Skip to main content

Beware this while using some voice command program


http://crisisofdemocracticstates.blogspot.fi/p/beware-this-while-using-some-voice.html

Kimmo Huosionmaa

How easy is to use voice commands in the mobile telephone. It's like in some "Star Trek" movie. If somebody wants to make very big and easy security leak to the smartphone, would that person need only some subliminal voice generator, and if the targeted person uses the system, what records the commands, what is given by using voice, would the mobile telephone become the very big security problem. Then somebody wants to teach some own commands to the mobile telephone, must this person need only some voice, like 80's techno-hit.


And then that person need only get the targeted mobile telephone in the hands in a couple of minutes. After this, that person might tech some tricks like publishing websites or using GPS to that telephone, and then that hacker must only wait for the right place and then put the music on. After that, the mobile device would automatically make records or publish websites without that the owner would even notice that. And of course, if those commands can be taught by using remote control, would that cause the situation, that the GPS system can be activated in some particular area.


After that this mobile telephone would be very easy to track. In the remote teaching, the hacker would need only two mobile telephones, what are connected to the same account. By using another telephone, the hacker would teach voice commands to another telephone, and in this case, the hacker would activate some chat-program like What's App, and then just record every world, what is told near the telephone. Even if those records are not very clear, the voice could analyze by using computer software, that uncovers every world, that is talked near the device.


This is one threat for the people, who uses mobile telephones. And somebody can teach those commands to the telephone in the house party, where the targeted person might pump full of some drugs like Sodium Pentothal, and after that, this person would tell any password, what the people want to know. The same chemical is also used in lethal injections. But that chemical is also capacity to operate as the "truth serum", and sometimes SOCOM uses it for terrorist interrogation and that might be very effective in this role.

https://www.facebook.com/IWCsync/posts/10156613717489406


http://crisisofdemocracticstates.blogspot.fi/p/beware-this-while-using-some-voice.html

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....