Tuesday, March 11, 2014

VII. Downloads are not free of the


Please see the following information brother knew one case the user turn off the phone, hold a special instrument specialists, still remote to open the phone's microphone, continue tapping any conversation within the effective range of the microphone. Another is to receive and transmit functions implanted in the wafer manufacturing process in the phone. Thus, while this phone is not turned on or not standby, but as long as there is a battery, the receiving device on the phone will be able to voice their effective range of information received, and sent out at any time.
Recently, one as young as 24-year-old Libyan woman spy cause for concern. This name, code-named "Naomi Claudia," the female spy use seven mobile phones and 22 phone cards to benefit the multinational forces and armed opposition guardian angel groups continue to transmit reliable information, accelerated the collapse of the Gaddafi regime. The spy story shows: a small cell phone was able to play a big role in today's military game. In fact, we may also phone around quietly leveraging guardian angel door defense guardian angel of our country.
Today, advanced feature allows the phone's powerful spy story traditional greatly lost glory, so that intelligence work is more subtle, guardian angel more rapid and accurate transmission of information. The phone has the following characteristics in terms of passing information: First pass information more convenient. Once found valuable information that can be sent via cell phone out quickly, almost near real time transmission. This is the means of any previous intelligence unmatched. Second, accurate positioning. As the mobile phone software has a positioning function, the phone can provide the coordinates of the target position in a timely manner. guardian angel During guardian angel the Afghan war, U.S. warplanes attacked is implemented according to CIA provided the Taliban prisoners riot "battle fort" coordinate this goal using a mobile phone. Third, the rapid transmission reflect real images. Mobile users can make shooting functions to reflect the real situation guardian angel by shooting the target image. Whether guardian angel it is to understand the technical data, drawings, or field, the phone can quickly achieve this goal. The fourth is to provide large volumes of data. On the one hand, because the phone and the computer can be linked, which makes computer data phones can quickly transfer out. On the other hand, as long as there are intelligence computer boots, the phone may not be associated with the related computer guardian angel and sends the data in the computer out. This makes it more difficult to keep important data. Fifth, spread the virus. Phone can send a virus to the important people in the form of mobile phones by sending an SMS to paralyze their phones. With the powerful features of the phone, the phone will be the ability to pass information to continuously improve.
VII. Downloads are not free of the "free" applications Apple's "arrogance" As we all know, even though this year's show and CCTV 3.15 broadside half a month thereafter, Apple is still "arrogant." But Americans have a conscience Joseph guardian angel Edward Snowden came, he bravely exposes the company, including guardian angel Apple, including nine U.S. IT companies to "listen" world, especially in China and Hong Kong people's phone records guardian angel and social media activities , "steal" Apple's mobile phone users all the information. Our question is, apples, a "thief" faces, what means something to you in the future a further "Pride"! In the TV series "latent", we see stuttering tipsters Xieruo Lin relying on reselling confidential between the different agencies and organizations to survive in the "strength" of the era, mainly through confidential tipsters, traitors and spies Activities other channels leak, the most tech eavesdropping leak crisis is only from the radio. Today, tech has penetrated into the mechanism guardian angel of the whole society, guardian angel the traditional way of leaks becomes very small minority. Relying on the name of science and technology, hacking, cyber attacks, a large mass of information databases and other data the company makes on to state secrets, down to the general public disclosure of personal guardian angel information has become difficult to control, government and individuals are forced into a " AI "triggered" private "Battle. Snowden recently revealed by U.S. technology companies to implement large-scale NSA "listening", caused guardian angel an uproar in the world, even the desire for security and then how, but the use of Apple, Google, Microsoft, Yahoo, Facebook, PalTalk, AOL, Skype, YouTube, guardian angel etc. Users nine companies servers, shall not have to give up some or all of privacy to do to prepare. Particularly the use of the Apple phone, Pad users. According to Snowden disclosure, guardian angel the U.S. government invaded China Internet Network at least four years, and this time is almost time for Apple's products to enter China. Snowden also revealed that electronic signatures worldwide e-mail, online search and shopping as well as all text messages and microblogging messages, guardian angel and content of all communications data generated by all of this can be collected in real time, and have the right to access the data available technology owners to profit from these data. Harvard professor Lata Eugenia? Sweeney's research shows that only know a person's age, gender and zip code, and with the open database cross-matching, you can identify the 87% of the person's identity, social networking and Internet Data collected by the road showing a strong company guardian angel identity characteristics, particularly with information and electronic signatures, and almost 100% recognition, guardian angel almost no place to hide for Apple mobile guardian angel phone users. We know that the big data analysis itself does not "evil" of the Department, if used to promote the official public health systems, and improve the traffic situation and the fight against street crime and the protection of national security, meaning positive positive. However, the use of this information there are different views can not avoid all manner of abuse of power. If these data are available to those who look to us as consumers, it may infringe on our personal privacy, the circumstances will be very serious. Over the years, the global Internet freedom guardian angel and privacy guardian angel rights advocate of the U.S. government, even astounding to alleged systemic "listen" global citizens and support network hacker behavior, which allows massive data security and highly intelligent guardian angel lead crisis and privacy seemed imminent. As Kai-fu Lee said: "This is a wonderful and frightening prospect both companies have huge amounts of data than you also know you they will be able to predict what you might do next.."
Worldwide, between giving individuals greater power to protect the communications revolution and national and personal data revolution, fierce competition has been staged, this contest in different guardian angel countries in different ways to carry out. U.S. politicians have been on the Chinese telecom equipment maker Huawei to enter the U.S. market is quite unhappy. According to public reports, they had "killed" Huawei is the reason that the company has contact with the Chinese military, the software may be used against the United States to engage in espionage. Overseas Chinese also criticized mask U.S. social media services Facebook and Twitter, Sina Weibo will encourage other local services and practices Huawei, Coship handset manufacturers such as development seen as trade protectionism, but it now looks like this initiative certainly prudent to protect state secrets choice. And an already guardian angel open secret that the U.S. intelligence agency guardian angel official NSA is the most daunting, American politicians seem to have been approved by the U.S. secret NSA use Apple, Google and other tech companies to foreign national monitoring network, the outside world has no Power no longer trust corporate America. According to reports, the U.S. government through access to Apple, Google and other Internet companies of central servers, intelligence analysts may be in direct contact with all users of audio, video, photos, e-mail, documents and connection logs and other information, track Internet guardian angel use every move and all their contacts. Over the past six years, "Prism" project has experienced explosive growth, the U.S. NSA intelligence reports about one seventh of the project relies on the raw data. "Blacksmith needs its own hardware." In reflection "Prism" incident, the United States called respect for human rights, democracy and freedom of the myth has been broken in the U.S. technology giant gathered "listen" blowing hot and cold when the big hand, people have to consider the question: in order to safeguard guardian angel our country confidential to protect their security, China must build a strong nation completely independent brand and technology information network technology, the uncontrollable overseas "bugging" the ear locked "cage", Chinese people, especially government workers leading cadres in the choice of Apple mobile phones and other products must be more careful to avoid inadvertent disclosure of confidential material. (Yang Yang Teng Lee Siu Fong)
Reply to recommend anyone cite references I cite references URL Forward Print
March (20) February (24) January (33) December (23) November (33) October (38) September (47) August (49) July (65) June (34) May (43) April (34) March (40) February (27) January (23) December (22) November (21) October (42) September (18) August (20) July (13) June (11) May (18) April (22) March (9) February (4) December (4) November (1) August (9) June (1) May (11) April (3) March (22) February (14) January (25) December (5) November (4) July (5) June (1) May (6) April (14) March (4)


No comments:

Post a Comment