Crossover: 2014

Chapter 146 There is no pure black and white

Chapter 146 There is no pure black and white
When registering a security account for submitting vulnerabilities involves the selection of remuneration settlement methods.

Lin Hui found that in addition to the usual payment methods such as Visa settlement and PayPal settlement.

You can also choose BitPay payment.

BitPay is an American BTC payment service provider.

BitPay was founded in May 2011.

This payment service provider can provide BTC and BTC cash payment processing services to users.

After rebirth, anyone knows that the return rate of BTC is very high.

The so-called BTC is almost unknown to everyone.

However, Lin Hui feels that the real value of BTC is its derivative value.

And not just BTC itself.

BTC is a combined product of four important components.

First, BTC is a scarce digital asset.

The second is that BTC is a peer-to-peer network with a large number of full nodes.

Again, mining BTC requires finding a valid proof-of-work number.

This makes fraud very costly and guarantees randomness and scarcity.

Finally BTC involves a fully publicly auditable blockchain.

These four technologies are closely combined to produce BTC.

Not so useful when a part is removed.

It involves the derivative concept of BTC.

Lin Hui felt that BTC itself was more valuable.

Take blockchain as an example, this technology is very important.

Research involving blockchain has a long history.

Cryptographer David Chaum first proposed a blockchain-like protocol in his 1982 paper, "Computer Systems Built, Maintained, and Trusted by Mutually Suspicious Parties."

Further work on cryptographically secure blockchains was described by Stuart Haber and W. Scott Stornetta in 1991.

In 1992, Haber, Stornetta, and Dave Bayer incorporated Merkle trees into their design.

Its efficiency is improved by allowing multiple file certificates to be collected in one block.

But the real first decentralized blockchain was conceived in 2008 by a man (or group of people) known as Satoshi Nakamoto.

Satoshi improved on the design in an important way, using a hashing-like method to time-stamp blocks.

What exactly is blockchain.

A block can be understood as a growing list of records.

These blocks are linked together using cryptography to form a blockchain.

When it comes to the blockchain itself, each block contains the cryptographic hash, timestamp, and transaction data of the previous block.

(Transaction data is generally expressed as a Merkle tree, which is the aforementioned Merkle tree)
Since each block contains information about the blocks before it, they form a chain.

Each additional block strengthens the block before it.

Therefore, the blockchain is resistant to modification of its data.

Because once recorded, the data in any particular block cannot be changed retroactively without changing all subsequent blocks.

A blockchain is usually managed by a peer-to-peer network and acts as a public distributed ledger.

Or you can think of the blockchain as a database, a very secure database.

The significance of blockchain is that it can provide reliable shared data and build trust between parties.

At the same time, blockchain can eliminate data islands.

In addition, the blockchain endows data with high security and reduces the need for third-party intermediaries.

Blockchain enables the creation of real-time, tamper-proof records that can be shared between all parties involved.

With the help of blockchain, participants can ensure the authenticity and integrity of products in the flow of commerce, seamlessly track and trace goods and services throughout the supply chain.

Blockchain has broad prospects in the financial field, the Internet of Things and logistics fields, public service fields, digital copyright fields, insurance fields, and public welfare fields.

Ordinary people may have no idea about this stuff.

But this stuff is really important.

After all, ___ personally emphasized.

General ___ seldom express their views on specific technologies.

But two techniques are exceptions.

One is artificial intelligence.

The other is blockchain.

Digital Renminbi is a digital currency issued using blockchain technology.

In short, the importance of this thing is self-evident.

Although the blockchain is very important, even the importance can be compared with artificial intelligence.

But the embarrassing thing is:
Lin Hui is not particularly good at things related to the blockchain.

But it's not a big problem, the big deal will be handed over to a professional person.

Specific to BTC itself.

Generally speaking, the way to obtain BTC is nothing more than the following.

Buy, mine, earn.

Lin Hui wanted to dig in the past.

But no action was taken for various reasons.

The matter was shelved after that.

Unexpectedly, by accident, I accidentally discovered such a way to earn large-scale coins.

As for the iOS Apple bug bounty program that supports BTC payments.

Although this situation is unexpected, it is actually reasonable.

This vulnerability submission website is not a formal Apple official affiliate website.

It is a bit similar to a platform for hackers to exchange technology for a fee.

This is why Lin Hui took a series of security measures when he landed on this website before.

After all, there is no pure black and white in this world.

Many security technicians on this website who rely on submitting vulnerabilities for a living are originally wandering in a gray area.

BTC as a decentralized currency.

Its security and privacy have always been favored by those who wander in the gray area all the year round.

It is normal for such a platform to have BTC as a means of payment.

And BTC as a means of payment was first popular among hackers.

It is not uncommon for a bunch of people engaged in security technology to choose to use BTC as a payment method for payment.

Early BTC was not only circulated among geeks.

Most of the people involved in BTC mining are geeks.

Of course, this is also related to the relatively low difficulty of early BTC mining.

At that time, it was possible to participate in mining with ordinary computers.

Although at that time due to the circulation of BTC in the circle of geeks.

But BTC had almost no price at the time.

Most of them circulate in the form of gifts and rewards.

Even if you don't dig it yourself, it is not too laborious to obtain it through purchase.

2010年5月21日,一个美國的程序员用10000枚B.T.C换取了2个披萨。

At that time, the market price of these two pizzas was 30 US dollars, and the price of 1 BTC was 0.003 US dollars.

Although this behavior is largely hype.

But it can also be seen that BTC was really cheap at that time.

$0.003 a piece.

Doesn't that mean you can buy three for less than a penny?

It can be said that at that time, thousands of BTC could be processed with almost no effort.

However, looking forward to that time is useless.

It's already 2014.

Although the price of BTC at this time is not as exaggerated as later generations and the price has been falling.

But at this time, it will cost more than 600 US dollars to start.

But the price is not really an issue.

After all, Lin Hui uses loopholes (technology) to make transactions.

To a certain extent, Lin Hui can be regarded as a business without capital.

To be honest, Lin Hui was a little moved by this settlement method.

If Lin Hui chooses to accept BitPay payment at this time.

Doesn't it mean that Lin Hui will get a huge amount of coins at once.

Lin Hui made an estimate, if Apple's personnel measured it based on the complexity and severity of the development chain.

Then the "time regression bug" is worth at least $70.

What Lin Hui submitted was the vulnerability corresponding to the iOS8 beta version.

According to the rules, Lin Ash should receive an additional 50% premium.

If Apple is not tricky in the payment link.

The value of the vulnerability submitted by Lin Hui was more than 105 million US dollars.

And now the transaction price of one coin is only 606 US dollars.

Choose to pay with BitPay.

Doesn't it mean that once the transaction can be concluded, Lin Hui will get 1732 coins at one time.

And this is just a conservative estimate.

In fact, Lin Hui felt that he would get more coins.

However, even if it is only a conservative estimate.

These 1732 coins will be quite a fortune after a few years.

Even at a price of $6 each.

In the next few years, these 1732 coins are also equivalent to 10392 million US dollars.

A loophole for more than 1 million US dollars?

No matter how you think about it, it's blood money.

It took a little trouble for Lin Hui to register the corresponding bitpay account.

After selecting the bitpay account as the settlement method.

A user notice in English popped up.

After reading through this User Notice.

Only then did Lin Hui realize that if he chose BitPay to pay, the account might not be so fast.

However, users can make an appointment (submit the vulnerability) any working day after three months as the arrival date.

Under other circumstances, this kind of delay in arriving at the account would certainly be frowned upon.

But when it comes to this kind of thing? Lin Hui likes this kind of delayed payment.

You know, the price of BTC has been falling recently.

This is undoubtedly very good news for Lin Hui.

Lin Hui remembered that in January 2015, BTC was generally only more than two hundred dollars.

In this case, if Lin Hui chooses to receive the account at the beginning of January.

Doesn't it mean that Lin Hui will actually get more BTC through the time regression loophole?
If the previous exploit was worth $105 million.

Then it is estimated at a price of 220 US dollars.

Lin Hui will also get 4772 pieces at one time.

Well, this figure is a bit exaggerated.

An exaggeration, however, is an exaggeration.

Lin Hui doesn't suspect that Apple can't afford to settle with BTC just because of a loophole.

It does not exist, although some big companies have been waiting and watching for BTC for a long time.

But the so-called wait and see of these giants is actually-buy something and try.

Instead of watching and not buying.

Lin Hui estimates that these Internet giants conservatively estimate that their stocks are more than tens of thousands.

In short, even if you really need to pay thousands of fruits at a time, it will not be a big problem.

Moreover, Lin Hui just chose to use BTC to settle the time return loophole.

As for the settlement of more loopholes with BTC.

It might be possible to continue after a while.

But forget it in a short time.

You have to pay attention to the basic facts when pulling wool.

After all, according to Satoshi Nakamoto's paper, the total number of BTC is only 2100 million.

It's too hard, what should I do if this channel is closed.

Moreover, Lin Hui submitted the vulnerability in a short period of time in exchange for dollars.

Not for bitcoin.

What's more, if Lin Hui is really interested in BTC, he can buy it directly at that time.

At this time in 14, BTC has been around for several years.

It's not too much trouble to buy directly.

Instead of going around the corner like this.

What Lin Hui really needs at this time is hot money, not futures money.

And Lin Hui also intends to make money through BTC operations.

This time, BTC was chosen as the settlement method for the time regression vulnerability.

It's just an unintentional move.

No special circumstances.Lin Hui is not very interested in matters related to BTC.

It is enough to hoard more than [-] pieces for future risk avoidance.

There is no need to stock up too much.

In fact, when the resources at hand reach a certain level.

The rules have also changed.

If one day Lin Hui really gets a lot of coins.

So will he cause panic in the market when he sells and cashes out?

Will it cause the originally strong currency price to plummet?
Everything is good in moderation, and there is no point in excess.

Various cumbersome procedures including account registration on the vulnerability submission website are cumbersome.

But it comes to the report of the vulnerability itself.

In fact, it doesn't take much effort, Lin Hui only needs to report the vulnerability itself.

As for the rest, Lin Hui is not in charge.

Lin Hui is only responsible for finding loopholes, not explaining the causes of loopholes and fixing them.

As for patching bugs?
Sorry, that's another price.

But when it comes to patching bugs, it's actually quite simple.

The approach taken by Apple in the previous life was good, directly preventing users from adjusting the time to January 1970, 1 in the UTC time zone.

After that, Lin Hui changed a computer and enabled another proxy IP.

Lin Hui registered a new account named "root"
Using this account, Lin Hui submitted several seemingly obvious vulnerabilities.

The reason for submitting is obvious.

It is because there are some shallow and some deep loopholes.

It is better to submit some simple ones that are relatively easy to find first.

As for some vulnerabilities that can only be triggered by a very special trigger mechanism, it would be suspicious to raise many at a time.

Although submitting a vulnerability is procedurally easy.

However, after submitting two or three, Lin Hui still felt a little boring.

Is there no way to get tens of millions of dollars at once?
Lin Hui's state of mind at this time is a bit like that just after the college entrance examination.

I just want to make money.

It's just that Lin Hui was thinking about how to make millions of dollars.

But now Lin Hui is thinking about how to make tens of millions of dollars at once?

At that time, it was time to look for millions of business opportunities.

Lin Hui thought of the mobile phone in his previous life.

At this time, tens of millions of dollars of business opportunities are involved.

Lin Hui still unconsciously thought of the mobile phone from his previous life.

The process of rummaging through the phone.

Lin Hui was attracted by a built-in application in the mobile phone.

The name of this app is Shortcuts.

It was also called a shortcut for a while.

The app itself has no functionality.

But users can use the action modules it provides in the application to form various tools like building blocks to meet their own needs.

For example, the user can make a shortcut command to grab the cover of some videos;

You can add new words you encounter while reading to the certain word bank you are memorizing;

Can convert video to GIF;

You can also turn GIF into video in reverse;

It can be used to identify pictures with pictures;

It can be used to identify the QR code in the screenshot of the mobile phone...

Can……

(ps: ... btc is almost mentioned in this chapter)
 .

  
 
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like