Skip to main content

About privacy and telephone companies

https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

When we are talking about the data, what private corporations collect about us, we always forget to ask one simple question: "Who owns our telephone or internet provider"? This question is very interesting because if the owner of that company wants, the RAID-5 technology would send all data, what travels thru the server rooms of that company even across the Atlantic, and that data can be used to create the profiles of every individual person, who use that provider.


And the second thing what might interest people is so-called "Carrier IQ". This is actually a small code, what would put in the front of every data package, what would send thru the Internet, and in TCP/IP-protocol that thing can tell anything about the usage of the computer or mobile device. TCP/IP (Transmission Control Protocol) is the communication protocol where the server sends the data as packages via the Internet.


This protocol cuts the transmission simultaneous because it would connect the control code in the data. When the packages would be sent to some computer, that code would drive the package to the right device. And it is in use also in GSM-telephones. This protocol asks the request, that the data package is right, and if there are some errors, the package would be resent. That allows us to use video-broadcasts and banking services safely.


But that protocol would allow that any device in the world can be tracked. This is the shadow side of the Carrier IQ and in the real world, that would allow installing any kind of malware programs inside the mobile devices. This means that inside that data would slip the packages, where is the malicious software. That means the observer can follow the person location, homepages where targeted person visits, and even the pulse and breath.


In this case, the privacy of the person can break totally, and another good way to slip malicious software to mobile telephones is to use the SIM-card, where is the program. In the real world, the telephone company can also make firewalls and antivirus programs, what allows specific malware to install in those devices. If the company wants, that the antivirus and firewall would let the malware, that has the right control code to pass the defense. And then that kind of malware can be installed to any device, what has that company's SIM-card or is inside of its firewall.

Comments

Popular posts from this blog

Antigravity will be the greatest thing. That we have ever created.

"Artistic depiction of a fictional anti-gravity vehicle" (Wikipedia, Anti-gravity) Sometimes, if the airships have the same lifting power as the weight of the airship.  It can act like some “antigravity system”. Those systems are based on lighter-than-air gas or hot air. The system can have a helium tank. And the hot-air section whose temperature can be adjusted using microwaves or particles that lasers warm. Those systems are faster to control than some gas flames. This makes it possible. To adjust the lifting power.  If a thing like a balloon has the same lifting power as its weight, the balloon can be lifted to a certain point and altitude. And the balloon stands at that point until something moves it. That kind of thing can make an impression. On the antigravity systems. Modern airships. Like Lockheed-Martin P-791 can look. Like a “UFO”. The system can use systems to move the craft. Or maybe those ion systems are used for plasma stealth systems, if those airships' mis...

The first test flight of X-59 QueSST

The X-59 QueSST (Quiet Supersonic Technology) demonstrator is the next generation of aircraft design. The QueSST technology means. The aircraft creates a gentler sonic boom. Because its wings are radically long and narrow delta wings, and its nose is also radically long, which makes the sonic pressure cone thinner. That technology makes the sonic boom quieter.  The QueSST technology in X-59 is a new and radical design. All of those systems are caricatures. And the final solutions might look far different than the prototypes. The QueSST technology is one of the things. That is planned to be used. It is used in military and civil applications. If that technology is successful. It can be used in manned and unmanned systems. But that requires more work.  The X-59 also uses fundamental technology. Where the pilot must not have windows. To see outside. The camera and other sensors replace traditional windows. And that can be useful in more advanced aircraft that operate at hypersoni...

The theory about paralleled universes

http://crisisofdemocracticstates.blogspot.fi/p/the-theory-about-paralleled-universes.html Kimmo Huosionmaa There is the quite unknown theory about paralleled universes. In this theory, there is not a single universe. Universes are like pearls in the pearl necklace, and there could be the connection between those universes. The connection to other universes would make possible the channel what is forming when the black hole would make the gravity tunnel to another universe. And in the paralleled universe theory, there could be millions of universes in the line, and this is also known as "Multiverse-theory". This theory was established when the galaxy-groups were noticed by astronomers. In that time were noticed that there are so-called super-groups of the galaxy, and those super-groups, where we're so much galaxy that galaxy involved stars made some cosmologists think that maybe there is also groups of universes in the emptiness. This kind of structures is so enormo...