Skip to main content

Strange things about WikiLeaks

https://metsantarinoita.blogspot.com/

Kimmo Huosionmaa

WikiLeaks has brought to the people know the things, what the government would want to hide, but there is one big mystery in this website: why it is not banned by DDOS-attacks? When the governments and private security corporations Emails were delivered to WikiLeaks, it was targeted the short period DDOS-attack, and in some claiming, some of the files were removed or changed during the attack, and in those files were some very interesting knowledge of the co-operation between governmental and private security corporations, what are actually intelligence agencies.


Somebody has even claimed, that the  CIA has been behind the WikiLeaks and the reason, why almost all the files, what are published in those sites are American origin, but the thing is made for confessing the audience, that the USA would be the primary target for those uncovered secrets. This means that the purpose of publishing those papers is meant for countenancing the persons, who want to steal the papers from the Pentagon or NSA send them to WikiLeaks, where counterintelligence has very easy to find those documents, and then I must say that those files can be used to track the information thief.


This means that in every single file may have the unique code, what is unseen for normal computers. But if the person has the right program, would the number of the handler be seen on the screen. And that number allows tracking the person, who has been downloaded that file, and also foreign partners have their own numbers, that the NSA can track the persons, who deliver the secret material to the Internet. That's why those papers must no be delivered to the Internet.


Those PDF-files seems like the normal, but the NSA:s main computer makes there the covered digital signature in those files. That's why everybody must know, that there are many secrets, what is very interesting, but those papers are meant for confidential. And in the real world, we must ask, is it better to track people by using electronic equipment, or is it more comfortable to make a very large police force, what comes to the people's home for searching the missing persons. This is one argument for supporting the surveillance of the people. But sometimes is clearly seen, that the terrorist attacks are supporting the growing security business.


Those corporations collect very much data, and that can be used for many things. If the information, that is collecting by using Trapwire, would contain business secrets, and somebody would sell those secrets,  some corporations will get very much benefits in their work. And this is one of the most concerning things in the world. If some private intelligence would sell those pictures and data, that would give the very good position for that corporation, that buys those pictures and data from the security corporations.


If some corporations would get too close cooperation with the government, that company would allow accessing the data, what is only reserved for governmental purposes. This means that the surveillance cameras can also collect data from the screens, and in those cases, there would be no sign of the security leak. So those servers data security, what operates surveillance cameras must be extremely highly secured. If the information would leak from secured areas, the benefits, what some company would get are extremely high.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that