Showing posts with label identification. Show all posts
Showing posts with label identification. Show all posts

Tuesday, June 17, 2025

Privacy against security.



When we talk about security we must ask “whose security that act serves”. We know that the internet is a tool that offers the greatest propaganda platform that we have ever seen before. The net is full of tools that are used to prove that writers are humans. The AI-based applications offer the possibility to share data into even billions of homepages and social media applications in seconds.

Data that AI creates can block almost any private server on our planet. And that makes it possible to use the AI-created data to block entire web services. Confirmation that people who use the net are who they claim is one of the things that used to argue that people should use their real identities on the net. The anonymous use against the confirmed use are things that both have their supporters. Anonymous use allows users to make reports about corruption and many other things.

And that makes people support that way of using the net. On the other side, anonymous use offers change for cyber attackers and disinformation deliverers to operate on the net. Things like AI agents can operate in the targeted networks, steal information, and deliver it to other users. That kind of thing can be put in order by forcing people to confirm that they are humans. And then tell who they really are. But that is similar to the U.S. firearms laws. Those things don’t stop propagandists or psychological operators from sending their fake information to the net. 

Those people, especially if they operate under state control to operate. Those disinformation actors can use fake or stolen identities. And the authorities can confirm those faked identities. If we want to deliver propaganda as an example from Russia, we must have computers in some states like Finland. Then we can take the VPN to that computer from Moscow and then start to deliver that information to the net by using that remote computer, which is located in Finland. So, in that case, we would ride with the Finnish networks. The operator who is based in Russia tends to stay away from Western countries. The assistants make everything, and that makes it possible for the person who knows something to stay under control. 



Wednesday, April 25, 2018

The legal problems with technical advantages

http://crisisofdemocracticstates.blogspot.fi/p/the-legal-problems-with-technical.html

Kimmo Huosionmaa


Legal problems with technical advantages are the rise in the public knowledge by the Facebook face recognition programs or solution. Then we are talking about face recognition, will some lawyers say, that the automatic comparison about faces is not specified in the law text being prohibited or dangerous. They say that is the similar action, what is used every time manually by ordinary people, who discusses pictures what are taken by their cameras.


And nobody prohibits the discussions about the pictures, what are put on the Facebook. There would always lawyers, who claim that laws of the privacy don't contain face recognition. The problematic use of that technology is the ability to take a picture in some place, and then those programs compile the faces with the faces, what are seen in other pictures, what are found in databases.


This kind of software is created first to take the shoplifters, and the use of it is quite simple. When the alarm gate notices, that somebody is taking the product out from the shop, the surveillance camera takes a photo of this person. Even if that person would run out, the picture of that thief is in the system. When this person would go back to some shop, what is guarded same security company, would the image recognition system notice that thief, and makes the alarm for security personnel, who can catch that thief. Or this is why the system has been created.


The same system can compare the faces from Facebook and another kind of social media if those pictures are downloaded for comparison. Also, it can make the comparison from screenshots, and that would allow some private security companies allow to catch the thief by using this kind of technology. Also, this technology allows tracking suspected terrorists from the streets. In this process, the recon aircraft would take the pictures of suspected terrorist camps in the Middle East, and then those pictures would download to the system, what is connected to the security camera.


Then the system would block those persons from the streets, and call the authorities to the place. That system cannot be deceived by barb, and it shows, how many percents of those faces have identical with the persons who have portrayed by some recon plane in from the Middle East. That kind of systems is of course very dangerous in wrong hands because they can use to recognize undercover military and police officials. That kind of actions is the danger to national security because it makes possible to hit key members like presidential bodyguards during they are in free time.


http://crisisofdemocracticstates.blogspot.fi/p/the-legal-problems-with-technical.html

What was before the Big Bang (Part II)

 What was before the Big Bang. (Part II) "Our universe could be the mirror image of an antimatter universe extending backwards in time....