Godlike Productions - Discussion Forum
Users Online Now: 2,204 (Who's On?)Visitors Today: 539,840
Pageviews Today: 897,371Threads Today: 302Posts Today: 5,283
10:35 AM


Back to Forum
Back to Forum
Back to Thread
Back to Thread
REPLY TO THREAD
Subject THE MARK???....Beware of QR Codes...that pixelated block you see on everything and everywhere...3 cubes (6 sides) within the code...666...updated
User Name
 
 
Font color:  Font:








In accordance with industry accepted best practices we ask that users limit their copy / paste of copyrighted material to the relevant portions of the article you wish to discuss and no more than 50% of the source material, provide a link back to the original article and provide your original comments / criticism in your post with the article.
Original Message IMAGINE...Tattoo one of these on your forehead and/or hand…you get the point. Any type of surveillance camera, Smartphone or satellite can track you and process your identity.






...combined with IPV6 protocol in coding



...not to mention RFID.No Mark will eventually equal no security clearance...
No security clearance equals no access or service...


...The new face of terrorism could be person with a malicious code tattooed on their body walking into a bank. Ex-convicts may also be encoded to alert citizens via cellphone to beware. Easy to see where this will go, eventually everyone will need the mark to maintain good public order.

Some Facts....
Malicious QR codes combined with a permissive reader can put a computer's contents and user's privacy at risk. QR codes intentionally obscure and compress their contents and intent to humans. They are easily created and may be affixed over legitimate QR codes. On a smartphone, the reader's many permissions may allow use of the camera, full internet access, read/write contact data, GPS, read browser history, read/write local storage, and global system changes.

Risks include linking to dangerous websites with browser exploits, enabling the microphone/camera/GPS and then streaming those feeds to a remote server, exfiltrating sensitive data (passwords, files, contacts, transactions),and sending email/SMS/IM messages or DDOS packets as part of a botnet, corrupting privacy settings, stealing identity,and even containing malicious logic themselves such as JavaScriptor a virus. These actions may occur in the background while the user only sees the reader opening a harmless webpage.

[link to cnettv.cnet.com]

[link to www.denso-wave.com]

[link to www.denso-wave.com]

[link to en.wikipedia.org]

[link to en.wikipedia.org]

[link to en.wikipedia.org]

[link to en.wikipedia.org]

[link to en.wikipedia.org]
Pictures (click to insert)
5ahidingiamwithranttomatowtf
bsflagIdol1hfbumpyodayeahsure
banana2burnitafros226rockonredface
pigchefabductwhateverpeacecool2tounge
 | Next Page >>





GLP