Come answer a question, share a laugh, encourage one another, and bring me a coffee! |
The simple answer: Depends on how it's used. A more complicated answer: 1. Depends how efficient the safeguards are that prevent it being misused; 2. Depends how efficient security personnel are at detecting, locating, and apprehending anyone attempting to misuse it (using AI, quantum computing, and nose-to-the-ground footwork); 3. Depends how efficient QC is at detecting glitches and patching them before they become catastrophes. (HINT: Don't let macrosux have the contract for patching the software.) 4. Don't allow juveniles uncontrolled access to the software a. They don't understand what is crucial and what isn't; b. old and wiser heads haven't trained them on what's "impossible" (which is why, among other things, the mortality rate of teenagers is so high); c. as they get older, they may realize "that's impossible" is just the rallying cry of the narrow-minded moron, and try it anyway (and succeed). The people in charge are politicians. Doesn't matter that cyberscientists are involved, unless their advice is listened to; politicians tend to be scientifically-illiterate by choice. Gee. There doesn't seem to be a black & white answer, does there? Welcome to life. |