Desperate Hacker
Chapter 341
Chapter 341
"Peak, I'm curious how you became a hacker?"
"It's a long story. I'll tell you slowly when I get the chance in the future!"
In this way, an experiment is going on through pictures and chat.
Duke had no previous experience dealing with hardware.
To put it bluntly, he is just a half-way hacker enthusiast.
Although he relies on his clever mind, he is more powerful than ordinary hackers who claim to be professional.
But his knowledge system is not complete, and he has not been exposed to many things before.
Hackers don't just do damage. Strictly speaking, such hackers are actually hackers who are shamed by the hacker community.
After all, anyone with a little practical experience will know that it is more difficult to build something than to destroy it.
Just like some bugs, there are some that are not the programmer's oversight, but are left there by humans.
The purpose is to maintain user confidentiality.
For example, when some organizations want to view all chat messages in a user account.
Why can I always get the other party’s password and username?
Obviously the password can be completely hidden as long as it uses asymmetric encryption.
But until today, many websites still use symmetric encryption.
Both are encryption. The former generates random ciphertext for each password, while the latter can try out the real password through exhaustive methods.
Absolute security in this world is not decided by some companies or individuals.
Rather, it allows you to make the optimal solution under some limited conditions.
Just like this drone in front of me.
The chip architecture model and technology it adopts are not the most advanced.
But Chen Qingfeng still has full respect for the developers who developed this patchwork platform.
Because he knew that this was the best industrial product that the Persians could do under strict blockade.
It's just that if people don't serve themselves, they will be punished by heaven and earth.
Chen Qingfeng wants to use this to exchange for subsequent financial support from His Majesty the Crown Prince.
When the outer sealant of the CPU was opened, the chip inside was quickly exposed.
To Chen Qingfeng's expectation, the chip inside was not Intel or Qualcomm, which he was familiar with and had mature technologies and platforms in the field of drones.
DJI of course has similar products.But Chen Qingfeng feels that it is unlikely that the Persians will obtain a full set of technical authorizations.
But what he saw in front of him was a chip that didn't look like a chip used in the flight control system.
"NXP chip?"
"It looks like this. It seems like it was removed from some household appliance, right?"
Duke sent the message to Chen Qingfeng in a slightly teasing tone, while waiting for further instructions from Chen Qingfeng. OK, I know which circuit Chen Qingfeng still wants to see.
However, Chen Qingfeng stopped.
This is not a chip that Chen Qingfeng often encounters.
To be honest, even if it is a product of Siemens, Chen Qingfeng can understand it.
But the chip in front of me belongs to another semiconductor company.
Simply put, this company has something to do with Philips.This company was established not long ago and is headquartered in Eindhoven, the Netherlands. It became the largest semiconductor group in Europe by acquiring Fiskar Semiconductor a few years ago.
In fact, Europe is not weak in semiconductors.
For example, ASML's photolithography machine is still enviable until now.
However, even a hacker might not be able to understand such high-end stuff.Because producing chips involves knowledge of materials, physics, and optics.
It's not something that hackers can do.
However, after seeing this unfamiliar chip, Chen Qingfeng casually searched it on Taobao.
It doesn’t seem to be a hot commodity!
This eliminates the need to specifically order from overseas.
"What should I do next?"
"no need!"
"What are you talking about? Didn't you just say that we need to reverse engineer? Don't we have to copy out the Persian code and then find a way to recompile it?"
"Don't waste any effort! I think we should take out the chip and study it first. I took a look and found that you can buy it on any website!"
"What do you mean?"
"What I mean is! Instead of studying the Persian code. I don't even know which Persian institution or company developed this aircraft. It's better to study NXP. Since it is a multinational company, it must be the R&D personnel." All over the world, all I have to do is..."
"Use your omnipotent penetration methods to find the original data of chip development? Are you really good at bullying people?"
"Okay, I won't contact you for the next two days! But I think it's boring to just leave you idle like this!"
"What do you mean?"
"I need a helper regarding NXP. Can you go to Europe?"
"I'm happy to oblige!"
"By the way, one more question! How do you feel about Anonymous?"
"Why are you asking this?"
"Look! It's not polite to reciprocate. Last time you pretended to be my name to attack virtual currency traders, so this time I plan to touch the largest semiconductor company in Europe. I just think the name Anonymous is very good? By the way, what do you usually do after you succeed?"
Duke became excited upon hearing this.
Now that I think about it, Anonymous pretty much uses him as a cash machine.
At that time, Duke was still searching for hacker knowledge on the website, and accidentally met a very powerful person, who gave him some pointers, and then he was inexplicably pulled into the Anonymous organization.
At that time, Duke was still very innocent, so he participated in the Anonymous organization to deal with financial issues and some investment projects.
Everyone thinks that these cyber hackers are Robin Hoods who are heroic and righteous.
But only Duke knew that they had a large amount of unexplained money on hand, and they needed customers to help them handle it into clean money that they could spend.
So later, Anonymous discovered online reports about Speaker, and then discovered the means by which Speaker used the open financial market to obtain legitimate income.
With this trick, they even skipped the money laundering process.
As a result, Duke's status within the organization plummeted, so much so that this time he was completely kicked out of the organization.
So when the speaker suggested that we should take revenge?
What do you think Duke would think?
"I found that you and I really hit it off! Have you always been so considerate?"
"as long as you are happy!"
"Haha! When will you do it?"
"That depends on when you went to Europe. By the way, your Medallion Company identity is still there, right?"
"What do you want to do?"
"Find a way to use your colleague's name to send him an email, saying that he wants to know about the market situation and R&D plan of the e200 chip!"
"Why do this?"
"Because the big shots in the company are absolutely too lazy to answer this kind of question. Maybe they will ask the engineer to contact you directly. In this way, as long as we know a little bit about which laboratory under the NXP Group he belongs to, we can probably Understand, who should we attack!"
(End of this chapter)
"Peak, I'm curious how you became a hacker?"
"It's a long story. I'll tell you slowly when I get the chance in the future!"
In this way, an experiment is going on through pictures and chat.
Duke had no previous experience dealing with hardware.
To put it bluntly, he is just a half-way hacker enthusiast.
Although he relies on his clever mind, he is more powerful than ordinary hackers who claim to be professional.
But his knowledge system is not complete, and he has not been exposed to many things before.
Hackers don't just do damage. Strictly speaking, such hackers are actually hackers who are shamed by the hacker community.
After all, anyone with a little practical experience will know that it is more difficult to build something than to destroy it.
Just like some bugs, there are some that are not the programmer's oversight, but are left there by humans.
The purpose is to maintain user confidentiality.
For example, when some organizations want to view all chat messages in a user account.
Why can I always get the other party’s password and username?
Obviously the password can be completely hidden as long as it uses asymmetric encryption.
But until today, many websites still use symmetric encryption.
Both are encryption. The former generates random ciphertext for each password, while the latter can try out the real password through exhaustive methods.
Absolute security in this world is not decided by some companies or individuals.
Rather, it allows you to make the optimal solution under some limited conditions.
Just like this drone in front of me.
The chip architecture model and technology it adopts are not the most advanced.
But Chen Qingfeng still has full respect for the developers who developed this patchwork platform.
Because he knew that this was the best industrial product that the Persians could do under strict blockade.
It's just that if people don't serve themselves, they will be punished by heaven and earth.
Chen Qingfeng wants to use this to exchange for subsequent financial support from His Majesty the Crown Prince.
When the outer sealant of the CPU was opened, the chip inside was quickly exposed.
To Chen Qingfeng's expectation, the chip inside was not Intel or Qualcomm, which he was familiar with and had mature technologies and platforms in the field of drones.
DJI of course has similar products.But Chen Qingfeng feels that it is unlikely that the Persians will obtain a full set of technical authorizations.
But what he saw in front of him was a chip that didn't look like a chip used in the flight control system.
"NXP chip?"
"It looks like this. It seems like it was removed from some household appliance, right?"
Duke sent the message to Chen Qingfeng in a slightly teasing tone, while waiting for further instructions from Chen Qingfeng. OK, I know which circuit Chen Qingfeng still wants to see.
However, Chen Qingfeng stopped.
This is not a chip that Chen Qingfeng often encounters.
To be honest, even if it is a product of Siemens, Chen Qingfeng can understand it.
But the chip in front of me belongs to another semiconductor company.
Simply put, this company has something to do with Philips.This company was established not long ago and is headquartered in Eindhoven, the Netherlands. It became the largest semiconductor group in Europe by acquiring Fiskar Semiconductor a few years ago.
In fact, Europe is not weak in semiconductors.
For example, ASML's photolithography machine is still enviable until now.
However, even a hacker might not be able to understand such high-end stuff.Because producing chips involves knowledge of materials, physics, and optics.
It's not something that hackers can do.
However, after seeing this unfamiliar chip, Chen Qingfeng casually searched it on Taobao.
It doesn’t seem to be a hot commodity!
This eliminates the need to specifically order from overseas.
"What should I do next?"
"no need!"
"What are you talking about? Didn't you just say that we need to reverse engineer? Don't we have to copy out the Persian code and then find a way to recompile it?"
"Don't waste any effort! I think we should take out the chip and study it first. I took a look and found that you can buy it on any website!"
"What do you mean?"
"What I mean is! Instead of studying the Persian code. I don't even know which Persian institution or company developed this aircraft. It's better to study NXP. Since it is a multinational company, it must be the R&D personnel." All over the world, all I have to do is..."
"Use your omnipotent penetration methods to find the original data of chip development? Are you really good at bullying people?"
"Okay, I won't contact you for the next two days! But I think it's boring to just leave you idle like this!"
"What do you mean?"
"I need a helper regarding NXP. Can you go to Europe?"
"I'm happy to oblige!"
"By the way, one more question! How do you feel about Anonymous?"
"Why are you asking this?"
"Look! It's not polite to reciprocate. Last time you pretended to be my name to attack virtual currency traders, so this time I plan to touch the largest semiconductor company in Europe. I just think the name Anonymous is very good? By the way, what do you usually do after you succeed?"
Duke became excited upon hearing this.
Now that I think about it, Anonymous pretty much uses him as a cash machine.
At that time, Duke was still searching for hacker knowledge on the website, and accidentally met a very powerful person, who gave him some pointers, and then he was inexplicably pulled into the Anonymous organization.
At that time, Duke was still very innocent, so he participated in the Anonymous organization to deal with financial issues and some investment projects.
Everyone thinks that these cyber hackers are Robin Hoods who are heroic and righteous.
But only Duke knew that they had a large amount of unexplained money on hand, and they needed customers to help them handle it into clean money that they could spend.
So later, Anonymous discovered online reports about Speaker, and then discovered the means by which Speaker used the open financial market to obtain legitimate income.
With this trick, they even skipped the money laundering process.
As a result, Duke's status within the organization plummeted, so much so that this time he was completely kicked out of the organization.
So when the speaker suggested that we should take revenge?
What do you think Duke would think?
"I found that you and I really hit it off! Have you always been so considerate?"
"as long as you are happy!"
"Haha! When will you do it?"
"That depends on when you went to Europe. By the way, your Medallion Company identity is still there, right?"
"What do you want to do?"
"Find a way to use your colleague's name to send him an email, saying that he wants to know about the market situation and R&D plan of the e200 chip!"
"Why do this?"
"Because the big shots in the company are absolutely too lazy to answer this kind of question. Maybe they will ask the engineer to contact you directly. In this way, as long as we know a little bit about which laboratory under the NXP Group he belongs to, we can probably Understand, who should we attack!"
(End of this chapter)
You'll Also Like
-
Plants vs. Cultivation
Chapter 245 1 hours ago -
The Psychic Resurrection: Riding the Mirage
Chapter 328 1 hours ago -
The Lucky Wife of the Era Married a Rough Man With Space
Chapter 585 1 hours ago -
Eagle Byzantium
Chapter 1357 1 hours ago -
With full level of enlightenment, I turned the lower world into a fairyland
Chapter 170 1 hours ago -
Becoming a God Starts From Planting a Bodhi Tree
Chapter 280 4 hours ago -
Global Mining
Chapter 537 5 hours ago -
The system is very abstract, fortunately I am also
Chapter 173 5 hours ago -
The Secret of the Goddess
Chapter 224 5 hours ago -
Bone King: Welcome the Birth of the King
Chapter 201 5 hours ago