Skip to main content

We wish you a Merry Christmas and beware with the mobile equipment.



Kimmo Huosionmaa

In this Christmas, many people will get the new mobile telephone from the Santa Claus, and some of those telephones might be the fingerprint locking. In this case, the user of the computer can be recognized with the biometric systems, and this would be very dangerous if somebody will touch those telephones without permission. Those modern telephones will collect the information, what normal users don't even think, and one information is the movements of the telephone.


In some case, the telephone will send the alarm if some unauthorized person touches the telephone or the telephone will move. In the world of artificial intelligence, there is nothing, what is impossible, and in some cases, those fingerprints will send straight to the police, and then if the user is different than the owner, there will be reported about this kind of cases to the officials. I don't know, what happened if some criminal person, who was wanted by the police will touch those mobile telephones.


Some telephones have the artificial intelligence, what recognizes the worlds, and if the person claims that he or she is in the different places, that this person really is, will the official take the telephone in the surveillance. The fingerprint recognizers would be around the telephone, and they will give the information if the user is somebody else than the person, who owns the phone.


The use of the fingerprint recognizers will give extra safety for the user, and it is the way to the world, where the only thing, what the person needs is the mobile telephone. The use of biometrical systems to secure the identity of the user gives opportunities to make the mobile telephone the wallet, ID-card and many other things like the bank. The mobile telephones have one very nasty thing, what the people always forget. It is to use the telephone as the surveillance tool. The eavesdropped must only open the What's App and then close the screen.

And then the telephone will send all discussions to another telephone, and if the person has right programs, might this person use that telephone as an effective eavesdropping system. Another person will not notice that this application is open because the screen is locked. Also with the right software, the mobile telephone will transfer the effective "wardriving" platform, what collects the information from the networks, when some person will walk on the streets.


Modern mobile telephones have right components like GPS-system and WLAN for the wardriving, and that system will mark all the positions, what can be accessed to free and open network. But if some person has the remote control in the mobile telephone, can the hacker use that thing like the normal computer, and if the mobile telephone is equipped with the computers operating systems, another hacker can program the screen like that it will go black, and the telephone looks like that it is turned off.


In this scenario the hacker might use the telephone as the "man in the middle attack", and this person might collect very much important information of the target. And the mobile telephones can use as the infect other systems with viruses. Those computer viruses can be deadly if they will program the car to drive in the stone. In this hypothetical scenario, the control of the automobile will transfer to another place, and this system will work with the GPS-system and radios, what controls the safety of the car and denies the stealing of the vehicle.


The only part what must be put in the vehicle is actually the amplifier, what amplifies the signal of the electronic key. And by that way, the hackers can slip in the system. This tiny equipment can be masked as the surveillance transmitter, what can be put outside the vehicle. Or if the GPS system will transmit the data of the motor function to some surveillance officers, that channel can be used by putting the virus to vehicles.


The problem with computer viruses is that they might be very complicated, and it doesn't look anything more than some ordinary computer program. And in the worst scenario, the all operating system might be changed to the virus or trojan horse, what gives some operators capacity to take all the vehicle under their control.


The computer virus will change the car's fuel injection system, that it doesn't take commands from the hammer, and turns in the full throttle position. It can lock the people inside the vehicle,  like in some horror movies. And, of course, the brakes of the car will be brake and the control of the power steering might transfer to another place, and then some operator will drive the car to the wall. Some computer viruses can be infected the power platforms and if somebody puts them mistakenly to the systems, what controls the nuclear power plant, and the operator doesn't know that thing, could the result be an explosion. And this is the worst of the fears, what the man can get into the head.

travellingintimeandspace.wordpress.com/2017/12/24/we-wish-you-a-merry-christmas-and-beware-with-the-mobile-equipment/

Comments

Popular posts from this blog

MIT's tractor beam can make the new types of SASER systems possible

   "This chip-based "tractor-beam," which uses an intensely focused beam of light to capture and manipulate biological particles without damaging the cells, could help biologists study the mechanisms of diseases."(Interesting Engineering, MIT’s Star Wars-inspired ‘tractor beam’ uses light to capture, manipulate cells) MIT's tractor beam can make the new types of SASER systems possible. The tractor beam just hovers the nanoparticle in air or medium, and then the laser or some other electromagnetic system transports oscillation into those particles. The ability to make cells and other particles hover in the system makes it possible to create particles whose energy level or resonance frequencies are accurately calculated things.  That thing makes it possible to create things that transmit wave movement accurately and cleanly. This is one version of the use of a tractor beam. Modern tractor beams are like acoustic tweezers where sound waves lock the object in its cr

The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible.

  "An illustration of NASA’s research plane ER-2 flying over thunderstorms. Credit: University of Bergen / Mount Visual (CC BY 4.0), edited" (ScitechDaily, Surprising Discovery: NASA’s Retrofitted U2 Spy Plane Reveals Tropical Lightning Storms Are Radioactive) The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible. The process has been observed by the NASA (Lockheed) ER-2 research plane, which is a modified U-2 spy plane. The gamma-ray formation in thunderstorms. Where lightning and electric fields release electrons that impact the air molecules and water droplets is an interesting thing. That thing opens the route to solving many mysteries.  "The general physics behind how thunderstorms create high-energy flashes of gamma radiation is not a mystery. As thunderstorms develop, swirling drafts drive water droplets, hail, and ice into a mixture that creates an electric charge much like rubbing a balloon on your shirt. Pos

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th