Chapter 486: Apple's Troubles

Apple's shot is extraordinary. Although Longteng Group has stabilized the situation in China, its efforts abroad in recent years have become wiped out in an instant.

Including Longteng Group attaches the most importance to the Japanese market, Longteng Group has made great efforts in order to open the Japanese market. Comics, good voices, it took a lot of effort to open the Japanese market.

But now as soon as Apple makes a move, it has beaten the Longteng Group back to its original shape. As the giant with the highest market value in the United States, Longteng Group's influence is very terrifying. His actions can directly affect the U.S. government and make the U.S. government put pressure on Japan.

This kind of power is not something that Longteng Group can compare. The strength of Longteng Group has not yet reached this point. It's a little better at home, but it doesn't have that ability at all abroad.

Late at night, in Zhang Fan's villa, Zhang Fan was busy in front of the computer. Next to his computer is an Apple phone, and a data cable is connected to the computer.

"Hmph, that's true, Apple, let's see who is not safe. ”

After finding out what he wanted, Zhang Fan laughed. This world and the other world are basically in the same direction. If you go the same way, then some of the problems are basically the same.

What Apple did in another world, did the same in this world. And it is more concealed and ruthless.

Apple in this world, through its own unique closed system, uses special channels to transmit user data back to Apple's server.

This statistic is even more scary than the other world. Even the user's assimilated voice was transmitted back. Through the positioning system, the user's activity trajectory and the use of some software are transmitted back to the headquarters.

In other words, as long as you use your mobile phone, your whole person is basically monitored by Apple. And these data are transmitted back to the US headquarters in a special way.

This transmission method is particularly ingenious, even Zhang Fan didn't find it at the beginning. In the end, he exchanged his prestige for a bunch of experience books, and directly smashed his hacking experience to the limit before discovering this transmission method.

This transmission method is to pass back in the form of different passwords, and the passwords that are passed back are then reassembled and translated. This kind of encryption method is not enough for only top hackers, and it is only possible for top cryptography experts to find out.

Apple has gone to great lengths to send data back in this way, apparently for other purposes. In such a stealthy way, Zhang Fan has reason to believe that Apple's data and the U.S. intelligence system are inextricably linked.

After cracking it, Zhang Fan was not idle. Instead, they quietly began to hack Apple's servers. Hacking into the server, Zhang Fan saw a large amount of data information.

"Obediently, how much data has Apple stolen over the years. ”

Looking at the huge data, Zhang Fan swallowed his saliva, there was too much data. Not only Huaxia data, but also the United States, the European Union and so on. There are so many supporters of Apple in the world, and these users generate a huge amount of data every day.

Together, the amount of data is too big. Seeing these data, Zhang Fan laughed. When these things are exposed, the crusade against Apple is not just ordinary consumers.

No country would be willing to leak such a large-scale intelligence. Because of this kind of data, too many state secrets are involved, and many of these secrets are top secrets.

"This data can't be wasted. ”

Zhang Fan squinted his eyes, so much data is a huge wealth for any company and country. In this era of big data, data is the most valuable thing.

Through various data analysis, useful big data can be obtained. Through this kind of big data, it is possible to develop works that are more relevant to consumers.

Zhang Fan continued to be busy, leaving different backdoors in the database and connecting to Longteng Group's supercomputer through the backdoor. Then Zhang Fan installed a lot of special download tools.

These tools were all made by Zhang Fan himself, and Apple's engineers simply could not find these things.

A large amount of data began to be transmitted and stored in Longteng's superdatabase through the supercomputer.

After setting it up, Zhang Fan stood up. Things have come to this point where you don't have to do it yourself. Especially at home, the power of the state absolutely does not allow such a thing to exist.

Taking out his mobile phone, Zhang Fan dialed an internal phone. As a special talent of the Ministry of Cybersecurity, Zhang Fan's rights are very great.

"Hey, I have something very important to report. It's like this......"

Zhang Fan directly submitted the problems he found. After joining this army for so long, Zhang Fan has not done much, except for helping the military strengthen cybersecurity, Zhang Fan has always been very free.

"What, are you sure?"

At a military base in Yanjing, a middle-aged man in a military uniform looked shocked.

"I'll send you something right now. ”

Zhang Fan hung up the phone and sent some things. Later, at the National Cyber Force Center, some people began to look at what Zhang Fan had sent.

When they saw these things, everyone took a breath. Cybersecurity, they have been working on cybersecurity. But no one expected that the biggest security risk would be Apple.

They did this secretly through hardware and mobile phone systems. Thinking of the popularity of Apple products in China over the years, how much information has been leaked over the years.

"Immediately convene an emergency meeting ......"

The middle-aged soldier's face was iron-blue, angry, and extremely angry. In the depths of this position, it is definitely a dereliction of duty not to find such a hidden danger.

If it weren't for Zhang Fan's discovery today, I'm afraid that the super big vulnerability of domestic network security would not have been discovered by himself.

The news that Zhang Fan discovered was quickly submitted, and when it was submitted, it immediately shocked the entire Huaxia intelligence system. And the cybersecurity department has also begun to take action, checking other mobile phones as well.

At the same time, Zhang Fan also received the task of checking all mobile phones, computers and other communication equipment to see if there were any other back doors.

For such a task, Zhang Fan is also duty-bound. He knows that the more he does, the more protection he and Longteng Group will receive in China.

In addition to these, Zhang Fan also began to secretly plan how to make good use of these things to kill Apple with one blow and get the maximum benefit at the same time. Such a good card in your hand, you must not be broken, if you are broken, how sorry you are for this card in your hand.

Either it's not over, or it's just a one-hit game. When dealing with the enemy, you must give me a chance, kill with one blow, even if you can't kill at once, you must also play disabled, especially an opponent like Apple. 、