere with a lot of discussions on how this kind of behavior is true. The reason everyone thought it was true was because Gig based companies have been caught doing similar things in the past.

Now here’s the twist that no one expected, apparently the whole thing was a hoax. Yes, you read that correctly. Casey Newton at Platformer has posted an entire writeup on this Platformer.news: Debunking the AI food delivery hoax that fooled Reddit that is a fascinating read. You should check out the whole writeup for the details on how Casey figured out it was a hoax. The part which was really scary is towards the end of the article where he talks about how AI/LLM is making fact checking harder.

“On the other hand, LLMs are weapons of mass fabrication,” said Alexios Mantzarlis, co-author of the Indicator, a newsletter about digital deception. “Fabulists can now bog down reporters with evidence credible enough that it warrants review at a scale not possible before. The time you spent engaging with this made up story is time you did not spend on real leads. I have no idea of the motive of the poster — my assumption is it was just a prank — but distracting and bogging down media with bogus leads is also a tactic of Russian influence operations (see Operation Overload).”

For most of my career up until this point, the document shared with me by the whistleblower would have seemed highly credible in large part because it would have taken so long to put together. Who would take the time to put together a detailed, 18-page technical document about market dynamics just to troll a reporter? Who would go to the trouble of creating a fake badge?

Today, though, the report can be generated within minutes, and the badge within seconds. And while no good reporter would ever have published a story based on a single document and an unknown source, plenty would take the time to investigate the document’s contents and see whether human sources would back it up.

I’d love to tell you that, having had this experience, I’ll be less likely to fall for a similar ruse in the future. The truth is that, given how quickly AI systems are improving, I’m becoming more worried. The “infocalypse” that scholars like Aviv Ovadya were warning about in 2017 looks increasingly more plausible. That future was worrisome enough when it was a looming cloud on the horizon. It feels differently now that real people are messaging it to me over Signal.

We are going to see it more and more of this going forward. The only way to counter is to double or triple check everything you read online, especially if it is baiting you into outrage. I try to do the same thing when I write about stuff but there are times when I have been fooled as well and have usually posted a comment on the post (or a correction in it) explaining it. Basically if it seems too good to be true, it probably is.

Source: @inthehands@hachyderm.io

– Suramya

January 6, 2026

KDE’s Full form: Kool Desktop Environment

Filed under: Computer Software,Linux/Unix Related,My Thoughts,Tech Related — Suramya @ 5:12 PM

One of the cool things about Linux that also confuses a lot of people who are used to Windows is that it allows you to use different Desktop environments based on your choice. So if you like a minimalist setup or are on an old system with limited resources you can use something like IceWM or Fluxbox. Others like GNOME which is more like a Mac interface, I personally prefer KDE which is similar in layout to Windows and has a lot of good widgets and inbuilt functionality I like.

I have been using KDE since I first started using Linux back in early 2000 but till today didn’t really think about what the acronym stood. While surfing the web I found the full form and found it funny. KDE Officially stands for: Kool Desktop Environment. It was first announced on a Linux Mailing list way back on 14th Oct 1996: New Project: Kool Desktop Environment. Programmers wanted!

From that small beginning KDE is now one of the most popular Desktop Environments out there and is constantly being updated.

Thought I should share so that others also know…

– Suramya

January 5, 2026

Wasted hours of my life due to Copilot and AI on Win 11 laptop

Over the weekend Jani asked me to take a look at her laptop because it was heating up quite a bit and the CPU fan was almost constantly running on high speed. So I took the laptop ran a bunch of virus scans and malware removal tools on it. Disabled a some programs that didn’t need to be running all the time (Adobe was a big one) but still the issue wasn’t solved.

After wasting about 3 hours of my life on this I remembered that she is using Windows 11 and that Copilot is enabled by default on all Win11 systems. So I went and disabled Copilot and almost immediately the CPU utilization dropped and the system stopped heating up so much. Then I disabled Copilot in all the Office tools (Word/Excel etc) and Notepad. I mean why on earth does Notepad need Copilot/AI? It is a plain text note taking software… it shouldn’t have any AI in it.

The amount of energy that is being wasted by ‘AI’ not just in data-centers but on laptops/desktops computers/phones etc is mind boggling. If it worked well it would still make some sense but it doesn’t. In fact it is almost comically bad to the point of being dangerous.

I used to update all the software on my systems almost on auto earlier but now have to look at each upgrade to see what is being added to the software. This is so I can avoid the AI crap that is getting added to all software. For example, Calibre which is one of the best software for organizing/converting e-books recently added an AI Chatbot to “Allow asking AI questions about any book in your calibre library.” This was almost universally condemned and the project forked to remove the AI related nonsense. Similarly other software have added AI to their setup without warning and it is exhausting to have to vet every single upgrade before pushing it out.

I am happy that I run Linux so I don’t have to deal with the nonsense that MS and other big companies have been pushing out in the name of AI.

– Suramya

January 2, 2026

Steganography: Hiding data in Document Files using color tags

Steganography is the art of hiding information within container files to conceal the existence of embedded information. Media files have been the most common containers for hiding embedded data due to which there is a lot of scrutiny on media files when they are transferred. Most of the DLP (Data Leak Prevention) system focus on media files when checking for steganography. Word documents on the other hand are common enough that they can be used as containers for hidden information without raising flags.

In this paper we explore hiding secret data in a Word document by inserting multiple color tags into the file that alter the color for each character in the document to encode data without changing the visual look of the document.

Modern DLP systems can detect hidden information in media files such as images, videos or audio files by performing analysis of files to detect modification and potentially identify the hidden data. In order to be able to send data without detection a new method of hiding data needs to be found. In this paper we look at how to hide text in a word document by modifying the color tags in the word document. This allows us to exfiltrate data using word files with a minimal risk of detection using existing tools.

Introduction and History

Steganography is the art of hiding data or a message inside another file or object. This object can be an image, text, audio or video file. The word has Greek roots, and is a combination of steganos (“concealed, protected”) and graphy (“writing.”).

The first known use of steganography was in ancient Greece around 440 B.C, where the Greek ruler Histaeus would shave the head of a slave and tattoo a secret message on the slave’s scalp. After which he would wait for their hair to grow to hide the secret message and send the slave to the recipient who would then shave the head to get the message. (UK Essays, 2021) Another example from the same time period is when Demaratus sent a warning about a forthcoming attack to Greece by carving the message on the wood of a wax tablet before covering it with a fresh wax coat. This tablet that looked blank was delivered to Greece along with other blank tablets, where the Greeks removed the wax layer to read the hidden message. (Perera, 2011)

In more modern times, Steganography was used during the second world war by the Germans who used Microdots to reduce complete documents to the size of a dot which was then placed on a normal looking letter or document. Another technique used often was to encode messages in knitted scarves or sweaters sent to operatives. Every knitted garment is made of different combinations of just two stitches: a knit stitch, which is smooth and looks like a “v”, and a purl stitch, which looks like a horizontal line or a little bump. By making a specific combination of knits and purls in a predetermined pattern, spies could pass on a custom piece of fabric and read the secret message. (Zarrelli, 2021)
With the Digital age, the options to encode messages in digital files became available and steganography evolved to make use of the new medium.

How Digital Steganography works

Most digital files contain sections that can be altered without showing any obvious effects in the file. Modern techniques hide data in files by using one of the following approaches:

Adding bits to a file:

In this approach the hidden text is added to the “file header”, which usually contains information such as the file type or the resolution and color depth of a photo. This method is relatively easy to detect if we look at the file size difference. For example, if we add 1 MB of secret data to a 4 MB file, the output file size would increase by 1MB making it easy to detect if the resultant file was compared with the original.

Changing the Least Significant Bit (LSB):

To resolve this problem of changing file size, a new technique was created that makes use of the fact that the LSB’s in a file can be altered without significantly altering the source i.e. if the container was an image the altered image would look the same to human eyes. As an example, in an image file each pixel is comprised of three bytes of data corresponding to the colors red, green, and blue. LSB steganography changes the last bit of each of those bytes to hide one bit of data. Which allows a user to hide data in the file without changing the file size. The same technique can be applied to other media files such as Video or Audio files as well.

The larger the container file, the more data can be encoded into the file, which is why use of Images, Video and audio files is very popular with Steganographic users, as it allows the user to hide large quantities of data in a single file. The major limitation of using media files is that if the target doesn’t usually send or receive media files, then it is a break in the routine if they start suddenly sending or receiving such files.

Word Documents or Text files on the other hand are the bread and butter of all organizations and every user sends and receives a lot of documents throughout the course of the day. So, if we are able to hide data in a word file, then it would be easier to exfiltrate the data.

How to hide data in a text file

There are a lot of options available for use to hide information in a text file and some of them have been used historically for this purpose already, the digital text just gives us a new medium for the hidden text. Some of the options are as below:

Using patterns of letters within word

In this technique the user would send a normal looking message or document to another user. They would hide a secret message in the file by encoding a message that can only be read by taking the ith letter of each word in the message. The advantage is that you can send a lot of data using this technique, but the disadvantage is that the message can end up sounding very stilted because of the requirements of the steganography.

Using the Whitespace in the document to hide data

Another option is to use the spacing differences in the file to encode a message. One example is for the sender to put in one space after a full stop to mean 0 and two spaces after it to represent a 1. By looking at the spacing the secret message can be spelled out. The main problem with this approach is that it does not allow large quantity of data to be sent in a file, but the advantage is that it is harder to detect.

In this paper we are looking at a third way to hide data in a document by modifying the color tags in the document and we will look at this in more detail in the next section.

Hiding information using color tags in a Word Document

All versions of MS Office since 2007 save files in the Microsoft Office Open XML specification which are then zipped to create files in the DOCX format. Word files allow a user to show text in multiple colors by inserting the corresponding color tag into the file. (Microsoft, 2021) When the color of the displayed text is modified to a different color, the system adds a tag in the document.xml file located in the zip file like the following: <w:color w:val=”000000″/> to show the change in font color. The tag shows the color of the text in a Hex format, with 00 as Black and FF showing White color.

Each of the pair of bits in the color tag corresponds to the Red, Green or Blue color pallet. In each pair, the second bit is the least significant bit and its value can be modified without the output color looking significantly different to the viewer. So, visually speaking the font color represented by Hex value 000000 looks almost exactly the same as color represented by the Hex value of 010101. By altering the value of the second bit in the pair from 0 to 1 or vice versa information can be encoded into the file without adding text or information that can be found by security systems/reviewers. Since the data is in XML format, the sender can insert data into the document by inserting color tags into the document for each character. The process to hide the data would look like the following:

  • The user provides a word file to be used as an input. The file would contain sufficient text to allow the sender to encode data.
  • The system extracts the contents of the documents from the file by unzipping it.
  • The content of the document is stored in the ‘documents.xml’ file under the word folder created in the previous step.
  • The system extracts the text from the file by striping the XML tags from the file
  • For each character in the text, it adds a color tag such as or . The second bit in the pair is set to a 0 or a 1 depending on the data being encoded.
  • The original tags are restored to the file along with the new tags created.
  • The resulting file is saved as document.xml in the word folder
  • The folder is compressed as a ZIP file and renamed to .docx

The resultant file will contain the hidden data with little visual indication of the changes being made to the document and can be mailed our as usual with little chance of detection.

The recipient would follow these steps to extract the hidden data from the file:

  • Unzip the document to extract the content
  • Extract all the color font tags in the file
  • Read the second bit in every pair of color code
  • Save the values in a separate file that contains the secret information.
  • Review the information at your leisure.

This technique is fairly easy to implement with minimal coding skills required. If the setup doesn’t allow users to send out word documents, then the same technique can also be used to hide data in the html source of a website that the recipient would then download and extract. The same can also be accomplished by encoding data in emails sent from the user’s account.

Detection Techniques for hidden data in documents

Like any techniques to send hidden data the technique we just discussed has its weaknesses which can be used to detect hidden messages encoded in the document. However, such detection is not easy and most of the currently available tools will not be able to detect data hidden using this technique. This is because most commercial tools available in the market focus their efforts to detect hidden data with media files such as images, videos or audio files as they have traditionally been the most common containers used to hide data. Some of the options available to detect the possibility of hidden data are as follows:

  • Create a tool that examines all documents sent out to count the number of font tags in use in the document. If the count of the tags is over a certain threshold the file can be quarantined for review by a human
  • Use a tool checks the size a given document is expected to be based on the amount of text in the document. If the size of the file is significantly higher (due to anomalously high number of tags in the file) the file can be quarantined for review.
    • We would need to take into account any images etc embedded in the file when performing the analysis
  • Create a machine learning tool that uses AI/ML to detect files with hidden data.

Conclusion

Any data or file being sent outside the organizations network can be used to exfiltrate information from the network. The trick to detecting these attempts is to create a baseline of the activity, data sizes of the files transferred during a regular day and create alerts to notify administrators when there is a significant variation from the baseline.

Done correctly this will decrease the risk of data exfiltration but no technique to detect data is perfect so a lot of review and audits need to be done on a periodic basis to ensure that the system is still secure.

References

Microsoft. (2021, August 25). File format reference for word, Excel, and PowerPoint. Deploy Office | Microsoft Docs. Retrieved September 19, 2021, from https://docs.microsoft.com/en-us/deployoffice/compat/office-file-format-reference.
Perera, H. L. (2011, February 4). History of steganography. hareenlaks. Retrieved September 19, 2021, from http://hareenlaks.blogspot.com/2011/04/history-of-steganography.html.
UK Essays. (2021, August 12). The history & background of steganography. UK Essays. Retrieved September 19, 2021, from https://www.ukessays.com/essays/english-language/background-of-steganography.php.
Zarrelli, N. (2021, June 10). The wartime spies who used knitting as an espionage tool. Atlas Obscura. Retrieved September 19, 2021, from https://www.atlasobscura.com/articles/knitting-spies-wwi-wwii.


Note: This was originally written as a paper for one of my classes at EC-Council University in Q3 2021.

– Suramya

January 1, 2026

Happy New Year!

Filed under: My Thoughts — Suramya @ 9:46 PM

Earth has successfully completed one more revolution around the sun and to celebrate that here’s a Sanskrit verse (With a Hindi & English translation under it):

सूर्य संवेदना पुष्पे, दीप्ति कारुण्यगंधने। लब्ध्वा शुभं नववर्षेऽस्मिन कुर्यात्सर्वस्य मंगलम्॥

हिंदी अर्थ: जैसे सूर्य प्रकाश देता है, संवेदना करुणा उत्पन्न करती है और फूल सुगंध बिखेरता है, वैसे यह नया वर्ष सभी के लिए मंगलमय हो।

Translation: Like the sun gives light (life), sympathy gives birth to compassion and like flowers spread perfume, may the new year be auspicious for everyone!.

Interestingly this (Jan 1st) is not when most of India historically celebrates new year. The map below shows the traditional dates when various states in India celebrate New Year:

When do Indians celebrate their New Year
When do Indians celebrate their New Year?

Looking at the map it is clear that most of the country celebrates it in March/April (depending on the Moon’s path) with April 13/14/15 the second most common date. It shows how diverse India is and that is the best part of being in India. Imagine getting to celebrate “New Years” multiple times a year with the excuse to celebrate. What’s not to like about it?

I am probably going to do a post about 2025 in the next few days depending on my mood and energy levels.

– Suramya

December 31, 2025

82nd Anniversary of Netaji hoisting the Tricolour for the first time on the Indian Soil at Port Blair in Andaman and Nicobar Islands

Filed under: My Thoughts — Suramya @ 12:01 AM

India owes a lot to Netaji Subhas Chandra Bose because without his Ajad Hind Fauj India would not have gotten its independence from the British. It was only when the Ajad Hind Fauj started making its way from the north-east India towards Delhi & Calcutta did the British finally agree to leave India.

His freedom struggle was years in making and on 30th Dec 1943, Netaji hoisted the Tricolour for the first time on the Indian Soil in Port Blair at the Andaman and Nicobar Islands declaring the Islands as the first Indian Territory to be freed from the colonial rule.

According to the Government of India, Netaji Subhash Chandra Bose had visited the South Andaman district in 1943. On December 30, 1943, Netaji Subhash Chandra Bose, the Commander of the Azad Hind Fauj or the Indian National Army (INA), hoisted the Indian National Flag for the first time on the soil of Port Blair.

This historic event occurred after his escape from British surveillance on January 16, 1941, when he entered Indian soil. The flag hoisting symbolised the realisation of his promise that the Indian National Army would set foot on Indian soil by the end of 1943. This also marked a declaration of the Andaman and Nicobar Islands as the “first liberated territory of India”.

Now every year on 30th December a function is organized at Flag Point commemorating the first flag hoisting by Netaji. Without the struggle and sacrifice of these brave men and women India would not have won its independence and we owe it to them to ensure that their sacrifice and hard-work is not whitewashed and gaslit out of our history books. While I was writing this post I remembered this old Hindi song which is completely apt so sharing it here.

ये देश है वीर जवानों का
अलबेलों का मस्तानों का
इस देश का यारो क्या कहना
ये देश है दुनिया का गहना

यहाँ चौड़ी छाती वीरों की
यहाँ भोली शक्लें हीरों की
यहाँ गाते हैं राँझे मस्ती में
मचती हैं धूमें बस्ती में

पेड़ों पे बहारें झूलों की
राहों में क़तारें फूलों की
यहाँ हँसता है सावन बालों में
खिलती हैं कलियाँ गालों में

कहीं दंगल शोख़ जवानों के
कहीं कर्तब तीर कमानों के
यहाँ नित नित मेले सजते हैं
नित ढोल और ताशे बजते हैं

दिलबर के लिए दिलदार हैं हम
दुश्मन के लिए तलवार हैं हम

मैदाँ में अगर हम डट जाएँ
मुश्किल है कि पीछे हट जाएँ

A very rough Translation:

This country has brave young men who are carefree
Friends, this country
Friends, this country is great
This country is an ornament of the world

Here the courageous people have a brave heart
Here the women have an innocent face
Here the lovers sing
Here the lovers sing in joy
There are gatherings in the colony

There are swings of spring on the trees
There are flowers lined up in the paths
Here the rainy season smiles
Here the rainy season smiles in the tresses
The flowers blossom on the cheeks

Somewhere the young are wrestling
Somewhere there’s a talent show of archery
Here there are carnivals
Here there are carnivals adorned all around
Where the drums and music are playing

I’m a lover for my beloved
I’m a sword for my enemy
If I step my foot on the battlefield
If I step my foot on the battlefield
Then it’s impossible to turn me back

It is good to see India taking back its seat at the world stage and leading it towards a better future. (Yes there are issues that need to be solved but while we are working on that we do need to celebrate our progress as well)

– Suramya

December 30, 2025

Indian Railways Electrification at 99.2% complete as of 30th Nov 2025

Filed under: My Thoughts,News/Articles — Tags: — Suramya @ 5:17 PM

The more we move away from Fossil fuels the better it is for the environment and as part of that effort the Indian Government has been aggressively pushing for electrification of the tracks. As of 30th Nov 2025, we have electrified 99.2% of the tracks in India putting India at No. 2 in the world after Switzerland which is the only country in the world that has achieved 100% electrification.

Indian Railways go almost fully electric with 99.2% of tracks electrified
Indian Railways go almost fully electric with 99.2% of tracks electrified.

In 2014 only 21,801 km of tracks in India were Electrified. As of 30th Nov 2025 after a multi-year sustained effort 69,427 km of track out of 70,001 km have been successfully electrified. This leaves only 574 km remaining all of which are currently in the process of getting electrified. The following lists the tracks that are yet to be electrified:

Rajasthan: 93km out of 6,514
Tamil Nadu: 117km out of 3,920
Karnataka: 151km out of 3,742
Assam: 197km out of 2,578
Goa: 16km out of 187

My guess is that by mid-2026 we will have achieved 100% coverage.

Source: Indian Railways: Status of Railway Electrification as on 30.11.2025

– Suramya

December 25, 2025

Bad Idea no 2323546: Chat with AI Version of Ex to ‘get over them’

Filed under: Artificial Intelligence,My Thoughts,Tech Related — Tags: — Suramya @ 9:56 PM

I am making yet another post about AI and again not in a good way. The AI we want is something like Cortana from the Halo games, Chappie from Forbidden Planet or Data in Star Trek: The Next Generation. What we have instead is a scholastic parrot that can’t answer basic questions and is more of a plagiarism machine than AI. The scary part is that people are pushing it as the cure for everything and anything. In doing that they want people to stop talking to other people and instead talk to a machine instead. This is bad for all sorts of reasons and has been causing irreparable harm to the world and the way we think of other people.

Loosing someone either because they passed away or because they left you can be hard and it takes time to get over the loss. There are folks who have a hard time with this especially when the relationship was troubled/complicated and that is why Psychiatrists are there to help you get over this loss, another option is to be with friends and family who will help you with the ups and downs.

But now the Techbros have decided that they know better than anyone what is good for the people ’cause they are not people who have friends and a lot of times think of people as interchangeable parts… Elon Musk famously calls people who don’t agree with him or who he doesn’t like NPC’s which is a gaming term for Non Player Characters controlled by the game’s AI i.e. not real. So it is not surprising they have come up with the following abomination:

Chat with their AI-version of your ex. Thinking about your ex 24/7? There's nothing wrong with you. Chat with their AI version and finally let it go.
Chat with their AI-version of your ex. Thinking about your ex 24/7? There’s nothing wrong with you. Chat with their AI version and finally let it go. closure.ink

I found this in my feed and went to their site to learn more (not linking to it because this site doesn’t deserve any more traffic.) and below is their explanation of how things work:

AI-chats with those who disappeared
Chat with the AI version of the person who ghosted you. Get your answers. Regain your strength – and move on.

How It Works
1. Select Who Ghosted You. Choose the type of person who ghosted you – a friend, date partner, recruiter, or long-term partner.
2. Tell Your Story. Share details about your relationship and what happened to help our AI understand your situation.
3. Chat for Closure

Our AI plays role of the person ghosting you. Express your anger, get your answers, and find your closure.

The page is right about the fact that you need to talk about your feelings to someone when you have been Ghosted (or lose someone) but talking to ‘AI’ is not the answer. In fact it can actually make things worse. In Nov 2025, a college graduate who was feeling down shared his feelings with ChatGPT because it was his closest confidant and ChatGPT encouraged him to kill himself as per a lawsuit filed against ChatGPT. More details on the case is documented on this Wikipedia page. This wasn’t the only case where chatbots encouraged/made the situation worse when people who are in a fragile state reached out for help. An incomplete list of Deaths linked to chatbots is available on Wikipedia and multiple mental health professionals have raised concerns about this epidemic which is only going to get worse because of the Hype machine pushing AI as a solution for all ills.

Humans are social animals and need to talk to others. Others might not agree with you 100% of the time but will give you an alternate view that you might not have thought about on your own. It is good for us to have people who challenge our views and thoughts. Otherwise we end up thinking we know everything about everything and end up in situations that could have been avoided if someone had challenged us earlier. Elon Musk is infamous for this, as most of his ideas don’t really work but everyone around him keeps calling him a genius who can do no wrong so we end up with rockets exploding and damaged launch pads because Musk overrode the engineers about the construction. There are countless other examples of this.

I do understand that there are folks who don’t have a good support system around them for various reasons and they should take even more care when interacting with AI as a support system. They can try to chat with online friends, professional psychiatrists, organized groups etc. For example, on Mastodon has a tag that you can follow to have a friendly chat with people on any topic:

Fedi.Tips 🎄@FediTips:

Reminder that if you’re wanting to have a friendly chat with people about everyday things, perhaps Christmas-related or perhaps not, there’s a tag for this at:

➡️

You can talk about what you’re doing or enjoying today. Music, food, television, books, the weather… anything 🙂

It’s meant to connect people who want to have friendly discussions. Everyone is welcome to use it, but it’s especially meant to help people who are a bit isolated for whatever reason.

There are similar other resources available for people who need it including phone lines that you can call for help or just to vent.

To get you over someone, it really helps if you divert your mind by doing something else such as starting a new hobby, activity or changing your daily routine. I started Trekking to meet new people and ended up meeting my wife on a trek. Go out explore the world, you will have a better experience and get more support than what you can ever get from a ‘spicy autocomplete.’

– Suramya

Older Posts »

Powered by WordPress