The research and advances in artificial intelligence are causing the need to re-estimate what things like consciousness means? When we are creating new and powerful AI. We are creating something that has not existed before. And quantum technology has increased the power of AI. So that means we might face surprising situations when we are driving AI algorithms by using quantum computers that are a minimum of 1000 times faster and more powerful than traditional binary computers.
Showing posts with label collecting information. Show all posts
Showing posts with label collecting information. Show all posts
Saturday, July 28, 2018
One thing, what you probably didn't know about traffic tickets
https://avoimenkoodinmaailma.blogspot.com/
Kimmo Huosionmaa
Almost every person, who lives in the cities is using sometimes the bus or train. The public transportation system is one of the best inventions, what cities have. This system contains trains and busses, and of course, it's not free. When we are using this system, we must buy the ticket for traveling in the public transportation system, and this thing contains one very big danger for information security.
That danger is connected with the customer groups, what have the right to get lower price tickets. In some cases, the handicapped and mental patients have the different group for sale than other users. To getting the sale, we must show that we have right kind of diagnoses or we are students in some kind of high schools or universities. And that can danger our privacy because another reason for sale is needed the doctor's testimony, and that might be the thing, what we would not want to tell anyone else in the whole world.
Public transportation system has the database, what tells about us studies and medical diagnoses very clearly. And if the system would be in the wrong hands, could somebody follow, what bus or train lines the targeted person uses. The sneaker would compile the home address of the traffic user, and the numbers of lines, what this person uses, and then this follower can take information, what kind of bars and other places are found at the road of those busses and trains.
And if the person would go far away from home for the drink, would that bar be some kind of different, or that person has a boy or girlfriend in that area. Who will sit on the bus even hour for the drink, if the place would be nothing special? That is the question, what the sneaker would ask anytime when that person follows the target.
This means that everybody, who has the device, what can read the data from those electronic tickets can get very personal information in the hands. This is against personal data security because that information is prohibited to deliver even for the doctors, who work in the public health care system, but that information is available for any person, who sees the ticket automat in the busses or subways.
Also, modern mobile telephones can read those traveling cards even, when the wallet is in the pocket, by using official mobile applications, what is meant for checking, is there any money in the card. This might seem very small thing but is violates against the law of privacy. Those traveling cards are also problematic because the card can be programmed to deliver the computer viruses if somebody wants to do that.
This means that somebody must just write the computer virus, and then upload it to the card, and that would cause the collapse of all traffic control system. Only thing, what that hacker must get is the tool, what is used for writing to the cards, and then the tool, what can be used for programming those chips.
And the problem, in this case, is, that this hacker can also make the back gate to that system, and then steal the information of users of public transportation, who have some special reason for getting the sale for using that system. That could be quite embarrassing for people, who are marked for sale groups, what are reserved for some special groups like people, who have mental disorders.
Wednesday, July 25, 2018
The misuse of the social media data is a very big problem
https://pimeakronikka.blogspot.com/
Kimmo Huosionmaa
Collecting data from the social media services is against their contracts, and they would want to disconnect the firms, what makes that kind of actions on the Internet. But the problem is, how to control, that nobody would collect data by acting private person. This makes the surveillance of the net very easy because the corporation can have thousands of Facebook-accounts in their hands.
And they can operate that by using remote computers, what are placed even in the different countries. This is why connecting those accounts to some firm is impossible. The use of the cover firm makes possible to get flats and equipment possible without uncovering the identity of those operators. Firms can always establish new if the old one would get a bad reputation.
But the workers are difficult to renew, and the data to the Facebook would always send from the Western country. Those operators can use remote connections from Russia, and the computers, what is used can be installed in many countries because if one IP-address would be banned, the rest of them can continue their actions. This makes that thing very hard to deny.
And if some of those accounts would be removed, those operators can create the new one very easily, but the use of the firms as a cover guarantees, that those operators personal internet use would not be disturbed. One way to uncover those accounts, what is used in this kind of operations is to compile the information, what that account sends with the accounts, what operates same age persons, what this account owner claims, and if some 16 years old starts to feel like Vladimir Putin, could that account be faked.
The layer, what collects data from the Facebook or some other social media service must be very large, for getting enough data for making the profile of a large number of people and their way to use the Internet. This means that the corporation, what collects information might operate by several Facebook-accounts, what seems like private accounts.
That kind of data can be also collect by automatized screenshots and then the computers would start to analyze, what kind of interests and what kind of things, those persons like. Those corporations make compliments with the database where is collected the information by private operators and Russian authorities, what kind of person likes Vladimir Putin.
The things, what please the users are used to create propaganda posts, what are satisfying to see. That makes this kind of propaganda extremely dangerous because it is masked as the music videos or some other stuff, and this kind of propaganda is targeted at young people.
And there could be connected the flash-pictures and subliminal orders, what purpose is to change the targeted person way of think. But also to the leading politicians are frightened by Gallups, what might be faked. Those Gallups show, that the most of the people like the things, what support Russia.
Tuesday, May 29, 2018
Artificial intelligence is already here and it's the new "Frankenstein"
![]() |
Picture I |
Kimmo Huosionmaa
As we might see, the artificial intelligence is already here, and it can make very much things, what people would not even be expected. The key to the artificial intelligence is that the machine could learn actions without human control, and this makes it very attractive thing for computer games, what are normally lose they are interesting parts when the player learns the places, where the enemy makes ambushes or some barriers comes ahead of the virtual vehicles.
If the game uses artificial intelligence, the game would stay interesting long time, and if the artificial intelligence can develop new systems for the opponent, would that thing make the next generation computer games possible, and the big difference between those intelligent games and old fashion games would be, that the system can develop new technology for enemies or opponents, and this might keep the game interesting.
But as we know that the same technology, what is used in computer games can be used in real-world military leadership. And as we know the generals and admirals need many opponents when they are creating their tactics and choose their equipment for some military action, and then there would be the very attractive method to use the computer games in mission planning. The thing goes the way, that military intelligence puts the systems, what the enemy uses to some net game, and then enthusiastic players around the world would play this game, and the information about those virtual fights, would give the generals chance to make better plans for their actions.
We must say that the equipment, what is used in the games, would have the same quality than the systems, what enemy uses, but they might not seem like tanks or other equipment. And the players would not be suspicious about the purpose of some games, what are offered in the net, without any payment. Those simulations would also uncover if some person loses those games on purpose. But when we are talking about the use of artificial intelligence as the military systems, we must say, that there would be possible to make hybrid aircraft, what is same time robot and manned plane. That system can have the option, that if the pilot would be unable to operate, would the computer make the mission accomplished. In this case, would the aircraft have automatized fire control system, what opens fire automatically if the "autofire" button is pushed down.
Those hybrid aircraft can operate independently or manned missions, that makes those planes extremely dangerous. Even the human pilots make "legal attacks" against the targets, could the ground operators borrow those planes, without telling that thing to the pilots, and then use those planes as a tool for war crimes. And probably the pilots would not know anything about, what those planes have done when they have been at the free time. The independently operating combat androids are very problematic, because of the states, what creates and develops those things claims that they have no difference for missiles.
And in one case, what would become in my mind, could the F-35 or SU-27 fighters modified as a cruise missile. This undercover missile could fly with other planes of flight groups, and then it can be detonated above the target. In this case, this missile would have the internal nuclear warhead. Or the nuclear bomb can be loaded to some attack drone, and then detonate above the target, and this would make devastating result in the target.
Sources:
Picture I
https://cdn.cnn.com/cnnnext/dam/assets/180213140221-f-35-tease-0213-super-tease.jpg
https://crisisofdemocracticstates.blogspot.com/
Subscribe to:
Posts (Atom)
What was before the Big Bang (Part II)
What was before the Big Bang. (Part II) "Our universe could be the mirror image of an antimatter universe extending backwards in time....

-
AI boosts programming most in the environment. AI requires lots of energy, and that is one of the things. That limits the use of the AI. AI ...
-
From the point of gravity model. The problem with this image is that. Both balls should have a pothole under them. Those potholes make ene...
-
Above: A gravitational lens is a situation where the gravity field changes the direction of light. Black holes spin very fast. That spin co...