Skip to main content

How to map the social connection of some person?


Kimmo Huosionmaa

Do you know that Putin is three clicks away from you at the social media? This thing is investigated by some university, and that conclusion bases the claiming, that every person on earth would be two or three person thread from everybody, who uses social media. This thing makes us think, that in almost every person's social media network is some kind of intelligence officer.

Those officials serving for intelligence or police, and those persons mission is to find out drug dealers and other people, who are making criminal activities. The data, what is connected is problematic because it will uncover the real interests, what the users of the social media have. And the thing is, that connecting the information, what is collected from different sources can be used to make a very good profile of the targeted person.

And don't think, that if you have to pay for some solution makes it safe. Many of the solutions are free for private users, and that helps to control the sources, what are used to collecting information. Because firms must pay for the solution, that would allow filtering that kind of users away from the tracking lists. This means that intelligence services can target the tracking to private users or firms if the firmware solution is used for illegal activities.

There are many ways to investigate the social connections in social media, and one of them is to send the circular letter to that person and ask to deliver that message to all the social connections. The best way to make this thing working perfectly is to use some texts, what are very sensitive or makes need to show empathy. This is the best way to make people deliver those texts to other persons. This makes the social media very interesting place. And if someone would not want to deliver those circular letters, that will make this person sadistic and cold person in the eyes of other users of the social media.

So this is the short and sad story about the way, to find out the persons, who are members of some community. There is nothing wrong about the circular letters and some kind of stuff. But there is one very disturbing thing. They are always so sensitive, that they are going to disturb me, and the things, that some person would die in cancer are very sad. Sometimes there are asked money by using that kind of pictures and stories. And at the same time, they are causing negative for the people, who really need help, and here I'm writing about cases, where that kind of letters are shared because somebody wants to map the social connections. Those methods are strictly against the ethics and moral of the scientific work. And they are causing problems for people, who are in real trouble.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that