Kimmo Huosionmaa
In this Christmas, many people will get the new mobile telephone from the Santa Claus, and some of those telephones might be the fingerprint locking. In this case, the user of the computer can be recognized with the biometric systems, and this would be very dangerous if somebody will touch those telephones without permission. Those modern telephones will collect the information, what normal users don't even think, and one information is the movements of the telephone.
In some case, the telephone will send the alarm if some unauthorized person touches the telephone or the telephone will move. In the world of artificial intelligence, there is nothing, what is impossible, and in some cases, those fingerprints will send straight to the police, and then if the user is different than the owner, there will be reported about this kind of cases to the officials. I don't know, what happened if some criminal person, who was wanted by the police will touch those mobile telephones.
Some telephones have the artificial intelligence, what recognizes the worlds, and if the person claims that he or she is in the different places, that this person really is, will the official take the telephone in the surveillance. The fingerprint recognizers would be around the telephone, and they will give the information if the user is somebody else than the person, who owns the phone.
The use of the fingerprint recognizers will give extra safety for the user, and it is the way to the world, where the only thing, what the person needs is the mobile telephone. The use of biometrical systems to secure the identity of the user gives opportunities to make the mobile telephone the wallet, ID-card and many other things like the bank. The mobile telephones have one very nasty thing, what the people always forget. It is to use the telephone as the surveillance tool. The eavesdropped must only open the What's App and then close the screen.
And then the telephone will send all discussions to another telephone, and if the person has right programs, might this person use that telephone as an effective eavesdropping system. Another person will not notice that this application is open because the screen is locked. Also with the right software, the mobile telephone will transfer the effective "wardriving" platform, what collects the information from the networks, when some person will walk on the streets.
Modern mobile telephones have right components like GPS-system and WLAN for the wardriving, and that system will mark all the positions, what can be accessed to free and open network. But if some person has the remote control in the mobile telephone, can the hacker use that thing like the normal computer, and if the mobile telephone is equipped with the computers operating systems, another hacker can program the screen like that it will go black, and the telephone looks like that it is turned off.
In this scenario the hacker might use the telephone as the "man in the middle attack", and this person might collect very much important information of the target. And the mobile telephones can use as the infect other systems with viruses. Those computer viruses can be deadly if they will program the car to drive in the stone. In this hypothetical scenario, the control of the automobile will transfer to another place, and this system will work with the GPS-system and radios, what controls the safety of the car and denies the stealing of the vehicle.
The only part what must be put in the vehicle is actually the amplifier, what amplifies the signal of the electronic key. And by that way, the hackers can slip in the system. This tiny equipment can be masked as the surveillance transmitter, what can be put outside the vehicle. Or if the GPS system will transmit the data of the motor function to some surveillance officers, that channel can be used by putting the virus to vehicles.
The problem with computer viruses is that they might be very complicated, and it doesn't look anything more than some ordinary computer program. And in the worst scenario, the all operating system might be changed to the virus or trojan horse, what gives some operators capacity to take all the vehicle under their control.
The computer virus will change the car's fuel injection system, that it doesn't take commands from the hammer, and turns in the full throttle position. It can lock the people inside the vehicle, like in some horror movies. And, of course, the brakes of the car will be brake and the control of the power steering might transfer to another place, and then some operator will drive the car to the wall. Some computer viruses can be infected the power platforms and if somebody puts them mistakenly to the systems, what controls the nuclear power plant, and the operator doesn't know that thing, could the result be an explosion. And this is the worst of the fears, what the man can get into the head.
travellingintimeandspace.wordpress.com/2017/12/24/we-wish-you-a-merry-christmas-and-beware-with-the-mobile-equipment/
Comments
Post a Comment