When a scary dream is more

A lot of people have them, I do too, I just hd one and it scared me awake for some reason, and even now, one of the elements is already gone and my mind is fighting to hold onto the other thought, even though I am wide wake. It seems like the dreams are not giving up their secrets that easy, and it is a little bewildering. 

So here I am, in my dream, I meet a nice woman, she seems really nice, friendly and confused. She is confused as people are not calling her back and that is where this part is taking us, what we are not told. Changes that are a stage of what people think we should not need to know.

In this dream, I am learning that she has a 5G sim in her 4G phone, it seemingly works, but it only partially works, in the rear there are members of a nefarious organisation and they seemingly are aware that it would be possible to capture peoples hardware, autoforward their hardware and leave the owner unsuspected, a setting for large amounts of identity theft in 2023, as the bulk of our lives are going through a different device. You see, that thing you hold, that brick, that piece of plastic, it is not your mobile phone, not anymore. It has become your personal dat server and that is in this age a bit more powerful than you imagined and under 5G, taking a hold of finances and other means when you pump them through your mobile has consequences. So as I am pondering the dream, I see flares of the second dream. There I meet up with an old boss, he is wearing an old uniform jacket, like a bolero for men, shutting at the waist, the old Dutch uniform jacket of 1975-1980, some used to love them. The only thing I remember is that he had to remain aware in every room where the emergency exit was, it all went a blur after that, so here I am awake trying to figure out my delusions. So I started looking and through were several sources that are not worthy of mentioning, but Ericsson, with his setting gives us “The simple answer, under certain assumptions, is no. However, a complete answer is nevertheless trickier than just a yes or a no”, why can they not answer it: “Yes, if you have…. And no if you have the following situation”, why did I have to take notice of ‘a complete answer is nevertheless trickier’. 

And actually, their answer is surprisingly complete, and as I give you “While accessing the 5G system is one thing, the question we have is whether using the “new” security and privacy features of 5G requires a new kind of USIM other than Rel 99+ USIMs which could be used for 4G security. This is a valid question and something which we address below”, as well as “In 5G, subscription permanent identifier (SUPI) could be in two formats, one is the legacy format called international mobile subscriber identity (IMSI) and another is the format newly adopted in 5G called network access identifier (NAI). Furthermore, 5G provides at least two methods of authentication and key agreement (AKA) for accessing the network. One such method, 5G AKA, is an evolution of the authentication method in 4G. Another, called EAP-AKA’, is a method now widely adopted in 5G for broader use of the Extensible Authentication Protocol (EAP) framework”, which is interesting, I never knew any of this, I am literally learning this as I write the article, so why was the dream so unreal and partly scary? This is when I see “from the IdaM viewpoint, the Rel 99+ USIMs that could be used in 4G are still compatible with 5G, in that they can be used to authenticate and gain access to the 5G system. The main reason for this forward compatibility is the fact that there is no need for a new permanent security key shared between USIMs and the network”, as well as “5G has introduced significant privacy enhancements in terms of how permanent and temporary identifiers are used”, this optionally sets the stage for something really scary. What if the SolarWinds debacle is merely a test-run in getting some parts out there, optionally undetected? What if there is a run on copying all the data in some way because, as we see here ‘4G are still compatible with 5G’, I merely wonder what else is possible and why the dream scared me, more important, I knew nothing of this before now so how does my dream know? I have never seen an actual 5G sim before today, and as I see some of them, they are all vastly different, it also implies that the sim touches different points, in different cases, and I know that what I am seeing is marketing driven, but where is the reality? More important, what is the danger I dreamt of? If a person’s phone can be hijacked WITHOUT the owner knowing, what other dangers are their for their personal data servers? I worked on the IP to lower that danger, but it was merely a consumer driven IP, which aligned perfectly with something else, and here I am seeing that there is a danger, optionally merely a delusional one that is in the background, so I can pretty much kiss this night of sleep goodbye. 

Still, only 2 days left to get my groceries and most is done, but some parts I tend to leave to the last moment, that tends to be me. You see on the 24th many groceries start pricing down the stuff they cannot sell on the 25th for some reason and that is where my little profit is.

Still, my dreams seldom throw me to this degree and to be honest, when it comes to dreaming high tech and gorgeous women optionally scantily clothed, I still go for option two, even though I stopped being a teenager some time ago, well that’s me and for now I am considering something on branding for tomorrow, or the 25th, something happened and it puzzled me, but it is always a decent reason to dig into the matter and that I what I might do, yet for now, there was something on the dream that was more than delusional. It is not merely on what was done without our consent and knowledge, what happens when options like that become a larger stage of exploitation? What happens when EVERY sim is the first part of a tracker and 5G pushes us to allow for more, all whilst the evidence against us is legally not allowed to rely on data points to help prove our innocence? I will leave you to ponder on that element of the equation.

Leave a comment

Filed under IT, Science

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.