Skip to main content

Interactive systems would protect the information

https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

The interactive LLS (Low Light Screen) means the mobile device, what has an extremely low light screen, what must watch with night-vision glasses. Those glasses can transmit the code for the system, what tells the system if the user has permission to use some data. This system allows remote controlling the access of some data, and that can be filling with the bio metric identifier. This kind of systems might already in use at some classified areas, where the access must be controlled extremely sharp, like in some nuclear facilities and another kind of missions, where the operator must hide the existence of the team.


The low light screen allows using mobile devices in the dark forests, and in the situation, where the person must hide the position, from the observers. When we are thinking about the interactive technology, where the system identifies the allowance to use some components of those devices, we might think the situation, where the device is allowed to carry outside the operational area. If the operator has this right, the existence of those qualities might be wanted to hide from other persons.


Bio metric identifiers might be a very good tool, but if the owner of the system wants to hide the existence of the LLS (Low Light Screen)- or IRS (Infra-Red Screen) from other users, that might be needed to use the remote control or some other thing, like protective glasses, where is etched the special QR-code, what is visible with the selfie-camera. The double identifier allows denying the access to some functions if the person is outside the area, where the secret or classified things are doing, but this allows a person to use own mobile telephone, and answer the calls, what is coming from the members of the family.


If this component would be connected to the bio metric identifier, the person can use own telephone in secret areas. And if somebody takes that telephone in hand, the fingerprint or camera take the picture of the user. In some cases, the person might have RFID-identifier surgically involved in the hand. If somebody, who has no identifier touches the telephone, the GPS tells that it has been moved, and in this case, double identifier makes possible to uncover, if somebody plays the person.


Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....