top of page
71OMr0D4FrL._SL1500_.jpg
119159849_10158061653118813_5314694876572739015_n.jpg
71eSH5cSYiL._SL1377_.jpg
final.png

An A.I. Clone Doesn’t Have My Private Key - Trust


I mean what kind of email even is this?  My jaw dropped and I had to read the email a few times to understand what exactly it was “offering”.  This company really wanted to create a CLONE of me (a weirdo in a helmet), and then said the clone would what?  Talk in front of a camera and create CISSP videos?  Even the real Luke Ahmed doesn’t get in front of the camera, what were they even talking about?


They said I would no longer need to film videos for my Accelerator.  An AI avatar would look and sound exactly like me.  Content could be produced at scale for Instagram and TikTok.  Leads would flow in automatically.  I’ve been in this social media CISSP instructor game and I swear to you I still don’t know what a “lead” really means, or “impressions”.  Like, it’s not my concern.  My proud Bangladeshi father who has fought two wars and was a POW would laugh and find it utterly ridiculous if he saw me dancing around following some TikTok trend.


Every piece of CISSP guidance I publish is filtered through real experience.  These insights come from real stress, real sleep deprivation, real getting yelled at by my boss, and real feelings of satisfaction after solving a complex network security problem.  They are situational. They are contextual. They are human.  Let me give you an example of trust:



This above exchange happened with a complete stranger. He could not use his credit card due to local banking regulations, asked me to generate an invoice manually, sent the money, and trusted that access would be granted. And it was.


There was complete trust. That trust exists because over time people learn that my word verifies, that what I say I will do gets done. In cryptographic terms, my public persona is visible to everyone, but character, discipline, and consistency build the encryption algorithm that protects the private key. If that key is ever compromised, nothing I build afterward can be authenticated.


An AI avatar can read a script.  They cannot understand the tears that fall out of nowhere when someone sees “Congratulations”.  Nor does it feel the anger when the exam doesn’t go a student’s way and they feel all the months of studying have been wasted.


Yes, AI can save time.Yes, AI can assist with editing, structuring, summarizing, and repurposing.  I already use AI as a tool to edit my original work. 


But there is a hard line between:


  • AI assisting the work

  • AI impersonating the instructor


Crossing that line may increase reach, but it dilutes trust. In a field like cybersecurity, where trust, accountability, and authenticity are not optional, that tradeoff is unacceptable.

I am not trying to win a 30-day “engagement” sprint.  I am building a body of work that professionals rely on when:


  • Their exam date is approaching

  • They are mentally exhausted

  • They need someone who understands the pressure of passing and the sorrow of failing


That requires showing up as myself: imperfect, human, and accountable.


No avatar can do that.


AI will absolutely change education.


But the instructors who retain their authenticity through it all, the ones who don’t share their private key, they will last the longest and be the last ones standing. 


For CISSP, and for serious professional development, trust is the product.


And trust does not scale through imitation.

 
 
  • Youtube
  • Instagram
  • Linkedin
  • Facebook
  • TikTok
bottom of page