"Researchers show that ordinary WiFi signals can be used to create camera-like images of people in their surroundings, even if those people are not carrying active devices. Credit: Shutterstock" (ScitechDaily, Researchers Warn: WiFi Could Become an Invisible Mass Surveillance System)
The WiFi station is an interacting radio device. When we use technologies like WiFi and GSM (5G, etc.), we utilize similar technology all the time. The difference between 5G. And WiFi is how to log in. The 5G requires a SIM card, and the WiFi uses a network card. WiFi takes. And. Maintains a connection with computers using the MAC address and IP address.
When the computer makes first contact with the hotspot. It sends the MAC address to the system. Then the hotspot sends the IP address to the computer. Without that address, communication between the hotspot and the computer is impossible.
Those are the things that make WiFi “secured,” and the other purpose of those identifiers is to aim the data precisely. To a certain computer. This thing is important if the WiFi (WLAN) network uses roaming actions. The roaming. Means that when a user moves into the house. Roaming allows a computer to change. The access point.
The thing. That allows a computer to select the right information from data that travels across the air using the same frequencies. It is encryption and decryption. When a computer makes a connection. To a WiFi hotspot, that hotspot gives it the decryption and encryption key. Those keys allow the computer to select data packages. That is meant for it. When the computer moves to the other hotspot area, the hotspot checks the encryption key.
This allows for protecting data, but it also. Makes it possible to transport data. In the same frequency between multiple receivers. The GSM uses the same technology. And the SIM card is the key to that long-range WiFi system. The fact is that. The cell phone might not have a very long range. The GSM, like 5G base. It is in the hotspots and their cooperation with the cell phone. The 5G access points form the network of the access points. Some of those access points can have a connection. With the physical lines, but most of them operate wirelessly.
The WiFi stations can also make it possible. To track certain computers. The system must only know the IP address of that computer. And then it can use triangular measurement to track the computer. Then it can aim the surveillance camera at that point. This is one way to observe people. Tracking the 5G telephone and computer is a similar operation. The relay station, or access points, can be equipped with radio bearing systems. Those systems are actually the encrypted versions of the LORAN system.
The system uses a similar radio bearing antenna. That ship’s LORAN system is used to track the marine radios for finding its location. The radio bearing antenna. That is, the access point can track any system. That takes contact with it. The system. That is installed in the hotspot station, as one of its antennas, which can help the rescue crew. To locate the GSM that makes the emergency call. But. The same system can also detect cell phones and network cards that communicate. By using certain encryption keys.
https://scitechdaily.com/researchers-warn-wifi-could-become-an-invisible-mass-surveillance-system/

No comments:
Post a Comment
Note: Only a member of this blog may post a comment.