Strengthen the technology system

Chapter 102 Performance Vulnerabilities

Chapter 102 Performance Vulnerabilities
"Oh? Ding Jie, what can you do?" Ren Hong's voice seemed very casual.

Ding Jie went straight to the topic, "That's it. The Data Master Apple version has been tested by the International Network Security Department, and it has been proved that there is no problem. I have a record number here. You can check it online!"

With the record number, you can check the number directly on the official website of the Ministry of International Security, and you will be able to find out if there are any problems.

"Record number, I know, I will notify the Apple headquarters." Ren Hong's voice seemed a little cold, and the record number that Ding Jie mentioned just now was not written down at all.

At the Apple headquarters, it is absolutely impossible for the data master to unblock it, even if there is no international inspection.

Cook has long ordered that the data master has a security risk, and then the data master will be blocked and will never be released to the Apple market.

The previous negative news in China was also caused by Ren Hong. He found a few trustees, pretended that there was a problem with the mobile phone, and spent money to find the largest domestic media to report.

This is how it is these days, money is easy to do things, unnecessary things, 20 is not enough to drop 20, 30 is not enough to drop 50, [-], there is always a price, which can make the fake become real.

"If you have nothing to do, just hang up, I'm very busy." Ren Hong didn't wait for Ding Jie to answer, and hung up the phone directly.

On Apple's side, it is absolutely impossible for Data Master to continue to appear in the market. If Data Master is allowed to continue to develop, the sales of Apple machines will continue to decline even more, resulting in a much slower replacement speed.

This is something that Cook absolutely does not want to see. The data master blocks his own money and the sale of new machines, so he must directly trample to death.

Ding Jie heard the busy tone on the other end of the phone, and already knew the result, "The road of international appraisal is really not going to work, so we can only continue to look for other ways, or go to those people who published fake news?"

This is very difficult. The people who posted the fake news did not disclose their real names on the Internet, they were all pseudonyms, and they all wore mosaics when they showed up. From this point of view, the root cause cannot be found.

Ding Jie directly started hacking activities, relying on his own intrusion technology, successfully invaded the backstage of several media, and found some information about Ren Hong on it.

"Sure enough, Ren Hong had contacted several media a few days ago, and there is also a record of Apple's remittance, but this can only be used as evidence, but it cannot prove anything more."

The technology of the intrusion is very strong, and Apple's remittance records were quickly found in several media, but only these remittance records, there is no other valuable information.

The remittance records alone can only prove that Ren Hong has contacts with several media outlets in the past few days, but there is no real evidence, pointing out that those who made false evidence are the tricks of Ren Hong.

"By the way, I have installed Antivirus Guard for the Apple version of Data Master a while ago, and I have also collected some information about the vulnerabilities of the Apple system. Maybe I can find something useful."

The Apple version of Antivirus Guard has been running for nearly half a month. During this period, there are loopholes and hidden dangers in the Apple system, which are fed back to the Antivirus Guard Apple database.You may find some useful information here.

Open the database and look down one by one from top to bottom.In half a month, Antivirus Guard detected many vulnerabilities in Apple and tried to repair them proactively. However, the Apple system is closed. Only a few simple vulnerabilities were automatically repaired, and the remaining vulnerabilities were automatically rejected by the system.

Apple's system security is much higher than that of Android. Antivirus Guard only found 7 vulnerabilities in total, and automatically repaired 4 of them. The remaining [-] vulnerabilities were directly rejected by the system and could not be repaired.

Ding Jie looked at it from top to bottom, and found nothing wrong with the first five. When he saw the sixth, his eyes lit up, and something caught in his mind instantly.

"Performance vulnerability: After the system detects that the battery is aging, it will actively reduce the frequency, and the performance of the mobile phone will decrease accordingly, affecting the operating experience."

Under this performance vulnerability, there are also some very critical information marked. After the battery ages, the system will limit the frequency of the mobile phone, the screen sliding frame rate will decrease, the application startup time will become longer, and the background application needs to be reloaded when it starts. Frame rate drops.

"My God! So that's the case. No wonder the more Apple updates, the more laggy it gets. It turns out that Apple is reducing the frequency of the mobile phone, so the more you use it, the slower it gets!"

This vulnerability points to the source of the slowdown of Apple mobile phones. It is not that the updated version has too high requirements for the system, but that the update package limits the batteries of old mobile phones.

"Apple has done a good job. For the sake of sales of new phones, it automatically lowers the frequency, making old phones more and more sluggish. Naturally, users will buy new phones! But where are the rights and interests of consumers? No user Know that Apple's frequency reduction behavior exists!"

Apple's performance loophole should not be called a loophole specifically, and it is a deliberate behavior that has not been disclosed to anyone.

In other words, any consumer is not aware of this matter, nor does he know why the mobile phone system, which claims to be the best optimized, will become more and more stuck after two years of use.

This is a typical fraud, infringing on the legitimate rights and interests of consumers for the benefit of the company.

"It's no wonder that Apple wants to curb the development of Data Master at all costs. They have done this behind the scenes to make mobile phones more and more stuck, and to promote the sales of new phones. Although Data Master did not fix this bug, they directly let the mobile phone No more freezes, causing Apple's sales strategy to fail."

At this time, Ding Jie finally discovered the source of the problem, all of which was caused by Apple's hidden sales methods.

"Since you have banned the data masters, I will also make the performance loopholes public. The more muddy this situation is, the better!"

If there is no antivirus guard, how long will Apple have to hide such a bad performance loophole, and how long will it deceive users.

But since Ding Jie discovered this problem, and Apple targeted the data master so much, then this incident must not be easily resolved, and justice must be sought for everyone.

After sorting out the materials, Ding Jie rushed from Jin City to Kyoto overnight, and arrived at the headquarters of Xinlang Entertainment before dark.This matter is of great importance, and you must go there yourself before you can rest assured. If you hand it over to your subordinates, you may not be able to explain the order in it, or it is more convincing to say it yourself.

As soon as he entered the door, the receptionist at the door immediately asked, "Hi sir, who are you looking for?"

"It's like this. I'm from Wondershare Technology. I'm here to meet your Mr. Wu!" Although Ding Jie has never met this Wu Xin, he has dealt with him within the company, and it can be regarded as a cooperative relationship.

When the reception staff heard that someone was looking for Mr. Wu, they immediately paid attention to it, and took the phone at the front desk to inquire, "Sir, Mr. Wu is waiting for you in the conference room on the tenth floor, you can just go up."

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like