Desperate Hacker
Chapter 305 The hacker who was kicked out
Chapter 305 The hacker who was kicked out
Zimbabwe!
These members of the Anonymous organization have spent the past few days feeling both excited and disappointed.
The exciting thing is that they did make money, and the speed of making money was several times that of those big companies that used to rely on hacking techniques to extort money!
And the money is earned through virtual currency transactions. In some respects, it is legal income, eliminating the cost of money laundering.
But sadly, their behavior of pretending to be a speaker was discovered by the other party!
The other party found out their identities without any scruples, and even recorded their voiceprints.
"Haven't you figured out how he cracked our defense system?"
Duke was still analyzing with his companions at this time, what technology did the speaker use to penetrate into their computers?
Everyone is a hacker, and even if there is a gap in technology, the gap will not be that big.
Anonymous is not a small organization, but a well-known hacker organization ranked among the best in the world!
This time, they were entrusted by the organization with the important task of participating in the short-selling FTT project, naturally because they are a small team with relatively strong technical skills within the entire organization.
However, in front of Peaker, these people were nothing. The defense system they set up did not block him for even a minute. It was almost easy for people to sneak in without even making any movement.
Now is the time to start reviewing, but everyone still hasn’t discovered the key point about speaker’s technology!
"What the hell is going wrong?"
"Could he have tried our password?"
"Stop joking! Do you think encryption algorithms are children's toys?"
"Then I don't know why, I don't have any clues!"
Duke looked at his companions. They had been sitting together analyzing it for almost four days, but they still had no clue.
At this moment, someone suddenly raised his hand weakly!
"Boss! It is said that the story of Speaker becoming famous in one battle seems to have come from the CIA!"
"You mean the Colonia oil pipeline incident?"
"No! Before that, the CIA might have known about PEAKER! Because usually when a hacker organization is first wanted, it will not be rewarded with such a high reward! So I guess there is a possibility that the peaker has already mastered it. Is it possible to crack the world’s passwords?”
"Are you kidding me? Is there such a technology?"
"No conventional technology? But technology that transcends the times can make today's cryptography a joke! For example..."
"You mean a quantum computer?"
"Boss! This is the only possibility, otherwise I can't think of any other way!"
"Stop joking! Is that kind of thing something ordinary people can get?"
"But what if the speaker is not an ordinary person?"
……
Suddenly the whole room fell silent.
Everyone is a hacker, but we know that if a disruptive technology emerges one day, all hackers in the world will become a joke.
In fact, it is not hacking technology, but the cryptographic foundation on which the entire human race is based!
There are two ways to change all this. One is the seven mathematical problems known as the seven new millennium problems left to the world.One of the difficult problems is the problem of p and np.
This issue was once concerned by Turing, and the specific academic issues are definitely not something that hackers like them can understand.But everyone has heard of it to some extent.
Duke certainly understands what everyone is referring to. Simply put, computer scientists divide computing problems into two categories: P here refers to polynomial time. If a complex problem can be solved in polynomial time, then it is called a P problem. , which means that the computer can complete the calculation in a limited time;
Once this conjecture is solved, it means that all passwords will now become meaningless.Because these passwords can be calculated within a limited time.
Another solution is quantum computers from the physical level.
Simply put, this kind of thing involves the wave-particle duality of light.
Using Young's double slit experiment to observe photons, we can find that quanta pass through two slits at the same time.
In other words, instead of stabilizing calculations, quantum computers perform calculations simultaneously.
Ordinary hackers have no way of understanding this kind of thing.
But the facts of nature are there.
Once quantum computers or quantum computers specifically used to solve cryptography appear.
Then most passwords are also invalid.
Because the cost of calculating passwords is no longer infinite time!
……
However, this explanation is too science fiction.
Even Duke doesn’t believe in science fiction!
"Are you kidding? The problem of P and np, and quantum computers? Do you think the speaker will use such things to deal with us?"
"Boss? Don't forget how much money we made this time. Mx Exchange still doesn't dare to announce the truth. Of course we don't dare either because we don't have to. As for FTT..."
"But the speaker didn't take action against us. And if he had such terrifying computing power, why would he be interested in the supercomputer we hacked?"
"That's his problem! We can't think of a better explanation than this technology!"
Duke looked at his companions and said that they were not suitable, because when hackers cooperate with each other to form a team, although everyone has their own opinions, in fact, no one obeys the other technically.
But none of the people in front of me were unconvinced by the speaker.
After all, what happened this time really damaged everyone’s morale!
Duke is a core member of the anonymous organization. However, now the other core members only know that their actions have been a success, but they do not know that they have actually been choked!
……
The results of the discussion were inconclusive, but Duke felt it was his responsibility to tell his companions these things.
So, he released the relevant report about this operation in the internal communication channel!
"I'm sorry, our identity was discovered by another hacker organization's speaker. If you are worried that we will affect the continued survival of the Anonymous organization, if it is safe, I can consider opting out of the organization!"
……
After Duke posted this message, he looked at the silent companions on his cell phone. After a long time, someone suddenly sent a message.
"Thank you for all your hard work over the years, but I think it's time to say goodbye!"
Seeing this reply, Duke felt chilled!
However, at this time, as a core member, no other member said a word to him.
He suddenly began to wonder, what on earth have he been doing all these years?
"Duke! MX Company's Bitcoin, can you hand over these management rights to me?"
Duke looked at the message and wanted to curse, but after hesitating for a long time, he only typed two letters.
"OK!"
(End of this chapter)
Zimbabwe!
These members of the Anonymous organization have spent the past few days feeling both excited and disappointed.
The exciting thing is that they did make money, and the speed of making money was several times that of those big companies that used to rely on hacking techniques to extort money!
And the money is earned through virtual currency transactions. In some respects, it is legal income, eliminating the cost of money laundering.
But sadly, their behavior of pretending to be a speaker was discovered by the other party!
The other party found out their identities without any scruples, and even recorded their voiceprints.
"Haven't you figured out how he cracked our defense system?"
Duke was still analyzing with his companions at this time, what technology did the speaker use to penetrate into their computers?
Everyone is a hacker, and even if there is a gap in technology, the gap will not be that big.
Anonymous is not a small organization, but a well-known hacker organization ranked among the best in the world!
This time, they were entrusted by the organization with the important task of participating in the short-selling FTT project, naturally because they are a small team with relatively strong technical skills within the entire organization.
However, in front of Peaker, these people were nothing. The defense system they set up did not block him for even a minute. It was almost easy for people to sneak in without even making any movement.
Now is the time to start reviewing, but everyone still hasn’t discovered the key point about speaker’s technology!
"What the hell is going wrong?"
"Could he have tried our password?"
"Stop joking! Do you think encryption algorithms are children's toys?"
"Then I don't know why, I don't have any clues!"
Duke looked at his companions. They had been sitting together analyzing it for almost four days, but they still had no clue.
At this moment, someone suddenly raised his hand weakly!
"Boss! It is said that the story of Speaker becoming famous in one battle seems to have come from the CIA!"
"You mean the Colonia oil pipeline incident?"
"No! Before that, the CIA might have known about PEAKER! Because usually when a hacker organization is first wanted, it will not be rewarded with such a high reward! So I guess there is a possibility that the peaker has already mastered it. Is it possible to crack the world’s passwords?”
"Are you kidding me? Is there such a technology?"
"No conventional technology? But technology that transcends the times can make today's cryptography a joke! For example..."
"You mean a quantum computer?"
"Boss! This is the only possibility, otherwise I can't think of any other way!"
"Stop joking! Is that kind of thing something ordinary people can get?"
"But what if the speaker is not an ordinary person?"
……
Suddenly the whole room fell silent.
Everyone is a hacker, but we know that if a disruptive technology emerges one day, all hackers in the world will become a joke.
In fact, it is not hacking technology, but the cryptographic foundation on which the entire human race is based!
There are two ways to change all this. One is the seven mathematical problems known as the seven new millennium problems left to the world.One of the difficult problems is the problem of p and np.
This issue was once concerned by Turing, and the specific academic issues are definitely not something that hackers like them can understand.But everyone has heard of it to some extent.
Duke certainly understands what everyone is referring to. Simply put, computer scientists divide computing problems into two categories: P here refers to polynomial time. If a complex problem can be solved in polynomial time, then it is called a P problem. , which means that the computer can complete the calculation in a limited time;
Once this conjecture is solved, it means that all passwords will now become meaningless.Because these passwords can be calculated within a limited time.
Another solution is quantum computers from the physical level.
Simply put, this kind of thing involves the wave-particle duality of light.
Using Young's double slit experiment to observe photons, we can find that quanta pass through two slits at the same time.
In other words, instead of stabilizing calculations, quantum computers perform calculations simultaneously.
Ordinary hackers have no way of understanding this kind of thing.
But the facts of nature are there.
Once quantum computers or quantum computers specifically used to solve cryptography appear.
Then most passwords are also invalid.
Because the cost of calculating passwords is no longer infinite time!
……
However, this explanation is too science fiction.
Even Duke doesn’t believe in science fiction!
"Are you kidding? The problem of P and np, and quantum computers? Do you think the speaker will use such things to deal with us?"
"Boss? Don't forget how much money we made this time. Mx Exchange still doesn't dare to announce the truth. Of course we don't dare either because we don't have to. As for FTT..."
"But the speaker didn't take action against us. And if he had such terrifying computing power, why would he be interested in the supercomputer we hacked?"
"That's his problem! We can't think of a better explanation than this technology!"
Duke looked at his companions and said that they were not suitable, because when hackers cooperate with each other to form a team, although everyone has their own opinions, in fact, no one obeys the other technically.
But none of the people in front of me were unconvinced by the speaker.
After all, what happened this time really damaged everyone’s morale!
Duke is a core member of the anonymous organization. However, now the other core members only know that their actions have been a success, but they do not know that they have actually been choked!
……
The results of the discussion were inconclusive, but Duke felt it was his responsibility to tell his companions these things.
So, he released the relevant report about this operation in the internal communication channel!
"I'm sorry, our identity was discovered by another hacker organization's speaker. If you are worried that we will affect the continued survival of the Anonymous organization, if it is safe, I can consider opting out of the organization!"
……
After Duke posted this message, he looked at the silent companions on his cell phone. After a long time, someone suddenly sent a message.
"Thank you for all your hard work over the years, but I think it's time to say goodbye!"
Seeing this reply, Duke felt chilled!
However, at this time, as a core member, no other member said a word to him.
He suddenly began to wonder, what on earth have he been doing all these years?
"Duke! MX Company's Bitcoin, can you hand over these management rights to me?"
Duke looked at the message and wanted to curse, but after hesitating for a long time, he only typed two letters.
"OK!"
(End of this chapter)
You'll Also Like
-
Starry Sky Railway: Start by looking for a marriage partner for the rich pharmacist
Chapter 241 5 hours ago -
Star Iron Genshin Impact: Mihoyo Live
Chapter 299 5 hours ago -
Hong Kong Variety Show: I can travel through the magical world
Chapter 180 5 hours ago -
Naruto: I am Kokushibo, the invincible six-eye
Chapter 76 5 hours ago -
On the night of genocide, I awakened the eternal Izanagi
Chapter 210 5 hours ago -
Elf: I draw a lottery for a divine beast at the beginning, and I am invincible!
Chapter 429 5 hours ago -
Prince of Tennis: Fusion Kaido, Thunder Gossip Polk
Chapter 136 5 hours ago -
American comics: Extracting the immortality of cancer cells at the beginning
Chapter 154 5 hours ago -
What? The ladies in my dreams are real.
Chapter 452 5 hours ago -
Reborn to get the male god system, but transformed into a girl
Chapter 117 5 hours ago