Revisiting Future Path

Chapter 255: Freedom to be manipulated

255th Manipulated Freedom

There are 75 group friends in the special chat group, 52 of which are online.

There is a small group in the large group, which is similar to the temporary conversation function of the QQ group. In order to avoid the fact that the main group's rapid information flow affects actual communication, we have set up special temporary conversation groups around different topics. The large group is very lively, and the small group is also very lively. They are all talking about the NSA toolkit incident that broke out at 12 o'clock today. Some focused on the macro impact, some focused on specific technologies, and some online cooperation targeted analysis of a hacker tool.

Read the chat content, the friends of this special chat group are all white hat hackers.

Compared with black hats desperately hiding their whereabouts, white hats pay less attention to privacy, and many white hat hackers use their real names to communicate with the outside world. Moreover, often the higher the technical level, the more white-hat hackers are used to acting upright, because they have long become well-known industry elites with names; because they claim that they do not commit evil and are not afraid of legal sanctions and pressure from public opinion.

The 75 group friends of the white hat hacker group have different skills from each other, the high is very high and the low is very low.

However, no matter how low the technical level, 75 group friends have also escaped the script kid notoriety.

The so-called script kiddies refer to those who are just beginners who do not have the ability to develop tools and can only use existing scripts or tools for tools. For example, someone’s computer knowledge is not enough to develop hacking tools on his own. After downloading the 72 hacking tools announced by Wei Dongsheng, he can read and understand the specific operations, and then rely on it to invade or scan for vulnerabilities. He is entry-level. Script kid.

You Jin Liangbai hat hacker group, the poorest group of friends, also have a certain code audit ability and a certain security concept, rather than ignorant of using other people's tools. Most of the group friends at this level are true "disciples" of white hat hackers, who were drawn into the group leader by the master.

The most mainstream group friends are all at the master level. They can develop tools and dig deeper into vulnerability mechanisms on their own, and even come up with novel security concepts. They can also try to come up with a complete security solution in a short period of time when encountering the incident of NSA outflow of hacking tools. Seven or eight of the white hat hackers, like You Jinliang, are regular visitors to the Internet Security Conference.

You Jinliang’s white hat hacker group, the quality is certainly not too high, and some people are better than them; if it is low, it is definitely not low. It is difficult to find 50 white hat hacker exchange groups of similar quality in the country. .

In other words, the Internet industry revolution is still at an early stage of development.

The early development stages of the technological revolution were very rough, and the light of 1% genius flashed, far better than the orderly efforts of 99% of the public. The Internet industry also follows this development law, which is very primitive and very rough. For example, ten years ago, when the inspiration of individual programmers flashed, they were able to produce excellent products single-handedly; with the improvement of the technological revolution, there were fewer and fewer excellent individual works, and Internet thinking changed to small team cooperation. With a good idea, three, five or more than ten people can form an entrepreneurial team. If you are lucky, you can come up with innovations that shock the world. Such entrepreneurial efficiency is extremely difficult to see in non-high-tech industries.

The Internet industry revolution has just transitioned from the age of individuals to the age of small teams.

Compared to major projects such as rockets, satellites, nuclear weapons, the Internet industry is obviously more dependent on personal talent.

Including network security.

Spring and Autumn Security Butlers adhere to this philosophy, deliberately organizing Internet security conferences, drawing on the myths and legends of Nuwa to patch up the sky to build a platform for Nüwa loopholes, and the talents of freelancers who hate the rules and regulations, such as the loose personality of the pan alliance.

Wei Dongsheng found embarrassingly that the white-hat hacker group swimming in Liang actually had the tentacles of a spring and autumn security steward. Swim into the Liangbai hat hacker group, at this moment there are employees of the Spring and Autumn Security Butler security team who claim that their private behavior is actually an official behavior. In order to avoid unnecessary conflicts, the employees of Spring and Autumn Security Managers usually do not participate in non-technical discussions within the group. Their work content is to do their best to guide civilian white hat hackers to use by the Spring and Autumn Group. Stabilized white hat hackers improve their jobs.

In this way, Wei Dongsheng's previous thoughts of doing something for You Jinliang are no longer necessary.

Wei Dongsheng simply used the authority of the Spring and Autumn Security Butler, named himself itm, and dived in the white hat hacker group as a new employee.

Wei Dongsheng did not speak in the group, nor did he contact You Jinliang in private, and temporarily quit the white hat hacker group.

On January 14th and January 15th, Internet security circles were discussing NSA leaking hacking tools. Whether private black hat hackers, white hat hackers, or official teams of international companies have confirmed the effectiveness of 72 hacking tools. Security companies such as Russia’s Kaspersky also try to interpret the connection between these hacking tools and the US National Security Agency. In short, everyone has confirmed that 72 hacking tools are real hacking tools, but whether its old owner is the National Security Agency is not 100% sure for the time being.

However, with the exception of some public intellectuals who are defending from the US standpoint, public opinion would rather believe that they have the attitude to believe that the 72 hacking tools are the work of the US National Security Agency, criticizing this behavior while calling on the state to respond.

However, the safety circle has limited impact after all.

The astronomical phenomenon of the total solar eclipse on January 15 and the 67th American Golden Globe Awards Ceremony on January 17 easily shifted the focus of netizens. After all, netizens are only curious about the attack and defense of hackers deified by movies and TV shows, but lack interest in the boring world of codes in reality, and are too lazy to figure out the difference between network protocol attacks and collecting specific traffic.

Wei Dongsheng did not allow this matter to be downplayed.

On January 19, 2010, in view of the Internet public opinion gradually abandoning the NSA hacking toolkit news, Wei Dongsheng decisively threw a new incident in the name of the Avengers organization Avengers_Group and announced the auction of 36 more powerful hacking tools with a reserve price of 10,000 bitcoins.

On January 25, 2010, the Avengers Group announced its failure and released 36 hacking tools for free. The security circle panicked and ushered in new overtime.

On February 1, 2010, WannaCry's improved version of WannaCry_Enhanced Bitcoin ransomware based on Eternal_blue's improved version of Eternal_Red was quietly launched.

Cryptographic Center Branch, Oahu, Hawaii.

After the Wei Dongsheng invasion, Andrew seemed to be in bad luck, and everything went wrong.

Andrew had no accident.

Andrew is not angrily behind the culprit, who allows the virus to hide in his computer?

Although Andrew's specialty is big data analysis, looking for valuable key clues in massive amounts of information; but his network security technology is not bad, and he is fully qualified to be a security expert for a multinational group. Andrew needs to frequently connect to the external network to inquire about information. As a result, his department is the department with the highest level of security. He must be held responsible for the accident of being hacked.

Andrew is very responsible and willing to accept internal punishment. Andrew's depression and dissatisfaction originate from the rejection and maliciousness of the Cryptographic Center branch. In the face of the accident investigation a few days ago, Andrew frankly protested that the security department recklessly determined that the intruder was a Chinese hacker organization. And Andrew has an IQ but not an EQ. When he speaks of excitement, he can't hesitate to speak, which makes the administrative officials of the Oahu Crypto Center Branch Bureau in Hawaii look dark.

Although Andrew has low EQ, he is not stupid.

Andrew can't handle personnel relations well, but he can clearly feel that the future is gloomy.

Obviously, the Hawaiian Oahu Cryptographic Center branch can't stay.

However, Andrew is not worried about the future.

There is no place to stay here.

Elite technologists like Andrew can eat everything wherever they go. Moreover, the US administrative system is looser than the Chinese system, and Andrew can't get along with the Oahu Cryptographic Center branch in Hawaii, so he can be transferred to other departments. For example, if you go to the CIA, you don’t have to worry about the Hawaiian Oahu Cryptographic Center branch affiliated to the National Security Agency NSA.

Speaking of the CIA, Andrew has some friends.

The US National Security Agency and the US Central Intelligence Agency often have inter-agency cooperation. When Andrew was working in Switzerland a few years ago, he met many friends from the US Central Intelligence Agency. One of them was a colleague named Edward Snowden (Edward_Snowden), who withdrew from the CIA in 2009 to join Dell, and then was sent to Japan to continue his intelligence work. Andrew communicated with Edward a few days ago, and felt that Edward's life was very interesting, so he thought of working in Japan.

The difficulty of the Oahu Cipher Center branch in Hawaii was so bad that when he recalled his old colleague Edward Snowden, Andrew felt that everything was the result of his own free thinking.

But the truth is not like this.

Andrew's freedom is the freedom to be manipulated.

Andrew's choice is a controlled choice.

With so many computers and so many staff in the Oahu Crypto Center Branch in Hawaii, why did Wei Dongsheng choose Andrew? The answer is not a random accident, but a inevitability of Wei Dongsheng's deliberate choice. Wei Dongsheng first chose Snowden, who was famous in his thirty years of memory, and then secretly manipulated Snowden's old colleague Andrew.

In 30 years of memory, Snowden's Exposure Prism Project (PRIS-M) is an annual event and a major event that can be recorded in the history of Internet development. Exposing the prism itself doesn't make much sense. Snowden will expose it again, and similar monitoring plans will continue to be executed amidst doubts. However, people being watched stupidly and ignorantly are completely different from knowing they are being watched all the time. At least, the people will know what era they are living in.

In the future, the more advanced the technology and the stricter the monitoring system, humans will gradually lose all their privacy.

It is foreseeable that the definition of privacy will be completely changed from "privacy that you don't know if I don't tell you" to "privacy that the government or a company must not disclose casually" in the next ten years. There will be less and less privacy in the true sense; privacy in the true sense will also be farther and farther away.

The new generation will not be able to understand the allusion of the idiom "Heaven knows the earth, you know me.

Because in their cognition, a certain government and a certain company monitor them all the time, how can there be privacy that is not known by a certain government or company?

If you like to re-take the road of the future, please collect it: (lightnovelpub.net) Re-take the road of the future. The literature is updated fastest.