Accumulation of the production of the electronic components causing problems with data security
1) What if the microchips that are used in 5G networks are coming from the single deliverer?
The reason why the accumulation of component production causes problems is that the producer of the microchips can install the malicious components in those microchips. That means that the deliverer of the microchips can install the mode, that they can format the entire network, and that makes this kind of system unable to operate. But if the mobile 5G-network would be infected with artificial intelligence-based surveillance tools, that allows the observers to track every single word, what is said or written in that network. That allows the ultimate capacity to spy people also in foreign lands.
But the accumulation causes also another type of problem, and that is that the neutrality of data would be damaged. The thing is that the producer of the system can also install the programs or firewalls, which can filter the information, that is not tolerated by the deliverer of the system. And there is also the financial aspect in this kind of way to act, and the thing is that when the competitors are cleaned from the marketing area, that means the price of that technology would rise to clouds.
2) What if the data network would end up to the hands of a single operator? And how that thing could be done, without authorities would not react for that accumulation?
This is the thing in the markets. If some operator would get a monopoly on networks, that thing can control the entire data, what is shared on that network. And this thing can be done by buying the competitors away from markets. The operation would be very easy to make, and the thing is to use multiple companies, which is operating under the control of one single actor. And this makes this kind of thing dangerous.
Even the officials, what is controlling competition and monopolies are following the process, the problem is that the fusion between two main operators can be made by using middle-hand operators, the independent-looking companies, what are owned by the same company. But those companies might be after the long lines of companies, what are owning each other. In that case, the main contractor operates remotely, and those chains of companies can belong, and the companies might operate in different countries, which makes tracking the main operator very difficult.
And this is one of the risks of national security in every nation. If the data network of the country would end up to the single hands, that thing allows filtering the data, what s shared in it, and also it gives the ability to follow the messages and data, what is shared between the people. That operator can also shut down the network if it faces hostile actions against its interests, and that causes many risks for the democracy and neutrality of information.
Subscribe to:
Post Comments (Atom)
The new way to communicate using light.
"Propagation of light pulses with intermodal dispersion in multimode fibers, MMF. Words are mapped to different frequencies (different ...

-
"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lea...
-
What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it...
-
"Two twisted boron nitride layers (blue and pink) create a crystal lattice at a distance in which electrons (gold) can arrange themselv...
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.