I don't think we're straying to far off topic; over on another thread, @Bystander just posted a link to an excellent example of what can be done with a terrible script if you lay down $250 million dollars for the special effects! ;-)
One aspect of all of that is differentiating access: there has to be good information access control. Key aspects of that, "authentication" and "authorization". Authentication acknowledges the identity, authorization details trust of the identity for dispersal of information.
Cognizance of adversity is a major factor in these considerations. One reason why nobody speaks of "Inception" as being malicious propaganda - even if I might point out that it uses manipulative processes detailed in ericksonian hypnosis - is because it also continues that theme through out of potential adversities and adversaries.
"Hypnosis", it should be noted, is just a word. Very little is understood about the concept. What we do understand comes from what study we have performed. There is, on the subject, like many subjects - certainly like with hacking, information security, conspiracies, health, living longer - much disinformation. Taking in to one's core wrong information is like eating poison.
You could end up a mindless zombie of some political agenda, or some religious agenda. A corpse by the wayside, an useful idiot. No means richer, no means wiser, and all because you did not take to heart diligent information security concerns. Finding the right information, moreso, the right information streams.
System level access, direct conduits to The Unconscious, Root... requires strong access controls against disinformation -- the buffer overflows, sql injection, cross site scripting, and other security vulnerabilities of the soul scape. Mind and heart.
Inner person, beyond the flesh.
So, far moreso dangerous then mere untrained thieves as a concern, are nation state level adversaries intent on bringing into the corporate mind meld, the Borg, all who dare try and eject from their Matrix, the World.
But? On the other hand, there can be individual hackers who are very skilled and have the capacity for near nation state based level sophistication. Still, what we look for in terms of sophistication is with a very strenuous eye, sophistication far beyond what we see "out there". Sophistication that can truly prolong life and lead to a far better place.
Sophistication of product far beyond that possible even for all of the first world countries and the height of their most secret technology put together. Because you know they do not really have aliens doing their biding at Roswell. As their pictures well show, they are not on the road to living forever. Those are not disguises. And if there is any doubt, even a cursory glance at their words and actions prove it. Because people can judge by that standard, contrary to how scammers would proclaim.
A big problem remains: if they are not in control, then who is? Nobody offers anything for free in this world. We do trust doctors, we do trust nurses, we do trust cops - in some situations - we do trust even politicians in some situations. If information streams exist which prolong life, like rewiring the dna - not material food, but informational food, genetic splicing, the holy grail of words, an 'informational' 'live forever' pill - what is the cost? What is the price? And why must it be so secretive, why so hidden, why so well guarded?
We trust bus drivers, airline pilots. We trust airport security, to a degree, to a certain degree we trust our fellow people.
The Fountain of Youth, the Holy Grail, the Green Eggs and Ham of hidden informational streams. Like a network one finds and hooks into. A good metaphor is depicted by the wise Daniel Suarez, in Daemon and Freedom. Wear certain glasses, for instance, and see the virtual overlay across reality as designed by an all too loving but gone - not here - master software designer.
On global conquest. Taking over the world. Smashing the powers of the nations like an iron rod against clay pots.
What a horrific thing to say? Anarchy? Communism? No. To not be less disturbing.
Like "Fight Club", where our spiritual inner person awoken in shared dream space does 'what must be done' when we can not do it? Ultimately freeding everyone from the mountains of debt they have piled up, zeroing their credit entirely? Freedom from debt. Forgiven.
Access control with the nations is something quite different from access control with individuals. Individuals get hacked with low level script kiddy tools day and night. Getting some access control with root/system level access of a nation is one thing. They don't go and join the Davidians or start fishing with the Kingdom's Gate, or even into Multi-Level Marketing Ponzi schemes. But we surely saw nations get hacked by sophisticated attackers in the last century, with open source doctrines and well worked out, peer reveiwed hacker code written by Nietsczhe and Marx and even Paine. Spurious sources, perhaps well meaning, but used for clearly malicious purposes.
Now we see full well information control, information security, is not just with poorly secured third world nation systems, but also right here in the first world where the big, glossy technology resides. Even well written code like that by Washington and Jefferson and Paine has severe security holes in it.
But ultimately, there remains confidence. There are a lot of checks and balances, and the diversity of global systems is key. You can't get together Mac OS X, Linux, Unix, Android, Windows, on and on and on, warring political code schemes and religious schemes, and union them altogether. New code does not just come from anywhere, new technology does not just appear in a day. Aliens are not arriving to reboot the planet, and if they are? They would be well warded against.
Then again, unless they are us, already here, not 'seen as coming down from the sky', but 'within' and 'among us' already. Who kept diversity of code culture for security purposes, instead of a monolithic, 'hack everything with one virus' system. Any great work, after all, is kept hidden while in progress, like Michelangelo, hid the Sistine Chapel painting. You sweep away the curtain at once, you pull off the band aid quickly.
The bridge is built, but unconscious, unaware, secretive, then is expanded outwardly. Change is traumatic. Going into an operation, in the operation, anesthesia is used. Your foot, your legs, your body does not get scared. Your mind does. It happens in sleep, the big problem is resources for rest and change, healing afterwards. But the technology is in place, like the hospital is where the patient find's their self. If they are nervous about that, there is anti-anxiety medication also designed and ready for them.
So, there is code for you.
For anyone. Maybe just for myself. Are modern hospitals more persuasive to us then old shaman doctors? Depends on the context. We are cautious, seasoned buyers of sophistication, with good eye against counterfeit information. Wary against poisoned bread. But armed with endless fish and loaves.