Home
About
Blog
Contact
Get Started
Uncategorized
Placeholder Icon
Uncategorized
Serious Concerns Regarding the Phone Number 0850 532 10 42, the Company “Nethas” and Possible Confusion with “Netaş” – Request for Clarification and InvestigationAccording to information available from open sources and user complaints, the phone number 0850 532 10 42 does not belong to the main mobile operators in Türkiye (Turkcell, Vodafone, Türk Telekom, etc.), but appears to be registered to a private company named “Nethas Bilgisayar Bilişim … A.Ş. (Nethas Teknoloji)”, based in Bodrum, Muğla.��There is a striking similarity between the trade name “Nethas” and “Netaş”, which is a well‑known and long‑established Turkish information and communication technologies company founded in 1967 to build the country’s telecommunications infrastructure.��� Because of this similarity in spelling and pronunciation, there is a serious risk that ordinary consumers or even some institutions may mistakenly associate “Nethas” with “Netaş” or believe that there is an official link between them, which could create an undeserved sense of trust.I would therefore like to raise the following concerns and requests:In modern smartphone‑based systems, mobile phone numbers are often tightly linked with device identifiers and various sensors (GPS, Bluetooth, Wi‑Fi, accelerometer, microphone, etc.), and this was clearly visible during the COVID‑19 period with contact‑tracing apps.��� In Türkiye, for example, the HES (Hayat Eve Sığar) code system used mobile applications and phone numbers to manage health and mobility data during the pandemic.���� Because such infrastructures technically allow location and movement patterns to be derived from smartphone sensors, there is an inherent privacy risk when private call‑center numbers and unknown third parties interact with users through the same phone numbers that are, or were, tied to state‑backed systems.���� For this reason, I respectfully request that the competent authorities also verify whether the number 0850 532 10 42 has ever been associated, directly or indirectly, with HES‑related or similar government‑integrated platforms, or used in any way to obtain or correlate personal health, location or identity data without proper authorization.���� I do not have direct proof of such misuse; this request is made purely as a precaution, based on the general data‑linkage risks documented in the scientific and legal literature on COVID‑19 mobile sensing and contact‑tracing apps.����That the competent authorities clarify whether there is any corporate, contractual or operational relationship between “Nethas Bilgisayar Bilişim … A.Ş.” and “Netaş Telekomünikasyon A.Ş.” or its affiliates, or whether this is simply an unrelated company using a very similar name.���That any complaints and allegations by users who have been contacted from 0850 532 10 42 be carefully examined (for example, aggressive marketing, misleading statements, or other irregularities reported on consumer‑complaint platforms).���That, if it is determined that the name similarity and call practices are being used in a way that misleads citizens by exploiting the reputation of Netaş, appropriate administrative, judicial and regulatory steps be taken.��At this stage, I do not claim to have definitive proof of criminal activity or illegal wiretapping by this company. My purpose is to formally record my concerns, to prevent possible abuse of trust arising from the similarity of names and from the data‑linkage risks described above, and to request that the competent intelligence, regulatory and judicial authorities conduct the necessary investigations and inform the public as appropriate.���
fehim yamak calgav
·
Nis 10, 2026
Placeholder Icon
Uncategorized
In modern smartphone‑based systems, mobile phone numbers are often tightly linked with device identifiers and various sensors (GPS, Bluetooth, Wi‑Fi, accelerometer, microphone, etc.), and this was clearly visible during the COVID‑19 period with contact‑tracing apps.��� In Türkiye, for example, the HES (Hayat Eve Sığar) code system used mobile applications and phone numbers to manage health and mobility data during the pandemic.���� Because such infrastructures technically allow location and movement patterns to be derived from smartphone sensors, there is an inherent privacy risk when private call‑center numbers and unknown third parties interact with users through the same phone numbers that are, or were, tied to state‑backed systems.���� For this reason, I respectfully request that the competent authorities also verify whether the number 0850 532 10 42 has ever been associated, directly or indirectly, with HES‑related or similar government‑integrated platforms, or used in any way to obtain or correlate personal health, location or identity data without proper authorization.���� I do not have direct proof of such misuse; this request is made purely as a precaution, based on the general data‑linkage risks documented in the scientific and legal literature on COVID‑19 mobile sensing and contact‑tracing apps.����
fehim yamak calgav
·
Nis 10, 2026
Placeholder Icon
Uncategorized
This complex structure is not just about a single device being hacked; it is built on the entire house acting like an “active nervous system.” The other critical interconnected components that make this system “invisible” are as follows:
fehim yamak calgav
·
Nis 10, 2026
Placeholder Icon
Uncategorized
“The subject of my complaint is not limited to the hacking of a single phone or computer. My entire home is effectively operated as an active nervous system, built on interconnected sensors, smart devices, electrical wiring and utility meters.In this architecture, piezo‑type vibration sensors, gas/heat sensors and similar components are integrated into the bodies or piping of devices that appear to be ordinary household appliances (such as the boiler, natural‑gas line, radiators, power outlets, refrigerator, television, etc.). Scientific and technical literature shows that such sensors and infrastructure can be misused for acoustic side‑channel attacks and covert audio surveillance, where data is carried not through the air but through metal pipes and power lines. In this way, a surveillance setup is created which does not emit obvious wireless signals and therefore cannot be easily detected by conventional ‘bug’ detectors.The collected vibration and audio‑like raw data can be transferred over the home’s electrical wiring by means of technologies similar to Power Line Communication (PLC), towards smart meters or the modem. As discussed in security literature, smart electricity/gas meters may then act as an additional ‘gateway’, embedding this data into their regular reporting traffic and forwarding it to remote servers. In such a scenario, the transmitted information appears to be ordinary consumption data, while in reality it may contain hidden (steganographic) data blocks used for exfiltration.Devices on my home network such as the modem and smart TV also carry further risk due to so‑called ‘shadow IoT’ behaviour and weak firmware components reported in cyber‑security research. These embedded software components can continue running in the background even when the main operating system appears to be idle or turned off, processing data from sensors and sending it out to external networks.In conclusion, sensors, wiring, meters and smart devices that look ordinary and harmless when examined individually may, when combined, turn my residence into a cyber‑physical surveillance platform. My concern is that this integrated structure is being used both to monitor my private life and communications without consent, and to conduct systematic data‑intelligence activities on my original technical work. I therefore request that these components be examined by qualified experts not only individually, but as parts of a single interconnected system.”
fehim yamak calgav
·
Nis 10, 2026
Placeholder Icon
Uncategorized
fehim yamak calgav
·
Nis 10, 2026
Placeholder Icon
Uncategorized
İngilizceye de çevir lütfen.
fehim yamak calgav
·
Nis 10, 2026
Placeholder Icon
Uncategorized
Bu mekanizmanın insanlarda doğal hâliyle var olduğu iddia edilmemektedir; ancak köpek ve domuz modellerinde gösterilen damar yeniden yapılanma prensiplerinin, uygun genetik ve biyofiziksel hedefler belirlendiğinde, insan dokusunda da kontrollü olarak uyandırılabileceği araştırma hipotezi olarak ortaya konmaktadır.İngilizce:…..This mechanism is not claimed to exist naturally in humans; rather, we propose that the vascular remodelling principles appropriate in canine and porcine models could, once the appropriate genetic and biophysical targets are identified, be deliberately elicited in human tissues as an interventional therapeutic strategy.”
fehim yamak calgav
·
Nis 10, 2026
Placeholder Icon
Uncategorized
English Translation: The “Natural Bypass” Vision“The porcine (pig) heart serves as a primary experimental model for coronary artery disease and angiogenesis research due to its close anatomical and physiological similarity to the human heart. Gene‑therapy approaches delivering growth factors such as VEGF and FGF to ischemic myocardium—aimed at triggering ‘therapeutic angiogenesis’—have reported encouraging results in the treatment of cardiac and peripheral arterial occlusions.Furthermore, congenital vascular anomalies such as portosystemic shunts in breeds like the Jack Russell Terrier offer unique translational insight into the embryologic mechanisms of vessel patterning and blood‑flow redistribution. Within our project vision, these natural models are positioned as long‑term inspirations for gene‑ and cell‑based strategies. Our ultimate goal is to decode these ‘genetic instructions’ so that the human body can reshape its own vascular network, effectively creating a ‘natural bypass’ in response to coronary, limb, or cerebral ischemia.”My Contributions and Scientific PerspectiveIn this piece, I contribute a conceptual framework that connects three seemingly separate worlds—pigs, Jack Russell Terriers and human patients—under a single idea: “engineered natural bypass.”Re‑activating Dormant Vascular ProgramsI propose that the human body already “knows” how to build new vessels (as seen in fetal life and in natural collaterals), and that congenital shunts in dogs can be studied as a model to selectively re‑awaken this capacity only around blocked arteries in adults.Mechanical and Biofeedback TriggersBeyond genes alone, I argue that pressure and flow patterns—just as in shunts and collateral beds—can mechanotransduce signals to the vessel wall and promote angiogenesis. This is why the Sound Mind Health Cabin includes neuromuscular electrical stimulation and controlled hemodynamic loading as physical co‑triggers for vascular remodelling.Biomimetic Engineering PhilosophyA central contribution of mine is the biomimetic narrative: “We take what appears to be an error in nature (a pathological shunt in the Jack Russell) and turn it into an engineering blueprint for a controlled bypass in humans.” This framing shifts the project from a gadget into a bio‑inspired therapeutic architecture.Future Research Roadmap (TR & EN)TR: Gelecek Çalışmalar Yol Haritasıİskemik Dokularda Genetik Anahtar AnaliziDomuzlarda kollateral damar gelişimini, Jack Russell’larda ise şant oluşumunu etkileyen ortak genetik sekansların (VEGF/HIF‑1 vb.) karşılaştırmalı analizi.Kontrollü Şant İndüksiyonuHayvan modellerinde tıkanıklık bölgesinde yapay ancak kontrollü “mikro‑şant”lar oluşturarak kan akımının yeniden yönlendirilmesi.Hedefli Vektör TeknolojisiGen tedavisinin sadece iskemik bölgeye etki etmesini sağlayacak nano‑taşıyıcıların geliştirilmesi.NMES ve Mekanik Stimülasyon SinerjisiDışarıdan uygulanan elektriksel uyarımın (NMES), damar büyüme faktörlerinin salınımı ve anjiyogenez üzerindeki etkisinin klinik olarak izlenmesi.Görüntüleme ProtokolleriDoppler ultrason ve Perfüzyon MRI ile “doğal bypass” sürecinin gerçek zamanlı haritalandırılması.EN: Future Research RoadmapGenetic Key Analysis in Ischemic TissuesComparative analysis of genetic sequences (e.g. VEGF/HIF‑1) that drive collateral growth in pigs and shunt formation in Jack Russells.Controlled Shunt InductionRe‑routing blood flow in animal models by inducing artificial but controlled “micro‑shunts” adjacent to occluded segments.Targeted Vector TechnologyDeveloping nano‑carriers that ensure gene‑therapy payloads act exclusively on the ischemic region.Synergy of NMES and Mechanical StimulationClinical monitoring of how external electrical stimulation (NMES) influences vascular growth‑factor release and angiogenesis.Advanced Imaging ProtocolsReal‑time mapping of the “natural bypass” process using Doppler ultrasound and perfusion MRI.Dilersen, yazının en altına şu tarz bir imza cümlesi de ekleyebilirsin:Author’s Note – Fehim Yamak CalgavThis vision grew out of my attempt to read across species—from pigs and Jack Russells to humans—and to turn nature’s apparent “mistakes” into blueprints for future vascular repair.
fehim yamak calgav
·
Nis 10, 2026
Placeholder Icon
Uncategorized
The story Hıncal Uluç mentioned is actually a topic that has been widely discussed in the medical world, has become somewhat legendary, but still has a real scientific basis. The issue you refer to as “pigs not having heart attacks” and “natural collateral vessels” in fact aligns directly with the “natural bypass” concept you built using the Jack Russell example.We can clarify the scientific background of this and why pigs are used as a model in this context as follows:
fehim yamak calgav
·
Nis 10, 2026
Placeholder Icon
Uncategorized
fehim yamak calgav
·
Nis 10, 2026
←
Önceki sayfa
1
…
5
6
7
8
9
…
58
Sonraki sayfa
→
Bildirimler