Skip to main content

Somebody always sees

Somebody always sees

Even if we want to use the Internet anonymously, and our bosses cannot get the data from our workstations, we must remember that somebody always knows who we are are, and what kind of data we are searching for. The thing is that there can be many security levels in the routers and switches, which means that some of those levels can sometimes use only the persons, who have special access to that kind of thing.

When we are thinking about the news, where people are giving statements about some kind of things, those algorithms are analyzing those words, and then they are classifying the statement as "positive", "neutral" or "negative". The process is similar to the "speech-to-text" algorithm, which is used as the voice command programs, and the system can also follow the speech, and notice if the person seems nervous.

Those systems are also metering the breaks and other things, what is uncovering is there is something difficult to say. Also, algorithms see things, that the human eye cannot see, and one is the action of the pupil, and many little things that people normally don't notice.

So the thing is that those systems are used because they are neutral themselves. The system doesn't have prejudice and other kinds of things that can affect to analyze, and that's why they are used in the investigation. The thing is that the very negative attitude for some theoretical research and another kind of thing like the use of infrared cameras to track guns and other weapons on streets.

The negative attitude for that kind of thing would bring officials to the place, especially if the same person accepts things like forcing undressing for the same reason. The thing is that the government denies knowledge and that means that the electronic locking system can be opened by using the mobile application, which will break the code.

And if the mobile telephone would not have enough calculation power, it can ask for assistance from the internet. In that case, the mobile telephone would use the NFC (Near Field Communication)- antenna or system as the electronic key. The thing is that that highly advancing artificial intelligence-based systems can also delete all data about that visiting from the surveillance systems of the house. So the surveillance camera images would be manipulated, that those officials would not be seen in those films.

If the person would be arrested the government would also hide that kind of thing. That means that the authorities would put the person in jail for the weekend, and there will prove about payments like receipts in the wallet and rendered images on social media, that suspect has been on board of a cruise ship. That kind of manipulated data can deny, that a person cannot even prove to be on the arresting. This kind of tactic is created for destroying the trust of suspected people in the eyes of the social network of that person.

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...