Skip to main content

Hiding identity in the network

https://kimmontaidearvioita.blogspot.com/

Kimmo Huosionmaa

Almost every day somebody would want to hide the identity because this person has been done something embarrassing on the  Internet. And somebody would make the thing, that they use those embarrassing web services only from the public places, and use the Google or Microsoft account, what they will not open in the home or workplace. Those persons would think, that nobody knows, who they are.


But those places, where the person uses the Internet, would be targeted by surveillance cameras, and then that allows that security team can look those people straight away when they notice the use of the Internet. They must just point those cameras in that area, where the user is using network services. And if there is only one laptop user at the screen, the identity of that user is very easy to find out the identity of that person.


This idea is wrong, the persons, who survey the Internet, would profile those persons by using the Data profiling, and if the account is used only in the public networks, that person might have something to hide. In the real situation, the surveillance team just sends the little cookie with some downloadable package, and this cookie would install the small program in that computer. That program would tell that some computer uses the Net when this computer would be connected to the Internet next time. And if that happens in the home, would the connection tell, who uses this computer, because the flat or house can be tracked by using normal tracking protocol.


 But the case would be more complicated if the hotspot will be installed to some flat without telling that thing to the person, who lives in that apartment, and this WLAN-station can be hidden behind some furniture or inside some walls. The hackers can use that hotspot for dirty things. The data security is the race between hackers and security. In some cases could the security team get the information about the computers serial numbers, and they can track the owner of that computer by using payment- or guaranteed data, what tells, who have bought this computer and guarantee services for it.


So this means that there is no change to hide the identity in the world of the Internet. In some cases, the antivirus software, what is loaded from the wrong net site would contain the feature, that it would remove all viruses, but those Trojan horses will send every single package of that data to the hackers, who might work in private corporations or under the government surveillance.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that