Weakness in security of computer hardware, operating system, installed software, mobile and WIFI, networks, smartphones, internet routers, IP (internet Protocol) and the magnetic stripe on cards, contact less (Wireless) payment and chip of bankcards or identity cards.

Facebooktwitterredditpinterestlinkedinmailby feather

Weakness in security of computer hardware, operating system, installed software, mobile and WIFI, networks, smartphones, internet routers, IP (internet Protocol) and the magnetic stripe on cards, contact less (Wireless) payment and chip of bankcards or identity cards.

We can see weakness in security of TCP/IP protocol, VPN solutions AES 256 bit encryption – https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

https://en.wikipedia.org/wiki/Triple_DES , Triple DES
https://en.wikipedia.org/wiki/RC4

HTTPS:// SSL (Secure Socket Layer) – Example: Heartbleed
https://en.wikipedia.org/wiki/Heartbleed
https://en.wikipedia.org/wiki/Transport_Layer_Security

Also, we see security of ID solutions like “One new code each time from security dongle for logging in or digitally signing documents” when logging in to webservice that it can be misused.
The architecture of computer hardware, operating system, web protocols, encryption and software network protocols, mobile network, router, WIFI network all have weaknesses in them that can be exploited with today’s knowledge and tools.

A completely new security and integrity (software and hardware) solution should be built for computer hardware, operating system, installed software, mobile networks, smartphones, internet routers, the magnetic stripe and chip of bankcards, contact less payment bankcards and security access cards.

With the architecture of todays system and reality around them, there is no 100 % secure solution out there in the entire world as I have seen.
If we are living inside a simulation like the movie “The matrix”, the system administrator of the simulation (Matrix) can read or change any passcode, encryption key, password, or network activity inside the simulation. Also, God could see the value inside hard drives or one-time code – security dongles, id solution security cards, memory, CPU, or network LAN (Local Area Network) and WAN – Wide Area Network/Internet.

Facebooktwitterredditpinterestlinkedinmailby feather

Leave a Reply

Your email address will not be published. Required fields are marked *