Crossover: 2014

Chapter 214

Chapter 214
As the saying goes, the predecessors planted trees, and the descendants enjoyed the shade.

When it comes to Lin Hui, it's the other way around.

It has become that later generations plant trees, and predecessors enjoy the shade.

Why do you say that?
Because of the part of the results that people only produced in the past few years in the past life.

In this time and space, forest ash can be transported almost unscrupulously.

Although Lin Hui knew that this kind of handling behavior was a bit inappropriate.

But as the saying goes, if there are too many lice, don’t bite, and if you have too many debts, don’t worry.

Lin Hui is now a dead pig and is not afraid of boiling water.

As long as the corresponding technology has sufficient value, the technical logic makes sense, and there is no risk of colliding with others.

Lin Hui will carry it hard.

Such a detection technology as using a mobile phone virus/virus database to detect a mobile phone virus/virus.

Although the use of this technology cannot once and for all solve all the mobile terminal security problems faced by the mobile terminal.

However, Lin Hui thinks that it is more valuable to use the mobile phone virus/virus database in the past few years to apply the mobile phone virus/virus database to detect mobile phone viruses/viruses in 2014.

Even if mobile phone viruses/viruses emerge in endlessly, this technology will not need to worry about most possible mobile phone virus/virus threats within two years.

Of course, the mobile phone virus/virus mentioned here refers to the conventional mobile phone virus/virus.

For some mobile malicious attacks with special nature, this technology may also be GG.

For example, if various underlying protocols are used to attack.

This technology of intercepting mobile phone viruses/viruses is likely to be helpless.

Like Lin Hui's previous feedback on the time regression vulnerability of the iOS8beta version, he pointed out:

If there is a hacker who knows the characteristics of the time regression vulnerability in advance.

So for hackers, it is completely possible to attack iOS devices connected to public networks.

By artificially sending malicious network time protocol attacks to these devices, the iOS system time is calibrated to the time when UTC is 0.

Then the attacked device will be affected by this bug, and the device cannot be used after restarting the device.

The attack here takes advantage of the underlying protocol - Network Time Protocol.

When an iOS device is connected to a public network, the iOS system will use the Network Time Protocol service to calibrate the time zone and time.

The protocol that this process relies on is the Network Time Protocol.

Network Time Protocol is one of the oldest network transport protocols.

Its purpose is to transmit the time of precise timing devices such as atomic clocks to every networked device through the network, thereby providing the most accurate time synchronization capability.

Even the Network Time Protocol protocol itself has taken into account the possibility of tampering with time.

However, for a long time, cyber attacks using the network time protocol as the entry point have been common.

It can be said that it is difficult to prevent malicious attacks on mobile devices by using the Network Time Protocol.

Even using the patented technology from the previous life mentioned by Lin Hui, it is difficult to prevent such malicious attacks.

Because this type of attack is mainly initiated by people deliberately.

The technology that Lin Hui is currently looking at is not very good at dealing with malicious attacks.

Since the technology of using mobile phone virus/virus library scanning to prevent mobile phone viruses/viruses in the previous life cannot prevent malicious attacks.

But as long as this technology can cope with the existing mobile phone viruses/viruses, it is enough for Lin Hui to respect this technology.

Because it is necessary to understand the difference between mobile phone viruses/viruses and malicious attacks.

Usually mobile phone viruses/viruses spread in every dark corner of the Internet, and the notable feature of the attacks presented by mobile phone viruses/viruses is "indiscriminate attacks".

From this perspective, mobile phone virus/virus attacks are somewhat similar to stray bullets on the battlefield.

Malicious attacks are "fixed-point scalpel attacks."

A bit like a bullet fired by a sniper on the battlefield.

The steel helmets worn by soldiers are almost difficult to toughen the bullets fired by snipers.

But that's not to say that helmets don't work.

On the contrary, the helmet is very useful.

Because the helmet can effectively avoid the losses caused to soldiers by stray bullets on the battlefield.

And the technology that Lin Hui admired in his previous life was somewhat similar to the role of a steel helmet on the battlefield.

Although this technology is not very useful for targeted scalpel-style malicious attacks.

But it is completely enough to deal with mobile phone viruses/viruses scattered in the dark corners of the Internet.

You should know that the mobile devices of ordinary users almost never encounter targeted scalpel-style malicious attacks from hackers.

On the contrary, they are often disturbed by indiscriminate attacks.

In this case, Lin Hui's handling technique is naturally very useful.

In short, Lin Hui believes that the value of this technology in his previous life is high enough.

And because the person who created the technology in the previous life basically didn't encrypt all the technical data of the technology.

Lin Hui thought it would be easy to carry.

After all, there are a lot of ready-made declaration materials.

Even so, Lin Hui was not too hasty.

You know, Lin Hui has just applied for some patents related to Nanfeng APP.

Now apply for some patents in almost completely different categories from the previous patent applications.

It is easy to cause some unnecessary troubles.

In short, Lin Hui felt that it would be better to develop patents related to mobile phone security after a while.

……

Mention mobile security.

Lin Hui remembered several security vulnerabilities he had submitted in the Apple bug bounty program a few days ago.

It is also not known if the previously submitted bugs were accepted.

With Lin Hui's current wealth, he doesn't really care about the reward of one million US dollars for submitting bugs.

What Lin Hui cares about is the BTC equivalent to these US dollars.

After all, the former has little room for appreciation, while the latter is a huge profit.

Generally speaking, the ways to obtain BTC are nothing more than the following:
- Buy, mine, earn.

Things like buying and mining are not very suitable for forest ash.

Especially not suitable for Lin Hui, who is now worth hundreds of millions.

They are worth hundreds of millions, so why not dig?

Perhaps some pumping algorithms can be used for commissioning.

But it seems that there is no need to dig it yourself, it's shabby.

As for buying, the efficiency is too low.

And it's easy to argue with sellers.

Anyway, Lin Hui thinks that the more suitable way for him to obtain coins is to earn.

And submitting bugs is an excellent opportunity for Lin Hui to earn BTC.

……

Lin Hui couldn't wait to see the progress after the bug was submitted not long ago.

Despite the urgency, there are steps that should be taken.

Lin Hui has adopted a series of security measures.

Including but not limited to using a new login device, connecting to a new proxy IP, changing the network environment, etc.

It's a bit of a hassle, but be careful.

There is still a big difference between this so-called vulnerability submission website and the regular official website.

This platform for security personnel to communicate with each other is very similar to a hacker forum.

It's not good to be careful.

After all, Lin Hui is now carrying a shocking secret.

It's not that Lin Hui is making a fuss over a molehill.

The truth is that even GitHub, a seemingly innocuous website, is not.

If you rashly download some open source code that you don't know the specific purpose of and then run it, it is easy to have some security problems.

Technology has been a double-edged sword since the day it came out.

Anyway, be careful.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like