https://crisisofdemocracticstates.blogspot.com/
Kimmo Huosionmaa
When we are talking about the data, what private corporations collect about us, we always forget to ask one simple question: "Who owns our telephone or internet provider"? This question is very interesting because if the owner of that company wants, the RAID-5 technology would send all data, what travels thru the server rooms of that company even across the Atlantic, and that data can be used to create the profiles of every individual person, who use that provider.
And the second thing what might interest people is so-called "Carrier IQ". This is actually a small code, what would put in the front of every data package, what would send thru the Internet, and in TCP/IP-protocol that thing can tell anything about the usage of the computer or mobile device. TCP/IP (Transmission Control Protocol) is the communication protocol where the server sends the data as packages via the Internet.
This protocol cuts the transmission simultaneous because it would connect the control code in the data. When the packages would be sent to some computer, that code would drive the package to the right device. And it is in use also in GSM-telephones. This protocol asks the request, that the data package is right, and if there are some errors, the package would be resent. That allows us to use video-broadcasts and banking services safely.
But that protocol would allow that any device in the world can be tracked. This is the shadow side of the Carrier IQ and in the real world, that would allow installing any kind of malware programs inside the mobile devices. This means that inside that data would slip the packages, where is the malicious software. That means the observer can follow the person location, homepages where targeted person visits, and even the pulse and breath.
In this case, the privacy of the person can break totally, and another good way to slip malicious software to mobile telephones is to use the SIM-card, where is the program. In the real world, the telephone company can also make firewalls and antivirus programs, what allows specific malware to install in those devices. If the company wants, that the antivirus and firewall would let the malware, that has the right control code to pass the defense. And then that kind of malware can be installed to any device, what has that company's SIM-card or is inside of its firewall.
The research and advances in artificial intelligence are causing the need to re-estimate what things like consciousness means? When we are creating new and powerful AI. We are creating something that has not existed before. And quantum technology has increased the power of AI. So that means we might face surprising situations when we are driving AI algorithms by using quantum computers that are a minimum of 1000 times faster and more powerful than traditional binary computers.
Subscribe to:
Post Comments (Atom)
Chaos is the thing that limits our range of view things.
The black hole's mathematical shape is a hyperbolic layer. Chaos or entropy is what limits our view. We cannot see the other side of t...

-
Artificial muscles and synthetic organic intelligence can be tools that make it possible to create robots. More intelligent than humans. The...
-
"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger...
-
"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Eule...
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.