Skip to main content

Why is strong identification important in the world of the internet?



Strong identification is the term that means biometric recognition. In the network's world, everybody is at a distance of 15 seconds. That means we can make contact with people who are 5000 kilometers from us. But there is a possibility that this person lives next door to us. And that means we must be careful and think about what we are saying or writing on the net. 

But then we must realize that there are no harmless hackers. Even if, we think. That there is nothing to hide in our network. We forget one thing. Hackers can break into harmless networks to use that network as a platform to attack. 


The attack can be:


1) Attempt to steal vital information. 


2) Deliver propaganda and disinformation.


Both of those hostile actions can cause the internet will be closed. By connecting a cell phone to the Google account and using a cell phone-based login protocol the account's legal owner gets information if somebody tries to log in to that account without permission. The modern "watchdog" system tells if somebody tries to log in to the system without permission. 

The use of modern equipment makes those systems safer. And things like getting access to Facebook or some other social media accounts by removing the sim card from the cell phone is impossible. 

Hackers can use stolen social media accounts to send messages to the victim's children and ask if there is a paper in the parent's room where the password for some more important user accounts is. The message could be that "hi, I lost my just changed password, and that thing is in under my notebook would you send it to me". 

And then the kid sends that password. So we should teach our children that they should not give any passwords to anybody. Also, tell them that they should tell those kinds of attempts to their parents. 

That kind of attack by using social media to cheat other people to seek paper, where a user wrote a password and shares their data in SMS or social media message. Is a forgotten way to use social media in attacks. In that case, the attacker might borrow a sim card or telephone. That was left on the table after the workday. 

The user must always change the sim card's pin code. If the hacker has access to the office. There is the possibility that this attacker just asks for a new password for the boss' account by using those sim cards. Changing a sim card between telephones is not difficult. And if there is some kind of service for a certain telephone number, the hacker will use that thing for the attack. 

In every company are lists of clients' data. That data consists the contact information like telephone numbers that people like car mechanics can call when the car is ready. And there is the possibility that the hacker makes a social attack against the victim. In that case, the hacker might try to ask for the passwords for some governmental facilities. If their victim is working in those places. 

And how do hackers get that name? They might follow the list of lecturers in open lectures. There might read information like the ICT specialist of some data security company that is the military force's contractor or military forces itself. Then hackers will simply ask for the password. But another thing is that there are no safety data accounts. 

If hackers can break things like the recovery account of Google account, those persons might steal that user's identity. Hackers can steal passwords during lectures very easily. They can simply take a film of the hand movements of the victim. And then they can use slow motion to see where the fingers are on the keyboard. 

So how to act in those places? The best possible thing is to use a biometric login. That thing is impossible to break. And the second best method is to stay logged in. In that case, there is possible to download another browser where accounts' users are logging in to accounts. Then the person can make notes. And then uninstall that browser if that thing is unnecessary. 

In the same way, the person can open their account for lectures and other kinds of symposiums. If there is nothing important, that thing minimizes damages even if somebody steals passwords. Changing password often is not reasonable. Users must always write new passwords somewhere. And if that thing is some kind of paper, there is the possibility that the piece of paper will go to the wrong hands.

So when should a user change the password? When that person worked somewhere else than their own office by using a computer, that is not their property. They should change their password. But that thing is necessary only if the user uses a password. The keyloggers cannot break biometric sensors. And that means bimetric identification is the tool of the next generation. 


https://fromplatoscavetoreality.blogspot.com/2022/10/why-is-strong-identification-important.html

Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

Terrifying visions of genetic engineering.

 Terrifying visions of genetic engineering.  The modern Hounds of Baskerville ABW:s (Advanced biological weapons are the modern Hounds of Baskerville. The term ABV means the animal which is genetically engineered. And which is controlled by using some interactive electronic systems. There is a possibility to connect the action camera to dogs collars. And transmit commands to that animal by using electronic systems. Spoken words can use to the commands.  Or they can be a series of sounds that are stored in the sound files. When the operator activates a certain file that sound means a certain command to the animals. There is the possibility to automatize some commands by connecting the system to the image recognition tool. When the action camera sees something that is stored in the memory of the computer. That system sends the coded order to the animal.  Nanotechnology and genetic engineering are the most lethal combination in the world. The ABW:s (Advanced Biological ...

The story of (Northrop?) TR3A "Black Manta"

    Image I The story of (Northrop?) TR3A "Black Manta" Sometimes there have been discussions that the mysterious TR3A "Black Manta" was a study project for the B-2 bomber.  That means that TR3A was used as the flying mockup for testing the aerodynamic and control solutions for the B-2 "Spirit" bomber. The thing that supports this thing is that the manufacturer of both planes is Northrop corporation.  Along with "Aurora" was flying one other mysterious aircraft, TR3A "Black Manta". The system is described as the "Stealth VTOL" (Vertical Take-Off and Landing) aircraft. Unless the mysterious TR3B, the Northrop TR3A is the conventional VTOL-aircraft, what is using regular jet engines, but what has the stealth-body.  Image II The thing is that the stealth-reconnaissance aircraft, which uses a similar technology with the Northrop B-2 bomber would be an interesting part of the weapon arsenal. There is a possibility that the TR3A was...