Skip to main content

What we should afraid of social media and social media applications?

What we should afraid of social media and social media applications?

1. The blind trust is the biggest threat in the world of telecommunication

Social media is the biggest opportunity and the biggest threat at the same time. And at the beginning, I must say that the blind trust for some systems is the biggest threat in the world of telecommunication in the entire world.

When some social media solution claims that it would not collect the data or sell it to the third party, we must remember, that there is always an actor, who is out of control in those causes, and that actor is group, what is made the code of that program. When we are looking at the thing, what social media is making, we must understand that algorithms are searching the data, what people are writing about their experiences about the users of this kind of social media application.

2. The maker of the solution is always out of control 

But the algorithms and artificial intelligence can make much more than we can ever imagine. Those algorithms can look for the references to other social media applications, and then the operators can search that user from those services. Or if the algorithm is made by using highly sophisticated skills and tools, it might collect the data of the usage of social media and the entire Internet by using automatized artificial intelligence.

The system operates with the method, what cumulates the databases, and it can compare used words to the data, what is mentioned in the news and other internet pages. And then it can make a profile the entire use of the Internet. That system can find out, what the person is interested, and what that person has not interested.

3. There is no privacy in the Internet

The algorithm just finds out, what kind of things the person is writing in social media, and that would help to make a complete and effective profile of that person, and map the contacts of that targetted inmate. The system can find out what is the normal things, what those people are discussing. And it can also find out even the sexual orientation of the person if it will compare the feedback, what the person gets from the partners, who have been dated.

When we are talking about privacy, and how we must be careful, we must remember that there could always be somebody, who will listen or follow the messages. In analog telephone lines were situations, that somebody just connects own telephone or loudspeaker to the wrong plug, and then all phone calls, what are called from some houses, were allowed to hear.

4. In the digital age, the methods have been changed

But when we are thinking about the modern digital age, we always forget that there is always software, what handles the phone calls and data usage. Using the digital network is a simple and effective thing, but we always forget that the telephone needs an operating system for making the connections to the digital networks, which handles only numbers one and zero.

And if somebody would put the small tracking cookie in the operating system every byte, what is sent from the device would be doubled, and the second one would send to a third-party server, and if the system uses  User Datagram, or UDP-protocol the system, what sends data would not even notice that there is a data leak.

5. Stealth eavesdropping tool can be installed even in the eldest mobile telephones

Normally the echo of TCP or Transmission Control Protocol would uncover if some of the bytes would go to the wrong receiver, but UDP doesn't send that echo. And even the oldest telephones can equip with the cookie, what will mark the sending data by using so-called control bytes, what orders routers duplicate them.

And in fact, it's more dangerous to trust that the system is safe, and blindly believe system delivers, that they would not give information to their party actors, than use systems what risk the privacy and know the risks. In real life, we must not speak secret things and send classified information by using E-mails.

6. Private operators are toothless against government

We should meet the person who we want to tell classified things face to face, and even then we must be a little bit paranoid and think that the person would be traitorous, and record the discussion. So in those cases, we must be sure, that we also speak about things by following the law.

At last, I must tell one thing. Private operators are toothless against the government. The government can order the makers of the secrecy programs make there the "back gate", which allows opening every message, what is sent made by using that software, and if there is not back gate, the government might deny sharing that program on the Internet.

6.1 Government might deny the use of unauthorized software by equipping the files with carrier byte. If that byte is not found, the message would not deliver forward. 

And only the authorized software would put the carrier code on the front of the code. If that certificate code would not be found the message would not deliver to forward. This makes possible control the data traffic on the Internet more effectively than ever before.

It can deny delivering messages, which are made by using unauthorized software. The thing is really simple. If the message is made by using authorized software, there is a small code in front of the data package, and if the router would not find that code, it would crush the message immediately. This case would be simply explained that it is "tracking code backward".

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som

The breakthrough in solid-state qubits.

Hybrid integration of a designer nanodiamond with photonic circuits via ring resonators. Credit Steven Burrows/Sun Group (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) ****************************************** The next part is from ScitechDaily.com "JILA breakthrough in integrating artificial atoms with photonic circuits advances quantum computing efficiency and scalability". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "In quantum information science, many particles can act as “bits,” from individual atoms to photons. At JILA, researchers utilize these bits as “qubits,” storing and processing quantum 1s or 0s through a unique system". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "While many JILA Fellows focus on qubits found in nature, such as atoms and ions, JILA Associate Fellow and University of Colorado Boulder Assistant

Metamaterials can change their properties in an electric- or electro-optical field.

"Researchers have created a novel metamaterial that can dynamically tune its shape and properties in real-time, offering unprecedented adaptability for applications in robotics and smart materials. This development bridges the gap between current materials and the adaptability seen in nature, paving the way for the future of adaptive technologies. Credit: UNIST" (ScitechDaily, Metamaterial Magic: Scientists Develop New Material That Can Dynamically Tune Its Shape and Mechanical Properties in Real-Time) Metamaterials can change their properties in an electric- or electro-optical field.  An electro-optical activator can also be an IR state, which means. The metamorphosis in the material can thermally activate.  AI is the ultimate tool for metamaterial research. Metamaterials are nanotechnical- or quantum technical tools that can change their properties, like reflection or state from solid to liquid when the electric or optical effect hits that material. The metamaterial can cru