5G networking technology and global Internet
If we are thinking to buy some cheap parts for our data systems, we can buy very much troubles at the same time. One risk of cheap computers is that the battery is weak, and the mobile usage of the systems is very short, but if somebody would sell the used computer, should that system first clean, what means the re-installing operating system.
In 5G mobile network is one problem, and it is that if the microchips, what is used in components are infected with viruses or surveillance software, that system can turn against its owners. The thing, in this case, is that those components might have own satellite communication devices, what would deliver all data from the network to the part, what is controlling the software and the network.
This is the thing, what makes 5G architecture problematic. Those components might have also logic bombs, or they can use as this data virus. The thing is that those microchips can be formatted by using remote control and then the network is unable to operate. The third problem is that technology can be used to track the citizens, who are in foreign lands.
That means that the network remote usage allows the use it in the surveillance, and this makes it really problematic. The remote usage systems would be used as that network maintenance, and things like anti-virus and firewalls are updating by using those remote control panels. And this makes those networks a very big risk if the maintenance is left to some unknown operator. In the worst case, those operators can have a so-called back gate to the system, and that means that they can shut down an entire network if they want.
This is the reason, why every nation should have separated network for the official use. In that network must be used only trusted parts. And things like microchips must be produced in the trusted places, and the programs, what are connecting those parts to computer keyboards and other parts should be programmed and installed only in the trusted places, what is fully EMP-protected because that denies that in those components would install the software, what makes them risk for the security.
If we are thinking to buy some cheap parts for our data systems, we can buy very much troubles at the same time. One risk of cheap computers is that the battery is weak, and the mobile usage of the systems is very short, but if somebody would sell the used computer, should that system first clean, what means the re-installing operating system.
In 5G mobile network is one problem, and it is that if the microchips, what is used in components are infected with viruses or surveillance software, that system can turn against its owners. The thing, in this case, is that those components might have own satellite communication devices, what would deliver all data from the network to the part, what is controlling the software and the network.
This is the thing, what makes 5G architecture problematic. Those components might have also logic bombs, or they can use as this data virus. The thing is that those microchips can be formatted by using remote control and then the network is unable to operate. The third problem is that technology can be used to track the citizens, who are in foreign lands.
That means that the network remote usage allows the use it in the surveillance, and this makes it really problematic. The remote usage systems would be used as that network maintenance, and things like anti-virus and firewalls are updating by using those remote control panels. And this makes those networks a very big risk if the maintenance is left to some unknown operator. In the worst case, those operators can have a so-called back gate to the system, and that means that they can shut down an entire network if they want.
This is the reason, why every nation should have separated network for the official use. In that network must be used only trusted parts. And things like microchips must be produced in the trusted places, and the programs, what are connecting those parts to computer keyboards and other parts should be programmed and installed only in the trusted places, what is fully EMP-protected because that denies that in those components would install the software, what makes them risk for the security.
Comments
Post a Comment