Skip to main content

About the secrecy and security in the Internet




Kimmo Huosionmaa

The collecting information of users of social media is not new in the world. This thing has been the problem all the time, and now it has been coming to publicity. When somebody doesn’t give information to the social media, would that be also information, what profilers use, then they make psychological profiles about targeted persons. If somebody doesn’t use social media, there is no question, does this person want to use social media. It is the question, that the profiler sees, that the person hides something.


Social media is so common thing, that if somebody wants to be outside those services, must this person have the good reason for that. And when we are talking about profiles, the needed information can be collected from somewhere else than Facebook or Twitter. Profiling the people is not the new thing in police or military intelligence. The use of telephone, and the things, what person buys and what kind of hobbies person has gives also information, what profiler use.


The phone calls to sex phones would tell very much about person’s sexual behavior, and collecting that kind of information is denied by law. But the problem is that those so-called “phone boxes” is a telephone number and if somebody got the list of phone calls, and the length of those phones, can this sneaker get information, what would cause damage for other person’s reputation.


People would give information about themselves in many ways. One is to take pictures from own apartment, and sometimes there are the things, what doesn’t look very good. Or if some lonely man would buy women underwear simultaneous, that would make the increasing of interest of profiler. The profiles of YouTube usages would give the information, what attracts us, and what is disgusting for us.


The use this information in PSYOPS and INFO-OPS is the very attractive thing. That information is important when the right persons would be tempted to look music videos, where has been used subliminal messages like flash pictures and infrasound messages. But if the person doesn’t use social media, would that cause the situation, where this person would be started to followed more intensive methods that social media.

The reason for intensive surveillance would be, that the person is hiding something. And that would cause the interest of eavesdrop that person. When the people are profiled, the filtering of information is easy, and the profile would help to find the persons who have something to hide.

https://crisisofdemocracticstates.blogspot.fi/

http://crisisofdemocracticstates.blogspot.fi/p/about-secrecy-and-security-in-internet.html

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....