The Internet Basics Guide That Apparently We Still Need in 2026
Or: How Did We Get Here, and What the Hell is a Spammer Anyway?
Want to know more?

There’s a special kind of exhaustion that comes from watching someone ask “What’s a spammer?” in the year 2026. Not judgment—exhaustion. Because somewhere between the invention of email and the present moment, we collectively failed to teach basic digital survival skills to millions of people who now live their entire lives online.
This is that guide. The one we should have written twenty years ago.
The Facts, No Spin
The situation: Adults who have been using the internet for decades somehow don’t know fundamental concepts like spam, phishing, or basic online safety. This isn’t a failure of intelligence. It’s a failure of education, design, and corporate responsibility.
The numbers: As of 2024, approximately 3.45 billion spam emails were sent daily worldwide. Yet digital literacy programs remain inconsistent, underfunded, or non-existent in most educational systems and communities.
The consequence: People lose money, identities get stolen, elderly relatives get scammed, and the collective frustration level of anyone who has to explain “don’t click that link” for the thousandth time approaches nuclear levels.
Three-Layer Thinking: What’s Really Happening Here?
Layer 1: What’s the obvious answer? (surface thinking)
The Surface Problem: Some people don’t know what spam is.
The Surface Solution: Explain spam to them.
Simple, right? Except it’s not working, because if it were, we wouldn’t still be having this conversation.
Layer 2: What am I missing? (blind spot angles)
Blind Spot #1: The Assumption of Exposure
We assume everyone learned these concepts through osmosis. But think about it: When did you learn what spam was? Probably through trial and error, getting annoyed, or having someone explain it to you. We never formalized this education. We just expected everyone to figure it out.
Blind Spot #2: The Vocabulary Problem
“Spam” is tech jargon that became common... to us. To someone who missed that cultural moment, it’s just the name of a canned meat product. Why would they automatically know it also means unwanted digital messages?
Blind Spot #3: The Interface Illusion
Tech companies designed interfaces that sort of protect users (spam folders, warning labels) but never actually taught users what they’re being protected from or why. It’s like giving someone a seatbelt without explaining car crashes.
Blind Spot #4: The Digital Divide Isn’t What We Think
This isn’t just about old people vs. young people. It’s about people who had mentors/guides vs. people who didn’t. It’s about people who could afford to make mistakes safely vs. people who couldn’t. It’s about cognitive load—someone managing three jobs doesn’t have bandwidth to become a digital security expert.
Layer 3: What question should I actually be asking? (reframe)
The Real Question: How do we create a society where digital literacy is treated as essential infrastructure rather than assumed knowledge?
But since we’re not there yet, let’s start with the basics.
The Toddler-Level Breakdown (With Respect)
Part 1: What Is Spam?
The Simple Version: Spam is unwanted messages sent to lots of people at once. Like junk mail in your physical mailbox, but digital.
Why It’s Called “Spam”: Named after a Monty Python sketch where everything on a menu was spam (the canned meat). The joke was about something unwanted being everywhere. The internet loved the reference. Now it means digital junk.
What It Looks Like:
Emails trying to sell you things you didn’t ask for
Messages from people/companies you don’t know
Repetitive content flooding your inbox
Often has terrible grammar, weird formatting, or seems “off”
Why It Exists: Because sending a million emails costs basically nothing. If even 0.01% of people respond, spammers make money. It’s a numbers game, and you’re the number.
Part 2: What Is Phishing?
The Simple Version: Phishing is when someone pretends to be a trusted person/company to steal your information or money.
The Name: “Phishing” = Fishing for information. The “ph” spelling comes from old hacker culture’s habit of replacing “f” with “ph” (like “phreaking” for phone hacking).
What It Looks Like:
Email that looks like it’s from your bank (but isn’t)
Messages creating urgency: “Your account will be closed!”
Links that look legitimate but lead somewhere else
Requests for passwords, credit cards, or personal info
Why It Works: Because humans are wired to respond to authority and urgency. Scammers exploit this. They create panic so you act before thinking.
The Golden Rule: Legitimate companies will NEVER ask for sensitive information via email. Never. Not once. Not ever.
Part 3: Basic Online Etiquette (Netiquette)
The Core Principles:
Don’t type in ALL CAPS (it’s considered shouting)
Read before you respond (especially in group conversations)
Don’t feed the trolls (people trying to start arguments for fun)
Assume good intent first (text loses tone; people aren’t always being mean)
Think before you share (especially personal info or unverified news)
Respect privacy (don’t share others’ info without permission)
Use clear subject lines (helps people know what they’re reading)
Don’t hijack threads (stay on topic in group discussions)
The Meta-Rule: Treat online communication like you’re talking to someone’s face. The screen creates psychological distance, but there’s still a human on the other end.
Part 4: How Social Media Actually Works
The Simple Truth They Don’t Tell You:
Social media platforms are not neutral spaces showing you “what’s happening.” They are advertising companies that make money by keeping you engaged and selling your attention to advertisers.
The Mechanism:
You are not the customer. You are the product.
Advertisers are the customers
Your attention/data is what’s being sold
The platform maximizes engagement, not your wellbeing
The Algorithm decides what you see
Not chronological (usually)
Not “everything”
Optimized for engagement (outrage, curiosity, validation)
Creates filter bubbles (you see what confirms your views)
Every action is data
What you click
How long you look
What you scroll past
All of it feeds the algorithm
The content you see is designed to trigger emotion
Anger spreads faster than joy
Fear spreads faster than calm
Platforms know this and optimize accordingly
What This Means for You:
If you’re feeling anxious, angry, or addicted to checking social media—that’s not an accident. That’s the design working as intended.
Part 5: Practical Safety Rules
Email/Messages:
Hover before you click: Hold your mouse over a link to see where it actually goes
Check the sender address: “apple.com.secure-verify.net” is NOT Apple
Watch for urgency tactics: Real companies don’t threaten to close accounts in 24 hours
When in doubt, go direct: If an email claims to be from your bank, don’t click the link—go directly to the bank’s website yourself
Passwords:
Use a password manager: Your brain cannot remember 100+ unique strong passwords
Different passwords for everything: One breach shouldn’t compromise everything
Enable two-factor authentication: Extra step, but it stops most attacks
Length beats complexity: “correct-horse-battery-staple” is stronger than “P@ssw0rd!”
Social Media:
Friend requests from people you know but are already friends with? Their account got hacked. Don’t accept.
Too good to be true = definitely not true: No, you didn’t win a lottery you didn’t enter
Check before sharing: That shocking news story might be completely fabricated
Privacy settings matter: Review them annually minimum
General Internet:
HTTPS not HTTP: Look for the lock icon in your browser
Public WiFi is not secure: Don’t do banking on coffee shop internet
Update your devices: Those annoying updates fix security holes
Backup your data: Not if you get hacked, but when
The Dimensional View: Why This Matters Beyond Individuals
Dimension 1: Personal Security Your data, money, and identity have value. Protecting them is self-care.
Dimension 2: Community Health When one person falls for a scam, scammers get funded to scale up operations. Everyone’s security is interconnected.
Dimension 3: Democratic Function Misinformation spreads through the same mechanisms as spam. Digital literacy is civic infrastructure.
Dimension 4: Economic Justice Scams disproportionately target vulnerable populations. This is a wealth transfer from those who can least afford it to criminals.
Dimension 5: Cognitive Load Every piece of spam, every phishing attempt, every misleading post requires mental energy to process. This is a collective tax on human attention and wellbeing.
The Uncomfortable Truth
Here’s the thing nobody wants to say: The current state of digital literacy is not an accident. It’s profitable.
Tech companies benefit from confusion because confused users are easier to exploit for data and engagement.
Scammers benefit from ignorance because that’s their entire business model.
Politicians benefit from digital illiteracy because it makes misinformation campaigns more effective.
The reason we don’t have comprehensive, mandatory, well-funded digital literacy education isn’t because it’s hard. It’s because powerful interests prefer the status quo.
What Actually Needs to Happen (The Optimistic Part)
Individual Level:
Share knowledge without condescension
Be patient with people learning
Remember: you didn’t know this stuff once either
Community Level:
Libraries as digital literacy hubs
Neighborhood mutual aid networks
Intergenerational knowledge sharing
Institutional Level:
Mandatory digital literacy in schools (all ages)
Public funding for adult education programs
Corporate responsibility for user education
Policy Level:
Regulation requiring clear security education
Penalties for companies that exploit user confusion
Digital literacy as a human right
A Note on Frustration
To the person who posted their exasperation: Your frustration is valid. It is absurd that basic concepts from decades ago still aren’t universal knowledge.
But here’s the dimensional reframe: That frustration is data. It tells us the system is broken. Not the people asking questions—the system that failed to teach them.
The Silent Generation grandparents who knew about spam? They probably had someone patient explain it to them. Or they learned through painful trial and error. Neither of those is a good educational model.
We can do better.
The Actually Practical Checklist for Helping Someone
If someone asks you “What’s spam?” here’s the approach:
Acknowledge without judgment: “That’s a good question—let me explain”
Use concrete examples: Show them actual spam/phishing attempts
Explain the ‘why’: Motivation makes concepts stick
Give practical steps: “Here’s what to do when...”
Check understanding: “Does that make sense?”
Offer resources: Point them to this guide or similar
Be available for follow-up: Learning takes time
Definitions of Words Matter
Let’s make this crystal clear:
Spam: Unsolicited bulk messages (commercial or otherwise)
Phishing: Fraudulent attempts to obtain sensitive information by pretending to be trustworthy
Malware: Software designed to damage, disrupt, or gain unauthorized access to systems
Scam: Dishonest scheme to defraud people of money or information
Troll: Someone who deliberately provokes others online for their own amusement
Bot: Automated program that performs tasks on the internet (can be legitimate or malicious)
Hacker: Someone who explores system vulnerabilities (can be ethical or criminal)
Two-Factor Authentication (2FA): Security method requiring two forms of verification
VPN: Virtual Private Network—encrypts your internet connection for privacy
Cookie: Small data file websites store on your device to remember information
Precision in language matters because it enables precise thinking. When we’re vague about threats, we can’t defend against them effectively.
The Bottom Line
Truth matters. The truth is that digital literacy education has been catastrophically inadequate.
Facts matter. The fact is that this isn’t individual failure—it’s systemic neglect.
Justice matters. Justice requires ensuring everyone has access to the knowledge needed to navigate digital spaces safely.
Definitions matter. When we don’t share a common vocabulary, we can’t communicate about threats, solutions, or collective action.
If you’re reading this because someone finally explained spam to you: Welcome. There’s no shame in learning. The shame belongs to the systems that didn’t teach you sooner.
If you’re reading this because you’re frustrated explaining these concepts repeatedly: I see you. Your exhaustion is valid. Channel it into structural change rather than individual blame.
And if you’re reading this because you already know all of this: Share it. Translate it. Adapt it. Make it accessible. Because somewhere right now, someone is about to click a link that will empty their bank account, and they have no idea why they shouldn’t.
We can’t fix decades of neglect overnight. But we can start somewhere.
This is somewhere.
Sources, Links, and Further Reading
Official Resources
For Spam/Phishing Education:
Federal Trade Commission (FTC) Consumer Information
https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
Comprehensive guide to recognizing scams
Cybersecurity & Infrastructure Security Agency (CISA)
https://www.cisa.gov/news-events/news/avoiding-social-engineering-and-phishing-attacks
Government resource for security awareness
National Cyber Security Centre (UK)
https://www.ncsc.gov.uk/cyberaware/home
Practical security advice for individuals
Password Security
Electronic Frontier Foundation: Surveillance Self-Defense
https://ssd.eff.org/
Comprehensive digital security guide
Password Manager Reviews (2024):
Options include: 1Password, Bitwarden, Dashlane, LastPass
Research current reviews before selecting
Digital Literacy Programs
DigitalLearn.org (Public Library Association)
https://www.digitallearn.org/
Free courses on basic digital skills
GCFGlobal.org
https://edu.gcfglobal.org/en/topics/
Free tutorials on technology topics
AARP Fraud Watch Network
https://www.aarp.org/money/scams-fraud/
Focused on protecting older adults from scams
Understanding Social Media Algorithms
“The Social Dilemma” (2020 documentary)
Available on Netflix
Explains how social media platforms work
Algorithmic Justice League
https://www.ajl.org/
Research on algorithmic bias and impact
Academic/Research Sources
Pew Research Center: Internet & Technology
https://www.pewresearch.org/internet/
Data on digital literacy and technology use
Stanford Digital Repository
Research on online misinformation and digital literacy
Books Worth Reading
“Future Crimes” by Marc Goodman (2015)
Explores the dark side of technological innovation
“Spam: A Shadow History of the Internet” by Finn Brunton (2013)
Historical context for understanding spam
“The Age of Surveillance Capitalism” by Shoshana Zuboff (2019)
Deep dive into how tech companies monetize user data
Community Resources
Local Libraries: Many offer free digital literacy classes
Community Colleges: Often have affordable technology courses
Senior Centers: Frequently provide technology assistance programs
SCORE/SBA: Free business technology mentoring
For Immediate Help
If You Think You’ve Been Scammed:
Contact your bank immediately if financial information was compromised
Report to FTC:
https://reportfraud.ftc.gov/
File police report for documentation
Monitor credit reports: annualcreditreport.com (free)
Consider credit freeze: Contact Equifax, Experian, TransUnion
If Your Account Was Hacked:
Change passwords immediately
Enable two-factor authentication
Review account activity
Notify contacts about the breach
Scan devices for malware
Final Note
This guide is released into the world with the hope that it reduces suffering and increases collective security. Share it freely. Adapt it for your community. Translate it. Print it for people without internet access.
And if you find yourself asking “How do people not know this?”—remember that you didn’t know it once either. Someone, somewhere, had the patience to teach you.
Be that person for someone else.
Remember, “don’t hate, educate!”
About Cognitive-Loon (Hans Jonsson)
Swedish writer and consciousness development practitioner applying dimensional thinking to modern problems. Publishing daily at hejon07.substack.com, exploring patterns across domains from quantum physics metaphors to democratic theory.
The Algorithm: Pay attention. Do your best. Pay it forward.
Published January 10, 2026
“Teaching how to think, not what to think—but right now, we need to teach what ‘spam’ actually is.”



Fantastic post, Hans.
As a senior, all of this was an entirely foreign block of information. Yes, all should be educated about these threats. We aren't dying tomorrow.
Excellent journalism.