Skip to main content

About privacy and telephone companies

https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

When we are talking about the data, what private corporations collect about us, we always forget to ask one simple question: "Who owns our telephone or internet provider"? This question is very interesting because if the owner of that company wants, the RAID-5 technology would send all data, what travels thru the server rooms of that company even across the Atlantic, and that data can be used to create the profiles of every individual person, who use that provider.


And the second thing what might interest people is so-called "Carrier IQ". This is actually a small code, what would put in the front of every data package, what would send thru the Internet, and in TCP/IP-protocol that thing can tell anything about the usage of the computer or mobile device. TCP/IP (Transmission Control Protocol) is the communication protocol where the server sends the data as packages via the Internet.


This protocol cuts the transmission simultaneous because it would connect the control code in the data. When the packages would be sent to some computer, that code would drive the package to the right device. And it is in use also in GSM-telephones. This protocol asks the request, that the data package is right, and if there are some errors, the package would be resent. That allows us to use video-broadcasts and banking services safely.


But that protocol would allow that any device in the world can be tracked. This is the shadow side of the Carrier IQ and in the real world, that would allow installing any kind of malware programs inside the mobile devices. This means that inside that data would slip the packages, where is the malicious software. That means the observer can follow the person location, homepages where targeted person visits, and even the pulse and breath.


In this case, the privacy of the person can break totally, and another good way to slip malicious software to mobile telephones is to use the SIM-card, where is the program. In the real world, the telephone company can also make firewalls and antivirus programs, what allows specific malware to install in those devices. If the company wants, that the antivirus and firewall would let the malware, that has the right control code to pass the defense. And then that kind of malware can be installed to any device, what has that company's SIM-card or is inside of its firewall.

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....