Skip to main content

What we should afraid of social media and social media applications?

What we should afraid of social media and social media applications?

1. The blind trust is the biggest threat in the world of telecommunication

Social media is the biggest opportunity and the biggest threat at the same time. And at the beginning, I must say that the blind trust for some systems is the biggest threat in the world of telecommunication in the entire world.

When some social media solution claims that it would not collect the data or sell it to the third party, we must remember, that there is always an actor, who is out of control in those causes, and that actor is group, what is made the code of that program. When we are looking at the thing, what social media is making, we must understand that algorithms are searching the data, what people are writing about their experiences about the users of this kind of social media application.

2. The maker of the solution is always out of control 

But the algorithms and artificial intelligence can make much more than we can ever imagine. Those algorithms can look for the references to other social media applications, and then the operators can search that user from those services. Or if the algorithm is made by using highly sophisticated skills and tools, it might collect the data of the usage of social media and the entire Internet by using automatized artificial intelligence.

The system operates with the method, what cumulates the databases, and it can compare used words to the data, what is mentioned in the news and other internet pages. And then it can make a profile the entire use of the Internet. That system can find out, what the person is interested, and what that person has not interested.

3. There is no privacy in the Internet

The algorithm just finds out, what kind of things the person is writing in social media, and that would help to make a complete and effective profile of that person, and map the contacts of that targetted inmate. The system can find out what is the normal things, what those people are discussing. And it can also find out even the sexual orientation of the person if it will compare the feedback, what the person gets from the partners, who have been dated.

When we are talking about privacy, and how we must be careful, we must remember that there could always be somebody, who will listen or follow the messages. In analog telephone lines were situations, that somebody just connects own telephone or loudspeaker to the wrong plug, and then all phone calls, what are called from some houses, were allowed to hear.

4. In the digital age, the methods have been changed

But when we are thinking about the modern digital age, we always forget that there is always software, what handles the phone calls and data usage. Using the digital network is a simple and effective thing, but we always forget that the telephone needs an operating system for making the connections to the digital networks, which handles only numbers one and zero.

And if somebody would put the small tracking cookie in the operating system every byte, what is sent from the device would be doubled, and the second one would send to a third-party server, and if the system uses  User Datagram, or UDP-protocol the system, what sends data would not even notice that there is a data leak.

5. Stealth eavesdropping tool can be installed even in the eldest mobile telephones

Normally the echo of TCP or Transmission Control Protocol would uncover if some of the bytes would go to the wrong receiver, but UDP doesn't send that echo. And even the oldest telephones can equip with the cookie, what will mark the sending data by using so-called control bytes, what orders routers duplicate them.

And in fact, it's more dangerous to trust that the system is safe, and blindly believe system delivers, that they would not give information to their party actors, than use systems what risk the privacy and know the risks. In real life, we must not speak secret things and send classified information by using E-mails.

6. Private operators are toothless against government

We should meet the person who we want to tell classified things face to face, and even then we must be a little bit paranoid and think that the person would be traitorous, and record the discussion. So in those cases, we must be sure, that we also speak about things by following the law.

At last, I must tell one thing. Private operators are toothless against the government. The government can order the makers of the secrecy programs make there the "back gate", which allows opening every message, what is sent made by using that software, and if there is not back gate, the government might deny sharing that program on the Internet.

6.1 Government might deny the use of unauthorized software by equipping the files with carrier byte. If that byte is not found, the message would not deliver forward. 

And only the authorized software would put the carrier code on the front of the code. If that certificate code would not be found the message would not deliver to forward. This makes possible control the data traffic on the Internet more effectively than ever before.

It can deny delivering messages, which are made by using unauthorized software. The thing is really simple. If the message is made by using authorized software, there is a small code in front of the data package, and if the router would not find that code, it would crush the message immediately. This case would be simply explained that it is "tracking code backward".

Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of