Chapter 273: The Dark Web
After Liu Long arranged for the intelligent robot to send Liu Yi home, he went to the study, and Yili and the two divine beasts did not bother Liu Long, because they also knew that as long as Liu Long entered the study, he had something to deal with.
Liu Long, who came to the study, first said to one by one, "This time Cook has caused me a lot of trouble, is there any way to make him disappear from the earth." ”
"Young master, Cook is an American after all, and now the relevant departments have known through interrogation that he is the mastermind behind the scenes, if he suddenly has an accident, I am afraid it will not be good for you at that time. Analyze them one by one.
In fact, Liu Long thought about the analysis one by one, but this time the killer made Yili frightened, if it was just like that, I am afraid that he would be blind to the golden finger he had.
But if Liu Long secretly sent an intelligent robot to the United States to solve the rejection of Cook, it may not be troublesome, or even easy, but that just gives the relevant departments the corresponding handle, not that the country is towards Cook, but what Liu Long did is like someone who exceeded the law and privately sentenced and sentenced the guilty person, after all, the relevant departments are particularly interested in Liu Long's mystery, and it is conceivable that the current good situation between him and the country will be affected.
More importantly, he also knows that the purpose of the relevant departments to tell him is transparent, Liu Long is like a plate of beautiful and delicious food, and some people are powerful and want to occupy it as exclusive, and some people identify this plate of food, of course, the purpose is also to eat a few bites, and some people, not only do he say that all the ingredients used in this plate of food are contraband, and even some are made of expired rotten materials, but they are all the same, that is, they all want to take this plate of beautiful and delicious food for themselves, or eat a few bites.
And the biggest obstacle in this is that this beautiful and delicious food has its own thoughts and will not be at the mercy of others, so there will be so many problems, in other words, if Liu Long is not out of control, then everything will be very simple now.
"Then what do you say, you can never pin your hopes on the country, I think you know, after the approval of the national action is completed, I don't know the year of the monkey, and if Cook is arrested, it is an international issue, after all, the killer's confession alone cannot convict him. ”
As Liu Long said, if Cook is Chinese, then it is relatively much simpler, as long as he touches the bottom line of certain rules, then whether he is an entrepreneur or a self-employed person will get the legal punishment he deserves.
But Cook is a foreigner, and he is also a foreigner who used to be very influential, and for the issue of foreign friends, with the strength of China, although it will not be as unbalanced as before, but influential people like Cook will generally be promoted to the level of diplomacy, so it is simply unrealistic for China to convict Cook based on the testimony of the killer.
"Young master, we can repay the contemptible body in a contemptible way, since those killers are all hired by Cook, then we can completely reward the Cook Sutra in the dark web, and then our people can disguise themselves as killers on the dark web to complete this transaction, of course, we can disclose the news that someone bought a murder on the dark web, so that if Cook has an accident, the state can deal with it calmly. ”
After saying it one by one, he probably felt that his plan was very smart, so he jumped around the screen, waiting for Liu Long to praise him, of course, the most important thing in this is the dark web in his mouth, so what is the dark web.
It turns out that the dark web is a kind of network that can only be accessed after a series of special operation settings on the computer or with the assistance of special software or special authorization for the computer - it is called the "dark web".
The data on the "dark web" is transmitted and exchanged in an "invisible" way, which is extremely difficult to retrieve by conventional means, and the same is true for server addresses. In addition, a high degree of privacy is a major feature of the user's contact with each other, and the requirements for interception means and network technology are extremely high, and deciphering the intercepted information is also a major problem.
The dark web is a fork of the deep web, which can currently be done through the "onion network" or "I2P network". Statistics show that the number of domain names on the surface web that we usually see only accounts for 1/400 to 1/500 of the dark web.
The dark web is now widely used by criminals for cybercrime because of its inherently stealthy nature. From the theft of secrets by network hackers of personal behavior, digital currency transactions, illegal sales of illegal prohibited items to the will of the state, all rely on the concealment services of the dark web, so the existence of the dark web poses a severe challenge to the prevention of new networks, economies, endangering national security and other criminal acts, especially the public security and national security departments in the investigation and handling of crimes to trace the source of the huge challenge, the dark web because of its huge harmful characteristics are also listed as one of the new network threats.
Although countries have never stopped cracking down on the dark web, because of the particularity of the dark web, the results are minimal.
The reason why the dark web is so difficult to clean up is because the dark web is actually a scientific research project initiated by the U.S. military and implemented in 2003
Project. The main purpose of its research and development is to provide Internet users with services to hide their identities, and it is precisely because of this feature that the dark web has two sides, on the one hand, it can be used to protect the privacy of Internet users, and on the other hand, it can also be used by criminals to hide criminal traces or engage in other malicious behaviors.
Normal Internet access behaviors are transparent, that is, the access records of users accessing the server through the Internet can be retrospectively reviewed, which is also an important means for public security and national security departments to investigate Internet crimes.
For example, Internet user A accesses website B through the Internet, and the server of website B deploys a traffic monitoring program, so that the IP address used by user A to surf the Internet can be found through the program, and then the address of its Internet terminal can be determined, so that the real identity and hiding place of user A can be found.
However, To
The advent of the To, To
The working principle is that the route of user A to access website B must be encrypted and transmitted through a series of intermediate nodes, and finally the content of website B will be returned to user A, so that it becomes extremely difficult to trace the source, so the dark web is like a tumor that is difficult to cut off, living in the Internet, providing convenience for various illegal and criminal activities.