Showing posts with label Data security. Show all posts
Showing posts with label Data security. Show all posts

Wednesday, January 26, 2022

AI and quantum computers will revolutionize ICT.



MIT researchers made a new programming language for quantum computers. And that thing is a big step. For bringing those systems out from laboratories to the supermarkets. The new programming language opens fundamental possibilities for quantum computers. And that thing allows collecting of more programmers around those quantum computer processes. 

There is the possibility to make translator programs for well-known programming languages like Java, C++, Python, and many others. But translator programs along with highly advanced artificial intelligence. Makes it possible to use spoken language for making computer programs. In those cases, the programming tool follows commands like "draw circle which diameter is xx" or "make the form where are following fields and connect it to the database which name is XX". 

That thing makes the programmer's work easier than ever before. The thing is that artificial intelligence can be the next-generation tool for making web services. In that case, the programmer must just give the values that the web service must contain. And there is the possibility to use some other web service as a model. The AI can search the data from the Internet. And then it can make the necessary things like needed connections with the existing database. 

Or the system can ask things like flow chart as the model of the structures what the database should involve. The thing is that the AI can ask the feedback. And in that feedback, the users can tell what they want more. What they feel good, and especially what must be changed. That thing means. That interactive AI can make many things that were difficult before. 

There are already tools on the Internet like Google forms that are making it possible that every person can make things that required highly trained programmers before. That means everybody can make their polls on the Internet without any special training. And that causes the programmers are turning unnecessary. 

Quantum computers and web-based programming applications are making the internet safer. It is impossible to make malicious code by using web applications. If the user makes malicious code. That thing means that the AI detects that attempt. And then, the AI tracks the IP address where that traffic comes. 

The thing is that the quantum computer is the ultimate tool in data security. There is the possibility that the quantum system marks every single mark written on the platform that runs on it. By using a certain code. That code is the thing that identifies that the code is made by using authorized systems. That means the firewalls could block every mark. That is not checked by using web-based applications. 

That thing denies writing computer viruses. But as I am written before. There are new threats like social hacking where is the virtual actors. Or there is the possibility that the person whose log-in rights wanted to use would just inject by using sodium Amytal or tetrodotoxin. That thing makes those people tell their access codes. And that kind of thing can be a risk for national security. 


https://scitechdaily.com/twist-mits-new-programming-language-for-quantum-computing/


https://thoughtsaboutsuperpositions.blogspot.com/

Friday, August 10, 2018

Strange things about WikiLeaks

https://kirjabloggaus.blogspot.com/

Kimmo Huosionmaa

WikiLeaks has brought to the people know the things, what the government would want to hide, but there is one big mystery in this website: why it is not banned by DDOS-attacks? When the governments and private security corporations Emails were delivered to WikiLeaks, it was targeted the short period DDOS-attack, and in some claiming, some of the files were removed or changed during the attack, and in those files were some very interesting knowledge of the cooperation between governmental and private security corporations, what are actually intelligence agencies.


Somebody has even claimed, that the  CIA has been behind the WikiLeaks and the reason, why almost all the files, what are published in those sites are American origin, but the thing is made for confessing the audience, that the USA would be the primary target for those uncovered secrets. This means that the purpose of publishing those papers is meant for countenancing the persons, who want to steal the papers from the Pentagon or NSA send them to WikiLeaks, where counterintelligence has very easy to find those documents, and then I must say that those files can be used to track the information thief.


This means that in every single file may have the unique code, what is unseen for normal computers. But if the person has the right program, would the number of the handler be seen on the screen. And that number allows tracking the person, who has been downloaded that file, and also foreign partners have their own numbers, that the NSA can track the persons, who deliver the secret material to the Internet. That's why those papers must no be delivered to the Internet.


Those PDF-files seems like the normal, but the NSA:s main computer makes there the covered digital signature in those files. That's why everybody must know, that there are many secrets, what is very interesting, but those papers are meant for confidential. And in the real world, we must ask, is it better to track people by using electronic equipment, or is it more comfortable to make a very large police force, what comes to the people's home for searching the missing persons. This is one argument for supporting the surveillance of the people. But sometimes is clearly seen, that the terrorist attacks are supporting the growing security business.


Those corporations collect very much data, and that can be used for many things. If the information, that is collecting by using Trapwire, would contain business secrets, and somebody would sell those secrets,  some corporations will get very much benefits in their work. And this is one of the most concerning things in the world. If some private intelligence would sell those pictures and data, that would give the very good position for that corporation, that buys those pictures and data from the security corporations.


If some corporations would get too close cooperation with the government, that company would allow accessing the data, what is only reserved for governmental purposes. This means that the surveillance cameras can also collect data from the screens, and in those cases, there would be no sign of the security leak. So those servers data security, what operates surveillance cameras must be extremely highly secured. If the information would leak from secured areas, the benefits, what some company would get are extremely high.

The problems with the electric cars and data security


https://kirjabloggaus.blogspot.com/

Kimmo Huosionmaa

The electric cars are problematic for privacy because every time the customer loads the car, could that device send also many types of information to the unknown part. That data would contain very specific information of driving speed to location, and if that data can be connected to data, what is collected from the mobile devices GPS-systems, the third part would know where the owner of the car is visiting often, and also who is with that owner.


When we are talking about other data, what would be collected by those load points, is if the person would drive over speed, because if the top speed of the vehicle is more than the top allowed speed in the country, would that mean, that the person drives too fast. Also how the person would use the gas pedal, would that tell that if this person is suspected for driving drunken. This same data can be collected from vehicles by using "lambda", what reads the memory of the cars computer, what controls the usage of the motor and gas pedal. In those cases, we must say, that street is not a racetrack, and that's why authorities explain the usage of that information.


But there are some other problems with electric cars, and those things are computer viruses, what could take those cars to control. In those cases, the car would become very dangerous, because if the computer viruses take the control of the vehicle in the wrong place, that could cause the terrible accident. In this case, the entire computer programs of the cars computer would be replaced with malware and that malware would use car's GPS-system to find out the most horrifying place to take the car for increasing the speed.


And that could be very dangerous. Those computer viruses can be very complicated. They can install by using USB-stick or by some other method. Those computer viruses can cause the physical injuries for people if they infect the wrong computer controlled device. If that device is some kind of automobile or train that could cause the terrible situation. If the brakes of the car would not work even the simple computer virus can cause the very bad situation.

Friday, June 22, 2018

Every road is taking you somewhere (About social media and data security)




http://kimmontaidearvioita.blogspot.com/p/every-road-is-taking-you-somewhere.html

Kimmo Huosionmaa

Nothing in this world has been done without purpose, and when we have the change to choose our way, we must realize that there would be no perfect way. If you are the nice guy and try to please everybody, other people would push you. This means, that if you want to listen to other people's opinions every time, I'm sure, that this road is giving you the job, where everybody believes, that they are better than you. Or you can sometimes say something against your bosses, and they would kick you off the work.


This is the thing, what would happen to you, but after that, you are free to go.  And if you follow always the advice, that you should not publish any information about yourself, or somebody would laugh at you, I must say one thing, those persons who want to say something about the publications might want to hide their identities, because they are some kind of computer security gurus, but when I'm hearing that kind of thing, I must ask you, what things do you need to hide?


Do you have some kind of firearms, or are you in some kind of witness protection program? We are all adult persons, and we all make our own decisions about this kind of things, and here I must say that people might guess, why hiding the identity is so important for some persons. If some person claims that he is just one "poor country boy", there will be little embarrassing, if there would see expensive stereos or firearms, and the man is some kind of prisoner. I once read one book, what tells about some hobbies


There was one clause, what I just remembered: The secrecy is for people, who have something to hide. If the person would have nothing to hide, why that person wants to be without identity? Do you believe, that this would not draw attention if the person would not have mobile telephones or official address? This kind of things is very nice when we are reading them from some spy books, or sees them in the movies like "Terminator". But in the real life, this kind of things would be very striking, because almost every person in the world has mobile telephones.


When we are talking about the "gurus" what are introduced in the public media, we must be critical and dare to ask about "how many writings have they made on the Internet about their skills?". When we are talking about confessing writings, we should understand that almost everybody can go to media, and say "hey guys, I'm guru". This might seem attractive, but we would like to know, what makes this person "the guru"?


If we think that this person is the leader of some big company, all the works, what are made in those companies they would be made by other persons, and this "guru" could be the financial leader or the training of that person might be the lawyer. That means that this person might be over the top on the own area, but this would not make this person any security specialist. None of the press writings are made, without the purpose, and when we are thinking about the situation, that every person should follow every instruction, we must realize that those devices are given for some reasons, and they are given to persons, who have something to hide. This is the thoughts about privacy and the social media.

What was before the Big Bang (Part II)

 What was before the Big Bang. (Part II) "Our universe could be the mirror image of an antimatter universe extending backwards in time....