Rembrandt code - стр. 32
Ask me why I'm mentioning this. T of the level of technology that I have had to work with, and sometimes be a tester, part developer, is of such a high order that will cause you to distrust . For example, you have a cell phone, but you don't know all of its functions. I often use it as an example, because it is always with you, even more – it has become a part of your body ( accordingly, its micro version, implanted in your body and integrated into your nervous and cognitive system, will be welcomed; in other words, for many employees of ZASLON JSC it is already a necessary attribute of life and work). It entered our life very quickly. Imagine, even before your eyes the changes in the capabilities of technology are so rapid that some would have seemed to you a fantasy even years twenty years ago. What is there twenty, you do not have time to study the existing technologies, and not secret, civilian, as others appear. E if you as a child were told about the possibilities of your cell phone, because with it you can do what was once the dream of spies, just fantastic technology, – you would count … yes no, you would not, the time period matters. … you would not believe, and many of the programs capabilities would not understand . For example, a person who was born at the time of the birth of mobile communication and lived about a hundred years, not that would have s seemed fantastic in his childhood possibilities of technology to his old age, no, he simply, as I said, would not understand what we are talking about. And the rate of such transformations – changes in the capability of technology – will increase algebraically. Now I hope it will be easier for you to imagine the near future, when your mobile with all the technical tricks that are and will be become the size of a small pea, will be implanted directly into your brain, and it will begin to be powered by your body heat.
It is e surprising, of course, that it is possible to spy on people with the help of a cell phone . The remote activation of cameras and microphones is no surprise to anyone. And it is done almost officially, almost all the time. You even notice the strange appearance of advertising offers, not set in the search for services and goods, but just mentioned in the conversation. In you talk on the cell phone about something, and then you have contextual advertising on this topic. Even when the smartphone is off, it sends a signal to its base station. Many people try to change their address, their online data, with this stay anonymous. Now imagine yourself not on this side of the network, but inside it. In all your actions, whether it is sending emails, calls, searching for information, geolocation and so on, – all e is as if connected by a thread, which is seen by the programs that provide these opportunities. Accordingly, those on the other side of the network, who have access to the servers that connect all your locations to each other, see these connections and actions. And it's not a secret. Therefore, it is impossible to hide.