Chapter 982 - The Onion Router (Two More Requests for Subscription)
Qin Feng came to the stage.
All the hackers gradually quieted down.
As for Q, although everyone doesn't know its name, and what it has done in the past.
But just by virtue of its preparation for this hacker conference and such a successful event, they have gained so much that they deserve their respect.
"Fellow hackers, I believe that over the past few years, you have been confused about two things!" Qin Feng's voice rang out.
Many hackers are listening.
"The first thing is that people aren't safe enough. Whether it's chatting, or the usual exchange of technology, any platform, is very insecure. At any time, because of your unintentional words, the FBI may come to the door. Therefore, everyone is usually very careful and cautious. Even let's live in fear!" Qin Feng said.
These words were agreed by all the hackers on the scene.
This is their life, a miserable life. But it's their choice. They may have broken the law in some way. But in fact, in many cases, most people do so out of a desire for technology, an exploration of technology.
They don't really want to make a profit from it.
Of course, it is not excluded that some of them make a profit from this. But in reality, most people don't make a profit from it. It's more about exposing something out of righteousness and righteousness.
But it also caused trouble and made himself extremely embarrassed.
The worst of these is Philip Katz, who single-handedly overturned Cisco's ARZ company, reducing its profit to zero for the benefit of all netizens.
But what about him, but he died of embarrassment. Of course, it is even possible that he did not die drunk. You must know that people who are really drunk every day are rarely really drunk to death.
On the contrary, the kind of person who is usually very controlling, but occasionally gets drunk once, can get drunk to death.
However, you don't have any evidence that Philip Katz didn't die of drunkenness, but of homicide. There is no evidence.
You know, behind this incident, it involves Cisco. But anything related to IT hardware, as well as some link software, and network protocols, you can't avoid Cisco.
Cisco is so powerful, for ordinary people, they may not have heard of it. But for anyone who learns IT, it is like thunder.
In the face of such a powerful company, they are nothing to a group of hackers.
"The second thing, which is that we lack a platform to publish when we have something big. Especially, when we have some secrets, when we are in a state of justice and righteousness, and we want to publish them, we don't have the means to publish them. Feel free to publish, just like Mr. Katz. In the end, he died!" Qin Feng said.
There was a moment of silence.
This is indeed the most helpless thing that all hackers face.
If you want to be a lone hero, then the result is to go on the road alone.
The world is cruel and cruel. No one can help you. In the end, all you can rely on is yourself.
So what? Q what do you do?
"Here, I want to take this opportunity to solve these two things!" Qin Feng said.
How to fix it?
All the hackers looked curious.
At this moment, the FBI side is already in full swing.
"Always ready to act!" the FBI ordered.
As long as this Q reveals something terrifying, he will be captured.
After being captured, this group of hackers was leaderless.
They are not afraid of hackers, they are afraid of hackers uniting. That's too harmful.
That would be a disaster for everyone.
Those government departments, companies, I'm afraid they will suffer.
That would be a real nightmare.
Therefore, if Qin Feng really wants to do something, they will definitely arrest him. Even if they get into trouble, they need to know Q's identity.
However, the FBI didn't know that the agents they had placed by the FBI at the scene had long been known to Qin Feng.
They asked for 5 places. Originally, these 5 places did not let Te Wupu know.
After all, they are also in black clothes, black pants and black shoes, and they enter the arena wearing face masks.
It is impossible to know.
But they didn't expect that Tewupu arranged a two-night stay here. Naturally, it was impossible for FBI agents to participate. It's easy to expose the target, and it's not allowed by discipline.
What's more, with a monitor on you, it's impossible to do this.
This naturally allowed Te Wupu to find out his identity and lock his whereabouts.
Naturally, Tenopu also hired the relevant bodyguards to hinder these FBIs.
Of course, they don't need to fight with the FBI, they just need to hinder it a little. Anyway, all of them are black clothes, black pants, black shoes, and a big hood. In this case, there is no fear of being discovered.
It can be said that at this moment, next to every FBI agent on the scene, there are two bodyguards invited by Te Wupu to keep an eye on them. As long as the FBI acts, they act.
Therefore, Qin Feng is very safe.
"The first thing I want to do is to create a network where outsiders can't easily log in. At the same time, if you log in, you can also automatically hide each other's identity addresses and information, so that no one can know about it. Qin Feng said.
Numerous hackers nodded. That's what they've always wanted to do, but there's a technical problem.
At the same time, people need to take the lead. This cannot be done without a leader.
Now, with Q in the lead, it couldn't be better.
But what about technology?
"As for the technical issues that everyone is worried about, I have solved them. Qin Feng said with a smile.
During this time, Qin Feng was not only worried about Czech affairs, but at the same time, Qin Feng was also in the United States, using the convenience of his network to search for a technology.
This technology comes from the U.S. military. It is a scientific research project of the U.S. military, and its main purpose is to provide Internet users with services to hide their identities.
To this end, the U.S. military has created a special router called The Onion Router, which can automatically anonymize the user's identity.
The working principle of this router is very simple, that is, after receiving the data from the switch, it will automatically analyze the MAC address contained in the data, that is, the physical address and IP address, and then search the routing table that exists to see if there is a matching address. If not, it will be sent to the router at the next level.
In this way, the feedback is carried out one level at a time, until the address contained in the data is found. Then send it layer by layer, and finally arrive at the destination address.
In this case, the address is completely transparent. The Onion Router, on the other hand, can hide the real IP address in it and add it as a virtual fake address.
In the end, even if the data is intercepted, the real IP address and MAC address cannot be found.
This is also the famous dark web in later generations.