Almighty crossover king

Chapter 486 Apple's Trouble

Chapter 486 Apple's Trouble

Apple shot, the power is extraordinary.Although the Longteng Group has stabilized the situation in China, the efforts made abroad in the past few years have disappeared in an instant.

Including Longteng Group attaches great importance to the Japanese market, and Longteng Group has spent a lot of effort in order to open up the Japanese market.Comics, good voice, it took a lot of effort to open the Japanese market.

But now that Apple has made a move, it has brought Longteng Group back to its original shape.As the giant with the highest market value in the United States, Longteng Group has a terrifying influence.His actions can directly influence the U.S. government and let the U.S. government put pressure on Japan.

This kind of power is not comparable to that of Longteng Group.The strength of Longteng Group is not so strong yet.It's better at home, but there is absolutely no such ability abroad.

Late at night, in Zhang Fan's villa, Zhang Fan was busy in front of the computer.There is an Apple mobile phone next to his computer, and a data cable is connected to the computer.

"Hmph, sure enough, Apple, let's see whose information is insecure."

After finding what he wanted, Zhang Fan laughed.The trend of this world and the other world is basically the same.If the direction is the same, then some problems are basically the same.

What Apple does in another world, it does in this one.And do it more covertly and ruthlessly.

Apple in this world, through its own unique closed system, uses a special channel to send user data back to the inside of Apple's server.

This statistic is scarier than another world.Even the user's assimilated voice was sent back.Also through the positioning system, the user's activity track and the usage of some software are transmitted back to the headquarters.

In other words, as long as you use your mobile phone, your whole body is basically monitored by Apple.And these data are sent back to the US headquarters in a special way.

This transmission method is so ingenious that even Zhang Fan didn't find it at first.In the end, I exchanged my reputation for a bunch of experience books, and only discovered this transmission method after smashing my own hacking experience to the limit.

This transmission method is to send back in different password forms, and then recombine and translate the returned password.This kind of encryption method is not enough for top hackers, it must be discovered by top cryptography experts.

Apple went to great lengths to send data back in this way, apparently for other purposes.With such a covert method, Zhang Fan has reason to believe that Apple's data is inextricably linked with the US intelligence system.

After cracking it, Zhang Fan did not sit idle.Instead, it quietly began to invade Apple's servers.After hacking into the server, Zhang Fan saw a lot of data.

"Hey, how much data has Apple stolen over the years."

Looking at the huge data, Zhang Fan swallowed, there are too many data.Not only China's data, but also the United States, the European Union and so on.In the world, there are so many supporters of Apple, and the data generated by these users every day is a huge amount.

These data are gathered together, and the amount is too large.Seeing these data, Zhang Fan laughed.When these things are exposed, it is not just ordinary consumers who crusade against Apple.

No country would be willing to leak such large-scale intelligence.Because this kind of data involves too many state secrets, many of which are top secret.

"These data should not be wasted."

Zhang Fan squinted his eyes, so much data is a huge fortune for any company or country.In this era of big data, data is the most valuable thing.

Through various data analysis, useful big data can be obtained.Through this kind of big data, works that are more suitable for consumers can be developed.

Zhang Fan continued to be busy, leaving different backdoors in the database and connecting to the supercomputer of Longteng Group through the backdoors.Then Zhang Fan installed a lot of special downloading tools.

These tools are all made by Zhang Fan himself, and Apple's engineers can't find these things at all.

A large amount of data began to be transmitted and stored in Longteng's super database through the supercomputer.

After setting it up, Zhang Fan stood up.When things get to this point, you don't have to do it yourself.Especially in the country, the power of the state absolutely does not allow this kind of thing to exist.

Taking out his mobile phone, Zhang Fan dialed an internal number.As a special talent of the Network Security Department, Zhang Fan has great power.

"Hey, I have something very important to report. It's like this..."

Zhang Fan directly submitted the problems he found.After joining this army for such a long time, Zhang Fan has not done much. Apart from helping the military strengthen network security, Zhang Fan has always been very free.

"What, are you sure?"

In a military base in Yanjing, a middle-aged man in military uniform looked shocked.

"I'll send you something right now."

Zhang Fan hung up the phone and sent some things over.Then at the National Cyber ​​Army Center, some people began to read the things Zhang Fan sent.

After seeing these things, everyone took a breath.Network security, they have been working on network security.But no one thought that the biggest security risk turned out to be Apple.

They did this secretly through hardware and mobile phone systems.Thinking of the popularity of Apple products in China over the past few years, how much information has been leaked over the years.

"Call an emergency meeting immediately..."

The middle-aged soldier's face was ashen, angry, extremely angry.In this deep place, he didn't discover this kind of hidden danger, which is definitely his negligence.

If it wasn't for Zhang Fan's discovery today, I'm afraid he wouldn't have discovered this huge loophole in domestic network security.

The news that Zhang Fan discovered was quickly submitted, and when it was submitted, it immediately shocked the entire Chinese intelligence system.The network security department also started to take action, and checked other mobile phones.

At the same time, Zhang Fan was also tasked to check all mobile phones, computers and other communication equipment to see if there were any other backdoors.

For such a task, Zhang Fan is also obliged.He knew that the more he did, the more protection he and the Longteng Group would receive in the country.

In addition to these, Zhang Fan also began to secretly plan how to make good use of these things to kill Apple with one blow while gaining the maximum benefit.Such a good card in hand must not be smashed. If it is smashed, I will be sorry for the card in my hand.

Either you can't finish it, or you can play his one-hit must-have.When dealing with the enemy, you must take my chance and kill in one hit. Even if you can't kill it in one hit, you must play it disabled, especially an opponent like Apple. ,

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like