Chapter 144: Attack
Starting from the security issue can provoke the contradiction between the user and the Pangu and Tiangong systems to the greatest extent.
This method has been tried and tested repeatedly in the history of competition in the network of mutual benefit.
At the beginning of the year, Zhongxing wanted to enter the United States, and the products of the United States said that the products of Zhongxing had security vulnerabilities and were monitored by the Xia Kingdom, which could permanently steal the data of the people of the United States.
The news was widely reported by the media in the United States, and the center was allowed to participate in various hearings, and it was not easy to spend a huge amount of money to settle the so-called security gate. In addition to money, the price paid is also the emperor who was installed in the center of the high-level by the United States. The Emperor Taishang is a native of the United States, and he can unconditionally and unrestrictedly read any scientific and technological and financial information of Zhongxing Company, and the high-level management of Zhongxing Xia has no right to interfere.
At the beginning, Huawei wanted to enter the United States, and major enterprises such as Cisco jointly launched a joint action, which also publicized to the media and users that Huawei had serious security vulnerabilities, and was implanted by the relevant departments of Xia Guo into the monitoring backdoor, which would threaten the security of users and enterprises in the United States, and set up a large number of obstacles for Huawei, directly allowing Huawei to give up entering the United States market.
As long as it is something from the Xia Kingdom, security loopholes are the best attack weapons. The West's century-long propaganda of the Xia threat theory has made it easy for ordinary people to believe the rhetoric of the media and giants.
The way of attacking opponents under the pretext of security is not only used on Xia Guo enterprises, but also on the competitors of Mei Guo's own enterprises.
Google and Qualcomm have also attacked Apple's closed system to steal users' privacy, but Apple is a native of the United States, familiar with the country's judicial system, familiar with how to deal with the media, so Apple survived strongly.
Now, the giants are targeting Pangu Technology.
Google and Microsoft are very anxious, and the tech giants are usually not afraid of companies such as Zhongxing and Xiaomi, but they will worry about Warwick and Pangu, because the former does not have many core technologies, while the latter does.
Satya and Sundar reached an agreement after deliberations, and the two sides jointly committed to prohibiting Tiangong and Pangu from entering the Omi Market, and if Pangu wanted to enter the Omega Market, then he must disclose his kernel code to accept everyone's supervision to ensure that it does not threaten the security of users and does not steal users' data.
This condition is not a condition, and the possibility of Microsoft and Apple publishing kernel code is 0 if you ask Microsoft.
Google is also preparing to cooperate with Xia Guo's friends to jointly attack the insecurity of Tiangong's system.
After all, there are only two or three mobile phone manufacturers in Xia Guo who can have the opportunity to cooperate with Pangu Technology, and there are more than ten mobile phone manufacturers in Xia Guo.
"The people of Xia have no country in front of interests. Peter, a strategic analyst at Google, said: "If Pangu can be killed, I think many Xia manufacturers are more willing." ”
After the talks, the capitalists behind Google and Microsoft began to mobilize public opinion.
On Twitter, an industrial software engineer in the United States posted a post attacking the security flaws of the Pangu system.
The mechanical industry software engineer named Carson sent a video to attack Pangu: "I strongly urge our people to stay away from the Pangu operating system in Xia Kingdom!"
Carson said: "The Pangu operating system is indeed very convenient to use, but! Guys! Our information will be stolen by the Xia people! A certain precision control software developed by us using the Pangu operating system and the Xia language has not yet been officially announced to the market, and there is the same software in the Xia country, and it is free to use!"
Carson said angrily: "We downloaded the software in the application market and found that it was exactly the same as the concept we designed! The shameless Xia people stole our results through the Pangu program!"
The video was retweeted 200,000 times on Twitter and became a trending video.
Netizens in the United States commented: "My god won't!
"Does the Pangu system really steal users' information?"
"It's so insecure! If the high-end realm uses the Pangu system, won't all the secrets be stolen?"
"The Pangu system is a means for the Xia people to steal Western technology!"
Soon after, a second video was posted on Twitter.
The protagonist of the video is an Asian woman, who said that she brought a Jiasan mobile phone from Xia Guo and used it for a while, only to find that all the photos were posted on the Internet, and that there were serious security problems in the Tiangong system.
The video was also forwarded in large numbers in an organized manner, and successfully attracted the attention of the security services of the United States.
The information security department of the United States issued a warning announcement, saying that the Pangu system and the Tiangong system have not been confirmed by the confidence security department of the United States, and for the information security of users, the public is called on and enterprises in the fields of science and technology, industry, biology, and software not to use the Pangu and Tiangong systems.
The media propaganda and the warning of the security department really worked, and many companies in the United States that used the Pangu system had no choice but to retreat to the IN system under the interference of the outside world.
The news of the United States' echo ban on the Pangu and Tiangong systems spread to China and was also reposted on Weibo.
Some users are starting to make a splash on Weibo.
"Mi country is banned! Major security risks! If you want to upgrade the Pangu system and buy a plus three mobile phone, please be cautious!"
"The use of the Pangu system by users in the United States has led to the leakage of fruit photos, and users must use the Pangu system carefully!"
"Serious safety hazard ......"
"Urgently call on everyone to stop using the Pangu system......"
Fueled by these people, countless rumors poured out.
One moment someone's private photos are leaked, the next is a certain company's trade secrets are sold, etc., what is said is clear and easy to believe.
Pangu Technology, on the other hand, has become an information dealer who steals user information and sells it.
Mobile phone manufacturers who have not cooperated with Pangu Technology will never let go of this opportunity to promote themselves.
Changge mobile phone, which ranks 5th in Xia Guo's market share, posted on Weibo: "With Android, your safety can be guaranteed!"
Samsung even said: "The world's most secure mobile phone." "With a security advertisement.
For the first time, Apple liked the Weibo posts sent by Samsung and Changge phones.
Microsoft's official Weibo also posted an advertisement, and there is only one core content of the advertisement - security.
Although Microsoft did not send any text, everyone knew that the ad was for the Pangu system.
As the first Shenchuan computer to adopt the Pangu system, it quickly replied on the official website, indicating that there is absolutely no problem with the security of the Pangu system.
The Weibo of the plus three mobile phone has been exploded, and netizens who question the security issue have begun to curse.
Under the official website of Pangu Technology, many users began to question security issues.
Shenchuan and Huawei both urgently contacted Pangu Technology, and if this continues, the equipment equipped with the Pangu system and Tiangong system is likely to encounter sales difficulties.
Please remember that the first domain name of this book is:. Stealing incense mobile version reading website: