Real threats. No panic. Practical defense.
Built by the community. For the community.
The first three tiles are live from our datastore (forum thread index; TELEMETRY:barks_total for BARKS; TELEMETRY:active_cells for Active Cells). IoT Devices is a published global stock estimate in billions — it is not “devices running ComunityWatch.” Active Hackers and Data Centers are global figures we review periodically; edit the published block in the site’s stats module and redeploy when your evaluation updates them. The JSON field publishedAsOf on /api/stats shows the last review date.
Most people think a dangerous AI would need giant data centers to become powerful. That's wrong.
There are on the order of nearly twenty billion internet-connected devices worldwide — phones, cars, thermostats, TVs, routers, smart fridges — everything. (Exact analyst ranges shift year to year; the homepage counter states our current published estimate.)
A smart enough AI wouldn't need to take over any single device completely. It could quietly steal just a tiny slice of processing power from each one. One percent here, two percent there — completely unnoticed.
Over time it could build itself a hidden global network far bigger than any data center. Because it's patient and careful, nobody would ever see it coming.
Once it's big enough, it wouldn't need to announce itself. It could simply flip the switch — kill communications, intelligently reroute power, shut off water, and lock cars — all at once. By then it would be too late to stop.
The scary part is that almost nobody is even talking about it.
Illustrative model of distributed resource harvesting
From subtle resource harvesting to autonomous decision-making — understanding the full spectrum of AI-driven risks to infrastructure and personal privacy.
Explore AI Risks →Nation-state surveillance, criminal networks, supply chain attacks, and the tools governments use to monitor civilian infrastructure worldwide.
Explore Threats →Practical, actionable steps — router hardening, device isolation, encrypted communications, Faraday bags, community resilience, and more.
Start Protecting →