Showing posts with label solution. Show all posts
Showing posts with label solution. Show all posts
Sunday, August 12, 2018
Cicada 3301 the mystery in the Net.
https://gamesandtehories.blogspot.com/
Kimmo Huosionmaa
The most untypical thing on the Internet is Cicada 3301, some secret community, what delivers QR-codes around the world. Those physical papers, where is the code is telling that this is some kind of community, and there is a possibility, that those QR-codes allow tracking the mobile telephones. Sometimes I have thought that if some single person has enough money and time, there is a possibility, that Cicada 3301 is made by the one single person.
The word "Cicada" is locating the origin of this group to somewhere, where is Spanish or Portuguese speaking persons, and some people claim that the butterfly, what is in the mark is the deaths-head hawk moth, what difference with cicada is the form of skull in the back, This bu is known from the movie "The Silence of the Lambs", what tells horrifying story about the serial killer. The reason, why they claim that is when you see the film in the YouTube the arrow symbol would be in the same place where the skull is in the back of the deaths-head hawk moth, but this can be only coincidence.
The access to that group is behind the test, where the candidate must solve some problems, where is needed the knowledge about Mayan numerology, astronomy, religion, painting, and Cryptology. The purpose of this mystical thing is not ever mentioned. But behind that is claimed to be the NSA, some other intelligence services, police like FBI or even the South American drug cartels are claimed to be behind this thing, and the last one is claimed to be interested about the persons, who can do some tricks with the numbers for money laundry.
The intelligence services are claimed to use this test as the recruiting process for selecting the persons, who have skills to create the new kind of Cryptological solutions. The number 3301 is the prime number, so that can mean this group has some kind of connections with the Cryptology. But this might be only the coincidence. Maybe this group would be looking for very highly intelligent persons for creating the new type of Mensa in that organization.
https://www.is.fi/ulkomaat/art-2000001249025.html
Tuesday, August 7, 2018
Why there is no this kind of payment application? (QR-code on the screen)
![]() |
Picture I |
Kimmo Huosionmaa
One of the most simple applications, what can revolutionize payment process is missing. This application would make the mobile telephone "easy to use" for payments, and it's so easy, that nobody ever thinks about it. This is the application, what makes QR-code on the screen, and after the customer has used self-service cash, would this person just open the application and read the QR-code with the same tool, what is used to read the codes from the products.
This application might give advanced security because it could be made that way, that it uses fingertip recognition in this process. In this case, the fingertip detector would confirm that the telephone is in the right hands, and then the customer would read the QR-code, and after that, the payment would be moved in the phone bill, and that kind of applications would allow leaving the wallet to the home. The security in those devices is much better than old ones, and that makes them safe.
Of course, there would find the persons, who want to use cash, but this would be the nice new way to use the mobile telephone. This could also allow using new ID-card application, what would tell if the person, who uses mobile telephones "virtual ID-card" is the person, whose picture is on the screen. So that kind of software could be the future of the mobile payment, and they are so easy to use, that they could be the similar group of users with the modern payment applications.
QR-codes are easy to use, and there is nothing mystical in those things. They could be changing every time when this application is in use, and the system could ask from the mobile telephone, that the thing, what is used is the mobile telephone. This eliminates the change to use pictures for that purpose. This means that the system would take the connection to that phone, and make sure, that this particular phone uses application.
Picture I
https://www.lg.com/us/images/cell-phones/md05603107/gallery/k373_medium_01.jpg
Monday, July 23, 2018
Another individual solution for aviation
![]() |
Avro Avrocar (Picture I) |
https://gamesandtehories.blogspot.com/
Kimmo Huosionmaa
There is another one individual idea of aviation, and it contains with Avro's flying saucer. This aircraft failed because in the 1950's there were not able to control that device. The computerized control systems, what corrects the position of that aircraft, would make this aircraft real, and that form is very good for STEALTH-helicopters.
But this kind of machines have the capacity for much more, and one of them is, that they could be equipped with a valance, and under it can form the air cushion. This would make possible to use those devices in the extremely low altitude, but they could actually fly like aircraft or helicopter also in the high altitudes.
Those quiet and invincible machines would help to rescue dropped aircraft from hostile territory. The stealth-hybrid helicopter would work like there would be blower in the center of that saucer. That blower allows the silent take off and land, and the sides could be jet engines, what would give that device very high speed.
Under this system might be manipulator's hands, that would take the touch to the wreck and then fly with those bites inside the C-5 Galaxy airplane, that would be airborne during the operation. But the flying saucer could be equipped also with air cushion, that would give it the ability to fly on the ground and water like air cushion vehicle.
That means that this equipment can pass the defense lines by transforming the air cushion vehicle, what can operate near the ground without touching it. And when the mission is done, this vehicle can fly away. That device could be used for military and law enforcement actions in some swamp area.
Picture I
http://www.fiddlersgreen.net/aircraft/Avro-Avrocar/IMAGES/avrophoto-6.jpg
Saturday, March 3, 2018
How to make a machine, what reacts for feelings? And what makes them dangerous for national security?
![]() |
(Picture 1) |
Kimmo Huosionmaa
Have you seen the movie "Terminator"? There is a scene, where robot answers "Fuck you asshole" for the knocker. This is the thing what makes it feel so human. And that gives this fictional robot the capacity to slip into the resistance and eliminate the wanted persons. This is the horrific vision of future, where artificial intelligence has killed the human race and starts to war against humans.
Robots are creating to replace humans in boring jobs, where are problems to find workers, because of bad salary. Most elegant way to make robots, is to make them so sensitive, that they can play feelings, and that would make them very good workers in hospitals. Those sensitive robots would use their sensors to monitor how opponent speaks, does the opponent turn red, or what kind of voice this opponent has. This kind of robots are creating in Japan, and their missions would be customer service in restaurants and hospitals. Also, sex-industry might be interested in those machines.
By analyzing those changes, would that robot or computer notice if the opponent is angry, sad or glad. Also, they would notice if the person enjoys some food or seem nervous. Sensors would notice if there are tears in the opponent's eyes, and in that cases, it would show empathy for that person. Those robots would be so humane, that there would be hard to separate them from a real human.
Those robots are equipped with computer programs, what notices the changes of voice, or other marks of the person’s behavior. Also, those robots might have infrared sensors, what notices the changes in the skin temperature. And those sensors would notice if the person moves arms little bit too fast. That would tell robot if the person is stressed. After that, the computer chooses right protocol how to start talking with the person.
Closed space like hospital or school is the very good working area of those robots because they could be connected to WLAN all the time, and when they would need more computer power, they can take assistance from some central computers, what helps them to solve problems. In those robots are also some risks, what might ever think before. If those robots would be used in some police or intelligence missions, they might be easy to handle, and those machines can slip in the enemy leaders close circle.
Those robots can be assisted by some aircraft like E-6 Mercury, what can give their calculating capacity for those machines. That human like robots can use in surveillance missions, but there is one great danger for those systems. If somebody would use them as the eliminators or assassins, nothing would stop them. Of course, there would be effective weapons like computer viruses, what would be harmless for humans, but they would destroy robots. And they could be an effective defense against those machines.
But the problem of those robots is that they might have “ghost protocol”. This means that they can do their missions on two levels. Those robots can work as bodyguards, but they can also use for illegal activities. That kind of robots can work in their normal duties all the time, but when they notice the targeted person, those machines would eliminate this man or woman, and then they would return their normal duties. And the memories of those robots can be erased.
Those robots could be slip near the key persons of the military, and if they will start the operation, could those androids just kill them. Or some private corporation would use them to eliminate their competitors. So the Mafia of tomorrow would use this kind of devices as killers. But they can also use in the military missions around the world, and that would allow hiding even great scale of war.
Sources:
Terminator "Fuck you asshole" scene
https://www.youtube.com/watch?v=zlJtohZSsfY
Picture 1
http://themalestrom.com/wp-content/uploads/2017/04/RobotsvHuman-750x450.jpg
https://crisisofdemocracticstates.blogspot.fi/
Tuesday, February 20, 2018
The biggest threat to mankind is overpopulation
![]() |
House at Espoo |
Kimmo Huosionmaa
Overpopulation is the biggest threat to mankind. This is very commonly told the fact and the question why overpopulation is so bad problem is that human being needs space. When the population of people rises, they would need more space, and that would cause wars if some nation wants more living space like Nazis did in 1930's. If the population grows very big, there would be internal pressure for beginning the war against some neighbors. If in those conflicts are used weapons of mass destruction the results would be devastating.
But there have been rumors that in some countries like South Africa, the governments have planned to decrease the population by using biological weapons like hepatitis, and other STD for decreasing the population of their own people. In some plans, the mumps-virus would be put in the drinking water, and that would cause the lifetime sterilized for men.
When we are talking about the birth control, we must understand that talking is not enough for handling this problem, what might cause terrible war. In some talkings have mentioned, that there would be taken the DNA from unborn children, and if those genomes would be unwanted, those babies were sterilized just after the birth. Sterilization by using viruses or X-ray machines would be the most humanitarian method of decreasing the population. Then the woman has got enough children, the X-ray machines would destroy ovum, without any pain.
And the pill-implants would be put every woman after they got their first child. And if that woman will be allowed to make more babies, those must be something special. Also, The overpopulation will cause social problems, and those problems would be both humanitarian and economical. When the space of the people would be ended, the cities would become unsafe, because they will start to live outside the houses, what means streets.
![]() |
Japanese sleeping capsules (Picture 2) |
That could cause the increasing the number of criminal behavior. This causes more problems because the cities must hire more police and security officers. But when we are thinking about the solution for the problems of the space of the cities, we must think that all city would be covered by the giant bubble. Those bubbles can make all city areas very comfortable, and they allow the situation, that the people must not live in their own departments.
Sleeping in the future might happen in the plastic tubes, what will give the person only privacy, what is needed. Those tubes were created by Japanese architect, and they can be one good solution for loss of homes. In this scenario, those tubes might be even free for people, and only families with children would have right to use own rooms. This might be the very radical way of life, but we can always talk also about radical solutions. And maybe in the society of tomorrow is very much different than what we will know it is.
Sources:
https://www.mtv.fi/uutiset/kotimaa/artikkeli/tanaan-tv-ssa-tiedemiehet-varoittavat-ihmiskuntaa-tuhosta-suomalaisprofessori-kertoo-kovista-keinoista-kannattaisi-ottaa-tosissaan/6778266
Picture 2.
http://www.medias.rs/images/7/724/kapsula-hotel.jpg
https://crisisofdemocracticstates.blogspot.fi/
http://crisisofdemocracticstates.blogspot.fi/p/the-biggest-threat-to-mankind-is.html
Wednesday, October 18, 2017
Devil's best trick is to claim, that he is not exist
Kimmo Huosionmaa
When we are talking about intruders of data systems, we must know that those intruders might be people who have spent years in the system, before they begin to leak information. This kind of intruder is harmful and hard to remove because he or she had become a member of the team. And that's why those sleepers are very hard to locate and isolate. Many people noticed that is written with spy term, what is in John Lé Carre's novels.
Those methods are used in everyday life of industrial spying and information stealers world. A methodology of this kind of operation is, that when spying organization will get one person to the certain position of the system, he or she can make very much harm to that system. An agent might use harassment as a weapon with fumigate other workers out of their job and replace them with people like him or herself. That's why in systems must use offensive security, where security workers work undercover that they see what really is going on in their system.
That real-life sleeper is an agent who is put in the system, and that way make very much trouble to his or her clients. The best place to put that sleeper is some antivirus software company's coder, where that person can pollute many systems with malware code. Agent means a hostile operator, who works against companies interests. Normally those agents are very social and people want to believe their stories about how fine workers they are. But when we are talking about agents, we must realize that those persons are more often normal criminals that some governmental workers.
They might work for some criminal organization, what is led by organized crime, whose interests are stealing money from banks with hacking. Those operators might want to steal money from many bank accounts, what means that crime might stay out of security personnel's eye. That kind of criminals might steal the only couple of euros from millions of bank accounts, and because the transfer is so little, some people won't even notice, that their account is missing one or two euros.
And using this "cheese slider" methodology, those gangsters might take a couple of transfers in the same bank. If those people are clever, and use port accounts in many banks, to collect that stolen money in data form. Many gangsters make that kind of mistake, that they steal too much. If somebody realizes suddenly that his or her account is empty, that person normally calls to police. And that makes those money transfers easily to track. Where those people need an agent? They need that person to put their malware program to the server.
That kind of operations must be done outside from building because if all actions will happen inside from house, will data tracked immediately. But when gangsters will make them transfers with remote using the computer, they need access card and another kind of stuff, that they can accomplish the mission. But the problem is that bank's central computer will collect data of those transfers, and if gangsters have done that kind of operation they must destroy that database, that bank can't track them from the net. And that action must be done by malware because if that action is done by the agent the all actions will be uncovered by inner circle job.
But how an agent will rise to that kind of place, where that person make unlimited actions inside that network? Normally the agent will make him needful and helpful actor in the system. That rises he or she social rank in other person eyes. And what makes computer security team suspect that there is an agent inside the system, is that there is more so-called "little mistakes or errors" in system. How can data projector cut communication to the computer if cables are untouchable? Answer in machine or component called router.
Some operator must only disband that data port, and after that computer can't get the connection to the projector. Normally that happens by giving router orders to shut down that gate what allows communication between data-projector and computer. After that even the best ICT-specialists can't get computer's screen to data-projector. What makes people harass other. One answer is that they do it for money, that somebody can replace some workers with the new one.
https://crisisofdemocracticstates.blogspot.fi/
Subscribe to:
Posts (Atom)
New self-assembly nanotubes turn the impossible possible.
New self-assembly nanotubes turn the impossible possible. "The crystal structure of a carbon bilayer. The purple outer layer and blue...

-
That is the thing where electromagnetic wormholes are needed. In photonic data transportation, the system loads information as wave movement...
-
"Illustration of the USS Delaware deploying the Yellow Moray spy robot underwater. Image generated by AI" (Sustainability Times, “...
-
Above is a fictional interstellar spacecraft. There is a possibility that in the future this kind of spacecraft will be are reality. The ide...