Skip to main content

A couple of things, what you should know about a carrier IQ


Kimmo Huosionmaa

The thing, what is called a carrier IQ makes possible to track any mobile device, but that also allows actually to track any computer in the world, but this thing is not actually the reason, what makes this thing so frightening. This thing is allowed to make much more when it is connected to some other surveillance devices like surveillance cameras. The surveillance cameras allow taking pictures of the person, who is monitored, and also many things are basing the Carrier IQ.  Carrier IQ is like telephone number, it would help the routers and switches to drive the data packages in the right IP-address.

Carrier IQ allows tracking every single cellphone or other devices because the TCP/IP protocol makes the action, where after every single package of data would the device give the receive, that the all packages are successfully received. The normal thing is that when the server sends data packages to the receiver, would it send before every package the sum of the bits to the receiver. And after that, the receiver of the data transmission would send the sum of the received data, and this is the thing what causes problems.

The system can also the other data of the computer like the serial number, and this information can be used to track the person, who uses the computer.  Also, this protocol allows to see, what kind of films the user of the computer watches, and how long this person spends by looking the videos in the net. This data allows profiling every single net user, by using the data, what the device would transmit to the Internet. The thing bases, that the system knows every single movie clip, what the monitored person watches and homepage, where the net user visits.

For this action, what is called population, bases the matrix, that is made by using the information that is collected from a certain group of people. That group could be some ice-hockey players, military personnel or prisoners. After that, the data, what's collected from monitored person devices, and that can help profiler to make a profile the net user. And if the profile of the user matches with the group of serial killers or something like that, there would take the genome test of that person, because the reason for this kind of things is causing by the genome disorders.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that