Showing posts with label Payment. Show all posts
Showing posts with label Payment. Show all posts

Tuesday, August 7, 2018

Why there is no this kind of payment application? (QR-code on the screen)


Picture I
https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

One of the most simple applications, what can revolutionize payment process is missing. This application would make the mobile telephone "easy to use" for payments, and it's so easy, that nobody ever thinks about it. This is the application, what makes QR-code on the screen, and after the customer has used self-service cash, would this person just open the application and read the QR-code with the same tool, what is used to read the codes from the products.


This application might give advanced security because it could be made that way, that it uses fingertip recognition in this process. In this case, the fingertip detector would confirm that the telephone is in the right hands, and then the customer would read the QR-code, and after that, the payment would be moved in the phone bill, and that kind of applications would allow leaving the wallet to the home. The security in those devices is much better than old ones, and that makes them safe.


Of course, there would find the persons, who want to use cash, but this would be the nice new way to use the mobile telephone. This could also allow using new ID-card application, what would tell if the person, who uses mobile telephones "virtual ID-card" is the person, whose picture is on the screen. So that kind of software could be the future of the mobile payment, and they are so easy to use, that they could be the similar group of users with the modern payment applications.


QR-codes are easy to use, and there is nothing mystical in those things. They could be changing every time when this application is in use, and the system could ask from the mobile telephone, that the thing, what is used is the mobile telephone. This eliminates the change to use pictures for that purpose. This means that the system would take the connection to that phone, and make sure, that this particular phone uses application.

Picture I

https://www.lg.com/us/images/cell-phones/md05603107/gallery/k373_medium_01.jpg

Saturday, July 7, 2018

Why scuba-diver Lionel "Buster" Crabb vanished in Portsmouth harbor in 1956?

Sverdlov-class cruiser
(Picture I)
http://gamesandtehories.blogspot.com/p/why-scuba-diver-lionel-buster-crabb.html

Kimmo Huosionmaa

There is a strange story of the experienced scuba-diver Lionel Kenneth Philipp Crabb (1909-1956), who was working in the mine disarming unit in the Mediterranean and Portsmouth. This man was experienced scuba-diver, who worked in many risky missions during the WWII and after that. He was the member of the Royal Navy voluntary reserve and got the military rank Lieutenant Commander. In his biography has mentioned, that this man was the quite interesting person, who lived alone in the sleeping car, and wore always number one uniform.


This man used captures Italian diving suit, and he was working after the WWII at Palestine for disarming the mines what the Jew divers have put in the keels of the ships at the harbors of Palestine. When we are thinking about the vanishing of this man in the Portsmouth harbor when this man worked for MI-6 and spied the Soviet "Sverdlov-class" cruiser's underwater structures. This has been caused rumors about this case, that this scuba-diver was killed by Soviet frogmen, but there would be many people, who think that this case is still open. Nobody confirmed this man, named Koltshov claiming.


One Soviet diver told, that he cut the throat of  Crabb in the Portsmouth harbor, but he didn't have any evidence about that claiming, that Crabb was putting mine near the keel of the cruiser "Ordzhonikidze", what brought the leader of the Soviet Union Nikita Khrushchev and Nikolai Bulganin to Great Britain to meet the prime minister of that State. There is the possibility, that the cruiser used it's engines suddenly, and then Crabb was killed by accident when he went too close to the propel. another explanation would be that Crabb was captured by the Soviet Union, or he might jump in that land. But there is one thing, what makes this case very interesting. Why MI-6 needed to pay for that man?
Lionel Crabb
(1909-1956?)
(Picture II)


They were operating in the Great Britain territory, and that service could be given that mission to the company of SBS-scuba divers, so what was the reason, that they used Crabb in the very difficult mission. If Crabb moved to the Soviet Union voluntarily, was he made that because he didn't get the honor, what belonged to him? Was he disappointed with Great Britain, because they didn't give him the rank or position of the "real officer"? Or did he took the part of some secret operation, where were planned to put the mine under the keel of that cruiser?


Was the purpose of the mysterious "Operation Portsmouth" put the mine under the keel of that cruiser? Or was the thing, what were meant to put under the keel some kind of recorder, what would record the talking, what was made between Khrushchev and Bulganin? And in the same price would the British Intelligence get the voices of the machines of that cruiser. There is the possibility, that Soviet Spetsnaz scuba-divers were noticed Crabb under the ship, by the underwater TV-cameras, and then they were moved in the water probably by using an underwater airlock because nobody noticed anything from the beach.


There must be persons, who would make the alarm if they see, that some scuba-divers would come to the deck of the Soviet cruiser. But as I told, the case is still open. Even if one handless and headless body were found at the beach, and some friends of Crabb noticed the scar on the knee of the body, what was similar, what Crabb had. But the recognition was not sure, and this is the reason, why, Lieutenant  Commander Lionel Kenneth Philipp Crabb is still missing, and this case is quite mysterious. He was heavy drinking, and when we are talking, that this man was actually ordered to reserve, because of personal problems, could that cause the depression and self-destruction of this man, who served in dangerous missions at many places around the world.

https://en.wikipedia.org/wiki/Lionel_Crabb

https://en.wikipedia.org/wiki/Sverdlov-class_cruiser

Picture I

http://www.ww2.dk/new/navy/images/sverdlov.jpg

Picture II

https://en.wikipedia.org/wiki/Lionel_Crabb#/media/File:Lionel_Crabb.jpg

Tuesday, June 19, 2018

The thoughts about "WikiLeaks"



http://metsantarinoita.blogspot.com/p/the-thoughts-about-wikileaks-kimmo.html

Kimmo Huosionmaa

The thing what might seem nothing may have more meaning, what you ever imagine, and this is the very good way to think when we are going to make little information leak from the NSA. We might want to use some well-known homepage for that action, and why don't we choose the "Wikileaks for that thing, where we would release 2000 pages top secret material to those servers.  The question, what becomes important in this case, is who pays Assange's phone bill?


Of course, there seem to be many servers around the world, what would support that kind of actions, and the next thing, what might be interesting is, who pays the electric bill of those departments, where those servers would stay? Those questions are things, what is very important when we are making the data leaks to the Internet. Also, when seeing that Mr. Assange is traveling very much, we might want to know about who pays for those tickets?


In the real life there are many ways to screw up on the Internet, and one is to make data leaks without thinking those questions because in the worst cases, those servers can be actually "honeypots", what tracks the persons and their IP-addresses from the Internet, and there is one thing, what makes me believe that at least one part of this network is meant for use as the "honeypots", and it is, that none of those servers are isolated from the Internet. This kind of network, of course, should be attractive for the persons, who want to share secret or confidential information across the Internet.


And the technology, what is used in that kind of devices is very nasty. That server could sometimes track the deliverer of that information in seconds, but there is the very big possibility, that this server would deliver a different kind of information for the computers, what is used by leaking the data. Sometimes those "honeypots" would start to round the data, what is meant for the deliverer of the data thru them, and that allows making the illusion, that those data, what the deliverer have sent actually seen in there.


"Honeypots" are trap servers, what mission is to track the hackers, and some of them are copying the IP-address of those computers, but some of those servers can also track the place of the computer, and take the control of those devices cameras and audio-system. They can also connect the computer viruses to the material, what is delivered from that system, and that might collapse the computers, what is downloading the material, and those viruses can be connected to the PDF-documents. Some of them might open the back gate to the system, and the honeypot can now track all data, what is delivered to that computer. In this case, the tracking software would set every data package, what is delivered from that computer the tracking cookie, what would guide the data packages thru the tracking server.


Then somebody starts to leak the information to the Internet, would the "honeypot-server" just set the little cookie in that internet connection. This cookie would set the stable IP-virtual server in that system. And even if the user of the computer uses dynamic-IP, what means that the IP-address of the system changes every time when it would put on, would there still be stable IP in somewhere at the net, and when this computer would put in the net, would the data start to surround thru the "honeypot".  The meaning of this operation would be provocative other leakers to put their information to that server, what would help to track those persons.

Friday, May 18, 2018

What mobile payment means for personal data security and privacy?

http://crisisofdemocracticstates.blogspot.fi/p/what-mobile-payment-means-for-personal.html

Kimmo Huosionmaa

When we are thinking about data security and mobile payment, we must know that there is the new wave of discussion about privacy on the Internet. The mobile telephone can become the new combination of wallet and ID-papers, and when we are thinking the things that way, we must know that this makes strong identification of user easier and harder to break than ever before. The mobile telephone can get the biometric identification algorithm like fingerprints and face image from official authorities, and then this telephone can use them for verifying the telephone user's information, what it would get from the camera and fingerprint detector.


And when the user wants to take new telephone in use, this person takes the selfie and then gives the fingerprint to that telephone, and if they match with the data, what is stored in the police files, the telephone can be used as the strong ID-card, what is very safe for payments. If some wrong person takes this telephone in the hand, would it make alarm?


Of course, hackers can break this system, but same way normal credit card can be tracked. When we are thinking about the privacy of the user of this system, we must say that every shopping and other payments, where is used credit- or bank cards can be tracked to some particular person. Same way the paper money can be tracked by using serial numbers and compiling them with the bank cards, what were used in bank automatics.


Privacy is the very interesting question, and always we forget the golden rule of the data security. Never make exceptions, and if you want to keep some payments hidden, don't use Market's customer cards, where you can collect points. And ever buy any of the products, what you want to hide, from the place, where other people knows you. The persons who are looking targets for surveillance would also look for exceptions in the way of payment. If some person uses credit- or bank card all the time, the use of the cash automatic would give the tip for those persons, that this person is planned to buy something, what this person wants to hide.


And as you see, the privacy is the problematic thing, bank or credit cards are the safe way to pay because even if they were stolen, the thief would not do anything with them if they would not get the PIN-code in their hands. The big number of cash makes person easy target for robbery and thief, and this means, that even if cash is safe in the point of view of privacy, but also that makes the person exposed to physical violence.


This is one point for mobile pay and mobile id-card. And they might be real in the near future when we are talking about the situation, that we are leaving our wallets home, and use the mobile telephones in every action, what were used by cards, which were found in wallets. Technology for that advantage already exists, and the attitudes with some limitations of laws what limits to delivering official data to the mobile systems are limiting the use of the mobile telephone for every action, what was used by the ban- and ID-cards.


https://www.mtv.fi/lifestyle/digi/artikkeli/tuleeko-puhelimesta-uusi-kukkaro-mobiilimaksaminen-voi-korvata-kaikki-kortit-ja-kateisen-vastuuta-on-myos-kayttajalla/6914478#gs.RwXKmQI

http://crisisofdemocracticstates.blogspot.fi/p/what-mobile-payment-means-for-personal.html

What was before the Big Bang. (Part II)

  What was before the Big Bang. (Part II) "Our universe could be the mirror image of an antimatter universe extending backwards in time...