Chapter 660: The Archipelago Project
Download the Chapter 660 Islands Plan
Next chapter
While Atletico was talking, Tang Jiayi was trying to control her chin, not only to hold back her laughter, but also to avoid complaining and creating discord between husband and wife.
As an insider, she knows very well that the account self-checker has been in the limelight recently, constantly swiping on the big screen and small screen, and there are a lot of headlines, but in fact, the web widget is not as powerful as people think.
Atletico Madrid has not yet fallen to the point of deception and direct fabrication, and the reason for this result is completely the result of a combination of factors, such as the efforts of him and the security services, the loud mouths of the reporters on the scene, and the inexplicable assistance of a hacker, the combination of the three forces set off this monstrous wave.
The appearance of the gadget is very amazing, as some people can't help but try to use it, the home page of the tool begins to constantly refresh the breached account ID and the total number and cracking rate figures, but it does not show the specific breached website/application name, because in fact, most of the accounts cracked by it come from some unknown small stations, and there are not many big station accounts.
Because of the lack of psychological attention, users are often quite casual when registering accounts on small websites/miscellaneous applications, and will be more inclined to use easy-to-remember simple accounts and passwords, such as ABCDE, 1456, qweasdzxc, etc., and usually small companies and even individual operators should also be a lot lax in terms of security precautions, not to mention password complexity reminders, login retry restrictions, and abnormal login interception These common security measures are generally not available, and they are naturally easy to break.
In fact, limited by the cost and technical level, their servers are also cheap web hosts installed with a free and open source website building system, there are many general vulnerabilities, and the probability of being breached by the whole site is very high, so it is also the preferred target of all kinds of pants removal demons.
On the contrary, the probability of being breached is much smaller, and users psychologically pay more attention to passwords that can tolerate complex and difficult to remember, and the operator's own various security measures will be more in place, and it is generally not easy to be directly breached. Even if a user's account is occasionally stolen, it is mostly achieved through weak password/credential stuffing attempts, Trojan viruses, phishing attacks, and even resetting passwords by replacing cards.
Credential stuffing is a variety of channels, such as attacking a well-known small station to obtain the number of users, and then sorting it out and taking it to other websites for login attempts, just like picking up a bunch of keys and trying them one by one on the door lock, if you are lucky, you can open the account for further operations, and if you are lucky, there is nothing, and the account password will naturally become spam.
After decades of development, the information industry on the surface is developing and prospering, and the world of hackers has also begun to have "industrialization" and "industrial chain", and the hackers who do this are therefore called black industry people. For example, hang up and stuff the library to get a valid account and then carry out in-depth "development", or make a "house inquiry" website to attract traffic and sell advertisements, and in the end, the value of the number of jù libraries will be disclosed to the outside world, and released for people to download publicly to achieve the purpose of waste utilization. The CSDN and Tianya Forum databases that were leaked a few years ago are typical examples of industrial chain development, and the leakage time is much later than the invasion time.
Credential stuffing attacks are naturally illegal and criminal, after all, the key you picked up is not yours, and it is forbidden to save or use it.
Of course, Atletico Madrid can't know the law, so his web gadget does not use credential stuffing attacks with a higher success rate and efficiency, but uses a more "traditional" password dictionary guessing method, the only difference is that his dictionary comes from the real number jù, and after repeated training and optimization, it can be said that it is a dictionary 2.0 based on large numbers jù, and the success rate is much higher than that of traditional methods.
In particular, this product is also intended to confuse the concept,Let the big station and the small station mix together,Everyone looks at the past,It's all gjshgld and the like that are randomly entered at a glance.,And most of the normal and ordinary accounts have been breached.,It looks very scary.。
In fact, as long as you have tried it, it is easy to find that most of the web pages that have been successfully logged in are small websites that are not in the stream, such as picture download stations, pirated novel sites, etc. However, after all, everyone is listening to the speech and can't communicate openly, so they don't know what the proportion of the small station account is, and they can only see the increasing total number of breached account IDs and the cracking rate on the homepage of the tool.
Atletico Madrid's audience has a lot of heads and brains of various technology companies, who are either from technical backgrounds or have a good technical foundation, so they can naturally understand what tricks the person on stage played. But another group of people, the media circle, especially the reporter friends of science and technology news websites, are a little "don't understand", this group of special human beings who are often shocked and collapse and cry miserably, the first thing that comes to mind after seeing the "shocking" numbers on the mobile phone is not to guess the principle and question the authenticity, but to immediately take screenshots and post articles, after all, grabbing news is a race against time.
Originally, this kind of picture stream news may not be able to become popular, and its popularity may not even be as good as the ancestral food of the old Chinese medicine and the rumors that genetically modified organisms poison the national physique, but at this time, someone jumped out to assist, and the nasdaq Chinese concept stock Jiabai.com, which is recently preparing to be privatized and withdrawn from the U.S. stock market, was suddenly exposed last night that the website was broken and the news that 100 million users were leaked, which suddenly ignited the enthusiasm for discussion across the country and even the world.
I don't know if it's a coincidence or a certain number in the dark, Ashleymadison, which is known as the largest extramarital affair website in the former world, was hacked half a year ago, causing a farce of turmoil that has not completely dissipated for several months. At first, the website still didn't admit it when the hackers released it, until they released a number of packages containing the basic information of 37 million users, and the 13-year-old Canadian website was immediately pushed to the forefront.
After downloading and disclosing the data disclosed by various media outlets, they have turned into "big number analysts", producing various global cheating maps, the world's most debaucherous cities, the most open universities, user gender composition analysis, cheating age rankings, politicians with different appearances, and other derivative products, which have found wonderful entertainment for people around the world all summer. Funnily enough, because they were deeply analyzed and interpreted by the world's media, they led to a strong brand communication effect, and the number of registered users finally exceeded the 40 million mark.
Originally, half a year has passed, except for the United States F force and the Royal Canadian Mounted Police, not many people still pay attention to this invasion, after all, the division has been separated, and the inseparable has continued, but the shock bomb released by Jiabaiwang has re-awakened everyone.
Because of this, the topic of "Atletico Madrid demonstrated the invasion on the spot, and your password is not secure" suddenly became popular, and related topics quickly became popular on the Internet. After all, all kinds of passwords are flooding everyone's lives these days, and you can't hide if you want to, unless you go to the mountains to plant corn.
As for the similarities and differences between these two attack methods, they are not on the attention list of those who are happy to talk about it, after all, hot topics or something are just hot topics, I don't know if it seems low, it doesn't make sense to know too much, and who knows when it will become obsolete.
Atletico Madrid has long known that Jiayuan.com was hacked, but it is not clear who did it, and the broken website is like a grass shed, which is ventilated on all sides and has no safety at all, and it is naturally more difficult to guess who did it. However, he didn't expect that the hackers would release the account number so quickly, you must know that this kind of fresh number jù library has a huge "development value", and it usually takes several hands to spread it publicly into the public eye, and it is a complete waste of resources to release it now.
But in any case, with this timely and considerate full-picture assist, it has finally completely ignited the public's discussion of password security, and Bee has also benefited a lot.
However, it is also for this reason that the people of Jiabai.com have put their suspicious eyes on Atletico Madrid, believing that he is the biggest beneficiary of the whole incident and needs to prove his innocence.
For these second-class goods, Atletico Madrid wanted to simply spray them back on the scarf, "MDZZ, I thought it was you guys who were guarding and stealing the stock price!" But thinking that this would pull the color C in, he finally gave up.
For listed companies, it is usually the best situation for the stock price to be stable at a high level, although the market value is a little more watery, but it can still be exchanged for cash if it is stable for a long time. However, for Jiabai, which is preparing to be delisted, the lower the stock price, the better, so that the cost of buying back outstanding shares will be reduced. However, if someone does this in the U.S. stock market, they will definitely be investigated by the Securities and Exchange Commission, and various shareholder lawyers will also jump out to file a lawsuit, so unless the other party's management is collectively poisoned by hydrogen oxide, such speculation will never become a reality. (Oxygen and water are necessary for life, but excessive intake can cause poisoning.)
waited until Atletico Madrid ended the Q&A conversation with the boat lady Xiao Meng, and then Tang Jiayi came to him and bit his ear and said: "That hacker just now made another move and poked out the source code of their chat machine qì program." ”
"It doesn't matter, it's not our machine anyway," Atletico said indifferently, "it's actually quite a pity, but they don't have a lot of mouths and cannons." Do you say I should quote it, and don't give free exposure in vain. ”
"Forget it, do you still lack that little bit of exposure?" Tang Jiayi pushed him: "Let's think about what to say!"
Speaking of which, the ultimate reason why Atletico Madrid threw this small bullet during the Internet conference was to promote their lockbox and the "Archipelago Project".
At that time, the idea was to use the topic of safety to attract everyone's attention first, and then lead to a long-prepared plan, which was in line with the theme of the conference, and it was very appropriate to come up with it.
Who knows, but ran into a crooked building master, and as a result, it scared everyone too hard, deviated from the original plan, and also destroyed the atmosphere of the conference report carefully prepared by various departments. Although the bee has gained a small peak in sales, it is more than worth the loss, so it will cancel the public plan after being interviewed.
As for the promotion of the "Archipelago Project", he could not stop, and in the evening he would hold a party to sell the plan to those who wished to do so.
In the beginning, people compared the disconnected computer system to a lonely island in the ocean of information, and called it "information island". Later, this concept was also widely used in other related fields, and the island of "archipelago" refers to those third-party content providers that are independent of each other, and Bee hopes to pull them to a new open platform and turn the island into an archipelago.
The causes of this phenomenon of isolation are very objective and complex, for example, the scope of information transmission is limited due to technical reasons, and in the past, the cost of interconnection was too high and it could only be turned into a decentralized system; there are also reasons for economic and personal interests, and the right to control information is not just talk.
At a time when big numbers, cloud computing, mobile Internet, and the Internet of Things are emphasized, the information island has become a street rat that everyone shouts and beats, and anyone can shout "break the information island". It's just that it's not easy to do it completely, the industry and the industry should exchange information to break the barriers and misunderstandings, the country should exchange information between all regions and departments, and the country should also advocate the exchange of information, which is the theme of this Internet conference.
However, these things have always been easier said than done, and today we have not even completely solved the problem of language and dialect, and the rapid development of the mobile Internet has brought us new problems, and the information islands have not become fewer, but more.
In the era of the information explosion, people are surrounded by the surging torrent of information all the time, and it is easy to reduce their judgment due to information saturation, so they have to follow the hot spots and become a flock of blind obedience, and finally be divided into "application islands" that seem to be open but are actually closed, and then look down on each other and even hate each other because of communication problems.
Nowadays, mainstream online content providers have their own open platform plans, taking out account operation API interfaces, third-party software SDKs, software development kits, and even large support funds, hoping to recruit allies to make money together.
Of course, the Bee Network is indispensable, and even because it is backed by the Bee system platform, they have stuffed the "Bee Login" API into the vast majority of Beeos applications. However, in actual use, bees obviously feel that the current mainstream open protocol is still not "open" and easy to use, and many times there will be a feeling of not being able to make it itchy from the boots, and then they are unwilling to get involved in the development of standards to quarrel with others, so they simply play by themselves behind closed doors, so there is the archipelago plan.