Skip to main content

About privacy and telephone companies

https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

When we are talking about the data, what private corporations collect about us, we always forget to ask one simple question: "Who owns our telephone or internet provider"? This question is very interesting because if the owner of that company wants, the RAID-5 technology would send all data, what travels thru the server rooms of that company even across the Atlantic, and that data can be used to create the profiles of every individual person, who use that provider.


And the second thing what might interest people is so-called "Carrier IQ". This is actually a small code, what would put in the front of every data package, what would send thru the Internet, and in TCP/IP-protocol that thing can tell anything about the usage of the computer or mobile device. TCP/IP (Transmission Control Protocol) is the communication protocol where the server sends the data as packages via the Internet.


This protocol cuts the transmission simultaneous because it would connect the control code in the data. When the packages would be sent to some computer, that code would drive the package to the right device. And it is in use also in GSM-telephones. This protocol asks the request, that the data package is right, and if there are some errors, the package would be resent. That allows us to use video-broadcasts and banking services safely.


But that protocol would allow that any device in the world can be tracked. This is the shadow side of the Carrier IQ and in the real world, that would allow installing any kind of malware programs inside the mobile devices. This means that inside that data would slip the packages, where is the malicious software. That means the observer can follow the person location, homepages where targeted person visits, and even the pulse and breath.


In this case, the privacy of the person can break totally, and another good way to slip malicious software to mobile telephones is to use the SIM-card, where is the program. In the real world, the telephone company can also make firewalls and antivirus programs, what allows specific malware to install in those devices. If the company wants, that the antivirus and firewall would let the malware, that has the right control code to pass the defense. And then that kind of malware can be installed to any device, what has that company's SIM-card or is inside of its firewall.

Comments

Popular posts from this blog

The hydrogen-burning supernovas are interesting models.

"Researchers discovered a significant magnesium anomaly in a meteorite’s dust particle, challenging current astrophysical models and suggesting new insights into hydrogen-burning supernovas. (Artist’s concept.)Credit: SciTechDaily.com" (ScitechDaily, Rare Dust Particle From Ancient Extraterrestrial Meteorite Challenges Astrophysical Models) If the star is too heavy when its fusion reaction starts, it can detonate just at that moment, when its fusion starts. If the collapsing nebula is heavy enough, it can form a black hole straight from the nebula. But if the nebula's gravity is too heavy to  form  the blue giant or too  small  it can collapse  straight  into a black hole . If  the forming star is a little bit larger than the blue supergiants. It can explode immediately when the fusion starts.    The theory of hydrogen-burning supernovas consists  model  of the giant stars that explode immediately after their fusion starts. When the...

The ancient galaxy mirrors the Milky Way.

"This image shows the galaxy REBELS-25 as seen by the Atacama Large Millimeter/submillimeter Array (ALMA), overlaid on an infrared image of other stars and galaxies. The infrared image was taken by ESO’s Visible and Infrared Survey Telescope for Astronomy (VISTA). In a recent study, researchers found evidence that REBELS-25 is a strongly rotating disc galaxy existing only 700 million years after the Big Bang. This makes it the most distant and earliest known Milky Way-like galaxy found to date. Credit: ALMA (ESO/NAOJ/NRAO)/L. Rowland et al./ESO/J. Dunlop et al. Ack.: CASU, CALET" (ScitechDaily, Astronomers Baffled by Ancient Galaxy That Mirrors Modern Milky Way) Researchers found the youngest Milky Way-type galaxy. The distance to the galaxy is enormous. And the light that comes from that galaxy named REBELS-25 comes from the Universe that is only 700 million years old. The distance to that galaxy is enormous about 236 billion light years. And that means it's a very dista...

Transcendence, or the ability to transcendent thinking may grow in teen's brains.

   "New research has discovered that transcendent thinking, which involves analyzing the broader implications of situations, can foster brain growth in adolescents. This form of thinking enhances brain network coordination, impacting developmental milestones and future life satisfaction. The study emphasizes the need for education that encourages deep, reflective thought, underscoring the critical role of adolescents in their own brain development". (ScitechDaily, Scientists Discover That “Transcendent” Thinking May Grow Teens’ Brains) "Scientists at  USC Rossier School of Education’s Center for Affective Neuroscience, Development, Learning and Education (CANDLE) have discovered that adolescents who grapple with the bigger meaning of social situations experience greater brain growth, which predicts stronger identity development and life satisfaction years later". (ScitechDaily, Scientists Discover That “Transcendent” Thinking May Grow Teens’ Brains) The transcendenc...