Skip to main content

The updates for Huawei-telephones would not be shared anymore

The updates for Huawei-telephones would not be shared anymore

The updates for Huawei-telephones would not be shared anymore


Mobile telephones are an effective tool for surveillance because they are almost every time in the pocket. And those mobile telephones can collect data, what nobody wants to share. By using the same NFC-sensors, what are used in mobile payments, can somebody scan the details of the mobile telephone and ID-cards, what are used chips without nobody even notices that thing.

Of course, there is one thing, what we must realize, and that is that the microchips that are used with smart cards are actually the computer, where is every part of the normal computers, but those parts are very much smaller. The reading of that computer would happen, that NFC would send the radio wave to the chip, and that would send the data to the telephone.

But those miniature computers would store the data of the reading, and that means that the mobile telephone can be identified by using the data, what is stored in the card, while it has been read. I don't know if this true, but that kind of data would store very easily, and it can be download to Web when the card is read in the payment point. That data would be driven to the NSA central computer.

Google refuses to update the Android-operating systems of Huawei-mobile telephones, and the reason for that is claimed to be that the intelligence officers of China would use those updates by creating the Trojan horses, what would collect the data of the user of those telephones very effectively, and the thing is that if those mobile telephones would be equipped with very large and complicated malicious software, that thing can send every single byte, what the mobile telephone would collect to the observers. That data contains the location, net use and also the health data if the user would use the sports applications.

The thing what makes that malicious software problem is that they are made by the government, and that means the official handler of those files makes possible to create very complicated and effective surveillance tools because nobody can control those hackers, who are working with Chinese military intelligence and security police. This is one of the biggest problems with the mobile telephones, which are made at the East or behind some national firewall.

Cheap price of the telephone addicts to buy them 

The cheap price will addict to buy those mobile telephones, and that will open the road to effective intelligence operations and monitoring people, who are using those mobile telephones. The idea is that the telephone is equipped with a microchip, which will release the malicious tool to the memory when the system observers would give the signal to that microchip. And then every single byte would send to Beijing, what is handled with that phone.

But there is another reason for that, the Huawei phones would not get updates anymore. The cheap price of the Chinese products would cause the customs to want to be put between that country and another world. And the reason for that is that the products of China are actually made by the government. Because the government can make mobile telephones at a low price that would give it a very good benefit to other products.

The problem is that the Chinese government would act straight in the business

That means that the cheap price would addict to buy those products. Those mobile telephones are a very good tool to monitor other people, but they must buy those phones before they can put under the surveillance. There is one thing, what concerns the western companies, and that is that China would also copy the western products and mark them in its own name. If the government would not stick to that thing, or even gives orders, what products should be copied, the thing is very embarrassing.

The thing what makes some western authorities suspect that China has created a very booming high-tech industry in a couple of years, and before that, they were not have anything like that. And suddenly China has created the fastest supercomputer in the world. Then they created Huawei, what was hit in the first time. Everything was perfect, and there were no errors in that mobile telephones. That thing caused rumors that the Chinese governmental agents have stolen the industrial secrets, what were necessary to build that kind of products. But also the thing that Google wants to support Donald Trump and his policy.

Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

Terrifying visions of genetic engineering.

 Terrifying visions of genetic engineering.  The modern Hounds of Baskerville ABW:s (Advanced biological weapons are the modern Hounds of Baskerville. The term ABV means the animal which is genetically engineered. And which is controlled by using some interactive electronic systems. There is a possibility to connect the action camera to dogs collars. And transmit commands to that animal by using electronic systems. Spoken words can use to the commands.  Or they can be a series of sounds that are stored in the sound files. When the operator activates a certain file that sound means a certain command to the animals. There is the possibility to automatize some commands by connecting the system to the image recognition tool. When the action camera sees something that is stored in the memory of the computer. That system sends the coded order to the animal.  Nanotechnology and genetic engineering are the most lethal combination in the world. The ABW:s (Advanced Biological ...

The story of (Northrop?) TR3A "Black Manta"

    Image I The story of (Northrop?) TR3A "Black Manta" Sometimes there have been discussions that the mysterious TR3A "Black Manta" was a study project for the B-2 bomber.  That means that TR3A was used as the flying mockup for testing the aerodynamic and control solutions for the B-2 "Spirit" bomber. The thing that supports this thing is that the manufacturer of both planes is Northrop corporation.  Along with "Aurora" was flying one other mysterious aircraft, TR3A "Black Manta". The system is described as the "Stealth VTOL" (Vertical Take-Off and Landing) aircraft. Unless the mysterious TR3B, the Northrop TR3A is the conventional VTOL-aircraft, what is using regular jet engines, but what has the stealth-body.  Image II The thing is that the stealth-reconnaissance aircraft, which uses a similar technology with the Northrop B-2 bomber would be an interesting part of the weapon arsenal. There is a possibility that the TR3A was...