Monday, December 21, 2015

Control Barriers And Privacy Issues

Controlling computers is necessary for successful operation. It has also become a frustrating requirement.  Why? It's become necessary to safeguard the information  a person inputs - or suffer the danger of losing it to computer thieves (or hackers).  I've don't know an explanation for the term "hacker", but it's used  to describe a person with the ability to invade another somebody elses  computer. The computer industry reaction has been to erect barriers to prevent information thievery. To do this it is necessary to make several changes. 

Now there are: 
  • number codes, passwords, and PIN numbers, 
  • fictional and non-fictional identification words (or numbers), 
  • user names, e-mail numbers and ip addresses, 
  • and more that I'm not familiar with.  
These are used to protect even the simplest programs. For a while all of these "barriers" were stored in a persons memory. This eventually strained a normal person's memory - and coded programs and clever lists were specifically developed by professional programers - who have now found ways to hide them  complete behind other  (master) barriers like Apple's "iCloud". 

But have all of these "barriers" really solved the security problem? For a short while perhaps, but it looks more and more like any computerized information, no matter how encrypted, is still subject to hacker attack. Hacker technology has improved just as fast as the "barriers" could be introduced. This is frustrating, and potentially dangerous regarding national security, military information, financial information and personal privacy.

So, what new  "fix-it"  is in-the-works?

No comments: