225 Bored regedit
Five days have passed, and the mobile phone placed in the release hall by Datang Shizi Technology has touched the hearts of countless people.
According to the background data, more than 30 million people have logged in to view the situation of the Shizi intelligent system through the link of the official website, which is also thanks to Wang Shizi's black money from Microsoft.
However, nothing happened, and the phone was kept on standby all the time, but fortunately the phone was not set to automatically black screen, otherwise it would be really boring.
But even so, countless people waiting to see the excitement have become bored. I thought I could see a wonderful hacker attack and defense battle. But what is this? Is this no one doing anything at all, or is it really impossible to hack this system?
Although the device connected to the phone seems to show that someone is constantly sniffing the phone and trying to connect in various ways, this does not say much about the problem. In short, this is too boring, and it is completely different from the imaginary hot scene.
However, at this moment, a post personally sent by regedit on the black hole forum once again detonated countless hacker discussions on the black hole forum, and then this post and all the follow-up posts were translated into Chinese and reprinted by almost all Chinese portals, which made this topic hotly discussed again.
In the post, Reedit explained in detail all the hacking methods and processes he tried, and gave countless ideas for invasion. Unfortunately, all of them didn't work out. At the end of the post, he said: "First of all, the Chinese are in Laipi. Putting a system out there without doing anything limits our play, and there are too many means to use; Secondly, what the hell is a system that only has four services enabled? Is this the only service that users can use when they use it? Well, I admit that I have no chance of a successful invasion for the rest of the time in this situation, so I announce my withdrawal from this pointless competition. ”
"Also. Is NCSC now occupied by a herd of pigs? Although the Chinese people are laipid,But only from the security point of view,This system is better than win10I don't know how powerful it is! Don't say anything else. The intelligent anti-sniffing technology of this system is an absolute nightmare for all hackers. And NCSC actually said that this system only has a D-level safety level, which made me misjudge! Well, I'm ashamed, I'm angry. NCSC, you're dead! ”
There is a natural tide below.
Many well-known hackers in the industry have replied in support of this post. I can't help it, everyone is very hard these days. It took five days to waste this system, but there was no result at all, and now that someone is taking the lead, how can you not vent? Anyway, there's nothing to be ashamed of if you can't get black, and gods like regedit are helpless.
Of course, there are also people who complain after him, in fact, regedit is right, the phone is left there and no one uses it, which naturally makes them have too many less attack methods. This makes them quite unhappy.
And the post is more about technical discussions. I have to say, although the Shizi system feels amazing. But there are many ways to break into the reggedit, which is refreshing for everyone. There's even a way to get a successful invasion if you have enough computing power to support it.
But in any case, when these professional posts are translated into Chinese and put on the Internet, in the eyes of ordinary people, these hackers are obviously making excuses for their incompetence.
I rub! used to boast that Haikou would definitely hack this system within 48 hours, but now five days have passed, what does it mean to post a post saying that I don't blame me for not working hard, but just blame the enemy for being too cunning?
In short, the mysterious hacking technology posts in front of the regedit post are all incomprehensible, but the words behind them can be understood. Anyway, who is this cheating? When Datang Shizi Technology communicated with you before, it was very clear that the mobile phone was there, and the IP was given to you, so that you could invade at will, and now that the invasion was unsuccessful, it began to find an excuse to pour bitter water, isn't this?
As for the posts in the back where the hackers poured bitter water together, they were directly ignored by the public. Sure enough, it's a group of people towards a group of people.,Anyway, the fact is that a group of the world's top hackers.,Busy for a whole week.,Failed to break through a system that was placed there.,And the IP is clear.,This seems to be enough to show that the security of the world's smartphone system is really strong enough!
So isn't the content of the previous evaluation of the American Orange Book nonsense? Now that I think about it, could it be that the Americans saw that this system was more advanced than their technology, so they deliberately suppressed it in this way?
There is only one explanation, otherwise why are they brainless?
As a direct consequence of this post, the authority of the American Orange Book began to be widely questioned, and countless analysts even began to write articles, despising this official system security evaluation agency as the spokesperson of American companies, and they can do professional advertising......
What's more, the Shizi smartphone system has been justified this time, and the silence of Datang Shizi Technology before is naturally better interpreted, it turns out that this company doesn't bother to sue with those water armies at all, and other people's confidence in their own systems has already made them not need to prove it through explanations......
Reedit, on the other hand, became a tragic figure.
In fact, regedit has a good reputation in the hacker circles he is in, but it is not seen that way in the eyes of ordinary people. This guy has obviously just reached a peak in his life, and he encountered Waterloo in a blink of an eye, which is sad.
But just when countless people were feeling sorry for regedit, this guy made another move, and less than three hours after posting, the websites of the National Security Agency and its subordinate agency, the National Center for Computer Security, were hacked......
Now log in to these two websites, there is only a dynamic picture left, a big pig with five big and three thick, is arching a big bucket, walking in the lattice office, and in front of each work computer, there is a cute pig sitting in front of the computer, and the picture is accompanied by captions, "Look, sure enough, these institutions are occupied by a group of pigs......"
Although these two official institutions immediately shut down their websites after being hacked for five minutes, but in this information age, these two pictures have spread all over the world, and everyone has once again seen the power of regedit, Nima, it's only been three hours since this guy was on the black hole platform, and he directly hacked the official websites of two serious official departments in the United States, is this really a tragic figure? It still seems to be so no-talk (sao)...... (To be continued......)
PS: Thanks: The top of the rabbit fur, Qi, young master, 588, happyhugo, 100, starting point coin reward!