TECH005: What Tech Is Doing to Us with Justin Evidon (Tech Podcast)

with Justin Evidon

Published October 15, 2025
Visit Podcast Website

About This Episode

Host Preston Pysh and guest Justin Evidon discuss how modern technology can be a double-edged sword, offering huge benefits while quietly reshaping behavior, privacy, and health. They cover social media recommendation algorithms, data sovereignty, decentralized protocols like Nostr, and emerging privacy-preserving AI tools. The conversation also explores physical impacts of technology such as LED light flicker, blue light, and electromagnetic exposure, along with practical strategies to protect circadian rhythms and use tech more intentionally.

Topics Covered

Disclaimer: We provide independent summaries of podcasts and are not affiliated with or endorsed in any way by any podcast or creator. All podcast names and content are the property of their respective owners. The views and opinions expressed within the podcasts belong solely to the original hosts and guests and do not reflect the views or positions of Summapod.

Quick Takeaways

  • Technology is a powerful double-edged sword that can enable abundance while also subtly eroding autonomy, attention, and health if used unconsciously.
  • Social media recommendation algorithms are optimized to maximize engagement, not user well-being, so users must actively curate and resist doomscrolling.
  • Decentralized protocols like Nostr and self-hosted tools offer ways to reclaim data sovereignty and resist deplatforming, though they still lag in convenience.
  • AI and large language models can function as a "second brain," but only if you understand where your data goes and consider private or self-hosted options.
  • Cloud photo services and permissive app permissions expose extremely detailed personal data, from geotags to social graphs, often without users realizing it.
  • Running personal servers and network-attached storage can replace services like iCloud Photos or Google Photos, but setup remains too complex for most people.
  • Modern LED lighting often flickers and concentrates blue light, which the brain still registers even when the eyes don't, potentially stressing the nervous system.
  • Natural daylight-especially morning light-is a primary regulator of circadian rhythm and is critical for sleep quality, recovery, and longevity.
  • Devices like the Daylight tablet aim to preserve digital productivity while minimizing blue light and flicker, helping users work at night without destroying sleep.
  • The overarching goal is not to abandon technology but to use it intentionally, balancing convenience with privacy, health, and long-term autonomy.

Podcast Notes

Introduction and episode setup

Show framing and topic overview

Host introduces Infinite Tech episode on the dark side of technology[0:06]
The episode will explore how innovation, biology, and data can start shaping us instead of us shaping them
Guest introduction: Justin Evidon[0:14]
Preston says his guest, Justin (referred to as Justin Evadon in the transcript), has spent years thinking about how tech rewires health, food, and freedom

Podcast and host introduction

Network and show identity[0:30]
Listeners are told they are listening to Infinite Tech by The Investors Podcast Network
Host and show scope[1:29]
Preston Pysh is introduced as the host, and the show explores Bitcoin, AI, robotics, longevity, and other exponential technologies through a lens of abundance and sound money

Setting the context: Bitcoin, health, and tech as a double-edged sword

Preston and Justin's background and connection

Long-running conversations between host and guest[0:37]
Preston says he and Justin (called "Jevi") have had conversations like this for years, starting with a rooftop event in Miami around five years ago
Bitcoin community as gateway to broader topics[1:54]
Justin notes that Bitcoin has been a medium for diving down many rabbit holes beyond money, including health and longevity

Health, longevity, and tech in the Bitcoin community

Why Bitcoiners care about longevity[2:10]
Preston says at Bitcoin events people talk not just about Bitcoin but also health, biotech, and longevity, since people doing well in life want to live longer and enjoy themselves

Tech as luxury and as a danger

Framing tech as a double-edged sword[2:35]
Preston describes technology as great for luxuries and ease, but also as a double-edged sword that can be detrimental to health
Justin's working thesis on technology's impacts[2:59]
Justin says throughout history, innovation and new technology have inevitably changed how society functions
He calls the dawn of the internet the sharpest double-edged sword humanity has encountered so far
He acknowledges huge new opportunities from the internet but also serious negative effects, especially visible in the last 5-10 years
He argues individuals must understand where pitfalls lie and cannot rely on tech companies for guidance because they profit from negative impacts

Social media algorithms and doomscrolling

Algorithmic steering and profit incentives

Platforms benefit from exploiting human tendencies[3:55]
Justin cites TikTok, Facebook, and Instagram algorithms steering users into endless doomscrolling and autopilot behavior
He notes there is significant profit opportunity in leveraging the negative impacts of these engagement-maximizing algorithms

Jack Dorsey's warning and X "For You" feed

Jack Dorsey's comment on algorithms programming users[4:10]
Preston recalls Jack Dorsey saying these algorithms are programming you rather than you programming them, which caused him to pause and reflect
Experience with X's AI-generated recommendations[4:35]
Preston describes X rolling out an AI-generated "For You" feed showing what it thinks he likes to look at
He noticed content he does not actually like appearing because he had previously dwelled on salacious or sensational videos, signaling interest to the algorithm
Aggressively curating the recommendation engine[5:35]
Preston consciously decided to immediately mark any unwanted content in the For You feed as "not interested" or block the account
He feels his For You feed is now much better because he has aggressively filtered it

Chronological feeds vs algorithmic discovery

Recreating the old chronological Twitter feed[6:38]
Justin had the same experience with X and previously with Facebook when they moved from a simple chronological feed to algorithmic feeds including content you didn't subscribe to
He found a recommended search query on X that recreates the old chronological feed of only people you follow and bookmarked it so his browser defaults to it
Trade-offs of the "For You" page[7:01]
Justin notes the chronological approach helps you actually engage with people you follow, since many of their posts never appear on the For You page
He acknowledges the For You page is useful for discovery, helping you find new creators and thinkers you might want to follow
He sees the For You feed as another double-edged sword: valuable for discovery but also capable of pushing salacious or detrimental content
Dependence on platform values and guidelines[8:04]
Justin highlights reliance on centralized platforms whose algorithms and content policies may not align with your ethos
He notes concerns that content has to conform to platform guidelines, prompting some users to look for alternatives

Decentralized social protocols and data sovereignty

Explaining Nostr as an alternative to centralized platforms

Nostr basics for non-Bitcoin listeners[8:27]
Preston explains that Nostr is a decentralized protocol allowing X-like functionality, where you use a public/private key pair and can choose any client
He emphasizes that on Nostr, nobody can delete your account and you can speak freely, with feeds organized differently by different client providers
He and Justin believe that over time such protocols may become more desirable because they are not dominated by a single company's algorithms

Security, data privacy, and sovereignty as Bitcoin rabbit holes

Bitcoin as gateway to caring about security and privacy[9:32]
Justin notes Bitcoin has made people think about security, data privacy, and sovereignty in new ways
Why many people dismiss privacy concerns[10:05]
Justin says people who don't understand Bitcoin are comfortable with existing financial structures and don't see pitfalls
Similarly, people dismiss data privacy concerns with "I have nothing to hide, so why should I care?"
He argues many have not "touched the stove" yet: they haven't been deplatformed or had data removed or misused, so they don't feel the risk
Preston's view that most people prioritize convenience[10:05]
Preston believes the majority ("at least 95 out of 100") hold the view that they have nothing to hide and like that algorithms feed them content they enjoy
He says the convenience argument dominates, and people feel they don't have time to set up alternatives

Self-sovereignty without becoming a Luddite

Effort required to step outside centralized environments[10:48]
Justin notes it takes effort to move away from controlled centralized environments toward self-sovereign alternatives
First step is understanding pitfalls; second is executing and becoming less reliant on centralized providers
Maintaining intentional tech use instead of digital Luddism[11:15]
Justin says he does not want to be a "digital Luddite" and recognizes huge benefits from many tech providers
His goal is to use tools with intention, aware of where things can go wrong and where overreliance creeps in

Future risks and the importance of forming conscious habits now

Concern about where current patterns lead in 10 years

Preston's worry about long-term trajectory[15:32]
Preston asks where current tech trends take us in 10 years if people do not develop conscious habits now
He stresses you cannot undo 10 years of unconscious engagement later; inaction now has compounding effects

Balancing gated ecosystems and sovereignty tools

Having a foot in both camps[16:35]
Preston interprets Justin's view as not needing to leave gated ecosystems entirely, but being thoughtful about which tools you use and why
He suggests people can maintain presence in both centralized and sovereign systems and lean on one or the other depending on their goals

AI, LLMs, and the idea of a private "second brain"

Benefits and risks of mainstream AI tools

Using AI and LLMs for productivity[16:42]
Justin sees huge benefits in AI and LLM tools, especially for making information gathering and distillation more efficient
He mentions using these tools in his day job as a product manager at Unchained
Data control and training risks[17:18]
Justin warns that if you send sensitive information into public AI infrastructure without data controls, it may be used for model training in ways you would not want

Concept of a digital second brain

Traditional note-keeping vs digital synthesis[18:10]
Justin notes humans have used journals and private tools for centuries to capture information but synthesizing and recalling it takes effort
Second brain as AI-augmented memory and synthesis[18:10]
He defines a digital second brain as capturing information digitally and leveraging technology to find synthesis points and connections outside your own memory
To truly function, a second brain system must hold all your information, including private thoughts and conversations, which raises privacy concerns
Need for private or self-hosted LLMs[18:48]
Justin argues that private or self-hosted LLMs are needed to make a second brain work without compromising privacy
He notes most privacy-oriented AI tools are currently cumbersome: you must host them yourself and they often do not retain context from prior conversations

Convenience of centralized AI vs burdens of self-hosting

Preston acknowledges utility of context-aware AI[19:26]
Preston states it is "crazy helpful" that AI tools can learn what types of questions he asks and topics he cares about, and anyone denying this is ignoring utility
Technical burden of local AI[19:52]
He notes that to use AI securely without big tech knowing everything, you must run your own server and store data locally instead of in the cloud
He asks whether there is a turnkey way today for non-technical people to self-host AI, or if that is still a few years away

Emerging privacy-preserving AI: Maple AI and OpenSecret

Shift in investment toward privacy tools[20:38]
Justin says early capital investment went to centralized, convenient AI systems run by large tech companies with access to capital
He believes investment is now starting to flow into privacy-oriented alternatives
Maple AI as a ChatGPT replacement[21:00]
Justin cites Maple AI, started by another Bitcoiner, as an example of a privacy-focused tool aiming to replace ChatGPT at roughly similar cost
He likes that Maple AI retains the convenience of a web-based service without requiring users to self-host
Security model and OpenSecret[21:48]
Justin says Maple AI uses an end-to-end encryption technology they developed called OpenSecret
He notes they provide tools that allow users to validate the end-to-end encryption, though he does not dive into technical details

Self-hosting data: photos, NAS, and home servers

Problems with cloud photo storage and app access

Dependence on Google Photos and iCloud[22:26]
Justin notes many people feel stuck in Google Photos or iCloud ecosystems and struggle to imagine moving away
Preston explains photo data sensitivity[23:12]
Preston details that photos are geotagged and, combined with AI, can reveal exact locations and identify people via social media cross-referencing
He warns that granting full photo access to an app can expose "anything and everything" you've photographed over 10-15 years to unknown entities
He advises checking which apps have full photo access on smartphones and reconsidering such permissions
Apple's partial mitigations and real-world consequences[24:02]
Justin notes iOS is trying to create better patterns, such as allowing users to share only specific photos with apps instead of entire libraries
He emphasizes that Apple and Google still ultimately have access to all cloud-hosted photos
He cites documented cases where people were convicted of crimes like child abuse based on evidence extracted from their cloud-hosted photos

Building a home server with network-attached storage (NAS)

Justin's background and backup evolution[25:40]
Justin previously worked as a freelance photographer/videographer for about a decade, generating very large digital negatives
He kept all images rather than deleting, amassing terabytes of data and facing complex backup challenges
His backup strategy evolved from a single local hard drive to multiple drives in different locations and concerns about simultaneous degradation
Transition to NAS as a personal server[26:22]
Justin eventually bought dedicated network-attached storage hardware providing redundant drives and acting as a server accessible from anywhere
The NAS allows him to run applications and store large amounts of data specifically for long-term preservation and access
Difficulty of making NAS setups accessible[27:10]
Justin planned to document his NAS setup and share it with friends and family but found the process still very hard
He frequently had to use ChatGPT to troubleshoot issues, indicating the complexity for average users
He sees projects like Start9 as promising all-in-one server solutions with click-to-install apps, though users still need some hand-holding
He believes there is demand and motivation to close the convenience gap with services like iCloud or Google Photos

Toward more private devices and self-hosted apps

Bitcoin nodes and user-friendly home servers

Preston describes node UX[27:48]
Preston notes that running a Bitcoin node on platforms like Start9 or Umbrel can feel like using an iPhone: you log in and install apps on your home server via a user-friendly interface
He suggests storing photos on such a device is relatively approachable for non-experts

Open-source phone OS and full privacy stacks

Ongoing leakage from mobile operating systems[28:47]
Preston observes that most data collection and transmission happens through smartphones running Apple or Google operating systems
He feels that even if he deploys privacy tools on servers, he still leaks data to Apple or Google via the phone, making full privacy feel "not worth it yet"
GrapheneOS on Pixel phones[29:47]
Justin points out you can side-load a privacy-oriented open source OS called Graphene onto Google Pixel phones
Graphene allows sandboxed access to Google Play services and apps like Maps or Gmail while maintaining a more privacy-focused environment
He stresses this still comes with a convenience cost compared to using standard Apple or Google setups

Immich as a self-hosted Google Photos replacement

Motivation for using Immich[30:30]
Justin discovered an open source project called Immich, a self-hosted alternative to Google Photos/iCloud that runs on his NAS
Features and migration away from iCloud Photos[31:14]
Immich automatically backs up photos from his phone to his server and uses internal AI for face detection and geotagging
Its interface is similar to Google Photos, making it more user-friendly
Justin was able to migrate all photos out of iCloud Photos and turn off iCloud backups, so new photos now go only to his NAS
He acknowledges he cannot control whether Apple actually deletes past data, but he can control present and future storage
Open-source development and stability[32:55]
Justin notes Immich has only existed a few years and recently reached a stable release
He praises what motivated open source developers can build and highlights Immich as nearly a one-click migration path away from centralized photo solutions

Hardware health impacts: light, EMF, and circadian rhythm

Concerns about electromagnetic frequency (EMF) and lighting

Overlooked hardware emissions[32:52]
Preston says hardware ramifications of tech, like electromagnetic frequency and light frequencies, are often ignored despite widespread use of devices like AirPods and iPads
He mentions people he respects keep warning about EMF from devices and LED lighting, suggesting it is not just a "tinfoil hat" concern

LED flicker demonstration and potential ADHD link

Using slow-motion video to reveal flicker[34:50]
Justin suggests taking out a phone, switching to slow-mo, and filming indoor lighting; playback often reveals intense flickering invisible to the naked eye
How dimming can cause flicker[35:04]
He explains cheaper LED dimming methods cut electricity on and off rapidly to lower apparent intensity, causing flicker your brain senses even if your eyes do not
Possible behavioral effects in children[35:40]
Justin recalls a study where one classroom had flickering fluorescent lights and another had non-flickering lights, and children under flicker were much more hyperactive
He suggests such lighting could contribute to behaviors labeled as ADHD, though he does not claim definitive proof

EMF, Wi-Fi, and 4G vs 5G

Cautious but non-alarmist stance on EMF[36:30]
Justin states he is not a scientist and does not want to sound like a conspiracy theorist, but believes more scrutiny of EMF is warranted
He notes some people prefer wired Ethernet over Wi-Fi to reduce EMF exposure, though fully swearing off Wi-Fi is inconvenient
He mentions debates about 4G vs 5G; some arguments seem outlandish, but he questions whether we really need 5G speeds for most use cases
His key point is to be aware of trade-offs and prioritize which conveniences matter most to you

Visual processing, subconscious effects, and lighting

Toilet-paper-tube experiment and binocular rivalry

Competing images and perceptual switching[42:48]
Preston recalls a book (he thinks "Consciousness and the Brain") describing an experiment where each eye sees a different image via monocles (e.g., cow vs rooster)
The brain alternates perception, seeing only one image at a time and switching every few seconds
Introducing a single altered frame in video[44:08]
Researchers converted each image into a video at about 30 frames per second and swapped a single frame in one video with a different picture (e.g., a bullseye)
Participants still believed they were seeing a static picture and did not consciously perceive the altered frame
However, the brain then stopped switching between images and consistently perceived only the video with the single altered frame

Implications for LED flicker and subconscious load

Subconscious processing of rapid changes[44:38]
Preston concludes that even when we think we only see a stable image, the subconscious is processing subtle, rapid changes with profound effects
Applying the experiment to LED flicker[45:18]
He relates the experiment to LED lights that flicker faster than we can consciously perceive, arguing our brains still register the flicker and may be stressed by it

Light spectrum, circadian rhythm, and blue light

Flicker frequency and desire for consistent light

Perception thresholds and camera artifacts[45:10]
Justin notes standard 30 fps video often cannot show flicker, but slow motion reveals horizontal bands or obvious flashing
He mentions that beyond a certain frequency (he references around 1000 Hz), the brain stops perceiving flicker
From flicker to spectral composition[45:30]
Justin says after you get consistent (non-flickering) light, you must also consider the light spectrum emitted

How modern LEDs differ from natural sunlight

Narrow spectrum and blue emphasis in LEDs[46:40]
He explains energy-efficient LEDs often achieve savings by cutting large parts of the spectrum present in incandescent or halogen bulbs
Much of the remaining output is concentrated in the blue region, which is not necessarily bad by itself but is unbalanced
Natural sunlight as a full-spectrum, time-varying signal[47:10]
Justin contrasts LEDs with midday sunlight, which has lots of blue light but also includes ultraviolet and infrared in a full spectrum
He describes how the sun's spectrum changes through the day: very orange/infrared in early morning, broader and bluer midday, then tapering back toward infrared in the evening

Light as a circadian and hormonal signal

Eyes and skin as light sensors for the body[48:17]
Justin says eyes and skin absorb light information and the body uses this to decide which hormones to release
Light cues tell the body whether it is morning and active time, or night and time to sleep, heal, and process the day
Preston's jet-lag example and morning light[49:44]
Preston shares that when he asked AI how to adapt to new time zones faster, the top recommendation was to go outside and get morning light into the eyes
He notes this underscores how strongly circadian rhythms and bodily timing are tied to light exposure at specific times of day

Blue light at night and sleep disruption

Tech use hijacking circadian rhythm[50:40]
Justin explains that many people stay on screens late at night, and the blue light keeps their bodies from winding down, delaying deep and REM sleep onset
Mitigation strategies: screen filters and daytime sunlight[50:22]
He recommends spending as much time as possible outside, especially getting first morning light as a key anchor for circadian rhythm
On computers he uses software like Iris (and mentions Flux) to adjust color temperature, reducing blue light in the afternoon and evening
On phones, he notes you can enable strong color filters to approximate a red light mode for late-night use
Real-life constraints with family and work[52:45]
Justin points out that with two kids, evenings are often spent cooking, reading, and putting them to bed, leaving limited solo time afterward to work or pursue projects
He acknowledges this reality means he sometimes must use screens close to bedtime, so mitigation tools matter even if they are not perfect

Daylight tablet and healthier digital workflows

Design and purpose of the Daylight tablet

Monochrome, transflective display to reduce blue and flicker[53:04]
Justin describes the Daylight tablet as an Android device with color stripped out and a transflective LCD that both emits and reflects light
Its built-in light source is intentionally designed to avoid blue light and minimize flicker
Comparison to e-ink and UX impressions[53:20]
Preston likens it to a Kindle or Etch-A-Sketch where outdoor visibility is excellent, but notes the refresh rate is fast enough to play video while still looking like static e-ink

Using the Daylight tablet to protect sleep while staying productive

Justin's nightly workflow[53:54]
Justin says after putting his kids to bed, he uses the Daylight tablet to write or research in the evening without the usual blue-light penalty
He tracks his sleep cycles and emphasizes consistent bed and wake times as critical for longevity
The Daylight tablet lets him both read books and do more active work like writing, all on a single low-impact device
Linking digital note-taking to second brain concepts[54:12]
He reiterates that capturing thoughts digitally (instead of only on paper) makes it easier to feed them into AI tools later for recall and synthesis as part of a second-brain system

Big-picture reflections on tech's benefits and costs

Lift vs drag analogy for technology

Aerospace metaphor for tech trade-offs[54:57]
Preston uses his aerospace engineering background to say you cannot have lift without drag; similarly, every tech benefit comes with associated costs
He observes most tech discussions focus on the "lift" (benefits) and ignore the "drag" (side effects and consequences)

Need to confront trade-offs early

Irreversibility of long-term exposure and data sharing[55:59]
Preston warns that if people ignore drag now, in 10-15 years it may be too late to undo data exposure or other tech-induced harms
He praises Justin for clearly laying out key issues so listeners can consciously decide what they are and are not comfortable with

Justin's closing perspective: awareness, not abstinence

Goal is awareness and intentionality[56:53]
Justin says he worried the conversation might feel scattered but hopes listeners at least become more aware of potential concerns
He clarifies this is not a call to swear off technology; he uses tech daily and wants people to get the best from it without retreating to the wilderness
Future topics and Justin's other work[57:32]
He notes there are many related topics they did not cover, including CRISPR
Justin mentions he started a Substack called "Primal Cut Sheet" focused on tips and insights about buying beef in bulk and the idea that the correct number of chest freezers is one more than you currently have
Host wraps up and invites feedback[58:00]
Preston says they will link to Justin's X and Nostr accounts and invites listeners to suggest future topics

Lessons Learned

Actionable insights and wisdom you can apply to your business, career, and personal life.

1

Centralized algorithms and platforms are optimized for engagement and profit, not your well-being, so you must actively curate what you consume and set boundaries on your own behavior.

Reflection Questions:

  • What content or apps consistently leave you feeling worse after using them, and how could you start blocking, muting, or marking them as "not interested"?
  • How might your information diet change if you spent more time in chronological or manually curated feeds instead of algorithmic "For You" feeds?
  • What specific step can you take this week to reduce doomscrolling, such as time limits, aggressive filtering, or removing one app from your phone?
2

Data sovereignty requires trade-offs: reclaiming control over your information through self-hosted tools, privacy-focused services, or decentralized protocols will cost convenience but reduces long-term risk.

Reflection Questions:

  • Where are you most dependent on a single company to store or mediate your critical data (photos, messages, documents, identity)?
  • How could adopting one self-hosted or privacy-preserving alternative (like a password manager, photo backup, or decentralized social client) improve your autonomy over the next year?
  • What is one centralized service you rely on today that you could begin gradually replacing with a more sovereign option, and what is the first tiny step in that direction?
3

AI can serve as a powerful "second brain" only if you are deliberate about what you store, how you structure it, and where that data lives, with privacy and future flexibility in mind.

Reflection Questions:

  • What kinds of notes, ideas, or documents would most benefit from being searchable and synthesizable by an AI assistant in your own "second brain"?
  • How might your approach to journaling, note-taking, or saving research change if you assumed it could later be queried and recombined by a private AI tool?
  • What is one workflow (writing, research, planning) where you could start centralizing your information in a system you control, instead of scattering it across opaque cloud services?
4

Your environment's light and EMF exposure quietly shape your sleep, focus, and mood; small design choices-especially around morning light and evening screens-compound into major health and performance outcomes.

Reflection Questions:

  • How much natural morning light are you currently getting in the first hour after waking, and what would it take to increase that exposure?
  • In what situations do you use bright, blue-heavy screens late at night, and how could you modify those habits with filters, alternative devices, or different routines?
  • What is one change you could make in your home or workspace lighting this month (bulb type, dimmers, screen settings) to better support your circadian rhythm?
5

Complexity is currently the main barrier to privacy-preserving tech; until tools are as easy as mainstream products, you need to pick a few high-impact areas where extra effort is worth the protection.

Reflection Questions:

  • Which category of your digital life-communications, finances, photos, identity-would cause the most harm if it were leaked, censored, or misused?
  • How could you prioritize learning and setup effort around one or two high-value protections instead of trying to "lock down" everything at once?
  • What specific privacy-enhancing tool (e.g., secure messenger, NAS, alternative OS, or decentralized protocol) are you willing to experiment with in the next three months?
6

The earlier you recognize and adjust for technology's "drag"-its hidden costs-the more options you preserve; waiting a decade to care about data exhaust, health impacts, or dependency leaves far less room to maneuver.

Reflection Questions:

  • Looking back over the past five years, where do you wish you had set clearer boundaries with technology sooner (social media, cloud storage, devices, or work tools)?
  • How might your future self 10 years from now describe the biggest tech-related risks you should start addressing today?
  • What is one reversible, low-risk experiment you can run this month to reduce a dependency or exposure, so you can learn before circumstances force your hand?

Episode Summary - Notes by Avery

TECH005: What Tech Is Doing to Us with Justin Evidon (Tech Podcast)
0:00 0:00