Skip to main content

About the age limits in the use of the Internet



https://kirjabloggaus.blogspot.com/

Kimmo Huosionmaa

Google has prohibited the use of its services from persons, who are under 16, here in Finland. 16 is the limit when people are responsible for their crimes in the eyes of the law, and they can put jail. The reason for choosing the age of 16 in Finland is probably, that other persons would make Google accounts in the name of people, who is under the age of criminal responsibility.


And maybe some hackers or other persons, who have used the Internet for the illegal purposes, like spamming the parliamentarians, are opened their accounts in the name of underage persons, whose names and pictures got from schools or neighbors. If some hacker can get the names of the pupils, this criminal can steal their identity by using their names and birthdays and then start the actions as the official supporter of the Russian Federation.


The telephone number can also be faked, or it can be prepaid, but this kind of things makes that suspicious. Use of underage person identity on the Internet is the very bad thing because the usage of those accounts is sometimes very different, what child's world should be, and the international politics and terrorism are the things, what should not be written by some 12 years, if that person is not some extreme intelligent youngster.


The thing, what makes the account suspected for use in illegal actions, is that some 12 years old probably would not support Vladimir Putin or show the pictures of assault rifles. This means that the actions of that account are different than the other that age person's accounts have. Another way to see the texts is that if the text would not fit the writer. The real prisoner would not probably like police, or homeless would not like to live on the streets. But if some prisoner starts to like the things, what is working against their benefits, the account would be stolen. Those accounts can be put under the surveillance, and if they are used by mobile devices, the person can be located quite easily.


And if in the table of the restaurant, where that device is located finds any children, but telephone sends messages, there is a reason to suspect that some other person than the marked user of the account is using that account. One thing, what makes the account suspicious is that is used only from the public hotspots. That means that the user would want to hide the existence of that account.

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....