Skip to main content

About privacy and telephone companies

https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

When we are talking about the data, what private corporations collect about us, we always forget to ask one simple question: "Who owns our telephone or internet provider"? This question is very interesting because if the owner of that company wants, the RAID-5 technology would send all data, what travels thru the server rooms of that company even across the Atlantic, and that data can be used to create the profiles of every individual person, who use that provider.


And the second thing what might interest people is so-called "Carrier IQ". This is actually a small code, what would put in the front of every data package, what would send thru the Internet, and in TCP/IP-protocol that thing can tell anything about the usage of the computer or mobile device. TCP/IP (Transmission Control Protocol) is the communication protocol where the server sends the data as packages via the Internet.


This protocol cuts the transmission simultaneous because it would connect the control code in the data. When the packages would be sent to some computer, that code would drive the package to the right device. And it is in use also in GSM-telephones. This protocol asks the request, that the data package is right, and if there are some errors, the package would be resent. That allows us to use video-broadcasts and banking services safely.


But that protocol would allow that any device in the world can be tracked. This is the shadow side of the Carrier IQ and in the real world, that would allow installing any kind of malware programs inside the mobile devices. This means that inside that data would slip the packages, where is the malicious software. That means the observer can follow the person location, homepages where targeted person visits, and even the pulse and breath.


In this case, the privacy of the person can break totally, and another good way to slip malicious software to mobile telephones is to use the SIM-card, where is the program. In the real world, the telephone company can also make firewalls and antivirus programs, what allows specific malware to install in those devices. If the company wants, that the antivirus and firewall would let the malware, that has the right control code to pass the defense. And then that kind of malware can be installed to any device, what has that company's SIM-card or is inside of its firewall.

Comments

Popular posts from this blog

New AI-based operating systems revolutionize drone technology.

"University of Missouri researchers are advancing drone autonomy using AI, focusing on navigation and environmental interaction without GPS reliance. Credit: SciTechDaily.com" (ScitechDaily, AI Unleashed: Revolutionizing Autonomous Drone Navigation) The GPS is an effective navigation system. But the problem is, how to operate that system when somebody jams it? The GPS is a problematic system. Its signal is quite easy to cut. And otherwise, if the enemy gets the GPS systems in their hands, they can get GPS frequencies. That helps to make the jammer algorithms against those drones. The simple GPS is a very vulnerable thing.  Done swarms are effective tools when researchers want to control large areas. The drone swarm's power base is in a non-centralized calculation methodology. In that model, drones share their CPU power with other swarm members. This structure allows us to drive complicated AI-based solutions. And in drone swarms, the swarm operates as an entirety. That ca

Hydrogen is one of the most promising aircraft fuels.

Aircraft can use hydrogen in fuel cells. Fuel cells can give electricity to the electric engines that rotate propellers. Or they can give electricity to electric jet engines. In electric jet engines. Electric arcs heat air, and the expansion of air or some propellant pushes aircraft forward. Or, the aircraft can use hydrogen in its turbines or some more exotic engines like ramjets. Aircraft companies like Airbus and some other aircraft manufacturers test hydrogen as the turbine fuel.  Hydrogen is one of the most interesting fuels for next-generation aircraft that travel faster than ever. Hydrogen fuel is the key element in the new scramjet and ramjet-driven aircraft. Futuristic hypersonic systems can reach speeds over Mach 20.  Today the safe top speed of those aircraft that use air-breathe hypersonic aircraft is about Mach 5-6.   Hydrogen is easy to get, and the way to produce hydrogen determines how ecological that fuel can be. The electrolytic systems require electricity, and electr

The neuroscientists get a new tool, the 1400 terabyte model of human brains.

"Six layers of excitatory neurons color-coded by depth. Credit: Google Research and Lichtman Lab" (SciteechDaily, Harvard and Google Neuroscience Breakthrough: Intricately Detailed 1,400 Terabyte 3D Brain Map) Harvard and Google created the first comprehensive model of human brains. The new computer model consists of 1400 terabytes of data. That thing would be the model. That consists comprehensive dataset about axons and their connections. And that model is the path to the new models or the human brain's digital twins.  The digital twin of human brains can mean the AI-based digital model. That consists of data about the blood vessels and neural connections. However, the more advanced models can simulate electric and chemical interactions in the human brain.  This project was impossible without AI. That can collect the dataset for that model. The human brain is one of the most complicated structures and interactions between neurotransmitters, axons, and the electrochemica