What we should afraid of social media and social media applications?
1. The blind trust is the biggest threat in the world of telecommunication
Social media is the biggest opportunity and the biggest threat at the same time. And at the beginning, I must say that the blind trust for some systems is the biggest threat in the world of telecommunication in the entire world.
When some social media solution claims that it would not collect the data or sell it to the third party, we must remember, that there is always an actor, who is out of control in those causes, and that actor is group, what is made the code of that program. When we are looking at the thing, what social media is making, we must understand that algorithms are searching the data, what people are writing about their experiences about the users of this kind of social media application.
2. The maker of the solution is always out of control
But the algorithms and artificial intelligence can make much more than we can ever imagine. Those algorithms can look for the references to other social media applications, and then the operators can search that user from those services. Or if the algorithm is made by using highly sophisticated skills and tools, it might collect the data of the usage of social media and the entire Internet by using automatized artificial intelligence.
The system operates with the method, what cumulates the databases, and it can compare used words to the data, what is mentioned in the news and other internet pages. And then it can make a profile the entire use of the Internet. That system can find out, what the person is interested, and what that person has not interested.
3. There is no privacy in the Internet
The algorithm just finds out, what kind of things the person is writing in social media, and that would help to make a complete and effective profile of that person, and map the contacts of that targetted inmate. The system can find out what is the normal things, what those people are discussing. And it can also find out even the sexual orientation of the person if it will compare the feedback, what the person gets from the partners, who have been dated.
When we are talking about privacy, and how we must be careful, we must remember that there could always be somebody, who will listen or follow the messages. In analog telephone lines were situations, that somebody just connects own telephone or loudspeaker to the wrong plug, and then all phone calls, what are called from some houses, were allowed to hear.
4. In the digital age, the methods have been changed
But when we are thinking about the modern digital age, we always forget that there is always software, what handles the phone calls and data usage. Using the digital network is a simple and effective thing, but we always forget that the telephone needs an operating system for making the connections to the digital networks, which handles only numbers one and zero.
And if somebody would put the small tracking cookie in the operating system every byte, what is sent from the device would be doubled, and the second one would send to a third-party server, and if the system uses User Datagram, or UDP-protocol the system, what sends data would not even notice that there is a data leak.
5. Stealth eavesdropping tool can be installed even in the eldest mobile telephones
Normally the echo of TCP or Transmission Control Protocol would uncover if some of the bytes would go to the wrong receiver, but UDP doesn't send that echo. And even the oldest telephones can equip with the cookie, what will mark the sending data by using so-called control bytes, what orders routers duplicate them.
And in fact, it's more dangerous to trust that the system is safe, and blindly believe system delivers, that they would not give information to their party actors, than use systems what risk the privacy and know the risks. In real life, we must not speak secret things and send classified information by using E-mails.
6. Private operators are toothless against government
We should meet the person who we want to tell classified things face to face, and even then we must be a little bit paranoid and think that the person would be traitorous, and record the discussion. So in those cases, we must be sure, that we also speak about things by following the law.
At last, I must tell one thing. Private operators are toothless against the government. The government can order the makers of the secrecy programs make there the "back gate", which allows opening every message, what is sent made by using that software, and if there is not back gate, the government might deny sharing that program on the Internet.
6.1 Government might deny the use of unauthorized software by equipping the files with carrier byte. If that byte is not found, the message would not deliver forward.
And only the authorized software would put the carrier code on the front of the code. If that certificate code would not be found the message would not deliver to forward. This makes possible control the data traffic on the Internet more effectively than ever before.
It can deny delivering messages, which are made by using unauthorized software. The thing is really simple. If the message is made by using authorized software, there is a small code in front of the data package, and if the router would not find that code, it would crush the message immediately. This case would be simply explained that it is "tracking code backward".
1. The blind trust is the biggest threat in the world of telecommunication
Social media is the biggest opportunity and the biggest threat at the same time. And at the beginning, I must say that the blind trust for some systems is the biggest threat in the world of telecommunication in the entire world.
When some social media solution claims that it would not collect the data or sell it to the third party, we must remember, that there is always an actor, who is out of control in those causes, and that actor is group, what is made the code of that program. When we are looking at the thing, what social media is making, we must understand that algorithms are searching the data, what people are writing about their experiences about the users of this kind of social media application.
2. The maker of the solution is always out of control
But the algorithms and artificial intelligence can make much more than we can ever imagine. Those algorithms can look for the references to other social media applications, and then the operators can search that user from those services. Or if the algorithm is made by using highly sophisticated skills and tools, it might collect the data of the usage of social media and the entire Internet by using automatized artificial intelligence.
The system operates with the method, what cumulates the databases, and it can compare used words to the data, what is mentioned in the news and other internet pages. And then it can make a profile the entire use of the Internet. That system can find out, what the person is interested, and what that person has not interested.
3. There is no privacy in the Internet
The algorithm just finds out, what kind of things the person is writing in social media, and that would help to make a complete and effective profile of that person, and map the contacts of that targetted inmate. The system can find out what is the normal things, what those people are discussing. And it can also find out even the sexual orientation of the person if it will compare the feedback, what the person gets from the partners, who have been dated.
When we are talking about privacy, and how we must be careful, we must remember that there could always be somebody, who will listen or follow the messages. In analog telephone lines were situations, that somebody just connects own telephone or loudspeaker to the wrong plug, and then all phone calls, what are called from some houses, were allowed to hear.
4. In the digital age, the methods have been changed
But when we are thinking about the modern digital age, we always forget that there is always software, what handles the phone calls and data usage. Using the digital network is a simple and effective thing, but we always forget that the telephone needs an operating system for making the connections to the digital networks, which handles only numbers one and zero.
And if somebody would put the small tracking cookie in the operating system every byte, what is sent from the device would be doubled, and the second one would send to a third-party server, and if the system uses User Datagram, or UDP-protocol the system, what sends data would not even notice that there is a data leak.
5. Stealth eavesdropping tool can be installed even in the eldest mobile telephones
Normally the echo of TCP or Transmission Control Protocol would uncover if some of the bytes would go to the wrong receiver, but UDP doesn't send that echo. And even the oldest telephones can equip with the cookie, what will mark the sending data by using so-called control bytes, what orders routers duplicate them.
And in fact, it's more dangerous to trust that the system is safe, and blindly believe system delivers, that they would not give information to their party actors, than use systems what risk the privacy and know the risks. In real life, we must not speak secret things and send classified information by using E-mails.
6. Private operators are toothless against government
We should meet the person who we want to tell classified things face to face, and even then we must be a little bit paranoid and think that the person would be traitorous, and record the discussion. So in those cases, we must be sure, that we also speak about things by following the law.
At last, I must tell one thing. Private operators are toothless against the government. The government can order the makers of the secrecy programs make there the "back gate", which allows opening every message, what is sent made by using that software, and if there is not back gate, the government might deny sharing that program on the Internet.
6.1 Government might deny the use of unauthorized software by equipping the files with carrier byte. If that byte is not found, the message would not deliver forward.
And only the authorized software would put the carrier code on the front of the code. If that certificate code would not be found the message would not deliver to forward. This makes possible control the data traffic on the Internet more effectively than ever before.
It can deny delivering messages, which are made by using unauthorized software. The thing is really simple. If the message is made by using authorized software, there is a small code in front of the data package, and if the router would not find that code, it would crush the message immediately. This case would be simply explained that it is "tracking code backward".
Comments
Post a Comment