Friday, September 24, 2010

Smart Phone Software Identification scrambling Coming to Prevent prying eyes

As more and more software applications for various types of smart phones available, and the iPhone, we will start to free applications, which encrypts information to identity and travel through these networks help to see. This is good and bad, bad if you try to track terrorists through their electronic serial numbers and record information on the local cell tower. And 'positive because it gives information about the user.

A manufacturer of smartphones is troubled because hiswhat they believe to be their proprietary software is now on, opened rewritten and always open source. It can be assumed that there will soon be the software that anonymize all your personal data online, and get information encryption in a way that no break in it. One can imagine that these things are not the intelligence of the industry is very happy, but she is very happy to have many of the light and how access to theseInformation.

Recently, India, the United Arab Emirates and Saudi Arabia all came hard on the Blackberry because it is a type of encryption that their governments can not enter data is used. If the government of India, you have a real problem, since the terrorist attacks in Mumbai, and used to communicate with mobile phones. If the royal family of Saudi Arabia If you're worried about a revolution, the last thing you want is a way for peoplewhich may also be planning attacks against encrypt the government, your communication during their attacks.

In the UAE, recently, a high-level foreign visit, was killed near the head of the individual at the state level in one of the hotels, and with it the certainty that officials prevent the ability to be smart-phone and transfers communications technology, things like access and protect the people who visit, or their government and their leaders for that matter.

If goodpeople's intentions to create open mobile operating system software applications that manage the people registering these special phones, as they try to work to help you through the creation of better ways of their mobile technology. But the mobile phone manufacturers are excited because the phone will never work again, each with the phone can decide to take it back for a refund, and are weakened by the open source community.

However, if youlegitimately buy the phone, you should have the right, in any way and want to unlock all its technology and skills to use it? No, actually it's wrong, because each of these communication devices registered with the Federal Communications Commission, and do not really have the right, even if you bought the phone - and may violate FCC, if you use the phone incorrectly.

Moreover, in doing so, you could make your own networks and groups,and linking and their friends. You can also phone the ability to, in some cases without the cell tower to talk about phones, and therefore the electronic serial number could not be pursued because the data, the tower does not have to go to cell transmission of information directly like a walkie - talkie.

This is worrying for the intelligence services, and those who seek to protect us from terrorists, but we want to live in an open society, and people really do notwant to be prosecuted or have privacy violated, even if it is a good thing as national security - because I am not a terrorist or rogue his knowledge, and hence no need for anyone to invade your privacy, right? Yes, I am your position and constitutional issues, see here, however, that point had to be done - of course.

Let's just say you want to climb your electronic serial number, when he said, bypassing the cell tower? Well, wellPoint, but also realize that a device is FCC registered! And that would not be advisable or legal, and if this was done, the phone could not be achieved in theory, oh it's probably but it would be worth it if you have a really bad person, and if so, would you be followed in anyway. Of course, if you're a good person does this, you should ask why? Red flag right there, you see that? Why are you trying to circumvent federal laws of communication?

But this idea ofAnonymity is a problem, because you know the caller ID blocking? Well, if the network picks up the caller ID for any reason, or stops it is very likely that no one bothers to answer your call in any case, as it is likely that only a sales call BS on their minds. So, any idea really scrambling up a red flag as to why this user is scrambling their identity, what are they hiding, what they fear, and who on earth is it? See this point, it's like Red FlagCity on several previous occasions.

Oh, that reminds me, let me tell you a story before I retired, I run a mobile car wash business with a 1 800 number and a shipping service. We had, at last, in this way because we have increased our business and have been operating in 450 different cities, with over 100 affiliates - so if the caller is a number-800 that we know where he would call from work, and a new route this request for service call to the phone operator, which istheir area. It 'was like magic, even in the early '90s was the hot stuff.

We then had some real problems with this, and we had a lot of problems with this because many people would call from the phone (think mobile phones really started in the 80s and 90s). So maybe you get an invitation to a car wash in Atlanta, but have since moved to Kentucky, but kept their old phone number. The franchisees or operators of mobile car washAtlanta was the fame, rather than the person in Kentucky, and you can see the problem.

Similarly, we can have a franchise that buyers could be in the Seattle Washington area, but the code was on his cell phone from Scottsdale, Arizona, where he would remain as snowbirds in the winter. The franchise buyer would want to call a car wash trucks in Seattle, when a concession for his son now lives in Houston, TX. Oh how crazy this gets, especially when you candid not want to sell a franchise in one of these cities or are already a franchisee.

Finally, the problems with this system have a 800 to be too large because the company has grown and more people are mobile phone users, and this time it was in the mid 90s. Previously, it was not a big deal at all - and back to the '80s and early '90s, when in 1990, 91, 92 and so on, almost everyone had a cell phone, and they were of their local environment on their surface cellular phoneIt was about the same area code, where they wanted services.

Now, why is this important? Well, if the phone scrambling for identification, because you do not want to know local marketing, or someone knows where you are, who you are or where we discuss all the information that the secrecy on the air - perhaps because so are you an executive committee and you know, lose Lips Sink Ships - Then other problems for themselves and all others involved, as they causetry to hide access to your user data, whether anonymous or not.

And you can understand why all these problems has opened a challenge to our national security, especially in the future, the smart phone operating system, work to protect the American people. Now there are many people who argue in this way you can avoid the possibility of a potential scenario "1984" Big Brother "type, and then OK to unlock your cell phone or smart software.

SoThe question is: let the data flow and communication in a chaotic and return to the people, yet disturbing at the end, they end up with all types of technology devices and the frequency of traffic trampling? Or do we want to find a way of hacking into the proprietary software that goes into every phone, smartphone, iPhone or any device technology staff with most of the people must be prevented in the next 5 years?

Apparently, even the Supreme Courtweighed into the debate, and think that you should be able to get out of proprietary software from say an iPhone, and use that were not approved or sold by Apple, which you use on your phone. Unfortunately, this also opens up another Pandora's box of unintended consequences and there is not much to talk about now, but I guarantee you will be in the future. Meanwhile, all unknown.

0 comments:

Post a Comment