Skip to main content

About privacy and telephone companies

https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

When we are talking about the data, what private corporations collect about us, we always forget to ask one simple question: "Who owns our telephone or internet provider"? This question is very interesting because if the owner of that company wants, the RAID-5 technology would send all data, what travels thru the server rooms of that company even across the Atlantic, and that data can be used to create the profiles of every individual person, who use that provider.


And the second thing what might interest people is so-called "Carrier IQ". This is actually a small code, what would put in the front of every data package, what would send thru the Internet, and in TCP/IP-protocol that thing can tell anything about the usage of the computer or mobile device. TCP/IP (Transmission Control Protocol) is the communication protocol where the server sends the data as packages via the Internet.


This protocol cuts the transmission simultaneous because it would connect the control code in the data. When the packages would be sent to some computer, that code would drive the package to the right device. And it is in use also in GSM-telephones. This protocol asks the request, that the data package is right, and if there are some errors, the package would be resent. That allows us to use video-broadcasts and banking services safely.


But that protocol would allow that any device in the world can be tracked. This is the shadow side of the Carrier IQ and in the real world, that would allow installing any kind of malware programs inside the mobile devices. This means that inside that data would slip the packages, where is the malicious software. That means the observer can follow the person location, homepages where targeted person visits, and even the pulse and breath.


In this case, the privacy of the person can break totally, and another good way to slip malicious software to mobile telephones is to use the SIM-card, where is the program. In the real world, the telephone company can also make firewalls and antivirus programs, what allows specific malware to install in those devices. If the company wants, that the antivirus and firewall would let the malware, that has the right control code to pass the defense. And then that kind of malware can be installed to any device, what has that company's SIM-card or is inside of its firewall.

Comments

Popular posts from this blog

Use virtual "perpetual motion machines" and seawater as energy sources.

   Use virtual "perpetual motion machines"  and seawater as energy sources.  The Archimedean screw can offer almost endless energy sources.  "Robert Fludd's 1618 "water screw" perpetual motion machine from a 1660 wood engraving. It is widely credited as the first attempt to describe such a device." (Wikipedia/Perpetual motion) The term "virtual perpetual motion machine" means a machine. That pulls water to the upper tank using a capillary tube. Then that water will fall through the generator or turbine wheel. The machine uses differences in pressure levels. But it looks like a "perpetual motion machine", that is impossible because of laws of thermodynamics.  The machine uses differences in pressure levels. But it looks like a " real perpetual motion machine", which is impossible because of the laws of thermodynamics.  The real perpetual motion machines don't use outside energy. And that's why they are not possible.

Metamaterials can change their properties in an electric- or electro-optical field.

"Researchers have created a novel metamaterial that can dynamically tune its shape and properties in real-time, offering unprecedented adaptability for applications in robotics and smart materials. This development bridges the gap between current materials and the adaptability seen in nature, paving the way for the future of adaptive technologies. Credit: UNIST" (ScitechDaily, Metamaterial Magic: Scientists Develop New Material That Can Dynamically Tune Its Shape and Mechanical Properties in Real-Time) Metamaterials can change their properties in an electric- or electro-optical field.  An electro-optical activator can also be an IR state, which means. The metamorphosis in the material can thermally activate.  AI is the ultimate tool for metamaterial research. Metamaterials are nanotechnical- or quantum technical tools that can change their properties, like reflection or state from solid to liquid when the electric or optical effect hits that material. The metamaterial can cru

There might be an answer to why there is a gravitational hole in Earth's gravitational field.

The gravitational field at the point of the Indian Ocean is weaker than in other places on Earth. The existence of that gravitational hole is proved. But the reason why that gravitational hole is formed is unknown. The reason why the gravitational field on the Indian Ocean is weaker might be a simple thing.  There is a possible lighter rock in the mantle, or there is less material at that point. In some wildest theories, there are bubbles in magma that turn below the bottom of the Indian Ocean are less massive than in other places on Earth. The lighter material at that point should make the hole in gravitation.  "Geoid undulation in false color. (International Centre for Global Earth Models/Wikimedia, CC BY 4.0) The impact of the ancient planet. In the time when Earth was young. Cause asymmetry of Earth's gravitational field, because there still is the debris of that impact. But the hole in a gravitational field is harder to explain than regular-looking asymmetry.  Could the r