Skip to main content

Beware this while using some voice command program


http://crisisofdemocracticstates.blogspot.fi/p/beware-this-while-using-some-voice.html

Kimmo Huosionmaa

How easy is to use voice commands in the mobile telephone. It's like in some "Star Trek" movie. If somebody wants to make very big and easy security leak to the smartphone, would that person need only some subliminal voice generator, and if the targeted person uses the system, what records the commands, what is given by using voice, would the mobile telephone become the very big security problem. Then somebody wants to teach some own commands to the mobile telephone, must this person need only some voice, like 80's techno-hit.


And then that person need only get the targeted mobile telephone in the hands in a couple of minutes. After this, that person might tech some tricks like publishing websites or using GPS to that telephone, and then that hacker must only wait for the right place and then put the music on. After that, the mobile device would automatically make records or publish websites without that the owner would even notice that. And of course, if those commands can be taught by using remote control, would that cause the situation, that the GPS system can be activated in some particular area.


After that this mobile telephone would be very easy to track. In the remote teaching, the hacker would need only two mobile telephones, what are connected to the same account. By using another telephone, the hacker would teach voice commands to another telephone, and in this case, the hacker would activate some chat-program like What's App, and then just record every world, what is told near the telephone. Even if those records are not very clear, the voice could analyze by using computer software, that uncovers every world, that is talked near the device.


This is one threat for the people, who uses mobile telephones. And somebody can teach those commands to the telephone in the house party, where the targeted person might pump full of some drugs like Sodium Pentothal, and after that, this person would tell any password, what the people want to know. The same chemical is also used in lethal injections. But that chemical is also capacity to operate as the "truth serum", and sometimes SOCOM uses it for terrorist interrogation and that might be very effective in this role.

https://www.facebook.com/IWCsync/posts/10156613717489406


http://crisisofdemocracticstates.blogspot.fi/p/beware-this-while-using-some-voice.html

Comments

Popular posts from this blog

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th

Iron Dome is one of the most effective air defense systems.

The Iron Dome is a missile defense system whose missiles operate with highly sophisticated and effective artificial intelligence. The power of this missile defense base is in selective fire. The system calculates the incoming missile's trajectory. And it shoots only missiles that will hit the inhabited area. The system saves missiles and focuses defense on areas that mean something. The system shares the incoming missiles in, maybe two groups. Another is harmless and another is harmful.  Things like killer drones are also problematic because their trajectories are harder to calculate than ballistic missiles. The thing that makes drones dangerous is that they can make masks for ballistic missiles. And even if those drones are slow, all of them must be shot down.  The thing is that the cooperation between drone swarms and ballistic missiles is the next danger in conflict areas. In the film, you can see how drones make light images of the skies. The killer drones can also carry LED li

The innovative shield that protects OSIRIS-APEX can also protect the new hypersonic aircraft.

"NASA’s OSIRIS-APEX spacecraft successfully completed its closest solar pass, protected by innovative engineering solutions and showing improvements in onboard instruments. Credit: NASA’s Goddard Space Flight Center/CI Lab" (ScitechDaily, Innovative Engineering Shields NASA’s OSIRIS-APEX During Close Encounter With the Sun) The OSIRIS-APEX probe travels close to the sun. The mission plan is to research the sun. And especially find things that can warn about solar storms. Solar storms are things that can danger satellites at the Earth orbiter. And the purpose of OSIRIS-APEX is to find the method of how to predict those solar storms. Another thing is that the OSIRIS-APEX tests the systems and materials that protect this probe against heat and plasma impacts.  The same technology. The researchers created for OSIRIS-APEX can used in the materials and structures. That protects satellites against nuclear explosions. That means this kind of system delivers information on how to prot