Desperate Hacker

Chapter 231 Security Mechanism

Chapter 231 Security Mechanism
"Mr. McLeod! Well, as the CEO of the world's largest virtual currency exchange, what do you think of the security of this currency?"

"This is a very interesting question? Because most people are being robbed of their personal wealth silently by inflation! Who still remembers how much a McDonald's hamburger cost 10 years ago? Time has blurred the memories of too many people. , so that we have forgotten that a long time ago, 1000 US dollars could do a lot of things. However, virtual currency is fixed with the blessing of algorithms, and will not cause the wealth of ordinary people to shrink significantly because some governments are issuing money indiscriminately. This is why After I closed the eDonkey company, I would devote myself to this business..."

Chen Qingfeng spent a day collecting all kinds of information about mx company from the Internet!
This company was founded 4 years ago!It can be said that it is an early pioneer in virtual currency trading. Even if there are many now and latecomers have re-entered this industry, they still cannot shake the strength of mx company!
However, Chen Qingfeng did not expect that the founder of this company was also the founder of eDonkey!

When he was still in college, who didn't use eDonkey's network at that time?There are all kinds of fun games, animations, music collections, movie e-books, and American TV series that were just starting on campus at that time. It can be said that, to a certain extent, eDonkey is Chen Qingfeng’s memory of his college days!

And now what Chen Qingfeng has to deal with is the company founded by the man who brought him infinite convenience back then!

"Do you think virtual currency transactions are safe?"

“In fact, I can’t think of anyone who can overcome the security guarantee brought by the blockchain! Everyone familiar with it knows that in order to complete a transaction, the accounting content of all accounts in the same block must be changed. ! This is why blockchain is secure. On this basis, in order to ensure that users will not be deceived due to misoperation or traps set by hackers, we also have a second security measure. Anyone who registers with our company For users, all assets are blocked in a secure local area network server..."

Chen Qingfeng suddenly stopped the mouse when he saw this, and then he released the content behind the video bit by bit!
This piece of content is crucial, because it is a piece of content in which the CEO explained his company's security structure in front of reporters!
As the saying goes, the speaker has no intention, but the listener has the heart!
Chen Qingfeng has actually set his sights on mx company, so first he must figure out what the technical structure of this McCraig is!
Chen Qingfeng looked at this guy in the video!

In the photo, there is a white man with black hair and small eyes, but he looks very wise!Chen Qingfeng didn't know whether this guy was a Jew or not!However, Chen Qingfeng secretly compared it. McCraig is already 46 years old this year!

But judging from the photos, this guy is much younger than me!

People with a technical background always like to talk to laypeople!

When it comes to technical content, I can’t stop talking!

After watching this video, Chen Qingfeng had a rough idea of ​​this guy's thinking!

simply put!He should believe in the security of blockchain technology, but he does not believe in his customers. In order to avoid trouble, he designed a security mechanism that requires customers to deposit all Bitcoins into the company's account when they are not trading. , wait until the transaction time and then withdraw it again!

This mechanism is somewhat similar to the role of a bank!

Chen Qingfeng picked up the pen and started writing and drawing on the paper!

Simply put, the entire transaction mechanism exists on both networks!
An intranet that is relatively strictly isolated from the outside world and is used to store the company’s managed Bitcoin addresses!

There is also a trading platform!This is an area accessible to anyone!But all Bitcoins are used in transactions.Considering this, Chen Qingfeng felt that it should be difficult to start. After all, even the banking system is learning and using the security of blockchain!

Death Spiral Plan Time waits for no one!

Chen Qingfeng doesn’t have time to study how to break the blockchain!
And this is not a good direction either.The reason is very simple. This requires a huge amount of calculations, and Chen Qingfeng does not have such powerful computing power!And even if the security mechanism of the blockchain is broken, the cost of success is likely to be more than the gain.

So Chen Qingfeng focused his attention on the connection between the external network and the internal network!
But now there is a problem!
The death spiral plan takes a certain amount of time!

This time will take at least about a week!
If I rashly hijack the mx company's Bitcoins, the company will break the news in less than two days!
So how to hijack the tenant’s Bitcoin without the information being exposed by the opponent!

This is the key to the difficulty of the entire plan!

And this requires the application of big data technology!
In the huge user database, there must be a large number of users with low security mechanisms. Chen Qingfeng needs a big data analyst to screen out these users, then use these accounts as broilers for Bitcoin transactions, and then store mx company Bitcoins in the intranet server are traded in a way that simulates normal transactions!

Only by dynamically borrowing this company's Bitcoin can the plan work!
"Big data!"

Chen Qingfeng stared at the computer screen hesitantly!

After a long time, he used the receiving phone number of the Russian website and sent a message to Susan, who had worked as a data analyst in the Apocalypse team!
……

Programmers are night owls, and so is Susan!

Although she has left university now, it does not mean that she has given up on her future life!
As a data guru, Susan has many ways to make herself comfortable!
The premise is that no organization like the CIA can cause trouble for you!
At this time, he is using crawler technology to search Penn's internal thesis library!

She is studying crawler technology and hopes to write several crawler robots that can be used on special websites!Then sell some valuable data online, or form some ready-made analysis reports, hang them directly on your own website, and support yourself by selling similar data services!

In the dead of night, the melodious sound of opera came from Susan's bedroom!
At this time, he was immersed in it, but suddenly he received an unread message on the screen!

I have to say that living alone is indeed a bit lonely, and now the only person Susan can contact is the speaker!
"If you see this message, I hope you can contact me. There is a project and I would like to ask you to join me!"

Susan didn't even look at it and just asked a question?

"What project? You actually want your enemies to join?"

"Because you are the only suitable math analyst I know!"

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like