Skip to main content

How to infect the mobile network?

.


How to infect the mobile network?


We are believing that the owners of the data networks are protecting us against computer viruses and malicious software. But what if the operator or owner of those networks are delivering the malicious code themselves? What if the entire mobile network is operating as a powerful tool for surveillance of the citizens? What if behind the hacking is some government? In that case, the hackers never go to the courtroom even they are tracked by some police organization? 

Hacking the mobile telephone allows the entire mobile network can infect by hackers. Hacking the mobile telephone can be made by pointing the antenna to those systems, that wanted to hack. So that means that the operating systems of mobile telephones must keep updated, or the operating systems can infect by computer viruses. 

Another thing, that can deliver computer viruses can be the hardware of the mobile device, and in this case, the programming of the microchips can change that the programming code contains malicious software. The reprogramming of some microcircuits is a very big risk because the microchip can deliver the virus to the entire mobile data network. 

The infection of the network can do by using the smart card, which is equipped with malicious code. In that scenario, the infected bank cards are injecting the virus into the payment system. Or if the person uses the payment device by mobile telephone, that system can send the virus code through the mobile device to the banking system, where it can deliver in many places. 

When we are protecting our devices, we are thinking that the networks, where we are using mobile devices are well protected. There is always firewalls and other stuff, what mission is to protect us from malicious programs. The fact is that we ever imagined, that the owner of the network would deliver the viruses in that system. If the owner of the mobile data network would want to put the computer virus on your mobile telephone. 

That operator must only make the new update for things like operating systems of the mobile devices.  and that thing allows delivering the complicated artificial intelligence-based computer viruses, what can filter the data, what they are stealing and deliver for the manufacturers of the viruses. The ability to preprocess the captured data makes it easier to separate important bytes from the "white noise of the Internet". The infected mobile network is a big risk for the private and national security of many nations. 


https://futurism.com/the-byte/horrifying-hack-iphones-antenna


 https://curiosityanddarkmatter.home.blog/2020/12/04/how-to-infect-the-mobile-network/

Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of