So how did I manage to make the new system I created secure?
It was very simple.
If anyone enters the computer room but me their signal is cut and their body falls down dead.
What if they get into a transporter room like this one...
It has a large touch screen left wall. computer on the right, you can just see the black box there bottom right and another screen that uses the mouse and keyboard.
So it has handprint recognition for now but could require iris scan, your eye, as well and even face recognition. And then some other features from sensors like how many heart beats are in there.
But you get in, so now what?
Well you access the computer lets say it has fingerprint log in, well you brought someone's hand with you or wax duplicate off the handprint screen, and you access the computer.
So what is it you want to do?
You want to open a stargate to the airship to get at the server.
Does your hand print have clearance for that? No.
So the system says someone just tried to get into the computer room, and so security is alerted.
That would be bad for that person, they would be what my daughter Tallia calls 'distapeared.'
So being careful they try to just get onto the airship, since surely many people would try that for no reason other than wanting to visit.
Security is alerted. lol
Now they are watching you.
But you have some sort of mask and are hi9ding the hand you brought in, and somehow Tom Cruise got past all of that.
So he sends the handprint and the name associated with that hand print.
He might get onto the airship, it's a stretch since security is watching.
And so then what?
Well he wants to get into the server.
It is not in that airship. The airship that other people can access is a copy that does not have a computer room.
Once again the airship computer resets.
So anyone on the airship now is on their beach towel.
Anyone without a body save location is what Tallia. "They get distappeared"
Ok so what if they aren't Tom Cruise? But a fully trained computer hacker from a Russian basement?
So they try to access the com server which takes the handprint and name for clearance level to open doors.
The com server wants a form.
A name and a handprint and that is all it wants all it will accept and that's all it knows how to do.
You try to send it gibberish, security is alerted, or it resets.
Or both.
All it knows how to do is to get an email that has a name and a handprint.
It doesn't know how to do anything else.
How are you going to hack it when it just doesn't understand what you are talking about and only accepts in house emails.
No back doors no nothing.
What if you intercept the wi fi transmission.
Well the handprint will look like this...or similar using encryption.
How long would it take for a supercomputer to figure out how to turn that back into an image?
Forever.
And it might end up making numerous images.
Who would ever say that was the right image that it made?
So what you try 5 times?
lol
Try once and security is alerted.
What was the key used?
An outdoor photo.
Can you ever reproduce a photo of a garden that is an encryption key?
Never.
So forget about intercepting the wi fi.