Flashmag Digizine Edition Issue 68 April 2017 | Page 11

...............11..............

On February 3, 2011 IPV4 (Internet Protocol Version 4 a process allowing a machine to connect and browse the Internet), was officially saturated. This internet protocol allowed computers or any other electronic devices to access Internet, through Internet service providers. These providers with the IPv4 allocated to their consumers, a connection time over the Internet, using units of measurement such as the megabyte, while assigning them an IP address that allowed computers or mobile phones to identify themselves and Exchange the information with the rest of the Web. An address that was different with every new session on the web. It was the era of dynamic address. Since the IPV4 protocol didn’t have enough addresses to assign a permanent identifier, to each machine connected to the Internet, the interchangeability of addresses was the norm and this gave Internet users surfing the web, a certain anonymity.

"The information collected by tracking computers and other mobile objects can allow those who master the technology, to know your life in great detail"

If IPV4 is still used from time to time, it is no less important to remember that IPV6, which is gradually replacing it, allows to assign to each machine connected on Internet, a unique identifier with almost perfect traceability. The fundamental principles of confidentiality and freedom will now be part of another era. With the IPV6 now used by companies such as Facebook, Microsoft or Google, when they ask their customers to register their device to secure their account it is the digital fingerprint of the device which is thus kept in their data bank. The IPV6 lets you know which device connected to the network at what time and for how long, and better you can trace back the device user, by geolocation.

The information collected by tracking computers and other mobile objects can allow those who master the technology, to know your life in great detail. And the transitivity of the information collected is even more dangerous from your telephone number for example it is possible to know your social security number, the bank to which you are affiliated, your bank account number, as well as your Academic or medical history, to the list of foods you consume.

1984, the prescient novel by George Orwell published in 1949, has seen its realization now, when digitization is breaking all records. Also, the telecran, a kind of screen installed in every home, that in 1984, serves for the continuous dissemination of government propaganda and help to see and hear what happens in household, exist already in a range of products such as TV screens, watching and listening to you, interpreting your behavior to offer you programs related to the behavioral profile that they realize on you.

The totalitarianism of the infamous Big Brother, is revealed today by the practices of state intelligence agencies such as the CIA, which according to the latest WikiLeaks revelations, would be able to spy with its plethora of spy programs all those who use Goods and services produced by firms such as Apple, Microsoft, Google or Samsung. These programs are able to open, cameras and microphones, of your computer and mobile phone even when the latter are turned off.

However, the question Is how the CIA, which despite the 25 thousands agents working for the US government in the cyber field, ,