The Black Hat Conference has always been recognized as the top event in the field of information security, and its authority is unique in terms of its ability to predict and describe the future information security situation.In order to ensure that the meeting can focus on reality and can propose solutions, solutions to problems and operational skills as quickly as possible, the meeting environment remains neutral and objective.

Yao Xiaojing's Chinese delegation is the team with the smallest number of people in the participating countries, but Yao Xiaojing won one of the only five speaking opportunities at the conference.This is a very high honor, which is only limited to senior experts who have made great contributions in the field of information security.On the second day after arriving in New York, Yao Xiaojing also received a special invitation from the organizing committee to participate in the next hacker conference.

The two major hacker events "Black Hat" and "Hacker Conference", the former is called Black Hat and the latter is called Defcon, organized by veteran hacker Jeff.Moss was founded in 1992 and 1997 respectively.The development of the Black Hat Conference has become a platform for professionals to exchange research results related to hacking attacks, while the Hacking Conference is more like a grand competition for hackers from all walks of life to demonstrate their "stunt skills".The two conferences stand at two poles, more like the officialdom and the martial arts in the Chinese popular language.In the chaotic and complicated rivers and lakes of the hacker world in the world, there are all kinds of characters, and they perform all kinds of staggering myths and miracles.

Yao Xiaojing was invited to be a judge of the hacker conference competition.She obtained this qualification, which aroused the dissatisfaction of the participating countries. They felt that the organizing committee was too rash and should not have entrusted such an important task to an unknown Chinese female representative.In this regard, the chairman of the organizing committee stepped forward at the right time. He blocked a group of xenophobic people with the scientific research achievement that Yao Xiaojing proposed when he was studying at the Massachusetts Institute of Technology to attack laptops and smartphones with a single computer cable Mouth of an expert hacker.Because none of them has reached that level until now.

All of this happened without Yao Xiaojing's knowledge. Later, Yao Xiaojing's role as a judge of the hacker conference was published in a newspaper by a reporter from the New York Times who was authorized to interview, and it immediately caused an uproar. The speeches in the conference hall on the last day of the Black Hat Conference also became the focus of media and hacker circles.

Before her, no oriental person had successfully stood on the podium of the Black Hat Conference.

On the eve of preparing to play, Qin Zhelang blessed Yao Xiaojing with a smile and pride: "Come on! Xiaojing!"

A beautiful Chinese girl in a navy blue dress with her hair curled up gave him the most beautiful smile.

"To win glory for the country! Duty to shirk!" she promises.

When the host led her to the serious and formal podium under the spotlight, the audience did not give warm applause like the previous speakers.Many people stared at the beautiful oriental girl on stage with surprise, doubt, and even mockery.Many people are wondering why she stood on the highest podium representing the honor of the hacker community.

"Crack...crack..." The few scattered applause came more from the host's microphone.

The atmosphere became a little tense and frozen for a while.

Yao Xiaojing stood tall and graceful on the stage, looking around at the audience of experts of different races and nationalities, facing their unfriendliness, she always kept a faint smile.

She started in pure English: "Everyone, teachers and seniors, hello, I am Yao Xiaojing, the Chinese representative of this conference." She raised her arm, pointed to the door on the side of the conference hall, and asked the experts present loudly: "Would you like me?" I would like to ask everyone to answer a question first, what is behind that gate?"

The people in the audience were stunned, and someone answered loudly: "It's the branch venue of our conference, you don't even know about this..." Many people showed disdain on their faces, and one even set up this year's conference. A senior expert who is unknown to the branch venue, her level may be like her appearance, which is all put on airs.

Yao Xiaojing smiled lightly and thanked the person who answered the question just now.

"Yes, this is a sub-venue set up by this conference. But it is still a sub-venue specially set up by the organizing committee to showcase solutions to hacker attacks. , then this year you have seen that all governments, organizations, and companies, including the grand event founded by Jeff Moss, have also begun to focus on solutions for hacking techniques. What does this explain? It fully illustrates the hacker culture and business, It’s a compromise, or balance, between governments. And hackers themselves are evolving in a certain direction.”

The noise that was still humming under the stage disappeared, and many people showed thoughtful expressions on their faces.

She paused, looked around the audience, and spoke calmly: "Hackers, like any profession in the world, have a process of continuous evolution. For the future of hackers, there are no more than three paths: stick to it, leave or recruit security. Persistent hackers are generally unknown. They are the hardcore supporters of the original hackers. They seem to be the ghosts of this network, wandering among almost all servers, looking for information they are interested in. At the same time, they dislike the commercialization trend of hackers The hackers who left followed the trend and fought offensive and defensive battles for information with great commercial value. Of course, many of them turned to other fields. The hackers who were recruited generally chose large Internet companies or governments. Like hacker conference organizations Moss, who also joined the U.S. Homeland Security Advisory Committee last year. Kevin, who was previously banned from touching keyboards and mobile phones. Mitnick has also been officially invited out of the mountain."

"Standing at different technological starting points and times, the temptations faced by hackers are also different. The earliest hackers whistled to steal phone calls, later hackers used bank loopholes to transfer money directly, and now hackers steal confidential documents of inestimable value. In 2009, Among the companies surveyed by Symantec, 43% lost patent information due to hacking.”

She looked around the audience and said emphatically: "When a hacker uses the technology in his hands to cross the moral bottom line to seek illegitimate benefits, he is already betraying the spirit of the hacker."

"As a hacker, it is worth everyone to sit down and think about what path to choose."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like