Somebody always sees
Even if we want to use the Internet anonymously, and our bosses cannot get the data from our workstations, we must remember that somebody always knows who we are are, and what kind of data we are searching for. The thing is that there can be many security levels in the routers and switches, which means that some of those levels can sometimes use only the persons, who have special access to that kind of thing.
When we are thinking about the news, where people are giving statements about some kind of things, those algorithms are analyzing those words, and then they are classifying the statement as "positive", "neutral" or "negative". The process is similar to the "speech-to-text" algorithm, which is used as the voice command programs, and the system can also follow the speech, and notice if the person seems nervous.
Those systems are also metering the breaks and other things, what is uncovering is there is something difficult to say. Also, algorithms see things, that the human eye cannot see, and one is the action of the pupil, and many little things that people normally don't notice.
So the thing is that those systems are used because they are neutral themselves. The system doesn't have prejudice and other kinds of things that can affect to analyze, and that's why they are used in the investigation. The thing is that the very negative attitude for some theoretical research and another kind of thing like the use of infrared cameras to track guns and other weapons on streets.
The negative attitude for that kind of thing would bring officials to the place, especially if the same person accepts things like forcing undressing for the same reason. The thing is that the government denies knowledge and that means that the electronic locking system can be opened by using the mobile application, which will break the code.
And if the mobile telephone would not have enough calculation power, it can ask for assistance from the internet. In that case, the mobile telephone would use the NFC (Near Field Communication)- antenna or system as the electronic key. The thing is that that highly advancing artificial intelligence-based systems can also delete all data about that visiting from the surveillance systems of the house. So the surveillance camera images would be manipulated, that those officials would not be seen in those films.
If the person would be arrested the government would also hide that kind of thing. That means that the authorities would put the person in jail for the weekend, and there will prove about payments like receipts in the wallet and rendered images on social media, that suspect has been on board of a cruise ship. That kind of manipulated data can deny, that a person cannot even prove to be on the arresting. This kind of tactic is created for destroying the trust of suspected people in the eyes of the social network of that person.
Showing posts with label government. Show all posts
Showing posts with label government. Show all posts
Tuesday, October 22, 2019
Tuesday, September 17, 2019
Transformation of society and the loss of middle class
Transformation of society and the loss of middle class
Society has turned to two class people because the economical middle class is lost. That makes very big differences to things like economical and tax planning. Also, the middle class people had a role to work as the shock absorber between wealthy and poor people, and that causes problems with society.
The middle class has been separated in the higher and lower middle class, what has delivered the information from the poor people to the wealthy persons by natural social contacts, but when the abyss between incoming layers has been growing, that would cause problems to get information that the prizes or taxes are too high to ears of the persons, who make decisions. The problem in parliaments is that the people, who come from wealthy families are over-represented in those institutions.
Wealthy people have more money, and they would pay the membership fees for political parties more often than poor people, who need money for many other targets. This would cause the phenomenon, where politicians are receding from the poor people. If I would be a person, who lives in a one-room flat, I would feel uncomfortable to meet people, who live in own houses, because I would not have a normal social relationship with people, who have a different level of incoming.
The large middle class has also offered good field, where politicians could promise things, and that allowed the popularity, and if politician betrays the permissions, this thing can cause the there are no votes. And that's why politician must think carefully about permissions because the betraying those things can cause the dropping from parliament.
The problem is that there are less wealthy people than poor people, and the paradox is that wealthy people are funding the campaigns of politicians. But the votes come from poor people, and if a politician would just please wealthy people, that would cause the end of funding the campaign, but if the campaign pleases only the wealthy people, the means the loss of votes.
Loss of a normal social relationship, with normal discussions, would cause that those people would not have information, what is going on in the poor people neighborhood. And that causes fear mutually because every people have prejudice, and this is the thing, what trolls would benefit effectively. But when we are thinking about the loss of middle class people that causes economical problems, because of the role of middle class people has been acting as the financial reserve.
If the government needs more money, it would collect more taxes from the middle class people, and in the years, when there is not so big need for money the tax level can be decreased. But when we are talking about the thing like the federal reserve, there are many things, where those words are pointing. Of course, that means the central bank of the USA, but also that means the bumper, what gives limits how the economy can move, or it can mean the money what can use right away for some urgent building sites or other urgent targets.
One version of the reserve is marginal, where the level of taxes can move. When the level of taxes are planned the planner would calculate the minimum and maximum levels for taxes, and when the decisions of the level are made, the level of collecting the money would keep low, because that level can rise in the next year.
If we would think this way, the person, who determines the level of taxes operates in two year periods. In the first year, the level of taxes is determined, and on the second year, the determiner would check how those calculations connected to reality, and then adjust the levels of collecting taxes. This is one way to think about the role of middle-class people in the socio-economical field.
Society has turned to two class people because the economical middle class is lost. That makes very big differences to things like economical and tax planning. Also, the middle class people had a role to work as the shock absorber between wealthy and poor people, and that causes problems with society.
The middle class has been separated in the higher and lower middle class, what has delivered the information from the poor people to the wealthy persons by natural social contacts, but when the abyss between incoming layers has been growing, that would cause problems to get information that the prizes or taxes are too high to ears of the persons, who make decisions. The problem in parliaments is that the people, who come from wealthy families are over-represented in those institutions.
Wealthy people have more money, and they would pay the membership fees for political parties more often than poor people, who need money for many other targets. This would cause the phenomenon, where politicians are receding from the poor people. If I would be a person, who lives in a one-room flat, I would feel uncomfortable to meet people, who live in own houses, because I would not have a normal social relationship with people, who have a different level of incoming.
The large middle class has also offered good field, where politicians could promise things, and that allowed the popularity, and if politician betrays the permissions, this thing can cause the there are no votes. And that's why politician must think carefully about permissions because the betraying those things can cause the dropping from parliament.
The problem is that there are less wealthy people than poor people, and the paradox is that wealthy people are funding the campaigns of politicians. But the votes come from poor people, and if a politician would just please wealthy people, that would cause the end of funding the campaign, but if the campaign pleases only the wealthy people, the means the loss of votes.
Loss of a normal social relationship, with normal discussions, would cause that those people would not have information, what is going on in the poor people neighborhood. And that causes fear mutually because every people have prejudice, and this is the thing, what trolls would benefit effectively. But when we are thinking about the loss of middle class people that causes economical problems, because of the role of middle class people has been acting as the financial reserve.
If the government needs more money, it would collect more taxes from the middle class people, and in the years, when there is not so big need for money the tax level can be decreased. But when we are talking about the thing like the federal reserve, there are many things, where those words are pointing. Of course, that means the central bank of the USA, but also that means the bumper, what gives limits how the economy can move, or it can mean the money what can use right away for some urgent building sites or other urgent targets.
One version of the reserve is marginal, where the level of taxes can move. When the level of taxes are planned the planner would calculate the minimum and maximum levels for taxes, and when the decisions of the level are made, the level of collecting the money would keep low, because that level can rise in the next year.
If we would think this way, the person, who determines the level of taxes operates in two year periods. In the first year, the level of taxes is determined, and on the second year, the determiner would check how those calculations connected to reality, and then adjust the levels of collecting taxes. This is one way to think about the role of middle-class people in the socio-economical field.
Friday, July 12, 2019
The international cooperation for anti-crime work is really important
The international cooperation for anti-crime work is really important
Below this text is a link to an article, where is told that the pander can forward the sex worker to a client by sitting at the foreign land. And the same thing is working in every other type of criminal activities. The leader of the criminal organization can control the henchmen by using social media applications and even order them to carry GPS and social media location tools, while they are doing something on the street.
They can order they henchmen record their discussions, and when they are giving orders, those people are many times in the foreign land. And those leaders of the gang can also make virtual conferences when they are communicating with other criminals. The leadership of the modern criminal organization is a dangerous job. People are more tolerated for sexual aberrations than ever before, so just homosexual relationships are not the thing, what would be an effective weapon in the hands of the criminal organizations.
There must be something more, and that kind of things is a dirty business. If a person has heterosexual behavior, that is a little bit different proving that thing is very difficult because the photographer must be in those parties of in bedroom for taking the pictures. And if the pander or targeted person uses the under-age prostitutes, that means the criminal prosecution process also for them. If every one of those persons is full aged and adult, there would be no crime, even if there would be played some whip games.
Law enforcement and other government officials have skills and ability to catch the data transmissions from the Internet, and also people are using social media very careless way, and that means there is visible many things, what normal people should not see. Of course, the operator of the sex business can use social media applications for ordering the strippers to some parties, and the thing is that those people are offered the same style of service to the newspapermen, that they would tell people, how nice men some motorcyclists are.
The normal action procedure of the criminal organizations is, that they hire prostitutes to please the important persons, and then the pictures of those parties would be used as the blackmailing. The problem is that in the modern world the information travels very high speed. And if the person is careless, the wrong images would be leaked to social media. What would you think, if some governmental official sees in Facebook or some YouTube video the boss of the criminal organization going in some vehicle, where the registration plates are visible.
Or some henchman, who is violated sees things like Eiffel tower outside the window of the office, where the film or communicate has been sent. And if the henchman, who is operating with the camera or sits another side of the Internet sees the mistake, would that person tell some mafia-boss, that there was a mistake?
https://yle.fi/uutiset/3-10875415
Below this text is a link to an article, where is told that the pander can forward the sex worker to a client by sitting at the foreign land. And the same thing is working in every other type of criminal activities. The leader of the criminal organization can control the henchmen by using social media applications and even order them to carry GPS and social media location tools, while they are doing something on the street.
They can order they henchmen record their discussions, and when they are giving orders, those people are many times in the foreign land. And those leaders of the gang can also make virtual conferences when they are communicating with other criminals. The leadership of the modern criminal organization is a dangerous job. People are more tolerated for sexual aberrations than ever before, so just homosexual relationships are not the thing, what would be an effective weapon in the hands of the criminal organizations.
There must be something more, and that kind of things is a dirty business. If a person has heterosexual behavior, that is a little bit different proving that thing is very difficult because the photographer must be in those parties of in bedroom for taking the pictures. And if the pander or targeted person uses the under-age prostitutes, that means the criminal prosecution process also for them. If every one of those persons is full aged and adult, there would be no crime, even if there would be played some whip games.
Law enforcement and other government officials have skills and ability to catch the data transmissions from the Internet, and also people are using social media very careless way, and that means there is visible many things, what normal people should not see. Of course, the operator of the sex business can use social media applications for ordering the strippers to some parties, and the thing is that those people are offered the same style of service to the newspapermen, that they would tell people, how nice men some motorcyclists are.
The normal action procedure of the criminal organizations is, that they hire prostitutes to please the important persons, and then the pictures of those parties would be used as the blackmailing. The problem is that in the modern world the information travels very high speed. And if the person is careless, the wrong images would be leaked to social media. What would you think, if some governmental official sees in Facebook or some YouTube video the boss of the criminal organization going in some vehicle, where the registration plates are visible.
Or some henchman, who is violated sees things like Eiffel tower outside the window of the office, where the film or communicate has been sent. And if the henchman, who is operating with the camera or sits another side of the Internet sees the mistake, would that person tell some mafia-boss, that there was a mistake?
https://yle.fi/uutiset/3-10875415
Wednesday, July 10, 2019
New kind of way to keep people silent is to publish everything, without telling a single thing.
![]() |
| Picture I |
Making "pseudo-UFO" by using modern technology. Normal quadcopters can be covered by baskets, which have canvas cover. Every person, who has quadcopter can make this kind of device by using the propeller shield of the table fan and put the quadcopter inside it. The shine would be made by using led lights or phosphorous painting.
The quadcopter can move independently if in it camera system would use an endoscope, what can be turned to the wanted direction with the same system, what is used to turn it normal camera. Or if the person wants to put a little bit more money for that thing, that inmate can put the web cameras at the outer layer of this UFO and control the device by using that system. The location would be defined by using GPS-system, and the flying system might use mobile data, which means that the operator can operate that system from the long distances.
New kind of way to keep people silent is to publish everything, without telling a single thing.
When we are talking about conspiracies, we are meaning something, what is not, what it should be. This thing is connected to the top-secret military bases, as well in many other places on Earth. The best way to keep things secret is to dive people in information, which is not true.
And one of the best ways to create this kind of operation is to make people hunt ghosts, or holograms, what are formed in fog or dust, what lays above the Earth. The thing is that many objects, what is seen above AREA-51 are very easy to explain by typing them the next-generation STEALTH aircraft or helicopter, and that thing is a very interesting point of view in this kind of theories, that the well-known aircraft like F-117 "Nighthawk" has probably the VTOL (Vertical Take-Off and Landing)-version.
That kind of system would operate in different ways than some Harrier or F-36, and the thing is that there are two ways to make the VTOL-craft. One is to use turning jet pipes, which are used in Harrier II and Yak-36 "Forger" VTOL-planes, and the other version is to simply equip the aircraft with vertically installed jet engines, what can be behind the hatches. That system would allow using normal aircraft body and engines in the horizontal movements, and it would allow using afterburners and another kind of systems.
Another version is to put every piece in one basket. The saucer-shaped airborne vehicle doesn't mean that those people have humanoids under the control. This system can be operated very simple way. There is one jet-motor in the middle of the structure, and other radially installed jet engines can move that flying saucer in the horizontal direction. In this case, the saucer-shaped STEALTH helicopters can have a role in working as the eye-ball or decoy, what mission is to turn the people to look another way, what helps to cover the systems, what really is top secret.
But what if those operators would have humanoids in their fridge?
Even if those operators would have humanoids in their fridges, and the bad joke, that doesn't mean that they have anything, what they can use in their research. That means that maybe those hypothetical humanoids would use advanced genetic technology for making those "little grey men". In this point of view, those characters would be bio-robots, which are controlled by implanted microchips. And those microchips would be formatted if some of those bio-robots would be captured.
There are also theories that those aliens would be dolls, which can be used in the sodium pentothal interrogations. Those characters would help those operators to hide their existence and the thing that they have been visited in some flat or house. That kind of things might seem quite scary, but if the persons, who are in some house are targeted with high voltage electromagnetic radiation like radio impulses, that thing would make them unable to move or act. Another way is to use high-power infra- and ultrasound, what locks the nervous system and makes people unable to act. This kind of things is used by whales like Orcas to disable and deny the quarries to escape.
Picture I
https://amp.businessinsider.com/images/59679be2abc1c821008b502f-1136-568.jpg
Thursday, June 13, 2019
What we should afraid of social media and social media applications?
What we should afraid of social media and social media applications?
1. The blind trust is the biggest threat in the world of telecommunication
Social media is the biggest opportunity and the biggest threat at the same time. And at the beginning, I must say that the blind trust for some systems is the biggest threat in the world of telecommunication in the entire world.
When some social media solution claims that it would not collect the data or sell it to the third party, we must remember, that there is always an actor, who is out of control in those causes, and that actor is group, what is made the code of that program. When we are looking at the thing, what social media is making, we must understand that algorithms are searching the data, what people are writing about their experiences about the users of this kind of social media application.
2. The maker of the solution is always out of control
But the algorithms and artificial intelligence can make much more than we can ever imagine. Those algorithms can look for the references to other social media applications, and then the operators can search that user from those services. Or if the algorithm is made by using highly sophisticated skills and tools, it might collect the data of the usage of social media and the entire Internet by using automatized artificial intelligence.
The system operates with the method, what cumulates the databases, and it can compare used words to the data, what is mentioned in the news and other internet pages. And then it can make a profile the entire use of the Internet. That system can find out, what the person is interested, and what that person has not interested.
3. There is no privacy in the Internet
The algorithm just finds out, what kind of things the person is writing in social media, and that would help to make a complete and effective profile of that person, and map the contacts of that targetted inmate. The system can find out what is the normal things, what those people are discussing. And it can also find out even the sexual orientation of the person if it will compare the feedback, what the person gets from the partners, who have been dated.
When we are talking about privacy, and how we must be careful, we must remember that there could always be somebody, who will listen or follow the messages. In analog telephone lines were situations, that somebody just connects own telephone or loudspeaker to the wrong plug, and then all phone calls, what are called from some houses, were allowed to hear.
4. In the digital age, the methods have been changed
But when we are thinking about the modern digital age, we always forget that there is always software, what handles the phone calls and data usage. Using the digital network is a simple and effective thing, but we always forget that the telephone needs an operating system for making the connections to the digital networks, which handles only numbers one and zero.
And if somebody would put the small tracking cookie in the operating system every byte, what is sent from the device would be doubled, and the second one would send to a third-party server, and if the system uses User Datagram, or UDP-protocol the system, what sends data would not even notice that there is a data leak.
5. Stealth eavesdropping tool can be installed even in the eldest mobile telephones
Normally the echo of TCP or Transmission Control Protocol would uncover if some of the bytes would go to the wrong receiver, but UDP doesn't send that echo. And even the oldest telephones can equip with the cookie, what will mark the sending data by using so-called control bytes, what orders routers duplicate them.
And in fact, it's more dangerous to trust that the system is safe, and blindly believe system delivers, that they would not give information to their party actors, than use systems what risk the privacy and know the risks. In real life, we must not speak secret things and send classified information by using E-mails.
6. Private operators are toothless against government
We should meet the person who we want to tell classified things face to face, and even then we must be a little bit paranoid and think that the person would be traitorous, and record the discussion. So in those cases, we must be sure, that we also speak about things by following the law.
At last, I must tell one thing. Private operators are toothless against the government. The government can order the makers of the secrecy programs make there the "back gate", which allows opening every message, what is sent made by using that software, and if there is not back gate, the government might deny sharing that program on the Internet.
6.1 Government might deny the use of unauthorized software by equipping the files with carrier byte. If that byte is not found, the message would not deliver forward.
And only the authorized software would put the carrier code on the front of the code. If that certificate code would not be found the message would not deliver to forward. This makes possible control the data traffic on the Internet more effectively than ever before.
It can deny delivering messages, which are made by using unauthorized software. The thing is really simple. If the message is made by using authorized software, there is a small code in front of the data package, and if the router would not find that code, it would crush the message immediately. This case would be simply explained that it is "tracking code backward".
1. The blind trust is the biggest threat in the world of telecommunication
Social media is the biggest opportunity and the biggest threat at the same time. And at the beginning, I must say that the blind trust for some systems is the biggest threat in the world of telecommunication in the entire world.
When some social media solution claims that it would not collect the data or sell it to the third party, we must remember, that there is always an actor, who is out of control in those causes, and that actor is group, what is made the code of that program. When we are looking at the thing, what social media is making, we must understand that algorithms are searching the data, what people are writing about their experiences about the users of this kind of social media application.
2. The maker of the solution is always out of control
But the algorithms and artificial intelligence can make much more than we can ever imagine. Those algorithms can look for the references to other social media applications, and then the operators can search that user from those services. Or if the algorithm is made by using highly sophisticated skills and tools, it might collect the data of the usage of social media and the entire Internet by using automatized artificial intelligence.
The system operates with the method, what cumulates the databases, and it can compare used words to the data, what is mentioned in the news and other internet pages. And then it can make a profile the entire use of the Internet. That system can find out, what the person is interested, and what that person has not interested.
3. There is no privacy in the Internet
The algorithm just finds out, what kind of things the person is writing in social media, and that would help to make a complete and effective profile of that person, and map the contacts of that targetted inmate. The system can find out what is the normal things, what those people are discussing. And it can also find out even the sexual orientation of the person if it will compare the feedback, what the person gets from the partners, who have been dated.
When we are talking about privacy, and how we must be careful, we must remember that there could always be somebody, who will listen or follow the messages. In analog telephone lines were situations, that somebody just connects own telephone or loudspeaker to the wrong plug, and then all phone calls, what are called from some houses, were allowed to hear.
4. In the digital age, the methods have been changed
But when we are thinking about the modern digital age, we always forget that there is always software, what handles the phone calls and data usage. Using the digital network is a simple and effective thing, but we always forget that the telephone needs an operating system for making the connections to the digital networks, which handles only numbers one and zero.
And if somebody would put the small tracking cookie in the operating system every byte, what is sent from the device would be doubled, and the second one would send to a third-party server, and if the system uses User Datagram, or UDP-protocol the system, what sends data would not even notice that there is a data leak.
5. Stealth eavesdropping tool can be installed even in the eldest mobile telephones
Normally the echo of TCP or Transmission Control Protocol would uncover if some of the bytes would go to the wrong receiver, but UDP doesn't send that echo. And even the oldest telephones can equip with the cookie, what will mark the sending data by using so-called control bytes, what orders routers duplicate them.
And in fact, it's more dangerous to trust that the system is safe, and blindly believe system delivers, that they would not give information to their party actors, than use systems what risk the privacy and know the risks. In real life, we must not speak secret things and send classified information by using E-mails.
6. Private operators are toothless against government
We should meet the person who we want to tell classified things face to face, and even then we must be a little bit paranoid and think that the person would be traitorous, and record the discussion. So in those cases, we must be sure, that we also speak about things by following the law.
At last, I must tell one thing. Private operators are toothless against the government. The government can order the makers of the secrecy programs make there the "back gate", which allows opening every message, what is sent made by using that software, and if there is not back gate, the government might deny sharing that program on the Internet.
6.1 Government might deny the use of unauthorized software by equipping the files with carrier byte. If that byte is not found, the message would not deliver forward.
And only the authorized software would put the carrier code on the front of the code. If that certificate code would not be found the message would not deliver to forward. This makes possible control the data traffic on the Internet more effectively than ever before.
It can deny delivering messages, which are made by using unauthorized software. The thing is really simple. If the message is made by using authorized software, there is a small code in front of the data package, and if the router would not find that code, it would crush the message immediately. This case would be simply explained that it is "tracking code backward".
Monday, June 3, 2019
What if we would find another Earth in our solar system?
What if we would find another Earth in our solar system?
1. There is a possibility, that because we are alone, that saved us from interplanetary conflict
There have been stories, what if we would have another Earth-like object in our solar system, and here I must say, that somehow, we might be lucky, that there is not another Earth-like planet near us. That's because we have saved from one of the worst nightmares, what we can imagine. That nightmare is the war between worlds.
Because we are alone in our own solar system, we have no outer enemies, and that is the thing, what we allow us to argue with together. The thing what made national states possible was the enemies, what was out of the borders, and that forced nations unite. Because there are no humanoids in the official stories, there is no need to make one state on Earth. And we know that official truth might differ from the real truth.
There is a reason in national security, and in fact, we can think, that the researchers of the superpower states would like to use the data from captured alien craft wrecks in their weapon and aircraft research projects. So they would not publish information on that thing, or would the reason, that the government wants to avoid the war between civilizations. But this is only the speculation, and maybe we ever find out the entire truth about things, what might have an influence on our life. Or maybe we just imagine those things.
2. If there would be another Earth, would it allow us to live another way?
But what if we would have another Earth in our solar system? Would we visit on that planet? If there is no intelligent life, we might want to see, what other forests and hills might look like. And that thing could our last thing, what would we ever do. That planet would be full of bacteria, what might destroy the crew immediately. So there would be no holiday trips to that planet. But that planet would cause problems on Earth if there will be bacteria or other micro-organisms to our planet.
But there is one problem more, and that problem has a connection to our society. If we would have another Earth, or something, what we might call as "backup planet", we might face the problem, that could we live like how we want, and then we can just move to another planet? In this scenario, we would use all our natural resources, move to another planet, and continue our lifestyle.
1. There is a possibility, that because we are alone, that saved us from interplanetary conflict
There have been stories, what if we would have another Earth-like object in our solar system, and here I must say, that somehow, we might be lucky, that there is not another Earth-like planet near us. That's because we have saved from one of the worst nightmares, what we can imagine. That nightmare is the war between worlds.
Because we are alone in our own solar system, we have no outer enemies, and that is the thing, what we allow us to argue with together. The thing what made national states possible was the enemies, what was out of the borders, and that forced nations unite. Because there are no humanoids in the official stories, there is no need to make one state on Earth. And we know that official truth might differ from the real truth.
There is a reason in national security, and in fact, we can think, that the researchers of the superpower states would like to use the data from captured alien craft wrecks in their weapon and aircraft research projects. So they would not publish information on that thing, or would the reason, that the government wants to avoid the war between civilizations. But this is only the speculation, and maybe we ever find out the entire truth about things, what might have an influence on our life. Or maybe we just imagine those things.
2. If there would be another Earth, would it allow us to live another way?
But what if we would have another Earth in our solar system? Would we visit on that planet? If there is no intelligent life, we might want to see, what other forests and hills might look like. And that thing could our last thing, what would we ever do. That planet would be full of bacteria, what might destroy the crew immediately. So there would be no holiday trips to that planet. But that planet would cause problems on Earth if there will be bacteria or other micro-organisms to our planet.
But there is one problem more, and that problem has a connection to our society. If we would have another Earth, or something, what we might call as "backup planet", we might face the problem, that could we live like how we want, and then we can just move to another planet? In this scenario, we would use all our natural resources, move to another planet, and continue our lifestyle.
Monday, May 20, 2019
The updates for Huawei-telephones would not be shared anymore
The updates for Huawei-telephones would not be shared anymore
The updates for Huawei-telephones would not be shared anymore
Mobile telephones are an effective tool for surveillance because they are almost every time in the pocket. And those mobile telephones can collect data, what nobody wants to share. By using the same NFC-sensors, what are used in mobile payments, can somebody scan the details of the mobile telephone and ID-cards, what are used chips without nobody even notices that thing.
Of course, there is one thing, what we must realize, and that is that the microchips that are used with smart cards are actually the computer, where is every part of the normal computers, but those parts are very much smaller. The reading of that computer would happen, that NFC would send the radio wave to the chip, and that would send the data to the telephone.
But those miniature computers would store the data of the reading, and that means that the mobile telephone can be identified by using the data, what is stored in the card, while it has been read. I don't know if this true, but that kind of data would store very easily, and it can be download to Web when the card is read in the payment point. That data would be driven to the NSA central computer.
Google refuses to update the Android-operating systems of Huawei-mobile telephones, and the reason for that is claimed to be that the intelligence officers of China would use those updates by creating the Trojan horses, what would collect the data of the user of those telephones very effectively, and the thing is that if those mobile telephones would be equipped with very large and complicated malicious software, that thing can send every single byte, what the mobile telephone would collect to the observers. That data contains the location, net use and also the health data if the user would use the sports applications.
The thing what makes that malicious software problem is that they are made by the government, and that means the official handler of those files makes possible to create very complicated and effective surveillance tools because nobody can control those hackers, who are working with Chinese military intelligence and security police. This is one of the biggest problems with the mobile telephones, which are made at the East or behind some national firewall.
Cheap price of the telephone addicts to buy them
The cheap price will addict to buy those mobile telephones, and that will open the road to effective intelligence operations and monitoring people, who are using those mobile telephones. The idea is that the telephone is equipped with a microchip, which will release the malicious tool to the memory when the system observers would give the signal to that microchip. And then every single byte would send to Beijing, what is handled with that phone.
But there is another reason for that, the Huawei phones would not get updates anymore. The cheap price of the Chinese products would cause the customs to want to be put between that country and another world. And the reason for that is that the products of China are actually made by the government. Because the government can make mobile telephones at a low price that would give it a very good benefit to other products.
The problem is that the Chinese government would act straight in the business
That means that the cheap price would addict to buy those products. Those mobile telephones are a very good tool to monitor other people, but they must buy those phones before they can put under the surveillance. There is one thing, what concerns the western companies, and that is that China would also copy the western products and mark them in its own name. If the government would not stick to that thing, or even gives orders, what products should be copied, the thing is very embarrassing.
The thing what makes some western authorities suspect that China has created a very booming high-tech industry in a couple of years, and before that, they were not have anything like that. And suddenly China has created the fastest supercomputer in the world. Then they created Huawei, what was hit in the first time. Everything was perfect, and there were no errors in that mobile telephones. That thing caused rumors that the Chinese governmental agents have stolen the industrial secrets, what were necessary to build that kind of products. But also the thing that Google wants to support Donald Trump and his policy.
The updates for Huawei-telephones would not be shared anymore
Mobile telephones are an effective tool for surveillance because they are almost every time in the pocket. And those mobile telephones can collect data, what nobody wants to share. By using the same NFC-sensors, what are used in mobile payments, can somebody scan the details of the mobile telephone and ID-cards, what are used chips without nobody even notices that thing.
Of course, there is one thing, what we must realize, and that is that the microchips that are used with smart cards are actually the computer, where is every part of the normal computers, but those parts are very much smaller. The reading of that computer would happen, that NFC would send the radio wave to the chip, and that would send the data to the telephone.
But those miniature computers would store the data of the reading, and that means that the mobile telephone can be identified by using the data, what is stored in the card, while it has been read. I don't know if this true, but that kind of data would store very easily, and it can be download to Web when the card is read in the payment point. That data would be driven to the NSA central computer.
Google refuses to update the Android-operating systems of Huawei-mobile telephones, and the reason for that is claimed to be that the intelligence officers of China would use those updates by creating the Trojan horses, what would collect the data of the user of those telephones very effectively, and the thing is that if those mobile telephones would be equipped with very large and complicated malicious software, that thing can send every single byte, what the mobile telephone would collect to the observers. That data contains the location, net use and also the health data if the user would use the sports applications.
The thing what makes that malicious software problem is that they are made by the government, and that means the official handler of those files makes possible to create very complicated and effective surveillance tools because nobody can control those hackers, who are working with Chinese military intelligence and security police. This is one of the biggest problems with the mobile telephones, which are made at the East or behind some national firewall.
Cheap price of the telephone addicts to buy them
The cheap price will addict to buy those mobile telephones, and that will open the road to effective intelligence operations and monitoring people, who are using those mobile telephones. The idea is that the telephone is equipped with a microchip, which will release the malicious tool to the memory when the system observers would give the signal to that microchip. And then every single byte would send to Beijing, what is handled with that phone.
But there is another reason for that, the Huawei phones would not get updates anymore. The cheap price of the Chinese products would cause the customs to want to be put between that country and another world. And the reason for that is that the products of China are actually made by the government. Because the government can make mobile telephones at a low price that would give it a very good benefit to other products.
The problem is that the Chinese government would act straight in the business
That means that the cheap price would addict to buy those products. Those mobile telephones are a very good tool to monitor other people, but they must buy those phones before they can put under the surveillance. There is one thing, what concerns the western companies, and that is that China would also copy the western products and mark them in its own name. If the government would not stick to that thing, or even gives orders, what products should be copied, the thing is very embarrassing.
The thing what makes some western authorities suspect that China has created a very booming high-tech industry in a couple of years, and before that, they were not have anything like that. And suddenly China has created the fastest supercomputer in the world. Then they created Huawei, what was hit in the first time. Everything was perfect, and there were no errors in that mobile telephones. That thing caused rumors that the Chinese governmental agents have stolen the industrial secrets, what were necessary to build that kind of products. But also the thing that Google wants to support Donald Trump and his policy.
Subscribe to:
Comments (Atom)
Meissner effect: the electromagnetic levitation.
“A long-standing mystery surrounding an unusual superconductor has taken a decisive turn. By carefully applying shear strain to ultrathin cr...
-
"Illustration of the Feitian 2 hypersonic vehicle demonstrating advanced flight capabilities. Image generated by AI." (Rude Baquet...
-
The grey fog is one of the superweapons that are so horrifying that we cannot even imagine them. That grey fog can erase entire planets. N...
-
"Two twisted boron nitride layers (blue and pink) create a crystal lattice at a distance in which electrons (gold) can arrange themselv...
