Thursday, May 10, 2018
Beware this while using some voice command program
http://crisisofdemocracticstates.blogspot.fi/p/beware-this-while-using-some-voice.html
Kimmo Huosionmaa
How easy is to use voice commands in the mobile telephone. It's like in some "Star Trek" movie. If somebody wants to make very big and easy security leak to the smartphone, would that person need only some subliminal voice generator, and if the targeted person uses the system, what records the commands, what is given by using voice, would the mobile telephone become the very big security problem. Then somebody wants to teach some own commands to the mobile telephone, must this person need only some voice, like 80's techno-hit.
And then that person need only get the targeted mobile telephone in the hands in a couple of minutes. After this, that person might tech some tricks like publishing websites or using GPS to that telephone, and then that hacker must only wait for the right place and then put the music on. After that, the mobile device would automatically make records or publish websites without that the owner would even notice that. And of course, if those commands can be taught by using remote control, would that cause the situation, that the GPS system can be activated in some particular area.
After that this mobile telephone would be very easy to track. In the remote teaching, the hacker would need only two mobile telephones, what are connected to the same account. By using another telephone, the hacker would teach voice commands to another telephone, and in this case, the hacker would activate some chat-program like What's App, and then just record every world, what is told near the telephone. Even if those records are not very clear, the voice could analyze by using computer software, that uncovers every world, that is talked near the device.
This is one threat for the people, who uses mobile telephones. And somebody can teach those commands to the telephone in the house party, where the targeted person might pump full of some drugs like Sodium Pentothal, and after that, this person would tell any password, what the people want to know. The same chemical is also used in lethal injections. But that chemical is also capacity to operate as the "truth serum", and sometimes SOCOM uses it for terrorist interrogation and that might be very effective in this role.
https://www.facebook.com/IWCsync/posts/10156613717489406
http://crisisofdemocracticstates.blogspot.fi/p/beware-this-while-using-some-voice.html
Subscribe to:
Post Comments (Atom)
A quantum computer's biggest problem may have been solved.
A quantum computer's biggest problem may have been solved. "Illustration of a new strategy to create materials with robust quan...

-
"This artist’s concept depicts the central region of the blazar BL Lacertae, a supermassive black hole surrounded by a bright disk and ...
-
The image introduces how gravity or gravitational waves form when black holes orbit each other. Those black holes pile energy between them. ...
-
"The Universe’s most abundant ice isn’t formless—it’s secretly laced with crystals. And that might change how we think about water, pla...
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.